Skip to content

Conversation

@millems
Copy link
Contributor

@millems millems commented Sep 27, 2023

No description provided.

@millems millems requested a review from a team as a code owner September 27, 2023 22:42
@sonarqubecloud
Copy link

SonarCloud Quality Gate failed.    Quality Gate failed

Bug C 4 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot E 2 Security Hotspots
Code Smell A 457 Code Smells

84.7% 84.7% Coverage
4.0% 4.0% Duplication

idea Catch issues before they fail your Quality Gate with our IDE extension sonarlint SonarLint

@millems millems merged commit 1ae9ac9 into feature/master/sra-identity-auth-testing Sep 28, 2023
@millems millems deleted the millem/backwards-compatible-testing-3 branch September 28, 2023 17:14
sugmanue pushed a commit that referenced this pull request Oct 31, 2023
sugmanue added a commit that referenced this pull request Nov 6, 2023
* Set TIME_OFFSET attribtue in SRA signin methods (#4483)

* Verify that execution attributes set by old interceptors can be read by new signers. (#4494)

* Move S3Presigner fully to SRA with HttpSigner (#4569)

* Remove derived attribute logic for PRESIGNER_EXPIRATION (#4602)

* Remove derived attribute logic for PRESIGNER_EXPIRATION

Because of the 2 instant() calls in the write/read mappings, a basic
write this attribute and read it back, would give different values.

Since this attribute should only be set/read explicitly by our
presigner code, we don't need this mapping logic at all.

Also, update S3PresignerTest to assert isEqualTo instead of isCloseTo
and remove unnecessary override

* Remove PRESIGNER_EXPIRATION mirroring test

* Enable SRA Auth for S3

* Make follow up changes from PR 4396 (#4454)

* Make SigingStage updates similar to AsyncSigningStage.
* Simplify (Async)SigningStageTests based on updated logic.
* Minor typos

* If authType=none don't use the old signer, even if overridden  (#4523)

* Add authType=none tests to AwsExecutionContentBuilderTest

Some of these tests are failing. Will fix them in next commit

* If authType=none don't use the old signer, even if overridden

* Update signing stage logic for authType=none

* Add asserts on identity resolution for authType=none

* Add a missing http-auth-aws dependecy to aws-core

* Add a changelog entry

---------

Co-authored-by: Zoe Wang <[email protected]>
Co-authored-by: Matthew Miller <[email protected]>
Co-authored-by: Jaykumar Gosar <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants