Skip to content

Validate signer client options based on authtype #3579

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Dec 1, 2022

Conversation

dagnir
Copy link
Contributor

@dagnir dagnir commented Dec 1, 2022

Motivation and Context

This fixes an issue with the client option validation where the client builder is incorrectly validating that a value for the SIGNER option is present, even when it's not required (because the service does not use AWS auth).

Modifications

This change only does the appropriate validations within the builder based on the authtypes present in the service model.

Testing

  • New unit tests

Screenshots (if appropriate)

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)

Checklist

  • I have read the CONTRIBUTING document
  • Local run of mvn install succeeds
  • My code follows the code style of this project
  • My change requires a change to the Javadoc documentation
  • I have updated the Javadoc documentation accordingly
  • I have added tests to cover my changes
  • All new and existing tests passed
  • I have added a changelog entry. Adding a new entry must be accomplished by running the scripts/new-change script and following the instructions. Commit the new file created by the script in .changes/next-release with your changes.
  • My change is to implement 1.11 parity feature and I have updated LaunchChangelog

License

  • I confirm that this pull request can be released under the Apache 2 license

@dagnir dagnir requested a review from a team as a code owner December 1, 2022 01:03
This fixes an issue with the client option validation where the client builder
is incorrectly validating that a value for the SIGNER option is present, even
when it's not required (because the service does not use AWS auth).

This change only does the appropriate validations based on the authtypes present
in the service model.
@dagnir dagnir force-pushed the dongie/fix-bearer-signer-npe branch from af4667e to b11b3bd Compare December 1, 2022 01:04
Copy link
Contributor

@dave-fn dave-fn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No issues at all, Looks good to me.

@sonarqubecloud
Copy link

sonarqubecloud bot commented Dec 1, 2022

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 12 Code Smells

97.5% 97.5% Coverage
0.6% 0.6% Duplication

"The 'overrideConfiguration.advancedOption[SIGNER]' must be configured in the client builder.");
}

if (AuthUtils.usesBearerAuth(model)) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should it be else if? Can they use both aws auth and bearer auth?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes they can. For example, the service signatureVersion has v4 but also includes one operation that uses bearer.

@dagnir dagnir merged commit c119790 into master Dec 1, 2022
aws-sdk-java-automation added a commit that referenced this pull request Jan 17, 2025
…fd9248d76

Pull request: release <- staging/c576f37d-5dca-45a5-99ad-c78fd9248d76
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants