-
Notifications
You must be signed in to change notification settings - Fork 123
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Question] en/decryptData with CryptoMaterialsManager is deprecated, how to migrate to non-deprecated? #2033
Comments
I think you have to use Keyrings as in the examples https://github.com/aws/aws-encryption-sdk-java/tree/master/src/examples/java/com/amazonaws/crypto/examples/keyrings. |
Interesting Idea, but it seems like this may be even older as it used the Java AWS SDK v1: For context, I basically followed: https://github.com/aws/aws-encryption-sdk-java/blob/master/src/examples/java/com/amazonaws/crypto/examples/v2/SimpleDataKeyCachingExample.java |
Well, I think it is the new API. Those tests where added recently, and it is working for me. I think that version 3.0.0 is new, and documentation on Amazon site was not yet updated to point it. |
You're right. But it can't figure out how to use caching using the Keyrings. |
I also don't know how to use the cache. But I think that somehow it is build in as default - i'm not sure, the code is somehow generated with Dafny. It have to be confirmed by someone from Amazon. |
Thanks for your help, I have reimplemented it using Keyrings. @repo-maintainers / amazon
Could please somebody of you confirm / provide advise please? |
Hi @StiviiK -- All new applications should use keyrings. Any applications that have already integrated with the caching cryptographic materials manager (CMM) are blocked from adopting keyrings until we (AWS Crypto Tools) release the caching CMM in the AWS Cryptographic Material Providers Library (MPL). It looks like you are working on a new application, so I would suggest using the hierarchical keyring. Let us know if you have further questions. |
@lucasmcdonald3 Awesome, thank you very much for your advice. I started implementing it using AWS KMS Hierarchical keyrings, but then another question came up for me. Regarding |
Hello. I'm trying to migrate an application from V2 to V3 and I have this problem too. I'm using a CachingCryptoMaterialsManager to minimize calls to KMS, since reusing the same key it's not a risk for us. I've read the documentation of the Hierarchical Keyring but it needs a DynamoDB table. However, our organization forbade us from using DynamoBD. ¿Is there a local implementation to replace the old CachingCryptoMaterialsManager just mantaining them in memory without any other dependency? |
@StiviiK This is a question for your threat model. @getaceres I have cut aws/aws-cryptographic-material-providers-library#354 |
EDIT: Original problem solved, single question still open - please see #2033 (comment).
Problem:
I am trying to use the aws-encryption-sdk and followed the examples (which work fine), but the methods the examples are using are deprecated:
How can I migrate to the non-deprecated methods?
Source-Context:
The text was updated successfully, but these errors were encountered: