Skip to content

Tags: awslabs/aws-c-auth

Tags

v0.8.4

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
A bunch of CMake fixes (#258)

v0.8.3

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
Add Account Id to Credentials (#260)

v0.8.2

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
Skip Transfer-Encoding from signing (#261)

v0.8.1

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
Fix Retries for ECSCredentialsProvider (#259)

v0.8.0

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
Update CMake to 3.9 (#255)

Co-authored-by: Michael Graeb <[email protected]>

v0.7.31

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
Add more partitions for sts cred provider (#253)

v0.7.30

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
Fix Multiple Shutdown Callback for Profile with STS Code Path (#251)

v0.7.29

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
When sourcing credentials from an external process, ignore stderr (#250)

**Issue:**
If the external process logged to `stderr` during a normal successful run, the credentials would fail to parse.

This was happening because the credentials-provider would always combine `stderr` and `stdout` by appending `2>&1` to the external command. Then JSON parsing would fail, due to random lines of logging on `stderr` mixing with valid JSON on `stdout`.

**Description of changes:**
Instead of redirecting `stderr` to `stdout`, redirect it to `/dev/null`.

It would be better to capture `stderr` separately, and display it if the external process fails. But `aws_process_run()` doesn't currently capture `stderr`, and would require a rework to do so.

v0.7.28

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
vpc-lattice-svcs specific presign (#249)

v0.7.27

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
add content-sha256 header for presign when the signed_body_value is s…

…et to UNSIGNED-PAYLOAD (#248)