AWS SDK

AWS SDK

rev. fe7325e930c91552a2543997ba9d1764da504a93 (ignoring whitespace)

Files changed:

tmp-codegen-diff/aws-sdk/sdk/s3/tests/express.rs

@@ -426,426 +480,0 @@
  446    446   
                .build(),
  447    447   
        )
  448    448   
        .build();
  449    449   
    let client = Client::from_conf(conf);
  450    450   
  451    451   
    // Note that we pass a regular bucket; when the bug was present, it still went through s3 Express auth flow.
  452    452   
    let _ = client.list_objects_v2().bucket("test-bucket").send().await;
  453    453   
    // If s3 Express auth flow were exercised, no request would be received, most likely due to `TimeoutError`.
  454    454   
    let _ = request.expect_request();
  455    455   
}
  456         -
  457         -
#[tracing_test::traced_test]
  458         -
#[tokio::test]
  459         -
async fn no_auth_should_be_selected_when_no_credentials_is_configured() {
  460         -
    let (http_client, _) = capture_request(None);
  461         -
    let config = aws_config::from_env()
  462         -
        .http_client(http_client)
  463         -
        .region(Region::new("us-east-2"))
  464         -
        .no_credentials()
  465         -
        .load()
  466         -
        .await;
  467         -
  468         -
    let client = Client::new(&config);
  469         -
    let _ = dbg!(
  470         -
        client
  471         -
            .list_objects_v2()
  472         -
            .bucket("doesnotmatter")
  473         -
            .send()
  474         -
            .await
  475         -
    );
  476         -
  477         -
    assert!(logs_contain(
  478         -
        "resolving identity scheme_id=AuthSchemeId { scheme_id: \"no_auth\" }"
  479         -
    ));
  480         -
}

tmp-codegen-diff/aws-sdk/sdk/s3/tests/no_auth.rs

@@ -1,1 +37,40 @@
    1      1   
/*
    2      2   
 * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
    3      3   
 * SPDX-License-Identifier: Apache-2.0
    4      4   
 */
    5      5   
           6  +
use aws_sdk_s3::config::Region;
    6      7   
use aws_sdk_s3::{Client, Config};
           8  +
use aws_smithy_http_client::test_util::capture_request;
    7      9   
use aws_smithy_http_client::test_util::dvr::ReplayingClient;
          10  +
use aws_smithy_runtime::client::auth::no_auth::NO_AUTH_SCHEME_ID;
    8     11   
use aws_smithy_runtime::test_util::capture_test_logs::capture_test_logs;
    9     12   
   10     13   
#[tokio::test]
   11     14   
async fn list_objects() {
   12     15   
    let _logs = capture_test_logs();
   13     16   
   14     17   
    let http_client = ReplayingClient::from_file("tests/data/no_auth/list-objects.json").unwrap();
   15     18   
    let config = aws_config::from_env()
   16     19   
        .http_client(http_client.clone())
   17     20   
        .no_credentials()
@@ -104,107 +0,162 @@
  124    127   
        .key("0431cddc-a418-4a79-a34d-6c041394e8e4/a6ddcc84-8e4d-4c68-885c-2d51168eec97.FPKM-UQ.txt.gz")
  125    128   
        .send()
  126    129   
        .await;
  127    130   
    dbg!(result).expect("success");
  128    131   
  129    132   
    http_client
  130    133   
        .relaxed_validate("application/xml")
  131    134   
        .await
  132    135   
        .unwrap();
  133    136   
}
         137  +
         138  +
#[tracing_test::traced_test]
         139  +
#[tokio::test]
         140  +
async fn no_auth_should_be_selected_when_no_credentials_is_configured() {
         141  +
    let (http_client, _) = capture_request(None);
         142  +
    let config = aws_config::from_env()
         143  +
        .http_client(http_client)
         144  +
        .region(Region::new("us-east-2"))
         145  +
        .no_credentials()
         146  +
        .load()
         147  +
        .await;
         148  +
         149  +
    let client = Client::new(&config);
         150  +
    let _ = dbg!(
         151  +
        client
         152  +
            .list_objects_v2()
         153  +
            .bucket("doesnotmatter")
         154  +
            .send()
         155  +
            .await
         156  +
    );
         157  +
         158  +
    assert!(logs_contain(&format!(
         159  +
        "resolving identity scheme_id=AuthSchemeId {{ scheme_id: \"{auth_scheme_id_str}\" }}",
         160  +
        auth_scheme_id_str = NO_AUTH_SCHEME_ID.inner(),
         161  +
    )));
         162  +
}