-
Notifications
You must be signed in to change notification settings - Fork 588
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(middleware-signing): attempt secondary authscheme selection during request signing #5895
Conversation
…g request signing
// user supplied signingName -> endpoints.json inferred (credential scope -> model arnNamespace) -> model service id | ||
input.signingName = input.signingName || signingService || input.serviceId; | ||
|
||
if (overwrite) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: overwrite
reads like the input.*
parameters would be overwritten, but the code path here is using the original input.*
parameters.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
unfortunately this part of the code mutates the config during signing and not during the constructor config resolution
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I changed it to only mutate if authscheme is not sigv4a. Sigv4a doesn't contain a meaningful region so far, so we can skip writing that to the input and leave it to any further resolutions containing a singular region.
Co-authored-by: Steven Yuan <[email protected]>
…authscheme is sigv4a
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs and link to relevant comments in this thread. |
Issue
S3 feature release
2ddd8ec
Description
In awsAuthMiddleware, select the second authScheme if:
Testing
existing unit test