-
-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Migrate from v0.10 to v0.11 #3
Comments
Hi Hanson, Alas, I had to release 0.11 prematurely due to a Cargo bug that prohibited some unrelated crates from building properly. It's probably not quite ready for consumption, and the interfaces are not settled/stable; I do want to make 0.10 compatibility better. Do you have time to chat next week? I'm curious how you're using this, as it looks like I might be starting to duplicate some work over on scratchstack-http-framework, e.g.: sigv4.rs. Looks like you're using Axum; would love to hear how that's working for what you're doing. In particular, Warp (whose author is at AWS now) looks nice, but doesn't like middleware snooping on the HTTP body, which is obviously required for SigV4. Thanks! |
Thanks Dave for the info. Good to know the current status of Many rust folks especially developers from the
I see many meetings on my calendar next week, but we can/should try. |
No hurry, we can push it out to fit your schedule. But I am quite interested in hearing how this would better fit your use case, especially as I design/redesign scratchstack-http-framework to work better around frameworks that people are using (especially tokio/async based). I have a general idea, but it's kind of an echo chamber over here in my head on Bainbridge. 😆 |
Bah, just realizing I should have tagged 0.11.0 with something like 0.11.0-preview0. I forget that you can do that with semver. |
Ok, versioning snafu fixed:
|
Awesome! |
Hey Hanson, In the latest preview release (0.11.1-preview.2), I added an optimization to allow the signing key provider to optionally return a policy if it's readily available (would save a round trip asking for it later on): https://github.com/dacut/scratchstack-aws-signature/blob/main/src/signing_key.rs#L317-L320 However, I'm beginning to think this was a mistake as it starts to tie the authn implementation (here) with a specific authz implementation (namely scratchstack-aspen), and might also be a premature optimization. Curious to know what you think. Feel free to hit me up via email (dacut at kanga dot org) if it's more convenient. Thanks, |
I just realized this crate has a new release
v0.11
but when I tried to compile my existing code based onv0.10.4
, it failed withIt seems the previous function
sigv4_verify
is now replaced bysigv4_validate_request
which has an additional parameter ofrequired_headers
of type&SignedHeaderRequirements)
. Any suggestion on how to migrate to the latest API? This is what the existing code like:Also, I don't seem to find a
0.11.x
branch or tag. Is themain
branch going to be used for0.11.x
?The text was updated successfully, but these errors were encountered: