Skip to content

Commit ef514ae

Browse files
committed
Revert "docs: add example to replicate AWS KMS MKP behavior with AWS KMS keyring (#255)"
This reverts commit 027b127.
1 parent 5628ede commit ef514ae

File tree

5 files changed

+6
-144
lines changed

5 files changed

+6
-144
lines changed

examples/README.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -44,12 +44,6 @@ We start with AWS KMS examples, then show how to use other wrapping keys.
4444
* [with keyrings](./src/keyring/aws_kms/discovery_decrypt_in_region_only.py)
4545
* How to decrypt with a preferred region but failover to others
4646
* [with keyrings](./src/keyring/aws_kms/discovery_decrypt_with_preferred_regions.py)
47-
* How to reproduce the behavior of an AWS KMS master key provider
48-
* [with keyrings](./src/keyring/aws_kms/act_like_aws_kms_master_key_provider.py)
49-
* How to use AWS KMS clients with custom configuration
50-
* [with keyrings](./src/keyring/aws_kms/custom_kms_client_config.py)
51-
* How to use different AWS KMS client for different regions
52-
* [with keyrings](./src/keyring/aws_kms/custom_client_supplier.py)
5347
* Using raw wrapping keys
5448
* How to use a raw AES wrapping key
5549
* [with keyrings](./src/keyring/raw_aes/raw_aes.py)

examples/src/keyring/aws_kms/act_like_aws_kms_master_key_provider.py

Lines changed: 0 additions & 117 deletions
This file was deleted.

examples/src/keyring/aws_kms/discovery_decrypt.py

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,8 @@
66
However, sometimes you need more flexibility on decrypt,
77
especially when you don't know which CMKs were used to encrypt a message.
88
To address this need, you can use an AWS KMS discovery keyring.
9-
The AWS KMS discovery keyring does nothing on encrypt.
10-
On decrypt it reviews each encrypted data key (EDK).
11-
If an EDK was encrypted under an AWS KMS CMK,
12-
the AWS KMS discovery keyring attempts to decrypt it.
13-
Whether decryption succeeds depends on permissions on the CMK.
14-
This continues until the AWS KMS discovery keyring either runs out of EDKs
15-
or succeeds in decrypting an EDK.
9+
The AWS KMS discovery keyring does nothing on encrypt,
10+
but attempts to decrypt *any* data keys that were encrypted under an AWS KMS CMK.
1611
1712
This example shows how to configure and use an AWS KMS discovery keyring.
1813

examples/src/keyring/aws_kms/discovery_decrypt_in_region_only.py

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,8 @@
66
However, sometimes you need more flexibility on decrypt,
77
especially when you don't know which CMKs were used to encrypt a message.
88
To address this need, you can use an AWS KMS discovery keyring.
9-
The AWS KMS discovery keyring does nothing on encrypt.
10-
On decrypt it reviews each encrypted data key (EDK).
11-
If an EDK was encrypted under an AWS KMS CMK,
12-
the AWS KMS discovery keyring attempts to decrypt it.
13-
Whether decryption succeeds depends on permissions on the CMK.
14-
This continues until the AWS KMS discovery keyring either runs out of EDKs
15-
or succeeds in decrypting an EDK.
9+
The AWS KMS discovery keyring does nothing on encrypt,
10+
but attempts to decrypt *any* data keys that were encrypted under an AWS KMS CMK.
1611
1712
However, sometimes you need to be a *bit* more restrictive than that.
1813
To address this need, you can use a client supplier that restricts the regions an AWS KMS keyring can talk to.

examples/src/keyring/aws_kms/discovery_decrypt_with_preferred_regions.py

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,8 @@
66
However, sometimes you need more flexibility on decrypt,
77
especially when you don't know which CMKs were used to encrypt a message.
88
To address this need, you can use an AWS KMS discovery keyring.
9-
The AWS KMS discovery keyring does nothing on encrypt.
10-
On decrypt it reviews each encrypted data key (EDK).
11-
If an EDK was encrypted under an AWS KMS CMK,
12-
the AWS KMS discovery keyring attempts to decrypt it.
13-
Whether decryption succeeds depends on permissions on the CMK.
14-
This continues until the AWS KMS discovery keyring either runs out of EDKs
15-
or succeeds in decrypting an EDK.
9+
The AWS KMS discovery keyring does nothing on encrypt,
10+
but attempts to decrypt *any* data keys that were encrypted under an AWS KMS CMK.
1611
1712
However, sometimes you need to be a *bit* more restrictive than that.
1813
To address this need, you can use a client supplier to restrict what regions an AWS KMS keyring can talk to.

0 commit comments

Comments
 (0)