/******************************************************************************* * Copyright 2012-2019 Amazon.com, Inc. or its affiliates. All Rights Reserved. * Licensed under the Apache License, Version 2.0 (the "License"). You may not use * this file except in compliance with the License. A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. * This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR * CONDITIONS OF ANY KIND, either express or implied. See the License for the * specific language governing permissions and limitations under the License. * ***************************************************************************** * * AWS Tools for Windows (TM) PowerShell (TM) * */ using System; using System.Collections.Generic; using System.Linq; using System.Management.Automation; using System.Text; using Amazon.PowerShell.Common; using Amazon.Runtime; using Amazon.KeyManagementService; using Amazon.KeyManagementService.Model; namespace Amazon.PowerShell.Cmdlets.KMS { /// /// Returns a unique asymmetric data key pair for use outside of KMS. This operation returns /// a plaintext public key, a plaintext private key, and a copy of the private key that /// is encrypted under the symmetric encryption KMS key you specify. You can use the data /// key pair to perform asymmetric cryptography and implement digital signatures outside /// of KMS. The bytes in the keys are random; they not related to the caller or to the /// KMS key that is used to encrypt the private key. /// /// /// /// You can use the public key that GenerateDataKeyPair returns to encrypt /// data or verify a signature outside of KMS. Then, store the encrypted private key with /// the data. When you are ready to decrypt data or sign a message, you can use the Decrypt /// operation to decrypt the encrypted private key. /// /// To generate a data key pair, you must specify a symmetric encryption KMS key to encrypt /// the private key in a data key pair. You cannot use an asymmetric KMS key or a KMS /// key in a custom key store. To get the type and origin of your KMS key, use the DescribeKey /// operation. /// /// Use the KeyPairSpec parameter to choose an RSA or Elliptic Curve (ECC) /// data key pair. In China Regions, you can also choose an SM2 data key pair. KMS recommends /// that you use ECC key pairs for signing, and use RSA and SM2 key pairs for either encryption /// or signing, but not both. However, KMS cannot enforce any restrictions on the use /// of data key pairs outside of KMS. /// /// If you are using the data key pair to encrypt data, or for any operation where you /// don't immediately need a private key, consider using the GenerateDataKeyPairWithoutPlaintext /// operation. GenerateDataKeyPairWithoutPlaintext returns a plaintext public /// key and an encrypted private key, but omits the plaintext private key that you need /// only to decrypt ciphertext or sign a message. Later, when you need to decrypt the /// data or sign a message, use the Decrypt operation to decrypt the encrypted /// private key in the data key pair. /// GenerateDataKeyPair returns a unique data key pair for each request. /// The bytes in the keys are random; they are not related to the caller or the KMS key /// that is used to encrypt the private key. The public key is a DER-encoded X.509 SubjectPublicKeyInfo, /// as specified in RFC 5280. The private /// key is a DER-encoded PKCS8 PrivateKeyInfo, as specified in RFC /// 5958. /// GenerateDataKeyPair also supports Amazon /// Web Services Nitro Enclaves, which provide an isolated compute environment in /// Amazon EC2. To call GenerateDataKeyPair for an Amazon Web Services Nitro /// enclave, use the Amazon /// Web Services Nitro Enclaves SDK or any Amazon Web Services SDK. Use the Recipient /// parameter to provide the attestation document for the enclave. GenerateDataKeyPair /// returns the public data key and a copy of the private data key encrypted under the /// specified KMS key, as usual. But instead of a plaintext copy of the private data key /// (PrivateKeyPlaintext), the response includes a copy of the private data /// key encrypted under the public key from the attestation document (CiphertextForRecipient). /// For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, /// see How /// Amazon Web Services Nitro Enclaves uses KMS in the Key Management Service Developer /// Guide.. /// /// You can use an optional encryption context to add additional security to the encryption /// operation. If you specify an EncryptionContext, you must specify the /// same encryption context (a case-sensitive exact match) when decrypting the encrypted /// data key. Otherwise, the request to decrypt fails with an InvalidCiphertextException. /// For more information, see Encryption /// Context in the Key Management Service Developer Guide. /// /// The KMS key that you use for this operation must be in a compatible key state. For /// details, see Key /// states of KMS keys in the Key Management Service Developer Guide. /// Cross-account use: Yes. To perform this operation with a KMS key in a different /// Amazon Web Services account, specify the key ARN or alias ARN in the value of the /// KeyId parameter. /// Required permissions: kms:GenerateDataKeyPair /// (key policy) /// Related operations: /// [Cmdlet("New", "KMSDataKeyPair", SupportsShouldProcess = true, ConfirmImpact = ConfirmImpact.Medium)] [OutputType("Amazon.KeyManagementService.Model.GenerateDataKeyPairResponse")] [AWSCmdlet("Calls the AWS Key Management Service GenerateDataKeyPair API operation.", Operation = new[] {"GenerateDataKeyPair"}, SelectReturnType = typeof(Amazon.KeyManagementService.Model.GenerateDataKeyPairResponse))] [AWSCmdletOutput("Amazon.KeyManagementService.Model.GenerateDataKeyPairResponse", "This cmdlet returns an Amazon.KeyManagementService.Model.GenerateDataKeyPairResponse object containing multiple properties. The object can also be referenced from properties attached to the cmdlet entry in the $AWSHistory stack." )] public partial class NewKMSDataKeyPairCmdlet : AmazonKeyManagementServiceClientCmdlet, IExecutor { protected override bool IsSensitiveResponse { get; set; } = true; #region Parameter Recipient_AttestationDocument /// /// /// The attestation document for an Amazon Web Services Nitro Enclave. This document includes /// the enclave's public key. /// /// The cmdlet will automatically convert the supplied parameter of type string, string[], System.IO.FileInfo or System.IO.Stream to byte[] before supplying it to the service. /// [System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)] [Amazon.PowerShell.Common.MemoryStreamParameterConverter] public byte[] Recipient_AttestationDocument { get; set; } #endregion #region Parameter DryRun /// /// /// Checks if your request will succeed. DryRun is an optional parameter. /// To learn more about how to use this parameter, see Testing /// your KMS API calls in the Key Management Service Developer Guide. /// /// [System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)] public System.Boolean? DryRun { get; set; } #endregion #region Parameter EncryptionContext /// /// /// Specifies the encryption context that will be used when encrypting the private key /// in the data key pair.Do not include confidential or sensitive information in this field. This field may /// be displayed in plaintext in CloudTrail logs and other output.An encryption context is a collection of non-secret key-value pairs that represent /// additional authenticated data. When you use an encryption context to encrypt data, /// you must specify the same (an exact case-sensitive match) encryption context to decrypt /// the data. An encryption context is supported only on operations with symmetric encryption /// KMS keys. On operations with symmetric encryption KMS keys, an encryption context /// is optional, but it is strongly recommended.For more information, see Encryption /// context in the Key Management Service Developer Guide. /// /// [System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)] public System.Collections.Hashtable EncryptionContext { get; set; } #endregion #region Parameter GrantToken /// /// /// A list of grant tokens.Use a grant token when your permission to call this operation comes from a new grant /// that has not yet achieved eventual consistency. For more information, see Grant /// token and Using /// a grant token in the Key Management Service Developer Guide. /// /// [System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)] [Alias("GrantTokens")] public System.String[] GrantToken { get; set; } #endregion #region Parameter Recipient_KeyEncryptionAlgorithm /// /// /// The encryption algorithm that KMS should use with the public key for an Amazon Web /// Services Nitro Enclave to encrypt plaintext values for the response. The only valid /// value is RSAES_OAEP_SHA_256. /// /// [System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)] [AWSConstantClassSource("Amazon.KeyManagementService.KeyEncryptionMechanism")] public Amazon.KeyManagementService.KeyEncryptionMechanism Recipient_KeyEncryptionAlgorithm { get; set; } #endregion #region Parameter KeyId /// /// /// Specifies the symmetric encryption KMS key that encrypts the private key in the data /// key pair. You cannot specify an asymmetric KMS key or a KMS key in a custom key store. /// To get the type and origin of your KMS key, use the DescribeKey operation.To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using /// an alias name, prefix it with "alias/". To specify a KMS key in a different /// Amazon Web Services account, you must use the key ARN or alias ARN.For example:To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. /// To get the alias name and alias ARN, use ListAliases. /// /// #if !MODULAR [System.Management.Automation.Parameter(Position = 0, ValueFromPipelineByPropertyName = true, ValueFromPipeline = true)] #else [System.Management.Automation.Parameter(Position = 0, ValueFromPipelineByPropertyName = true, ValueFromPipeline = true, Mandatory = true)] [System.Management.Automation.AllowEmptyString] [System.Management.Automation.AllowNull] #endif [Amazon.PowerShell.Common.AWSRequiredParameter] public System.String KeyId { get; set; } #endregion #region Parameter KeyPairSpec /// /// /// Determines the type of data key pair that is generated. The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys to encrypt /// and decrypt or to sign and verify (but not both), and the rule that permits you to /// use ECC KMS keys only to sign and verify, are not effective on data key pairs, which /// are used outside of KMS. The SM2 key spec is only available in China Regions. /// /// #if !MODULAR [System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)] #else [System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true, Mandatory = true)] [System.Management.Automation.AllowNull] #endif [Amazon.PowerShell.Common.AWSRequiredParameter] [AWSConstantClassSource("Amazon.KeyManagementService.DataKeyPairSpec")] public Amazon.KeyManagementService.DataKeyPairSpec KeyPairSpec { get; set; } #endregion #region Parameter Select /// /// Use the -Select parameter to control the cmdlet output. The default value is '*'. /// Specifying -Select '*' will result in the cmdlet returning the whole service response (Amazon.KeyManagementService.Model.GenerateDataKeyPairResponse). /// Specifying the name of a property of type Amazon.KeyManagementService.Model.GenerateDataKeyPairResponse will result in that property being returned. /// Specifying -Select '^ParameterName' will result in the cmdlet returning the selected cmdlet parameter value. /// [System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)] public string Select { get; set; } = "*"; #endregion #region Parameter PassThru /// /// Changes the cmdlet behavior to return the value passed to the KeyId parameter. /// The -PassThru parameter is deprecated, use -Select '^KeyId' instead. This parameter will be removed in a future version. /// [System.Obsolete("The -PassThru parameter is deprecated, use -Select '^KeyId' instead. This parameter will be removed in a future version.")] [System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)] public SwitchParameter PassThru { get; set; } #endregion #region Parameter Force /// /// This parameter overrides confirmation prompts to force /// the cmdlet to continue its operation. This parameter should always /// be used with caution. /// [System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)] public SwitchParameter Force { get; set; } #endregion protected override void ProcessRecord() { this._AWSSignerType = "v4"; base.ProcessRecord(); var resourceIdentifiersText = FormatParameterValuesForConfirmationMsg(nameof(this.KeyId), MyInvocation.BoundParameters); if (!ConfirmShouldProceed(this.Force.IsPresent, resourceIdentifiersText, "New-KMSDataKeyPair (GenerateDataKeyPair)")) { return; } var context = new CmdletContext(); // allow for manipulation of parameters prior to loading into context PreExecutionContextLoad(context); #pragma warning disable CS0618, CS0612 //A class member was marked with the Obsolete attribute if (ParameterWasBound(nameof(this.Select))) { context.Select = CreateSelectDelegate(Select) ?? throw new System.ArgumentException("Invalid value for -Select parameter.", nameof(this.Select)); if (this.PassThru.IsPresent) { throw new System.ArgumentException("-PassThru cannot be used when -Select is specified.", nameof(this.Select)); } } else if (this.PassThru.IsPresent) { context.Select = (response, cmdlet) => this.KeyId; } #pragma warning restore CS0618, CS0612 //A class member was marked with the Obsolete attribute context.DryRun = this.DryRun; if (this.EncryptionContext != null) { context.EncryptionContext = new Dictionary(StringComparer.Ordinal); foreach (var hashKey in this.EncryptionContext.Keys) { context.EncryptionContext.Add((String)hashKey, (String)(this.EncryptionContext[hashKey])); } } if (this.GrantToken != null) { context.GrantToken = new List(this.GrantToken); } context.KeyId = this.KeyId; #if MODULAR if (this.KeyId == null && ParameterWasBound(nameof(this.KeyId))) { WriteWarning("You are passing $null as a value for parameter KeyId which is marked as required. In case you believe this parameter was incorrectly marked as required, report this by opening an issue at https://github.com/aws/aws-tools-for-powershell/issues."); } #endif context.KeyPairSpec = this.KeyPairSpec; #if MODULAR if (this.KeyPairSpec == null && ParameterWasBound(nameof(this.KeyPairSpec))) { WriteWarning("You are passing $null as a value for parameter KeyPairSpec which is marked as required. In case you believe this parameter was incorrectly marked as required, report this by opening an issue at https://github.com/aws/aws-tools-for-powershell/issues."); } #endif context.Recipient_AttestationDocument = this.Recipient_AttestationDocument; context.Recipient_KeyEncryptionAlgorithm = this.Recipient_KeyEncryptionAlgorithm; // allow further manipulation of loaded context prior to processing PostExecutionContextLoad(context); var output = Execute(context) as CmdletOutput; ProcessOutput(output); } #region IExecutor Members public object Execute(ExecutorContext context) { System.IO.MemoryStream _Recipient_AttestationDocumentStream = null; try { var cmdletContext = context as CmdletContext; // create request var request = new Amazon.KeyManagementService.Model.GenerateDataKeyPairRequest(); if (cmdletContext.DryRun != null) { request.DryRun = cmdletContext.DryRun.Value; } if (cmdletContext.EncryptionContext != null) { request.EncryptionContext = cmdletContext.EncryptionContext; } if (cmdletContext.GrantToken != null) { request.GrantTokens = cmdletContext.GrantToken; } if (cmdletContext.KeyId != null) { request.KeyId = cmdletContext.KeyId; } if (cmdletContext.KeyPairSpec != null) { request.KeyPairSpec = cmdletContext.KeyPairSpec; } // populate Recipient var requestRecipientIsNull = true; request.Recipient = new Amazon.KeyManagementService.Model.RecipientInfo(); System.IO.MemoryStream requestRecipient_recipient_AttestationDocument = null; if (cmdletContext.Recipient_AttestationDocument != null) { _Recipient_AttestationDocumentStream = new System.IO.MemoryStream(cmdletContext.Recipient_AttestationDocument); requestRecipient_recipient_AttestationDocument = _Recipient_AttestationDocumentStream; } if (requestRecipient_recipient_AttestationDocument != null) { request.Recipient.AttestationDocument = requestRecipient_recipient_AttestationDocument; requestRecipientIsNull = false; } Amazon.KeyManagementService.KeyEncryptionMechanism requestRecipient_recipient_KeyEncryptionAlgorithm = null; if (cmdletContext.Recipient_KeyEncryptionAlgorithm != null) { requestRecipient_recipient_KeyEncryptionAlgorithm = cmdletContext.Recipient_KeyEncryptionAlgorithm; } if (requestRecipient_recipient_KeyEncryptionAlgorithm != null) { request.Recipient.KeyEncryptionAlgorithm = requestRecipient_recipient_KeyEncryptionAlgorithm; requestRecipientIsNull = false; } // determine if request.Recipient should be set to null if (requestRecipientIsNull) { request.Recipient = null; } CmdletOutput output; // issue call var client = Client ?? CreateClient(_CurrentCredentials, _RegionEndpoint); try { var response = CallAWSServiceOperation(client, request); object pipelineOutput = null; pipelineOutput = cmdletContext.Select(response, this); output = new CmdletOutput { PipelineOutput = pipelineOutput, ServiceResponse = response }; } catch (Exception e) { output = new CmdletOutput { ErrorResponse = e }; } return output; } finally { if( _Recipient_AttestationDocumentStream != null) { _Recipient_AttestationDocumentStream.Dispose(); } } } public ExecutorContext CreateContext() { return new CmdletContext(); } #endregion #region AWS Service Operation Call private Amazon.KeyManagementService.Model.GenerateDataKeyPairResponse CallAWSServiceOperation(IAmazonKeyManagementService client, Amazon.KeyManagementService.Model.GenerateDataKeyPairRequest request) { Utils.Common.WriteVerboseEndpointMessage(this, client.Config, "AWS Key Management Service", "GenerateDataKeyPair"); try { #if DESKTOP return client.GenerateDataKeyPair(request); #elif CORECLR return client.GenerateDataKeyPairAsync(request).GetAwaiter().GetResult(); #else #error "Unknown build edition" #endif } catch (AmazonServiceException exc) { var webException = exc.InnerException as System.Net.WebException; if (webException != null) { throw new Exception(Utils.Common.FormatNameResolutionFailureMessage(client.Config, webException.Message), webException); } throw; } } #endregion internal partial class CmdletContext : ExecutorContext { public System.Boolean? DryRun { get; set; } public Dictionary EncryptionContext { get; set; } public List GrantToken { get; set; } public System.String KeyId { get; set; } public Amazon.KeyManagementService.DataKeyPairSpec KeyPairSpec { get; set; } public byte[] Recipient_AttestationDocument { get; set; } public Amazon.KeyManagementService.KeyEncryptionMechanism Recipient_KeyEncryptionAlgorithm { get; set; } public System.Func Select { get; set; } = (response, cmdlet) => response; } } }