Conversation
Implements three new runnable examples demonstrating SDK usage without AWS credentials or KMS keys: - raw_aes_basic.exs: AES-GCM encryption with all key sizes (128/192/256-bit), encryption context, and error handling - raw_rsa.exs: RSA encryption with all 5 padding schemes (PKCS#1 v1.5, OAEP-SHA1/256/384/512), environment variable PEM key loading, and asymmetric key patterns - multi_keyring_local.exs: Multi-keyring demonstrating key redundancy, rotation scenarios, and generator + children pattern Fixes RSA keyring bug where load_public_key_pem and load_private_key_pem incorrectly used der_decode instead of pem_entry_decode, causing PEM-loaded keys to fail encryption. Updates all KMS examples (basic, discovery, cross_region, multi_keyring) to use correct Client API format where encrypt returns a map with ciphertext field and decrypt returns a map with plaintext and encryption_context fields. Updates examples/README.md to clearly distinguish AWS vs non-AWS examples with Quick Start section for local usage. Closes #74
Codecov Report✅ All modified and coverable lines are covered by tests. @@ Coverage Diff @@
## main #85 +/- ##
==========================================
- Coverage 92.75% 92.74% -0.02%
==========================================
Files 40 40
Lines 1435 1433 -2
==========================================
- Hits 1331 1329 -2
Misses 104 104
🚀 New features to boost your workflow:
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Implements three new runnable examples demonstrating SDK usage without AWS credentials or KMS keys:
raw_aes_basic.exs: AES-GCM encryption with all key sizes (128/192/256-bit), encryption context, and error handling
raw_rsa.exs: RSA encryption with all 5 padding schemes (PKCS#1 v1.5, OAEP-SHA1/256/384/512), environment variable PEM key loading, and asymmetric key patterns
multi_keyring_local.exs: Multi-keyring demonstrating key redundancy, rotation scenarios, and generator + children pattern
Fixes RSA keyring bug where load_public_key_pem and load_private_key_pem incorrectly used der_decode instead of pem_entry_decode, causing PEM-loaded keys to fail encryption.
Updates all KMS examples (basic, discovery, cross_region, multi_keyring) to use correct Client API format where encrypt returns a map with ciphertext field and decrypt returns a map with plaintext and encryption_context fields.
Updates examples/README.md to clearly distinguish AWS vs non-AWS examples with Quick Start section for local usage.
Closes #74