-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SigV4A auth selection update #3225
Conversation
@@ -208,6 +208,37 @@ protected void addRequestIdToResults(final ServiceModel serviceModel) { | |||
}); | |||
} | |||
|
|||
private static Set<String> servicesMissingMultiAuthMRAPTrait = new HashSet<>(); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: could just do
private static Set<String> servicesMissingMultiAuthMRAPTrait = ImmutableSet.of(
"S3",
"S3-CRT",
"CloudFront KeyValueStore",
"SESv2",
"EventBridge",
)
intead of having to have a static block, imo avoiding the static block is nice
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
updated, ty
context.put("multiRegionAccessPointSupported", true); | ||
} | ||
// todo: remove these checks later | ||
if (serviceModel.getEndpointRules().contains("\"sigv4a\"") && |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
besides endpoint rules, I think we should also check in operations. at operation level there can be authscheme in "auth" field (example cognito idp, even though its no auth but we just add the infra in case of operation level support)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
updated, thank you.
although, I'm not sure we need to check for noauth or bearer per operation.
This block is for enabling MRAP flag only, not for c2j model validation.
7d0fcd6
to
a72da65
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
Issue #, if available:
specification update
Description of changes:
c2j models now have an
auth
list metadata that represents a list of supported Auth Schemes on the service client.SDKs must rely on this trait to generate a SigV4-Asymmetric signer instead of Endpoint Rules.
(with the exception of 4 service clients at the moment whose service models are non-compliant on this regard
S3
CloudFront KeyValueStore
SESv2
EventBridge)
tested by generating all and seeing no diff is generated (as expected now).
Check all that applies:
Check which platforms you have built SDK on to verify the correctness of this PR.
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.