-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Disable request signing when basic auth is enabled #117
base: main
Are you sure you want to change the base?
Conversation
e2138b8
to
ae54090
Compare
Just tested this locally and it works fine for basic auth workflows. |
Thanks @Sovietaced for your contribution, is this a similar problem #102 that can be solved with this PR? |
Possibly. I'm not sure if #102 has been root caused |
Thanks @Sovietaced, Can you please add some unit tests to test this change? Thanks |
I see one of your another PR #114 (~ same subject), any co-relation between these 2 PR's? |
They are related. I made them separate pull requests because I wasn't sure how receptive you would be to a code change while a doc change is pretty straightforward. |
I had looked into adding unit tests but I don't see any existing coverage for basic authentication. I'm not even sure how I would observe that the options have been set on an HTTP client (besides setting up a mock HTTP server) which seems like quite a bit of work. |
Looks to me like if this PR goes in we dont have to explicitly disable the request signing right ? This PR #114 mentions to disable it. |
That is correct. If the documentation PR merges I will rebase this. If we'd like to merge this (and close the documentation PR), I can update the documentation accordingly. |
I will just prepare this pull request to remove the option to disable request signing. |
Thanks @Sovietaced I will go ahead and merge the documentation PR #114, please try to add some unit tests for this PR and then we can proceed to merge this. WDYT? |
Sounds good. Taking a look at things now. |
530b950
to
a6732c2
Compare
@prudhvigodithi I took a look at the test code here and I don't think there is much I can really do. There exists zero unit test code that targets basic authentication, and it makes sense because It looks like the existing code had resorted to one of the following:
If we really care about preventing regressions against AWS Opensearch, there should be a way to run acceptance/integration tests against AWS Opensearch. Given that AWS Opensearch is closed source and cannot be run locally by the public, the only reasonable way to run acceptance/integration tests is to run actual integration tests against an ephemeral instance of AWS Opensearch on AWS, IMO. And that is something I don't think I should be responsible for setting up. Please let me know if you had any other ideas around unit testing. |
a6732c2
to
dc05eef
Compare
Signed-off-by: Jason Parraga <[email protected]>
Signed-off-by: Jason Parraga <[email protected]>
dc05eef
to
5d39f57
Compare
@prudhvigodithi The changes are working for me, the following terraform code worked using this PR |
@prudhvigodithi Can we merge this PR? |
Hey @Sovietaced can you please take care of the conflicts, we can proceed to merge this PR. |
Description
Disable request signing when basic auth is enabled so that AWS request signing doesn't have to be explicitly enabled. Also removes the option to configure whether requests should be signed since it should always be disabled when basic auth is enabled.
Issues Resolved
#116
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.