-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added support for Amazon OpenSearch Serverless. #96
Conversation
Codecov Report
📣 This organization is not using Codecov’s GitHub App Integration. We recommend you install it so Codecov can continue to function properly for your repositories. Learn more @@ Coverage Diff @@
## main #96 +/- ##
==========================================
+ Coverage 42.28% 46.90% +4.61%
==========================================
Files 50 61 +11
Lines 28085 29075 +990
==========================================
+ Hits 11877 13638 +1761
+ Misses 16208 15437 -771
Flags with carried forward coverage won't be shown. Click here to find out more.
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. |
@dblock This looks good to me. I think where you have
|
073874d
to
d088be4
Compare
I think you're saying that service name would be part of credentials, but I think it belongs in the client, hence in the AWS transport. Most of clients know what their service signing name is, but in our case we need to switch between |
Updated PR on top of #114 and #112, with tests. This is ready to review (but look at the last commit). Working sample in dblock/opensearch-rust-client-demo@33a7826. |
Signed-off-by: dblock <dblock@amazon.com>
d088be4
to
b389eb7
Compare
My thinking was that service name is purely a signing parameter of AwsSigV4. Quite possibly That said I agree with your approach here as the most pragmatic and least friction. |
@Xtansia Maybe open an issue to refactor this as you think makes more sense? |
Signed-off-by: dblock dblock@amazon.com
Description
es
(Managed OpenSearch).x-amz-content-sha256
header as per doc. Seems to work against AWS Managed OpenSearch too.@Xtansia does this look right? I am a rust noob, so no idea if I got the
String
vs.str
types right here and whetherservice_name
is on the right object or whether we can do better. Please tell me what to do + it needs tests & docs.By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.