aws-sdk-paymentcryptographydata 1.8.0 → 1.10.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-paymentcryptographydata/client.rb +94 -47
- data/lib/aws-sdk-paymentcryptographydata/client_api.rb +15 -2
- data/lib/aws-sdk-paymentcryptographydata/endpoint_provider.rb +1 -1
- data/lib/aws-sdk-paymentcryptographydata/plugins/endpoints.rb +1 -0
- data/lib/aws-sdk-paymentcryptographydata/types.rb +135 -96
- data/lib/aws-sdk-paymentcryptographydata.rb +1 -1
- data/sig/client.rbs +561 -0
- data/sig/errors.rbs +36 -0
- data/sig/resource.rbs +79 -0
- data/sig/types.rbs +690 -0
- data/sig/waiters.rbs +13 -0
- metadata +13 -8
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6126989706af46778cf434cc347a8c7d3612827a1001706d0e213e05d5cd9612
|
4
|
+
data.tar.gz: a8a99a810c24b25b8ba1b9f30b7fc03d295cb426c41ff77e207dfe888a3654b9
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1c69e8560dd194bdfaf4d56ae5ffaaeb3b00fd4a79531eae91657eb4d8095c469d9bb8ec5b19820ce97c8c179abc57351f132fa829bb9ff336c6a5664eadade1
|
7
|
+
data.tar.gz: d274c07082e1aa888f464d77ab4aa465a6a479a276b07537752850fa537d2601994e2a383974a57d80ca1f3605f9e6beaacf910df91f8252dab7c11380ad41dd
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.10.0 (2024-03-07)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - AWS Payment Cryptography EMV Decrypt Feature Release
|
8
|
+
|
9
|
+
1.9.0 (2024-01-26)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.8.0 (2023-11-28)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.10.0
|
@@ -388,9 +388,10 @@ module Aws::PaymentCryptographyData
|
|
388
388
|
|
389
389
|
# @!group API Operations
|
390
390
|
|
391
|
-
# Decrypts ciphertext data to plaintext using symmetric,
|
392
|
-
# DUKPT
|
393
|
-
# in the *Amazon Web Services
|
391
|
+
# Decrypts ciphertext data to plaintext using a symmetric (TDES, AES),
|
392
|
+
# asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For
|
393
|
+
# more information, see [Decrypt data][1] in the *Amazon Web Services
|
394
|
+
# Payment Cryptography User Guide*.
|
394
395
|
#
|
395
396
|
# You can use an encryption key generated within Amazon Web Services
|
396
397
|
# Payment Cryptography, or you can import your own encryption key by
|
@@ -403,11 +404,15 @@ module Aws::PaymentCryptographyData
|
|
403
404
|
# [GetPublicCertificate][3].
|
404
405
|
#
|
405
406
|
# For symmetric and DUKPT decryption, Amazon Web Services Payment
|
406
|
-
# Cryptography supports `TDES` and `AES` algorithms. For
|
407
|
-
#
|
408
|
-
#
|
409
|
-
#
|
410
|
-
#
|
407
|
+
# Cryptography supports `TDES` and `AES` algorithms. For EMV decryption,
|
408
|
+
# Amazon Web Services Payment Cryptography supports `TDES` algorithms.
|
409
|
+
# For asymmetric decryption, Amazon Web Services Payment Cryptography
|
410
|
+
# supports `RSA`.
|
411
|
+
#
|
412
|
+
# When you use TDES or TDES DUKPT, the ciphertext data length must be a
|
413
|
+
# multiple of 8 bytes. For AES or AES DUKPT, the ciphertext data length
|
414
|
+
# must be a multiple of 16 bytes. For RSA, it sould be equal to the key
|
415
|
+
# size unless padding is enabled.
|
411
416
|
#
|
412
417
|
# For information about valid keys for this operation, see
|
413
418
|
# [Understanding key attributes][4] and [Key types for specific data
|
@@ -464,6 +469,14 @@ module Aws::PaymentCryptographyData
|
|
464
469
|
# key_serial_number: "HexLengthBetween10And24", # required
|
465
470
|
# mode: "ECB", # accepts ECB, CBC
|
466
471
|
# },
|
472
|
+
# emv: {
|
473
|
+
# initialization_vector: "HexLength16Or32",
|
474
|
+
# major_key_derivation_mode: "EMV_OPTION_A", # required, accepts EMV_OPTION_A, EMV_OPTION_B
|
475
|
+
# mode: "ECB", # accepts ECB, CBC
|
476
|
+
# pan_sequence_number: "HexLengthEquals2", # required
|
477
|
+
# primary_account_number: "NumberLengthBetween12And19", # required
|
478
|
+
# session_derivation_data: "HexLengthEquals16", # required
|
479
|
+
# },
|
467
480
|
# symmetric: {
|
468
481
|
# initialization_vector: "HexLength16Or32",
|
469
482
|
# mode: "ECB", # required, accepts ECB, CBC, CFB, CFB1, CFB8, CFB64, CFB128, OFB
|
@@ -488,9 +501,10 @@ module Aws::PaymentCryptographyData
|
|
488
501
|
req.send_request(options)
|
489
502
|
end
|
490
503
|
|
491
|
-
# Encrypts plaintext data to ciphertext using symmetric,
|
492
|
-
# DUKPT
|
493
|
-
# in the *Amazon Web Services
|
504
|
+
# Encrypts plaintext data to ciphertext using a symmetric (TDES, AES),
|
505
|
+
# asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For
|
506
|
+
# more information, see [Encrypt data][1] in the *Amazon Web Services
|
507
|
+
# Payment Cryptography User Guide*.
|
494
508
|
#
|
495
509
|
# You can generate an encryption key within Amazon Web Services Payment
|
496
510
|
# Cryptography by calling [CreateKey][2]. You can import your own
|
@@ -498,14 +512,24 @@ module Aws::PaymentCryptographyData
|
|
498
512
|
# must have `KeyModesOfUse` set to `Encrypt`. In asymmetric encryption,
|
499
513
|
# plaintext is encrypted using public component. You can import the
|
500
514
|
# public component of an asymmetric key pair created outside Amazon Web
|
501
|
-
# Services Payment Cryptography by calling [ImportKey][3]
|
515
|
+
# Services Payment Cryptography by calling [ImportKey][3].
|
502
516
|
#
|
503
|
-
#
|
504
|
-
# Cryptography supports `TDES` and `AES` algorithms. For
|
505
|
-
#
|
506
|
-
#
|
507
|
-
#
|
508
|
-
#
|
517
|
+
# For symmetric and DUKPT encryption, Amazon Web Services Payment
|
518
|
+
# Cryptography supports `TDES` and `AES` algorithms. For EMV encryption,
|
519
|
+
# Amazon Web Services Payment Cryptography supports `TDES`
|
520
|
+
# algorithms.For asymmetric encryption, Amazon Web Services Payment
|
521
|
+
# Cryptography supports `RSA`.
|
522
|
+
#
|
523
|
+
# When you use TDES or TDES DUKPT, the plaintext data length must be a
|
524
|
+
# multiple of 8 bytes. For AES or AES DUKPT, the plaintext data length
|
525
|
+
# must be a multiple of 16 bytes. For RSA, it sould be equal to the key
|
526
|
+
# size unless padding is enabled.
|
527
|
+
#
|
528
|
+
# To encrypt using DUKPT, you must already have a BDK (Base Derivation
|
529
|
+
# Key) key in your account with `KeyModesOfUse` set to `DeriveKey`, or
|
530
|
+
# you can generate a new DUKPT key by calling [CreateKey][2]. To encrypt
|
531
|
+
# using EMV, you must already have an IMK (Issuer Master Key) key in
|
532
|
+
# your account with `KeyModesOfUse` set to `DeriveKey`.
|
509
533
|
#
|
510
534
|
# For information about valid keys for this operation, see
|
511
535
|
# [Understanding key attributes][4] and [Key types for specific data
|
@@ -544,6 +568,18 @@ module Aws::PaymentCryptographyData
|
|
544
568
|
# @option params [required, String] :plain_text
|
545
569
|
# The plaintext to be encrypted.
|
546
570
|
#
|
571
|
+
# <note markdown="1"> For encryption using asymmetric keys, plaintext data length is
|
572
|
+
# constrained by encryption key strength that you define in
|
573
|
+
# `KeyAlgorithm` and padding type that you define in
|
574
|
+
# `AsymmetricEncryptionAttributes`. For more information, see [Encrypt
|
575
|
+
# data][1] in the *Amazon Web Services Payment Cryptography User Guide*.
|
576
|
+
#
|
577
|
+
# </note>
|
578
|
+
#
|
579
|
+
#
|
580
|
+
#
|
581
|
+
# [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html
|
582
|
+
#
|
547
583
|
# @return [Types::EncryptDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
548
584
|
#
|
549
585
|
# * {Types::EncryptDataOutput#cipher_text #cipher_text} => String
|
@@ -564,6 +600,14 @@ module Aws::PaymentCryptographyData
|
|
564
600
|
# key_serial_number: "HexLengthBetween10And24", # required
|
565
601
|
# mode: "ECB", # accepts ECB, CBC
|
566
602
|
# },
|
603
|
+
# emv: {
|
604
|
+
# initialization_vector: "HexLength16Or32",
|
605
|
+
# major_key_derivation_mode: "EMV_OPTION_A", # required, accepts EMV_OPTION_A, EMV_OPTION_B
|
606
|
+
# mode: "ECB", # accepts ECB, CBC
|
607
|
+
# pan_sequence_number: "HexLengthEquals2", # required
|
608
|
+
# primary_account_number: "NumberLengthBetween12And19", # required
|
609
|
+
# session_derivation_data: "HexLengthEquals16", # required
|
610
|
+
# },
|
567
611
|
# symmetric: {
|
568
612
|
# initialization_vector: "HexLength16Or32",
|
569
613
|
# mode: "ECB", # required, accepts ECB, CBC, CFB, CFB1, CFB8, CFB64, CFB128, OFB
|
@@ -708,15 +752,19 @@ module Aws::PaymentCryptographyData
|
|
708
752
|
# Generates a Message Authentication Code (MAC) cryptogram within Amazon
|
709
753
|
# Web Services Payment Cryptography.
|
710
754
|
#
|
711
|
-
# You can use this operation
|
712
|
-
#
|
713
|
-
#
|
714
|
-
#
|
715
|
-
#
|
716
|
-
#
|
717
|
-
#
|
718
|
-
#
|
719
|
-
#
|
755
|
+
# You can use this operation to authenticate card-related data by using
|
756
|
+
# known data values to generate MAC for data validation between the
|
757
|
+
# sending and receiving parties. This operation uses message data, a
|
758
|
+
# secret encryption key and MAC algorithm to generate a unique MAC value
|
759
|
+
# for transmission. The receiving party of the MAC must use the same
|
760
|
+
# message data, secret encryption key and MAC algorithm to reproduce
|
761
|
+
# another MAC value for comparision.
|
762
|
+
#
|
763
|
+
# You can use this operation to generate a DUPKT, CMAC, HMAC or EMV MAC
|
764
|
+
# by setting generation attributes and algorithm to the associated
|
765
|
+
# values. The MAC generation encryption key must have valid values for
|
766
|
+
# `KeyUsage` such as `TR31_M7_HMAC_KEY` for HMAC generation, and they
|
767
|
+
# key must have `KeyModesOfUse` set to `Generate` and `Verify`.
|
720
768
|
#
|
721
769
|
# For information about valid keys for this operation, see
|
722
770
|
# [Understanding key attributes][1] and [Key types for specific data
|
@@ -748,7 +796,8 @@ module Aws::PaymentCryptographyData
|
|
748
796
|
# The length of a MAC under generation.
|
749
797
|
#
|
750
798
|
# @option params [required, String] :message_data
|
751
|
-
# The data for which a MAC is under generation.
|
799
|
+
# The data for which a MAC is under generation. This value must be
|
800
|
+
# hexBinary.
|
752
801
|
#
|
753
802
|
# @return [Types::GenerateMacOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
754
803
|
#
|
@@ -1073,10 +1122,7 @@ module Aws::PaymentCryptographyData
|
|
1073
1122
|
# can be from PEK (Pin Encryption Key) to BDK (Base Derivation Key) for
|
1074
1123
|
# DUKPT or from BDK for DUKPT to PEK. Amazon Web Services Payment
|
1075
1124
|
# Cryptography supports `TDES` and `AES` key derivation type for DUKPT
|
1076
|
-
#
|
1077
|
-
# Encryption) use cases where the encryption keys should change but the
|
1078
|
-
# processing system either does not need to, or is not permitted to,
|
1079
|
-
# decrypt the data.
|
1125
|
+
# translations.
|
1080
1126
|
#
|
1081
1127
|
# The allowed combinations of PIN block format translations are guided
|
1082
1128
|
# by PCI. It is important to note that not all encrypted PIN block
|
@@ -1090,8 +1136,9 @@ module Aws::PaymentCryptographyData
|
|
1090
1136
|
# operations][3] in the *Amazon Web Services Payment Cryptography User
|
1091
1137
|
# Guide*.
|
1092
1138
|
#
|
1093
|
-
# <note markdown="1">
|
1094
|
-
#
|
1139
|
+
# <note markdown="1"> Amazon Web Services Payment Cryptography currently supports ISO PIN
|
1140
|
+
# block 4 translation for PIN block built using legacy PAN length. That
|
1141
|
+
# is, PAN is the right most 12 digits excluding the check digits.
|
1095
1142
|
#
|
1096
1143
|
# </note>
|
1097
1144
|
#
|
@@ -1116,15 +1163,15 @@ module Aws::PaymentCryptographyData
|
|
1116
1163
|
#
|
1117
1164
|
# @option params [Types::DukptDerivationAttributes] :incoming_dukpt_attributes
|
1118
1165
|
# The attributes and values to use for incoming DUKPT encryption key for
|
1119
|
-
# PIN block
|
1166
|
+
# PIN block translation.
|
1120
1167
|
#
|
1121
1168
|
# @option params [required, String] :incoming_key_identifier
|
1122
1169
|
# The `keyARN` of the encryption key under which incoming PIN block data
|
1123
1170
|
# is encrypted. This key type can be PEK or BDK.
|
1124
1171
|
#
|
1125
1172
|
# @option params [required, Types::TranslationIsoFormats] :incoming_translation_attributes
|
1126
|
-
# The format of the incoming PIN block data for
|
1127
|
-
# Web Services Payment Cryptography.
|
1173
|
+
# The format of the incoming PIN block data for translation within
|
1174
|
+
# Amazon Web Services Payment Cryptography.
|
1128
1175
|
#
|
1129
1176
|
# @option params [Types::DukptDerivationAttributes] :outgoing_dukpt_attributes
|
1130
1177
|
# The attributes and values to use for outgoing DUKPT encryption key
|
@@ -1135,7 +1182,7 @@ module Aws::PaymentCryptographyData
|
|
1135
1182
|
# data. This key type can be PEK or BDK.
|
1136
1183
|
#
|
1137
1184
|
# @option params [required, Types::TranslationIsoFormats] :outgoing_translation_attributes
|
1138
|
-
# The format of the outgoing PIN block data after
|
1185
|
+
# The format of the outgoing PIN block data after translation by Amazon
|
1139
1186
|
# Web Services Payment Cryptography.
|
1140
1187
|
#
|
1141
1188
|
# @return [Types::TranslatePinDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -1460,13 +1507,12 @@ module Aws::PaymentCryptographyData
|
|
1460
1507
|
|
1461
1508
|
# Verifies a Message Authentication Code (MAC).
|
1462
1509
|
#
|
1463
|
-
# You can use this operation
|
1464
|
-
#
|
1465
|
-
#
|
1466
|
-
#
|
1467
|
-
#
|
1468
|
-
#
|
1469
|
-
# same encryption key for MAC verification as you use for GenerateMac.
|
1510
|
+
# You can use this operation to verify MAC for message data
|
1511
|
+
# authentication such as . In this operation, you must use the same
|
1512
|
+
# message data, secret encryption key and MAC algorithm that was used to
|
1513
|
+
# generate MAC. You can use this operation to verify a DUPKT, CMAC, HMAC
|
1514
|
+
# or EMV MAC by setting generation attributes and algorithm to the
|
1515
|
+
# associated values.
|
1470
1516
|
#
|
1471
1517
|
# For information about valid keys for this operation, see
|
1472
1518
|
# [Understanding key attributes][1] and [Key types for specific data
|
@@ -1498,7 +1544,8 @@ module Aws::PaymentCryptographyData
|
|
1498
1544
|
# The length of the MAC.
|
1499
1545
|
#
|
1500
1546
|
# @option params [required, String] :message_data
|
1501
|
-
# The data on for which MAC is under verification.
|
1547
|
+
# The data on for which MAC is under verification. This value must be
|
1548
|
+
# hexBinary.
|
1502
1549
|
#
|
1503
1550
|
# @option params [required, Types::MacAttributes] :verification_attributes
|
1504
1551
|
# The attributes and data values to use for MAC verification within
|
@@ -1691,7 +1738,7 @@ module Aws::PaymentCryptographyData
|
|
1691
1738
|
params: params,
|
1692
1739
|
config: config)
|
1693
1740
|
context[:gem_name] = 'aws-sdk-paymentcryptographydata'
|
1694
|
-
context[:gem_version] = '1.
|
1741
|
+
context[:gem_version] = '1.10.0'
|
1695
1742
|
Seahorse::Client::Request.new(handlers, context)
|
1696
1743
|
end
|
1697
1744
|
|
@@ -36,6 +36,9 @@ module Aws::PaymentCryptographyData
|
|
36
36
|
DukptKeyVariant = Shapes::StringShape.new(name: 'DukptKeyVariant')
|
37
37
|
DynamicCardVerificationCode = Shapes::StructureShape.new(name: 'DynamicCardVerificationCode')
|
38
38
|
DynamicCardVerificationValue = Shapes::StructureShape.new(name: 'DynamicCardVerificationValue')
|
39
|
+
EmvEncryptionAttributes = Shapes::StructureShape.new(name: 'EmvEncryptionAttributes')
|
40
|
+
EmvEncryptionMode = Shapes::StringShape.new(name: 'EmvEncryptionMode')
|
41
|
+
EmvMajorKeyDerivationMode = Shapes::StringShape.new(name: 'EmvMajorKeyDerivationMode')
|
39
42
|
EncryptDataInput = Shapes::StructureShape.new(name: 'EncryptDataInput')
|
40
43
|
EncryptDataOutput = Shapes::StructureShape.new(name: 'EncryptDataOutput')
|
41
44
|
EncryptionDecryptionAttributes = Shapes::UnionShape.new(name: 'EncryptionDecryptionAttributes')
|
@@ -253,6 +256,14 @@ module Aws::PaymentCryptographyData
|
|
253
256
|
DynamicCardVerificationValue.add_member(:service_code, Shapes::ShapeRef.new(shape: NumberLengthEquals3, required: true, location_name: "ServiceCode"))
|
254
257
|
DynamicCardVerificationValue.struct_class = Types::DynamicCardVerificationValue
|
255
258
|
|
259
|
+
EmvEncryptionAttributes.add_member(:initialization_vector, Shapes::ShapeRef.new(shape: HexLength16Or32, location_name: "InitializationVector"))
|
260
|
+
EmvEncryptionAttributes.add_member(:major_key_derivation_mode, Shapes::ShapeRef.new(shape: EmvMajorKeyDerivationMode, required: true, location_name: "MajorKeyDerivationMode"))
|
261
|
+
EmvEncryptionAttributes.add_member(:mode, Shapes::ShapeRef.new(shape: EmvEncryptionMode, location_name: "Mode"))
|
262
|
+
EmvEncryptionAttributes.add_member(:pan_sequence_number, Shapes::ShapeRef.new(shape: HexLengthEquals2, required: true, location_name: "PanSequenceNumber"))
|
263
|
+
EmvEncryptionAttributes.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
|
264
|
+
EmvEncryptionAttributes.add_member(:session_derivation_data, Shapes::ShapeRef.new(shape: HexLengthEquals16, required: true, location_name: "SessionDerivationData"))
|
265
|
+
EmvEncryptionAttributes.struct_class = Types::EmvEncryptionAttributes
|
266
|
+
|
256
267
|
EncryptDataInput.add_member(:encryption_attributes, Shapes::ShapeRef.new(shape: EncryptionDecryptionAttributes, required: true, location_name: "EncryptionAttributes"))
|
257
268
|
EncryptDataInput.add_member(:key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location: "uri", location_name: "KeyIdentifier"))
|
258
269
|
EncryptDataInput.add_member(:plain_text, Shapes::ShapeRef.new(shape: HexEvenLengthBetween16And4064, required: true, location_name: "PlainText"))
|
@@ -265,10 +276,12 @@ module Aws::PaymentCryptographyData
|
|
265
276
|
|
266
277
|
EncryptionDecryptionAttributes.add_member(:asymmetric, Shapes::ShapeRef.new(shape: AsymmetricEncryptionAttributes, location_name: "Asymmetric"))
|
267
278
|
EncryptionDecryptionAttributes.add_member(:dukpt, Shapes::ShapeRef.new(shape: DukptEncryptionAttributes, location_name: "Dukpt"))
|
279
|
+
EncryptionDecryptionAttributes.add_member(:emv, Shapes::ShapeRef.new(shape: EmvEncryptionAttributes, location_name: "Emv"))
|
268
280
|
EncryptionDecryptionAttributes.add_member(:symmetric, Shapes::ShapeRef.new(shape: SymmetricEncryptionAttributes, location_name: "Symmetric"))
|
269
281
|
EncryptionDecryptionAttributes.add_member(:unknown, Shapes::ShapeRef.new(shape: nil, location_name: 'unknown'))
|
270
282
|
EncryptionDecryptionAttributes.add_member_subclass(:asymmetric, Types::EncryptionDecryptionAttributes::Asymmetric)
|
271
283
|
EncryptionDecryptionAttributes.add_member_subclass(:dukpt, Types::EncryptionDecryptionAttributes::Dukpt)
|
284
|
+
EncryptionDecryptionAttributes.add_member_subclass(:emv, Types::EncryptionDecryptionAttributes::Emv)
|
272
285
|
EncryptionDecryptionAttributes.add_member_subclass(:symmetric, Types::EncryptionDecryptionAttributes::Symmetric)
|
273
286
|
EncryptionDecryptionAttributes.add_member_subclass(:unknown, Types::EncryptionDecryptionAttributes::Unknown)
|
274
287
|
EncryptionDecryptionAttributes.struct_class = Types::EncryptionDecryptionAttributes
|
@@ -299,7 +312,7 @@ module Aws::PaymentCryptographyData
|
|
299
312
|
GeneratePinDataInput.add_member(:generation_attributes, Shapes::ShapeRef.new(shape: PinGenerationAttributes, required: true, location_name: "GenerationAttributes"))
|
300
313
|
GeneratePinDataInput.add_member(:generation_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "GenerationKeyIdentifier"))
|
301
314
|
GeneratePinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
|
302
|
-
GeneratePinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"
|
315
|
+
GeneratePinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
|
303
316
|
GeneratePinDataInput.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
|
304
317
|
GeneratePinDataInput.struct_class = Types::GeneratePinDataInput
|
305
318
|
|
@@ -560,7 +573,7 @@ module Aws::PaymentCryptographyData
|
|
560
573
|
VerifyPinDataInput.add_member(:encrypted_pin_block, Shapes::ShapeRef.new(shape: HexLengthBetween16And32, required: true, location_name: "EncryptedPinBlock"))
|
561
574
|
VerifyPinDataInput.add_member(:encryption_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "EncryptionKeyIdentifier"))
|
562
575
|
VerifyPinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
|
563
|
-
VerifyPinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"
|
576
|
+
VerifyPinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
|
564
577
|
VerifyPinDataInput.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
|
565
578
|
VerifyPinDataInput.add_member(:verification_attributes, Shapes::ShapeRef.new(shape: PinVerificationAttributes, required: true, location_name: "VerificationAttributes"))
|
566
579
|
VerifyPinDataInput.add_member(:verification_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "VerificationKeyIdentifier"))
|
@@ -32,7 +32,7 @@ module Aws::PaymentCryptographyData
|
|
32
32
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
33
33
|
end
|
34
34
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
35
|
-
if Aws::Endpoints::Matchers.boolean_equals?(
|
35
|
+
if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
|
36
36
|
return Aws::Endpoints::Endpoint.new(url: "https://dataplane.payment-cryptography-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
37
37
|
end
|
38
38
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
@@ -14,6 +14,7 @@ module Aws::PaymentCryptographyData
|
|
14
14
|
option(
|
15
15
|
:endpoint_provider,
|
16
16
|
doc_type: 'Aws::PaymentCryptographyData::EndpointProvider',
|
17
|
+
rbs_type: 'untyped',
|
17
18
|
docstring: 'The endpoint provider used to resolve endpoints. Any '\
|
18
19
|
'object that responds to `#resolve_endpoint(parameters)` '\
|
19
20
|
'where `parameters` is a Struct similar to '\
|