Skip to content

fix: Improve header serialization #747

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 30 commits into from
Mar 26, 2025
20 changes: 20 additions & 0 deletions CHANGELOG.rst
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,24 @@
Changelog
*********

4.0.1 -- 2025-03-26
===================

Fixes
-----------
* fix: Improve header serialization
`#747 <https://github.com/aws/aws-encryption-sdk-python/pull/747>`_

ESDK-Python <4.0.1 would truncate non-ASCII key provider IDs it wrote to message headers.
If a Raw or Custom MasterKeyProvider or Keyring supplied a non-ASCII key provider ID / key namespace,
ESDK-Python would truncate the the key provider ID it wrote to the message's header.
The message can be decrypted by replacing the truncated provider ID with the expected provider ID in decryption code.
Contact AWS for any questions about this approach.

Maintenance
-----------
* deps: Extend supported `MPL`_ versions to include v1.10.0

4.0.0 -- 2024-10-29
===================

Expand All @@ -23,6 +41,7 @@ Breaking Changes
However, messages that are constructed with the required EC CMM are not backward compatible with ESDK <4.0.0,
as no version of ESDK <4.0.0 supports reading messages encrypted with the required EC CMM.
A message that is encrypted with the required EC CMM from the MPL must be decrypted with a CMM from the MPL.
For more information on using the required EC CMM, see `AWS Documentation <https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/configure.html#config-required-encryption-context-cmm>`_.

Fixes
-----------
Expand Down Expand Up @@ -425,6 +444,7 @@ Minor
===================
* Initial public release

.. _MPL: https://github.com/aws/aws-cryptographic-material-providers-library
.. _breaking changes in attrs 17.1.0: https://attrs.readthedocs.io/en/stable/changelog.html
.. _tox: https://tox.readthedocs.io/en/latest/
.. _pylint: https://www.pylint.org/
Expand Down
4 changes: 2 additions & 2 deletions README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ Required Prerequisites
Recommended Prerequisites
=========================

* aws-cryptographic-material-providers: == 1.7.4
* aws-cryptographic-material-providers: == 1.10.0
* Requires Python 3.11+.

Installation
Expand Down Expand Up @@ -246,7 +246,7 @@ sharing entries in that cache across threads needs to be done carefully

**Important:** Components from the `AWS Cryptographic Material Providers Library (MPL)`_
have separate thread safety considerations.
For more information, see the note on thread safety in that project's README (TODO-MPL: link)
For more information, see the note on thread safety in that project's `README <https://github.com/aws/aws-cryptographic-material-providers-library/blob/main/AwsCryptographicMaterialProviders/runtimes/python/README.rst#thread-safety>`_.


.. _AWS Encryption SDK: https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/introduction.html
Expand Down
8 changes: 4 additions & 4 deletions codebuild/py310/decrypt_dafny_esdk_vectors.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,25 +28,25 @@ phases:
MOST_RECENT_RUN_ID=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token ${GITHUB_TOKEN}" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
| jq 'first(.workflow_runs[] | select(.name=="Daily CI") | .id)')
- |
echo "DEBUG: Fetching artifact from run $MOST_RECENT_RUN_ID"
- |
MOST_RECENT_RUN_DOWNLOAD_URL=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-latest_vector_artifact" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-22.04_vector_artifact" \
| jq '.artifacts[0].archive_download_url')
- |
echo "DEBUG: Fetching artifact at $MOST_RECENT_RUN_DOWNLOAD_URL"
- |
curl -L -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-latest_test_vector_artifact.zip
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-22.04_vector_artifact.zip
# This unzips to `net41.zip`.
- unzip ubuntu-latest_test_vector_artifact
- unzip ubuntu-22.04_vector_artifact
# This unzips to `net41/`.
- unzip net41.zip -d net41
build:
Expand Down
2 changes: 1 addition & 1 deletion codebuild/py310/decrypt_net_401_vectors.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ phases:
commands:
# Fetch ESDK .NET v4.0.1 Test Vectors
- VECTOR_ZIP=$CODEBUILD_SRC_DIR/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk-dafny/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- curl -s --output $VECTOR_ZIP --location $VECTORS_URL
- UNZIPPED_VECTORS_DIR=$CODEBUILD_SRC_DIR/test_vector_handlers/net_401_vectors
- unzip $VECTOR_ZIP -d $UNZIPPED_VECTORS_DIR
Expand Down
8 changes: 4 additions & 4 deletions codebuild/py311/decrypt_dafny_esdk_vectors_keyrings.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,25 +30,25 @@ phases:
MOST_RECENT_RUN_ID=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token ${GITHUB_TOKEN}" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
| jq 'first(.workflow_runs[] | select(.name=="Daily CI") | .id)')
- |
echo "DEBUG: Fetching artifact from run $MOST_RECENT_RUN_ID"
- |
MOST_RECENT_RUN_DOWNLOAD_URL=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-latest_vector_artifact" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-22.04_vector_artifact" \
| jq '.artifacts[0].archive_download_url')
- |
echo "DEBUG: Fetching artifact at $MOST_RECENT_RUN_DOWNLOAD_URL"
- |
curl -L -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-latest_test_vector_artifact.zip
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-22.04_vector_artifact.zip
# This unzips to `net41.zip`.
- unzip ubuntu-latest_test_vector_artifact
- unzip ubuntu-22.04_vector_artifact
# This unzips to `net41/`.
- unzip net41.zip -d net41
build:
Expand Down
8 changes: 4 additions & 4 deletions codebuild/py311/decrypt_dafny_esdk_vectors_masterkey.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,25 +28,25 @@ phases:
MOST_RECENT_RUN_ID=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token ${GITHUB_TOKEN}" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
| jq 'first(.workflow_runs[] | select(.name=="Daily CI") | .id)')
- |
echo "DEBUG: Fetching artifact from run $MOST_RECENT_RUN_ID"
- |
MOST_RECENT_RUN_DOWNLOAD_URL=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-latest_vector_artifact" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-22.04_vector_artifact" \
| jq '.artifacts[0].archive_download_url')
- |
echo "DEBUG: Fetching artifact at $MOST_RECENT_RUN_DOWNLOAD_URL"
- |
curl -L -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-latest_test_vector_artifact.zip
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-22.04_vector_artifact.zip
# This unzips to `net41.zip`.
- unzip ubuntu-latest_test_vector_artifact
- unzip ubuntu-22.04_vector_artifact
# This unzips to `net41/`.
- unzip net41.zip -d net41
build:
Expand Down
2 changes: 1 addition & 1 deletion codebuild/py311/decrypt_net_401_vectors_keyrings.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ phases:
- sh test_vector_handlers/scripts/install_mpl_test_vector_runner.sh
# Fetch ESDK .NET v4.0.1 Test Vectors
- VECTOR_ZIP=$CODEBUILD_SRC_DIR/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk-dafny/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- curl -s --output $VECTOR_ZIP --location $VECTORS_URL
- UNZIPPED_VECTORS_DIR=$CODEBUILD_SRC_DIR/test_vector_handlers/net_401_vectors
- unzip $VECTOR_ZIP -d $UNZIPPED_VECTORS_DIR
Expand Down
2 changes: 1 addition & 1 deletion codebuild/py311/decrypt_net_401_vectors_masterkey.yml
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ phases:

# Fetch ESDK .NET v4.0.1 Test Vectors
- VECTOR_ZIP=$CODEBUILD_SRC_DIR/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk-dafny/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- curl -s --output $VECTOR_ZIP --location $VECTORS_URL
- UNZIPPED_VECTORS_DIR=$CODEBUILD_SRC_DIR/test_vector_handlers/net_401_vectors
- unzip $VECTOR_ZIP -d $UNZIPPED_VECTORS_DIR
Expand Down
8 changes: 4 additions & 4 deletions codebuild/py312/decrypt_dafny_esdk_vectors_keyrings.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,25 +30,25 @@ phases:
MOST_RECENT_RUN_ID=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token ${GITHUB_TOKEN}" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
| jq 'first(.workflow_runs[] | select(.name=="Daily CI") | .id)')
- |
echo "DEBUG: Fetching artifact from run $MOST_RECENT_RUN_ID"
- |
MOST_RECENT_RUN_DOWNLOAD_URL=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-latest_vector_artifact" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-22.04_vector_artifact" \
| jq '.artifacts[0].archive_download_url')
- |
echo "DEBUG: Fetching artifact at $MOST_RECENT_RUN_DOWNLOAD_URL"
- |
curl -L -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-latest_test_vector_artifact.zip
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-22.04_vector_artifact.zip
# This unzips to `net41.zip`.
- unzip ubuntu-latest_test_vector_artifact
- unzip ubuntu-22.04_vector_artifact
# This unzips to `net41/`.
- unzip net41.zip -d net41
build:
Expand Down
8 changes: 4 additions & 4 deletions codebuild/py312/decrypt_dafny_esdk_vectors_masterkey.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,25 +28,25 @@ phases:
MOST_RECENT_RUN_ID=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token ${GITHUB_TOKEN}" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
| jq 'first(.workflow_runs[] | select(.name=="Daily CI") | .id)')
- |
echo "DEBUG: Fetching artifact from run $MOST_RECENT_RUN_ID"
- |
MOST_RECENT_RUN_DOWNLOAD_URL=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-latest_vector_artifact" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-22.04_vector_artifact" \
| jq '.artifacts[0].archive_download_url')
- |
echo "DEBUG: Fetching artifact at $MOST_RECENT_RUN_DOWNLOAD_URL"
- |
curl -L -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-latest_test_vector_artifact.zip
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-22.04_vector_artifact.zip
# This unzips to `net41.zip`.
- unzip ubuntu-latest_test_vector_artifact
- unzip ubuntu-22.04_vector_artifact
# This unzips to `net41/`.
- unzip net41.zip -d net41
build:
Expand Down
6 changes: 3 additions & 3 deletions codebuild/py312/decrypt_hkeyring_with_net.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,15 +25,15 @@ phases:
- export DAFNY_AWS_ESDK_TEST_VECTOR_MANIFEST_PATH="${PWD}/312_hkeyring_reccmm_manifest/manifest.json"

# Clone SDK-Dafny repo to get test vectors runner source code and the Dafny version to use
- git clone --recurse-submodules https://github.com/aws/aws-encryption-sdk-dafny.git
- git clone --recurse-submodules https://github.com/aws/aws-encryption-sdk.git
# Download Dafny to build the test vector runner; get Dafny version from ESDK's project.properties file
- export dafnyVersion=$(grep '^dafnyVersion=' aws-encryption-sdk-dafny/AwsEncryptionSDK/project.properties | cut -d '=' -f 2)
- export dafnyVersion=$(grep '^dafnyVersion=' aws-encryption-sdk/project.properties | cut -d '=' -f 2)
- curl https://github.com/dafny-lang/dafny/releases/download/v$dafnyVersion/dafny-$dafnyVersion-x64-ubuntu-20.04.zip -L -o dafny.zip
- unzip -qq dafny.zip && rm dafny.zip
- export PATH="$PWD/dafny:$PATH"

# Build MPL test vector runner from source
- cd aws-encryption-sdk-dafny/mpl/TestVectorsAwsCryptographicMaterialProviders/
- cd aws-encryption-sdk/mpl/TestVectorsAwsCryptographicMaterialProviders/
- make transpile_net

# Change ESDK TestVectors project to reference the published .NET ESDK
Expand Down
2 changes: 1 addition & 1 deletion codebuild/py312/decrypt_net_401_vectors_keyrings.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ phases:
- sh test_vector_handlers/scripts/install_mpl_test_vector_runner.sh
# Fetch ESDK .NET v4.0.1 Test Vectors
- VECTOR_ZIP=$CODEBUILD_SRC_DIR/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk-dafny/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- curl -s --output $VECTOR_ZIP --location $VECTORS_URL
- UNZIPPED_VECTORS_DIR=$CODEBUILD_SRC_DIR/test_vector_handlers/net_401_vectors
- unzip $VECTOR_ZIP -d $UNZIPPED_VECTORS_DIR
Expand Down
2 changes: 1 addition & 1 deletion codebuild/py312/decrypt_net_401_vectors_masterkey.yml
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ phases:

# Fetch ESDK .NET v4.0.1 Test Vectors
- VECTOR_ZIP=$CODEBUILD_SRC_DIR/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk-dafny/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- curl -s --output $VECTOR_ZIP --location $VECTORS_URL
- UNZIPPED_VECTORS_DIR=$CODEBUILD_SRC_DIR/test_vector_handlers/net_401_vectors
- unzip $VECTOR_ZIP -d $UNZIPPED_VECTORS_DIR
Expand Down
8 changes: 4 additions & 4 deletions codebuild/py38/decrypt_dafny_esdk_vectors.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,25 +28,25 @@ phases:
MOST_RECENT_RUN_ID=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token ${GITHUB_TOKEN}" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs?branch=mainline&status=completed&page=1&exclude_pull_requests=true" \
| jq 'first(.workflow_runs[] | select(.name=="Daily CI") | .id)')
- |
echo "DEBUG: Fetching artifact from run $MOST_RECENT_RUN_ID"
- |
MOST_RECENT_RUN_DOWNLOAD_URL=$(curl -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
"https://api.github.com/repos/aws/aws-encryption-sdk-dafny/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-latest_vector_artifact" \
"https://api.github.com/repos/aws/aws-encryption-sdk/actions/runs/$MOST_RECENT_RUN_ID/artifacts?name=ubuntu-22.04_vector_artifact" \
| jq '.artifacts[0].archive_download_url')
- |
echo "DEBUG: Fetching artifact at $MOST_RECENT_RUN_DOWNLOAD_URL"
- |
curl -L -H "Accept: application/vnd.github+json" \
-H "Authorization: token $GITHUB_TOKEN" \
-H "X-GitHub-Api-Version: 2022-11-28" \
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-latest_test_vector_artifact.zip
$(echo $MOST_RECENT_RUN_DOWNLOAD_URL | tr -d '"') -o ubuntu-22.04_vector_artifact.zip
# This unzips to `net41.zip`.
- unzip ubuntu-latest_test_vector_artifact
- unzip ubuntu-22.04_vector_artifact
# This unzips to `net41/`.
- unzip net41.zip -d net41
build:
Expand Down
2 changes: 1 addition & 1 deletion codebuild/py38/decrypt_net_401_vectors.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ phases:
commands:
# Fetch ESDK .NET v4.0.1 Test Vectors
- VECTOR_ZIP=$CODEBUILD_SRC_DIR/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk-dafny/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- VECTORS_URL=https://github.com/aws/aws-encryption-sdk/raw/mainline/AwsEncryptionSDK/runtimes/net/TestVectorsNative/TestVectors/resources/v4-Net-4.0.1.zip
- curl -s --output $VECTOR_ZIP --location $VECTORS_URL
- UNZIPPED_VECTORS_DIR=$CODEBUILD_SRC_DIR/test_vector_handlers/net_401_vectors
- unzip $VECTOR_ZIP -d $UNZIPPED_VECTORS_DIR
Expand Down
Loading