Skip to content

Configure authSchemeProvider in service client builder #4032

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

gosar
Copy link
Contributor

@gosar gosar commented May 23, 2023

Motivation and Context

This builds on top of #4025.

Modifications

  • Add AUTH_SCHEME_PROVIDER as client configuration.
  • Configure client with default AuthSchemeProvider.
  • Add codegen to generate An authSchemeProvider() method on each {ServiceName}ClientBuilder to allow overriding the default auth scheme resolver used by the client.

Testing

@gosar gosar requested a review from a team as a code owner May 23, 2023 22:04
@gosar gosar requested a review from zoewangg May 23, 2023 22:05
Base automatically changed from gosar/sra-ia-authScheme-service-interfaces to feature/master/sra-identity-auth May 24, 2023 22:06
@gosar gosar force-pushed the gosar/sra-ia-authSchemeProvider-clientBuilder branch from 7565753 to da8a785 Compare May 24, 2023 22:36
@sonarqubecloud
Copy link

SonarCloud Quality Gate failed.    Quality Gate failed

Bug C 4 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 143 Code Smells

70.2% 70.2% Coverage
1.1% 1.1% Duplication

@gosar gosar merged commit c456c5b into feature/master/sra-identity-auth May 25, 2023
@gosar gosar deleted the gosar/sra-ia-authSchemeProvider-clientBuilder branch May 25, 2023 20:54
aws-sdk-java-automation added a commit that referenced this pull request Jun 11, 2025
…ad8642df6

Pull request: release <- staging/62f9f990-f2be-48db-8311-c42ad8642df6
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants