This repository contains the AWS Encryption SDK Specification.
The primary goal of this specification is to define a standard,
language independent, description of the AWS Encryption SDK features.
It serves as the source of truth for the features that make up the AWS Encryption SDK
and the details of their behavior.
It is intended to promote consistency and interoperability
across implementations of the AWS Encryption SDK.
This GitHub project is also intended to track issues and feature requests,
and to collect feedback pertaining to the AWS Encryption SDK.
Below is the list of current implementation of this specification:
The documentation is made available under the Creative Commons Attribution-ShareAlike 4.0 International License. See the LICENSE file.
The sample code within this documentation is made available under the MIT-0 license. See the LICENSE-SAMPLECODE file.
We use prettier
to maintain consistent formatting.
Our CI will stop PRs that do not match our formatting requirements,
but to easily apply them,
run ./ci/prettify.sh write
.
If you want to check them without writing,
run ./ci/prettify.sh check
.
Duvet is a tool that can be used to ensure specification is documented alongside code.
This repo contains helpful scripts for installing and using Duvet with this specification.
To install Duvet:
./util/install-duvet
To generate a report on what portions of this specification are covered in code, use the report
script.
For example:
./util/report.js 'src/main/**/*.java' 'src/test/**/*.java'
compliance
from SpecificationThe Specification is written in Markdown. Our compliance tooling needs RFC formatted text files. As such, we have a tool that extracts the RFC spec from the Markdown.
We do not include every Markdown file in the RFC spec; Nor do we include all sections of the Markdown files (i.e. we exclude legacy, changes, etc.).
The directories in scope for RFC specifications are those listed
in util/specification_extract.sh
.
extract
If you have changed any Markdown in scope for compliance, you MUST run the extract utility.
There are two ways of doing this. If you have changed only one file, you may run extract
against just that file.
./util/extract.js PATH_TO_CHANGED_MARKEDOWN
For example, if ONLY the Default CMM Markdown was updated, we would run:
./util/extract.js framework/default-cmm.md
Alternatively, the entire specification may be extracted at once. Run:
./util/specification_extract.sh
The utility/script util/extract.js
depends on four run
times: node
, python
, ruby
, and rust
(No, this is not ideal, but Crypto Tools is pushing the "spec to code" boundary;
we are ahead of the tooling).
xml2rfc
Follow AWS Crypto Tools Getting Started with Python instructions to install pyenv
.
Then, in this repository, run pyenv local 3.9.7; pyenv exec python -m pip install xml2rfc==3.5.0 markupsafe==2.0.1
.
kramdown-rfc2629
This is the Ruby dependency. Unfortunately, we have not figured out a good way of installing this, so we do a bad way:
sudo gem install kramdown-rfc2629
Follow
Installing Node.js with nvm
macOS by Daniel Schildt
to get nvm
and node
working.
Installing Duvet will install rust.