An open API service providing package, version and dependency metadata of many open source software ecosystems and registries.

Top 3.8% on proxy.golang.org
Top 1.1% forks on proxy.golang.org

proxy.golang.org : github.com/aws/aws-sdk-go-v2/aws/signer/v4

Package v4 implements the AWS signature version 4 algorithm (commonly known as SigV4). For more information about SigV4, see Signing AWS API requests in the IAM user guide. While this implementation CAN work in an external context, it is developed primarily for SDK use and you may encounter fringe behaviors around header canonicalization. AWS v4 signature validation requires that the canonical string's URI path component must be the escaped form of the HTTP request's path. The Go HTTP client will perform escaping automatically on the HTTP request. This may cause signature validation errors because the request differs from the URI path or query from which the signature was generated. Because of this, we recommend that you explicitly escape the request when using this signer outside of the SDK to prevent possible signature mismatch. This can be done by setting URL.Opaque on the request. The signer will prefer that value, falling back to the return of URL.EscapedPath if unset. When setting URL.Opaque you must do so in the form of: The leading "//" and hostname are required or the escaping will not work correctly. The TestStandaloneSign unit test provides a complete example of using the signer outside of the SDK and pre-escaping the URI path.

Registry - Source - Documentation - JSON
purl: pkg:golang/github.com/aws/aws-sdk-go-v2/aws/signer/v4
Keywords: aws , aws-sdk , go , golang
License: Apache-2.0
Latest release: about 1 month ago
Namespace: github.com/aws/aws-sdk-go-v2/aws/signer
Stars: 2,531 on GitHub
Forks: 612 on GitHub
Total Commits: 2384
Committers: 101
Average commits per author: 23.604
Development Distribution Score (DDS): 0.573
More commit stats: commits.ecosyste.ms
See more repository details: repos.ecosyste.ms
Last synced: about 1 month ago