repo_name
stringlengths
1
52
repo_creator
stringclasses
6 values
programming_language
stringclasses
4 values
code
stringlengths
0
9.68M
num_lines
int64
1
234k
session-manager-plugin
aws
Go
package credentials import ( "os" "path/filepath" "testing" "github.com/aws/aws-sdk-go/internal/sdktesting" "github.com/aws/aws-sdk-go/internal/shareddefaults" ) func TestSharedCredentialsProvider(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() p := SharedCredentialsProvider{Filename: "example.ini", Profile: ""} creds, err := p.Retrieve() if err != nil { t.Errorf("expect nil, got %v", err) } if e, a := "accessKey", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "secret", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "token", creds.SessionToken; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestSharedCredentialsProviderIsExpired(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() p := SharedCredentialsProvider{Filename: "example.ini", Profile: ""} if !p.IsExpired() { t.Errorf("Expect creds to be expired before retrieve") } _, err := p.Retrieve() if err != nil { t.Errorf("expect nil, got %v", err) } if p.IsExpired() { t.Errorf("Expect creds to not be expired after retrieve") } } func TestSharedCredentialsProviderWithAWS_SHARED_CREDENTIALS_FILE(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() os.Setenv("AWS_SHARED_CREDENTIALS_FILE", "example.ini") p := SharedCredentialsProvider{} creds, err := p.Retrieve() if err != nil { t.Errorf("expect nil, got %v", err) } if e, a := "accessKey", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "secret", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "token", creds.SessionToken; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestSharedCredentialsProviderWithAWS_SHARED_CREDENTIALS_FILEAbsPath(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() wd, err := os.Getwd() if err != nil { t.Errorf("expect no error, got %v", err) } os.Setenv("AWS_SHARED_CREDENTIALS_FILE", filepath.Join(wd, "example.ini")) p := SharedCredentialsProvider{} creds, err := p.Retrieve() if err != nil { t.Errorf("expect nil, got %v", err) } if e, a := "accessKey", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "secret", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "token", creds.SessionToken; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestSharedCredentialsProviderWithAWS_PROFILE(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() os.Setenv("AWS_PROFILE", "no_token") p := SharedCredentialsProvider{Filename: "example.ini", Profile: ""} creds, err := p.Retrieve() if err != nil { t.Errorf("expect nil, got %v", err) } if e, a := "accessKey", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "secret", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if v := creds.SessionToken; len(v) != 0 { t.Errorf("Expect no token, %v", v) } } func TestSharedCredentialsProviderWithoutTokenFromProfile(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() p := SharedCredentialsProvider{Filename: "example.ini", Profile: "no_token"} creds, err := p.Retrieve() if err != nil { t.Errorf("expect nil, got %v", err) } if e, a := "accessKey", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "secret", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if v := creds.SessionToken; len(v) != 0 { t.Errorf("Expect no token, %v", v) } } func TestSharedCredentialsProviderColonInCredFile(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() p := SharedCredentialsProvider{Filename: "example.ini", Profile: "with_colon"} creds, err := p.Retrieve() if err != nil { t.Errorf("expect nil, got %v", err) } if e, a := "accessKey", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "secret", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if v := creds.SessionToken; len(v) != 0 { t.Errorf("Expect no token, %v", v) } } func TestSharedCredentialsProvider_DefaultFilename(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() os.Setenv("USERPROFILE", "profile_dir") os.Setenv("HOME", "home_dir") // default filename and profile p := SharedCredentialsProvider{} filename, err := p.filename() if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := shareddefaults.SharedCredentialsFilename(), filename; e != a { t.Errorf("expect %q filename, got %q", e, a) } } func BenchmarkSharedCredentialsProvider(b *testing.B) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() p := SharedCredentialsProvider{Filename: "example.ini", Profile: ""} _, err := p.Retrieve() if err != nil { b.Fatal(err) } b.ResetTimer() for i := 0; i < b.N; i++ { _, err := p.Retrieve() if err != nil { b.Fatal(err) } } }
206
session-manager-plugin
aws
Go
package credentials import ( "github.com/aws/aws-sdk-go/aws/awserr" ) // StaticProviderName provides a name of Static provider const StaticProviderName = "StaticProvider" var ( // ErrStaticCredentialsEmpty is emitted when static credentials are empty. ErrStaticCredentialsEmpty = awserr.New("EmptyStaticCreds", "static credentials are empty", nil) ) // A StaticProvider is a set of credentials which are set programmatically, // and will never expire. type StaticProvider struct { Value } // NewStaticCredentials returns a pointer to a new Credentials object // wrapping a static credentials value provider. Token is only required // for temporary security credentials retrieved via STS, otherwise an empty // string can be passed for this parameter. func NewStaticCredentials(id, secret, token string) *Credentials { return NewCredentials(&StaticProvider{Value: Value{ AccessKeyID: id, SecretAccessKey: secret, SessionToken: token, }}) } // NewStaticCredentialsFromCreds returns a pointer to a new Credentials object // wrapping the static credentials value provide. Same as NewStaticCredentials // but takes the creds Value instead of individual fields func NewStaticCredentialsFromCreds(creds Value) *Credentials { return NewCredentials(&StaticProvider{Value: creds}) } // Retrieve returns the credentials or error if the credentials are invalid. func (s *StaticProvider) Retrieve() (Value, error) { if s.AccessKeyID == "" || s.SecretAccessKey == "" { return Value{ProviderName: StaticProviderName}, ErrStaticCredentialsEmpty } if len(s.Value.ProviderName) == 0 { s.Value.ProviderName = StaticProviderName } return s.Value, nil } // IsExpired returns if the credentials are expired. // // For StaticProvider, the credentials never expired. func (s *StaticProvider) IsExpired() bool { return false }
58
session-manager-plugin
aws
Go
package credentials import ( "testing" ) func TestStaticProviderGet(t *testing.T) { s := StaticProvider{ Value: Value{ AccessKeyID: "AKID", SecretAccessKey: "SECRET", SessionToken: "", }, } creds, err := s.Retrieve() if err != nil { t.Errorf("expect nil, got %v", err) } if e, a := "AKID", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "SECRET", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if v := creds.SessionToken; len(v) != 0 { t.Errorf("Expect no session token, %v", v) } } func TestStaticProviderIsExpired(t *testing.T) { s := StaticProvider{ Value: Value{ AccessKeyID: "AKID", SecretAccessKey: "SECRET", SessionToken: "", }, } if s.IsExpired() { t.Errorf("Expect static credentials to never expire") } }
44
session-manager-plugin
aws
Go
package ec2rolecreds import ( "bufio" "encoding/json" "fmt" "strings" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/ec2metadata" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/internal/sdkuri" ) // ProviderName provides a name of EC2Role provider const ProviderName = "EC2RoleProvider" // A EC2RoleProvider retrieves credentials from the EC2 service, and keeps track if // those credentials are expired. // // Example how to configure the EC2RoleProvider with custom http Client, Endpoint // or ExpiryWindow // // p := &ec2rolecreds.EC2RoleProvider{ // // Pass in a custom timeout to be used when requesting // // IAM EC2 Role credentials. // Client: ec2metadata.New(sess, aws.Config{ // HTTPClient: &http.Client{Timeout: 10 * time.Second}, // }), // // // Do not use early expiry of credentials. If a non zero value is // // specified the credentials will be expired early // ExpiryWindow: 0, // } type EC2RoleProvider struct { credentials.Expiry // Required EC2Metadata client to use when connecting to EC2 metadata service. Client *ec2metadata.EC2Metadata // ExpiryWindow will allow the credentials to trigger refreshing prior to // the credentials actually expiring. This is beneficial so race conditions // with expiring credentials do not cause request to fail unexpectedly // due to ExpiredTokenException exceptions. // // So a ExpiryWindow of 10s would cause calls to IsExpired() to return true // 10 seconds before the credentials are actually expired. // // If ExpiryWindow is 0 or less it will be ignored. ExpiryWindow time.Duration } // NewCredentials returns a pointer to a new Credentials object wrapping // the EC2RoleProvider. Takes a ConfigProvider to create a EC2Metadata client. // The ConfigProvider is satisfied by the session.Session type. func NewCredentials(c client.ConfigProvider, options ...func(*EC2RoleProvider)) *credentials.Credentials { p := &EC2RoleProvider{ Client: ec2metadata.New(c), } for _, option := range options { option(p) } return credentials.NewCredentials(p) } // NewCredentialsWithClient returns a pointer to a new Credentials object wrapping // the EC2RoleProvider. Takes a EC2Metadata client to use when connecting to EC2 // metadata service. func NewCredentialsWithClient(client *ec2metadata.EC2Metadata, options ...func(*EC2RoleProvider)) *credentials.Credentials { p := &EC2RoleProvider{ Client: client, } for _, option := range options { option(p) } return credentials.NewCredentials(p) } // Retrieve retrieves credentials from the EC2 service. // Error will be returned if the request fails, or unable to extract // the desired credentials. func (m *EC2RoleProvider) Retrieve() (credentials.Value, error) { return m.RetrieveWithContext(aws.BackgroundContext()) } // RetrieveWithContext retrieves credentials from the EC2 service. // Error will be returned if the request fails, or unable to extract // the desired credentials. func (m *EC2RoleProvider) RetrieveWithContext(ctx credentials.Context) (credentials.Value, error) { credsList, err := requestCredList(ctx, m.Client) if err != nil { return credentials.Value{ProviderName: ProviderName}, err } if len(credsList) == 0 { return credentials.Value{ProviderName: ProviderName}, awserr.New("EmptyEC2RoleList", "empty EC2 Role list", nil) } credsName := credsList[0] roleCreds, err := requestCred(ctx, m.Client, credsName) if err != nil { return credentials.Value{ProviderName: ProviderName}, err } m.SetExpiration(roleCreds.Expiration, m.ExpiryWindow) return credentials.Value{ AccessKeyID: roleCreds.AccessKeyID, SecretAccessKey: roleCreds.SecretAccessKey, SessionToken: roleCreds.Token, ProviderName: ProviderName, }, nil } // A ec2RoleCredRespBody provides the shape for unmarshaling credential // request responses. type ec2RoleCredRespBody struct { // Success State Expiration time.Time AccessKeyID string SecretAccessKey string Token string // Error state Code string Message string } const iamSecurityCredsPath = "iam/security-credentials/" // requestCredList requests a list of credentials from the EC2 service. // If there are no credentials, or there is an error making or receiving the request func requestCredList(ctx aws.Context, client *ec2metadata.EC2Metadata) ([]string, error) { resp, err := client.GetMetadataWithContext(ctx, iamSecurityCredsPath) if err != nil { return nil, awserr.New("EC2RoleRequestError", "no EC2 instance role found", err) } credsList := []string{} s := bufio.NewScanner(strings.NewReader(resp)) for s.Scan() { credsList = append(credsList, s.Text()) } if err := s.Err(); err != nil { return nil, awserr.New(request.ErrCodeSerialization, "failed to read EC2 instance role from metadata service", err) } return credsList, nil } // requestCred requests the credentials for a specific credentials from the EC2 service. // // If the credentials cannot be found, or there is an error reading the response // and error will be returned. func requestCred(ctx aws.Context, client *ec2metadata.EC2Metadata, credsName string) (ec2RoleCredRespBody, error) { resp, err := client.GetMetadataWithContext(ctx, sdkuri.PathJoin(iamSecurityCredsPath, credsName)) if err != nil { return ec2RoleCredRespBody{}, awserr.New("EC2RoleRequestError", fmt.Sprintf("failed to get %s EC2 instance role credentials", credsName), err) } respCreds := ec2RoleCredRespBody{} if err := json.NewDecoder(strings.NewReader(resp)).Decode(&respCreds); err != nil { return ec2RoleCredRespBody{}, awserr.New(request.ErrCodeSerialization, fmt.Sprintf("failed to decode %s EC2 instance role credentials", credsName), err) } if respCreds.Code != "Success" { // If an error code was returned something failed requesting the role. return ec2RoleCredRespBody{}, awserr.New(respCreds.Code, respCreds.Message, nil) } return respCreds, nil }
189
session-manager-plugin
aws
Go
package ec2rolecreds_test import ( "fmt" "net/http" "net/http/httptest" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/credentials/ec2rolecreds" "github.com/aws/aws-sdk-go/aws/ec2metadata" "github.com/aws/aws-sdk-go/awstesting/unit" ) const credsRespTmpl = `{ "Code": "Success", "Type": "AWS-HMAC", "AccessKeyId" : "accessKey", "SecretAccessKey" : "secret", "Token" : "token", "Expiration" : "%s", "LastUpdated" : "2009-11-23T0:00:00Z" }` const credsFailRespTmpl = `{ "Code": "ErrorCode", "Message": "ErrorMsg", "LastUpdated": "2009-11-23T0:00:00Z" }` func initTestServer(expireOn string, failAssume bool) *httptest.Server { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { if r.URL.Path == "/latest/meta-data/iam/security-credentials/" { fmt.Fprintln(w, "RoleName") } else if r.URL.Path == "/latest/meta-data/iam/security-credentials/RoleName" { if failAssume { fmt.Fprintf(w, credsFailRespTmpl) } else { fmt.Fprintf(w, credsRespTmpl, expireOn) } } else { http.Error(w, "Not found", http.StatusNotFound) } })) return server } func TestEC2RoleProvider(t *testing.T) { server := initTestServer("2014-12-16T01:51:37Z", false) defer server.Close() p := &ec2rolecreds.EC2RoleProvider{ Client: ec2metadata.New(unit.Session, &aws.Config{Endpoint: aws.String(server.URL + "/latest")}), } creds, err := p.Retrieve() if err != nil { t.Errorf("Expect no error, got %v", err) } if e, a := "accessKey", creds.AccessKeyID; e != a { t.Errorf("Expect access key ID to match, %v got %v", e, a) } if e, a := "secret", creds.SecretAccessKey; e != a { t.Errorf("Expect secret access key to match, %v got %v", e, a) } if e, a := "token", creds.SessionToken; e != a { t.Errorf("Expect session token to match, %v got %v", e, a) } } func TestEC2RoleProviderFailAssume(t *testing.T) { server := initTestServer("2014-12-16T01:51:37Z", true) defer server.Close() p := &ec2rolecreds.EC2RoleProvider{ Client: ec2metadata.New(unit.Session, &aws.Config{Endpoint: aws.String(server.URL + "/latest")}), } creds, err := p.Retrieve() if err == nil { t.Errorf("Expect error") } e := err.(awserr.Error) if e, a := "ErrorCode", e.Code(); e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "ErrorMsg", e.Message(); e != a { t.Errorf("expect %v, got %v", e, a) } if v := e.OrigErr(); v != nil { t.Errorf("expect nil, got %v", v) } if e, a := "", creds.AccessKeyID; e != a { t.Errorf("Expect access key ID to match, %v got %v", e, a) } if e, a := "", creds.SecretAccessKey; e != a { t.Errorf("Expect secret access key to match, %v got %v", e, a) } if e, a := "", creds.SessionToken; e != a { t.Errorf("Expect session token to match, %v got %v", e, a) } } func TestEC2RoleProviderIsExpired(t *testing.T) { server := initTestServer("2014-12-16T01:51:37Z", false) defer server.Close() p := &ec2rolecreds.EC2RoleProvider{ Client: ec2metadata.New(unit.Session, &aws.Config{Endpoint: aws.String(server.URL + "/latest")}), } p.CurrentTime = func() time.Time { return time.Date(2014, 12, 15, 21, 26, 0, 0, time.UTC) } if !p.IsExpired() { t.Errorf("Expect creds to be expired before retrieve.") } _, err := p.Retrieve() if v := err; v != nil { t.Errorf("Expect no error, %v", err) } if p.IsExpired() { t.Errorf("Expect creds to not be expired after retrieve.") } p.CurrentTime = func() time.Time { return time.Date(3014, 12, 15, 21, 26, 0, 0, time.UTC) } if !p.IsExpired() { t.Errorf("Expect creds to be expired.") } } func TestEC2RoleProviderExpiryWindowIsExpired(t *testing.T) { server := initTestServer("2014-12-16T01:51:37Z", false) defer server.Close() p := &ec2rolecreds.EC2RoleProvider{ Client: ec2metadata.New(unit.Session, &aws.Config{Endpoint: aws.String(server.URL + "/latest")}), ExpiryWindow: time.Hour * 1, } p.CurrentTime = func() time.Time { return time.Date(2014, 12, 15, 0, 51, 37, 0, time.UTC) } if !p.IsExpired() { t.Errorf("Expect creds to be expired before retrieve.") } _, err := p.Retrieve() if v := err; v != nil { t.Errorf("Expect no error, %v", err) } if p.IsExpired() { t.Errorf("Expect creds to not be expired after retrieve.") } p.CurrentTime = func() time.Time { return time.Date(2014, 12, 16, 0, 55, 37, 0, time.UTC) } if !p.IsExpired() { t.Errorf("Expect creds to be expired.") } } func BenchmarkEC3RoleProvider(b *testing.B) { server := initTestServer("2014-12-16T01:51:37Z", false) defer server.Close() p := &ec2rolecreds.EC2RoleProvider{ Client: ec2metadata.New(unit.Session, &aws.Config{Endpoint: aws.String(server.URL + "/latest")}), } _, err := p.Retrieve() if err != nil { b.Fatal(err) } b.ResetTimer() for i := 0; i < b.N; i++ { if _, err := p.Retrieve(); err != nil { b.Fatal(err) } } }
196
session-manager-plugin
aws
Go
// Package endpointcreds provides support for retrieving credentials from an // arbitrary HTTP endpoint. // // The credentials endpoint Provider can receive both static and refreshable // credentials that will expire. Credentials are static when an "Expiration" // value is not provided in the endpoint's response. // // Static credentials will never expire once they have been retrieved. The format // of the static credentials response: // { // "AccessKeyId" : "MUA...", // "SecretAccessKey" : "/7PC5om....", // } // // Refreshable credentials will expire within the "ExpiryWindow" of the Expiration // value in the response. The format of the refreshable credentials response: // { // "AccessKeyId" : "MUA...", // "SecretAccessKey" : "/7PC5om....", // "Token" : "AQoDY....=", // "Expiration" : "2016-02-25T06:03:31Z" // } // // Errors should be returned in the following format and only returned with 400 // or 500 HTTP status codes. // { // "code": "ErrorCode", // "message": "Helpful error message." // } package endpointcreds import ( "encoding/json" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/client/metadata" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/private/protocol/json/jsonutil" ) // ProviderName is the name of the credentials provider. const ProviderName = `CredentialsEndpointProvider` // Provider satisfies the credentials.Provider interface, and is a client to // retrieve credentials from an arbitrary endpoint. type Provider struct { staticCreds bool credentials.Expiry // Requires a AWS Client to make HTTP requests to the endpoint with. // the Endpoint the request will be made to is provided by the aws.Config's // Endpoint value. Client *client.Client // ExpiryWindow will allow the credentials to trigger refreshing prior to // the credentials actually expiring. This is beneficial so race conditions // with expiring credentials do not cause request to fail unexpectedly // due to ExpiredTokenException exceptions. // // So a ExpiryWindow of 10s would cause calls to IsExpired() to return true // 10 seconds before the credentials are actually expired. // // If ExpiryWindow is 0 or less it will be ignored. ExpiryWindow time.Duration // Optional authorization token value if set will be used as the value of // the Authorization header of the endpoint credential request. AuthorizationToken string } // NewProviderClient returns a credentials Provider for retrieving AWS credentials // from arbitrary endpoint. func NewProviderClient(cfg aws.Config, handlers request.Handlers, endpoint string, options ...func(*Provider)) credentials.Provider { p := &Provider{ Client: client.New( cfg, metadata.ClientInfo{ ServiceName: "CredentialsEndpoint", Endpoint: endpoint, }, handlers, ), } p.Client.Handlers.Unmarshal.PushBack(unmarshalHandler) p.Client.Handlers.UnmarshalError.PushBack(unmarshalError) p.Client.Handlers.Validate.Clear() p.Client.Handlers.Validate.PushBack(validateEndpointHandler) for _, option := range options { option(p) } return p } // NewCredentialsClient returns a pointer to a new Credentials object // wrapping the endpoint credentials Provider. func NewCredentialsClient(cfg aws.Config, handlers request.Handlers, endpoint string, options ...func(*Provider)) *credentials.Credentials { return credentials.NewCredentials(NewProviderClient(cfg, handlers, endpoint, options...)) } // IsExpired returns true if the credentials retrieved are expired, or not yet // retrieved. func (p *Provider) IsExpired() bool { if p.staticCreds { return false } return p.Expiry.IsExpired() } // Retrieve will attempt to request the credentials from the endpoint the Provider // was configured for. And error will be returned if the retrieval fails. func (p *Provider) Retrieve() (credentials.Value, error) { return p.RetrieveWithContext(aws.BackgroundContext()) } // RetrieveWithContext will attempt to request the credentials from the endpoint the Provider // was configured for. And error will be returned if the retrieval fails. func (p *Provider) RetrieveWithContext(ctx credentials.Context) (credentials.Value, error) { resp, err := p.getCredentials(ctx) if err != nil { return credentials.Value{ProviderName: ProviderName}, awserr.New("CredentialsEndpointError", "failed to load credentials", err) } if resp.Expiration != nil { p.SetExpiration(*resp.Expiration, p.ExpiryWindow) } else { p.staticCreds = true } return credentials.Value{ AccessKeyID: resp.AccessKeyID, SecretAccessKey: resp.SecretAccessKey, SessionToken: resp.Token, ProviderName: ProviderName, }, nil } type getCredentialsOutput struct { Expiration *time.Time AccessKeyID string SecretAccessKey string Token string } type errorOutput struct { Code string `json:"code"` Message string `json:"message"` } func (p *Provider) getCredentials(ctx aws.Context) (*getCredentialsOutput, error) { op := &request.Operation{ Name: "GetCredentials", HTTPMethod: "GET", } out := &getCredentialsOutput{} req := p.Client.NewRequest(op, nil, out) req.SetContext(ctx) req.HTTPRequest.Header.Set("Accept", "application/json") if authToken := p.AuthorizationToken; len(authToken) != 0 { req.HTTPRequest.Header.Set("Authorization", authToken) } return out, req.Send() } func validateEndpointHandler(r *request.Request) { if len(r.ClientInfo.Endpoint) == 0 { r.Error = aws.ErrMissingEndpoint } } func unmarshalHandler(r *request.Request) { defer r.HTTPResponse.Body.Close() out := r.Data.(*getCredentialsOutput) if err := json.NewDecoder(r.HTTPResponse.Body).Decode(&out); err != nil { r.Error = awserr.New(request.ErrCodeSerialization, "failed to decode endpoint credentials", err, ) } } func unmarshalError(r *request.Request) { defer r.HTTPResponse.Body.Close() var errOut errorOutput err := jsonutil.UnmarshalJSONError(&errOut, r.HTTPResponse.Body) if err != nil { r.Error = awserr.NewRequestFailure( awserr.New(request.ErrCodeSerialization, "failed to decode error message", err), r.HTTPResponse.StatusCode, r.RequestID, ) return } // Response body format is not consistent between metadata endpoints. // Grab the error message as a string and include that as the source error r.Error = awserr.New(errOut.Code, errOut.Message, nil) }
211
session-manager-plugin
aws
Go
package endpointcreds_test import ( "encoding/json" "fmt" "net/http" "net/http/httptest" "testing" "time" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/credentials/endpointcreds" "github.com/aws/aws-sdk-go/awstesting/unit" ) func TestRetrieveRefreshableCredentials(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { if e, a := "/path/to/endpoint", r.URL.Path; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "application/json", r.Header.Get("Accept"); e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "else", r.URL.Query().Get("something"); e != a { t.Errorf("expect %v, got %v", e, a) } encoder := json.NewEncoder(w) err := encoder.Encode(map[string]interface{}{ "AccessKeyID": "AKID", "SecretAccessKey": "SECRET", "Token": "TOKEN", "Expiration": time.Now().Add(1 * time.Hour), }) if err != nil { fmt.Println("failed to write out creds", err) } })) defer server.Close() client := endpointcreds.NewProviderClient(*unit.Session.Config, unit.Session.Handlers, server.URL+"/path/to/endpoint?something=else", ) creds, err := client.Retrieve() if err != nil { t.Errorf("expect no error, got %v", err) } if e, a := "AKID", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "SECRET", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "TOKEN", creds.SessionToken; e != a { t.Errorf("expect %v, got %v", e, a) } if client.IsExpired() { t.Errorf("expect not expired, was") } client.(*endpointcreds.Provider).CurrentTime = func() time.Time { return time.Now().Add(2 * time.Hour) } if !client.IsExpired() { t.Errorf("expect expired, wasn't") } } func TestRetrieveStaticCredentials(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { encoder := json.NewEncoder(w) err := encoder.Encode(map[string]interface{}{ "AccessKeyID": "AKID", "SecretAccessKey": "SECRET", }) if err != nil { fmt.Println("failed to write out creds", err) } })) defer server.Close() client := endpointcreds.NewProviderClient(*unit.Session.Config, unit.Session.Handlers, server.URL) creds, err := client.Retrieve() if err != nil { t.Errorf("expect no error, got %v", err) } if e, a := "AKID", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "SECRET", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if v := creds.SessionToken; len(v) != 0 { t.Errorf("Expect no SessionToken, got %#v", v) } if client.IsExpired() { t.Errorf("expect not expired, was") } } func TestFailedRetrieveCredentials(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.WriteHeader(400) encoder := json.NewEncoder(w) err := encoder.Encode(map[string]interface{}{ "Code": "Error", "Message": "Message", }) if err != nil { fmt.Println("failed to write error", err) } })) defer server.Close() client := endpointcreds.NewProviderClient(*unit.Session.Config, unit.Session.Handlers, server.URL) creds, err := client.Retrieve() if err == nil { t.Errorf("expect error, got none") } aerr := err.(awserr.Error) if e, a := "CredentialsEndpointError", aerr.Code(); e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "failed to load credentials", aerr.Message(); e != a { t.Errorf("expect %v, got %v", e, a) } aerr = aerr.OrigErr().(awserr.Error) if e, a := "Error", aerr.Code(); e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "Message", aerr.Message(); e != a { t.Errorf("expect %v, got %v", e, a) } if v := creds.AccessKeyID; len(v) != 0 { t.Errorf("expect empty, got %#v", v) } if v := creds.SecretAccessKey; len(v) != 0 { t.Errorf("expect empty, got %#v", v) } if v := creds.SessionToken; len(v) != 0 { t.Errorf("expect empty, got %#v", v) } if !client.IsExpired() { t.Errorf("expect expired, wasn't") } } func TestAuthorizationToken(t *testing.T) { const expectAuthToken = "Basic abc123" server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { if e, a := "/path/to/endpoint", r.URL.Path; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "application/json", r.Header.Get("Accept"); e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := expectAuthToken, r.Header.Get("Authorization"); e != a { t.Fatalf("expect %v, got %v", e, a) } encoder := json.NewEncoder(w) err := encoder.Encode(map[string]interface{}{ "AccessKeyID": "AKID", "SecretAccessKey": "SECRET", "Token": "TOKEN", "Expiration": time.Now().Add(1 * time.Hour), }) if err != nil { fmt.Println("failed to write out creds", err) } })) defer server.Close() client := endpointcreds.NewProviderClient(*unit.Session.Config, unit.Session.Handlers, server.URL+"/path/to/endpoint?something=else", func(p *endpointcreds.Provider) { p.AuthorizationToken = expectAuthToken }, ) creds, err := client.Retrieve() if err != nil { t.Errorf("expect no error, got %v", err) } if e, a := "AKID", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "SECRET", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "TOKEN", creds.SessionToken; e != a { t.Errorf("expect %v, got %v", e, a) } if client.IsExpired() { t.Errorf("expect not expired, was") } client.(*endpointcreds.Provider).CurrentTime = func() time.Time { return time.Now().Add(2 * time.Hour) } if !client.IsExpired() { t.Errorf("expect expired, wasn't") } }
223
session-manager-plugin
aws
Go
// +build !go1.8 // Package plugincreds provides usage of Go plugins for providing credentials // to the SDK. Only available with Go 1.8 and above. package plugincreds
6
session-manager-plugin
aws
Go
// +build go1.8 // Package plugincreds implements a credentials provider sourced from a Go // plugin. This package allows you to use a Go plugin to retrieve AWS credentials // for the SDK to use for service API calls. // // As of Go 1.8 plugins are only supported on the Linux platform. // // Plugin Symbol Name // // The "GetAWSSDKCredentialProvider" is the symbol name that will be used to // lookup the credentials provider getter from the plugin. If you want to use a // custom symbol name you should use GetPluginProviderFnsByName to lookup the // symbol by a custom name. // // This symbol is a function that returns two additional functions. One to // retrieve the credentials, and another to determine if the credentials have // expired. // // Plugin Symbol Signature // // The plugin credential provider requires the symbol to match the // following signature. // // func() (RetrieveFn func() (key, secret, token string, err error), IsExpiredFn func() bool) // // Plugin Implementation Example // // The following is an example implementation of a SDK credential provider using // the plugin provider in this package. See the SDK's example/aws/credential/plugincreds/plugin // folder for a runnable example of this. // // package main // // func main() {} // // var myCredProvider provider // // // Build: go build -o plugin.so -buildmode=plugin plugin.go // func init() { // // Initialize a mock credential provider with stubs // myCredProvider = provider{"a","b","c"} // } // // // GetAWSSDKCredentialProvider is the symbol SDK will lookup and use to // // get the credential provider's retrieve and isExpired functions. // func GetAWSSDKCredentialProvider() (func() (key, secret, token string, err error), func() bool) { // return myCredProvider.Retrieve, myCredProvider.IsExpired // } // // // mock implementation of a type that returns retrieves credentials and // // returns if they have expired. // type provider struct { // key, secret, token string // } // // func (p provider) Retrieve() (key, secret, token string, err error) { // return p.key, p.secret, p.token, nil // } // // func (p *provider) IsExpired() bool { // return false; // } // // Configuring SDK for Plugin Credentials // // To configure the SDK to use a plugin's credential provider you'll need to first // open the plugin file using the plugin standard library package. Once you have // a handle to the plugin you can use the NewCredentials function of this package // to create a new credentials.Credentials value that can be set as the // credentials loader of a Session or Config. See the SDK's example/aws/credential/plugincreds // folder for a runnable example of this. // // // Open plugin, and load it into the process. // p, err := plugin.Open("somefile.so") // if err != nil { // return nil, err // } // // // Create a new Credentials value which will source the provider's Retrieve // // and IsExpired functions from the plugin. // creds, err := plugincreds.NewCredentials(p) // if err != nil { // return nil, err // } // // // Example to configure a Session with the newly created credentials that // // will be sourced using the plugin's functionality. // sess := session.Must(session.NewSession(&aws.Config{ // Credentials: creds, // })) package plugincreds import ( "fmt" "plugin" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/credentials" ) // ProviderSymbolName the symbol name the SDK will use to lookup the plugin // provider value from. const ProviderSymbolName = `GetAWSSDKCredentialProvider` // ProviderName is the name this credentials provider will label any returned // credentials Value with. const ProviderName = `PluginCredentialsProvider` const ( // ErrCodeLookupSymbolError failed to lookup symbol ErrCodeLookupSymbolError = "LookupSymbolError" // ErrCodeInvalidSymbolError symbol invalid ErrCodeInvalidSymbolError = "InvalidSymbolError" // ErrCodePluginRetrieveNil Retrieve function was nil ErrCodePluginRetrieveNil = "PluginRetrieveNilError" // ErrCodePluginIsExpiredNil IsExpired Function was nil ErrCodePluginIsExpiredNil = "PluginIsExpiredNilError" // ErrCodePluginProviderRetrieve plugin provider's retrieve returned error ErrCodePluginProviderRetrieve = "PluginProviderRetrieveError" ) // Provider is the credentials provider that will use the plugin provided // Retrieve and IsExpired functions to retrieve credentials. type Provider struct { RetrieveFn func() (key, secret, token string, err error) IsExpiredFn func() bool } // NewCredentials returns a new Credentials loader using the plugin provider. // If the symbol isn't found or is invalid in the plugin an error will be // returned. func NewCredentials(p *plugin.Plugin) (*credentials.Credentials, error) { retrieve, isExpired, err := GetPluginProviderFns(p) if err != nil { return nil, err } return credentials.NewCredentials(Provider{ RetrieveFn: retrieve, IsExpiredFn: isExpired, }), nil } // Retrieve will return the credentials Value if they were successfully retrieved // from the underlying plugin provider. An error will be returned otherwise. func (p Provider) Retrieve() (credentials.Value, error) { creds := credentials.Value{ ProviderName: ProviderName, } k, s, t, err := p.RetrieveFn() if err != nil { return creds, awserr.New(ErrCodePluginProviderRetrieve, "failed to retrieve credentials with plugin provider", err) } creds.AccessKeyID = k creds.SecretAccessKey = s creds.SessionToken = t return creds, nil } // IsExpired will return the expired state of the underlying plugin provider. func (p Provider) IsExpired() bool { return p.IsExpiredFn() } // GetPluginProviderFns returns the plugin's Retrieve and IsExpired functions // returned by the plugin's credential provider getter. // // Uses ProviderSymbolName as the symbol name when lookup up the symbol. If you // want to use a different symbol name, use GetPluginProviderFnsByName. func GetPluginProviderFns(p *plugin.Plugin) (func() (key, secret, token string, err error), func() bool, error) { return GetPluginProviderFnsByName(p, ProviderSymbolName) } // GetPluginProviderFnsByName returns the plugin's Retrieve and IsExpired functions // returned by the plugin's credential provider getter. // // Same as GetPluginProviderFns, but takes a custom symbolName to lookup with. func GetPluginProviderFnsByName(p *plugin.Plugin, symbolName string) (func() (key, secret, token string, err error), func() bool, error) { sym, err := p.Lookup(symbolName) if err != nil { return nil, nil, awserr.New(ErrCodeLookupSymbolError, fmt.Sprintf("failed to lookup %s plugin provider symbol", symbolName), err) } fn, ok := sym.(func() (func() (key, secret, token string, err error), func() bool)) if !ok { return nil, nil, awserr.New(ErrCodeInvalidSymbolError, fmt.Sprintf("symbol %T, does not match the 'func() (func() (key, secret, token string, err error), func() bool)' type", sym), nil) } retrieveFn, isExpiredFn := fn() if retrieveFn == nil { return nil, nil, awserr.New(ErrCodePluginRetrieveNil, "the plugin provider retrieve function cannot be nil", nil) } if isExpiredFn == nil { return nil, nil, awserr.New(ErrCodePluginIsExpiredNil, "the plugin provider isExpired function cannot be nil", nil) } return retrieveFn, isExpiredFn, nil }
212
session-manager-plugin
aws
Go
// +build go1.8,awsinclude package plugincreds import ( "fmt" "testing" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/credentials" ) func TestProvider_Passthrough(t *testing.T) { p := Provider{ RetrieveFn: func() (string, string, string, error) { return "key", "secret", "token", nil }, IsExpiredFn: func() bool { return false }, } actual, err := p.Retrieve() if err != nil { t.Fatalf("expect no error, got %v", err) } expect := credentials.Value{ AccessKeyID: "key", SecretAccessKey: "secret", SessionToken: "token", ProviderName: ProviderName, } if expect != actual { t.Errorf("expect %+v credentials, got %+v", expect, actual) } } func TestProvider_Error(t *testing.T) { expectErr := fmt.Errorf("expect error") p := Provider{ RetrieveFn: func() (string, string, string, error) { return "", "", "", expectErr }, IsExpiredFn: func() bool { return false }, } actual, err := p.Retrieve() if err == nil { t.Fatalf("expect error, got none") } aerr := err.(awserr.Error) if e, a := ErrCodePluginProviderRetrieve, aerr.Code(); e != a { t.Errorf("expect %s error code, got %s", e, a) } if e, a := expectErr, aerr.OrigErr(); e != a { t.Errorf("expect %v cause error, got %v", e, a) } expect := credentials.Value{ ProviderName: ProviderName, } if expect != actual { t.Errorf("expect %+v credentials, got %+v", expect, actual) } }
72
session-manager-plugin
aws
Go
/* Package processcreds is a credential Provider to retrieve `credential_process` credentials. WARNING: The following describes a method of sourcing credentials from an external process. This can potentially be dangerous, so proceed with caution. Other credential providers should be preferred if at all possible. If using this option, you should make sure that the config file is as locked down as possible using security best practices for your operating system. You can use credentials from a `credential_process` in a variety of ways. One way is to setup your shared config file, located in the default location, with the `credential_process` key and the command you want to be called. You also need to set the AWS_SDK_LOAD_CONFIG environment variable (e.g., `export AWS_SDK_LOAD_CONFIG=1`) to use the shared config file. [default] credential_process = /command/to/call Creating a new session will use the credential process to retrieve credentials. NOTE: If there are credentials in the profile you are using, the credential process will not be used. // Initialize a session to load credentials. sess, _ := session.NewSession(&aws.Config{ Region: aws.String("us-east-1")}, ) // Create S3 service client to use the credentials. svc := s3.New(sess) Another way to use the `credential_process` method is by using `credentials.NewCredentials()` and providing a command to be executed to retrieve credentials: // Create credentials using the ProcessProvider. creds := processcreds.NewCredentials("/path/to/command") // Create service client value configured for credentials. svc := s3.New(sess, &aws.Config{Credentials: creds}) You can set a non-default timeout for the `credential_process` with another constructor, `credentials.NewCredentialsTimeout()`, providing the timeout. To set a one minute timeout: // Create credentials using the ProcessProvider. creds := processcreds.NewCredentialsTimeout( "/path/to/command", time.Duration(500) * time.Millisecond) If you need more control, you can set any configurable options in the credentials using one or more option functions. For example, you can set a two minute timeout, a credential duration of 60 minutes, and a maximum stdout buffer size of 2k. creds := processcreds.NewCredentials( "/path/to/command", func(opt *ProcessProvider) { opt.Timeout = time.Duration(2) * time.Minute opt.Duration = time.Duration(60) * time.Minute opt.MaxBufSize = 2048 }) You can also use your own `exec.Cmd`: // Create an exec.Cmd myCommand := exec.Command("/path/to/command") // Create credentials using your exec.Cmd and custom timeout creds := processcreds.NewCredentialsCommand( myCommand, func(opt *processcreds.ProcessProvider) { opt.Timeout = time.Duration(1) * time.Second }) */ package processcreds import ( "bytes" "encoding/json" "fmt" "io" "io/ioutil" "os" "os/exec" "runtime" "strings" "time" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/internal/sdkio" ) const ( // ProviderName is the name this credentials provider will label any // returned credentials Value with. ProviderName = `ProcessProvider` // ErrCodeProcessProviderParse error parsing process output ErrCodeProcessProviderParse = "ProcessProviderParseError" // ErrCodeProcessProviderVersion version error in output ErrCodeProcessProviderVersion = "ProcessProviderVersionError" // ErrCodeProcessProviderRequired required attribute missing in output ErrCodeProcessProviderRequired = "ProcessProviderRequiredError" // ErrCodeProcessProviderExecution execution of command failed ErrCodeProcessProviderExecution = "ProcessProviderExecutionError" // errMsgProcessProviderTimeout process took longer than allowed errMsgProcessProviderTimeout = "credential process timed out" // errMsgProcessProviderProcess process error errMsgProcessProviderProcess = "error in credential_process" // errMsgProcessProviderParse problem parsing output errMsgProcessProviderParse = "parse failed of credential_process output" // errMsgProcessProviderVersion version error in output errMsgProcessProviderVersion = "wrong version in process output (not 1)" // errMsgProcessProviderMissKey missing access key id in output errMsgProcessProviderMissKey = "missing AccessKeyId in process output" // errMsgProcessProviderMissSecret missing secret acess key in output errMsgProcessProviderMissSecret = "missing SecretAccessKey in process output" // errMsgProcessProviderPrepareCmd prepare of command failed errMsgProcessProviderPrepareCmd = "failed to prepare command" // errMsgProcessProviderEmptyCmd command must not be empty errMsgProcessProviderEmptyCmd = "command must not be empty" // errMsgProcessProviderPipe failed to initialize pipe errMsgProcessProviderPipe = "failed to initialize pipe" // DefaultDuration is the default amount of time in minutes that the // credentials will be valid for. DefaultDuration = time.Duration(15) * time.Minute // DefaultBufSize limits buffer size from growing to an enormous // amount due to a faulty process. DefaultBufSize = int(8 * sdkio.KibiByte) // DefaultTimeout default limit on time a process can run. DefaultTimeout = time.Duration(1) * time.Minute ) // ProcessProvider satisfies the credentials.Provider interface, and is a // client to retrieve credentials from a process. type ProcessProvider struct { staticCreds bool credentials.Expiry originalCommand []string // Expiry duration of the credentials. Defaults to 15 minutes if not set. Duration time.Duration // ExpiryWindow will allow the credentials to trigger refreshing prior to // the credentials actually expiring. This is beneficial so race conditions // with expiring credentials do not cause request to fail unexpectedly // due to ExpiredTokenException exceptions. // // So a ExpiryWindow of 10s would cause calls to IsExpired() to return true // 10 seconds before the credentials are actually expired. // // If ExpiryWindow is 0 or less it will be ignored. ExpiryWindow time.Duration // A string representing an os command that should return a JSON with // credential information. command *exec.Cmd // MaxBufSize limits memory usage from growing to an enormous // amount due to a faulty process. MaxBufSize int // Timeout limits the time a process can run. Timeout time.Duration } // NewCredentials returns a pointer to a new Credentials object wrapping the // ProcessProvider. The credentials will expire every 15 minutes by default. func NewCredentials(command string, options ...func(*ProcessProvider)) *credentials.Credentials { p := &ProcessProvider{ command: exec.Command(command), Duration: DefaultDuration, Timeout: DefaultTimeout, MaxBufSize: DefaultBufSize, } for _, option := range options { option(p) } return credentials.NewCredentials(p) } // NewCredentialsTimeout returns a pointer to a new Credentials object with // the specified command and timeout, and default duration and max buffer size. func NewCredentialsTimeout(command string, timeout time.Duration) *credentials.Credentials { p := NewCredentials(command, func(opt *ProcessProvider) { opt.Timeout = timeout }) return p } // NewCredentialsCommand returns a pointer to a new Credentials object with // the specified command, and default timeout, duration and max buffer size. func NewCredentialsCommand(command *exec.Cmd, options ...func(*ProcessProvider)) *credentials.Credentials { p := &ProcessProvider{ command: command, Duration: DefaultDuration, Timeout: DefaultTimeout, MaxBufSize: DefaultBufSize, } for _, option := range options { option(p) } return credentials.NewCredentials(p) } type credentialProcessResponse struct { Version int AccessKeyID string `json:"AccessKeyId"` SecretAccessKey string SessionToken string Expiration *time.Time } // Retrieve executes the 'credential_process' and returns the credentials. func (p *ProcessProvider) Retrieve() (credentials.Value, error) { out, err := p.executeCredentialProcess() if err != nil { return credentials.Value{ProviderName: ProviderName}, err } // Serialize and validate response resp := &credentialProcessResponse{} if err = json.Unmarshal(out, resp); err != nil { return credentials.Value{ProviderName: ProviderName}, awserr.New( ErrCodeProcessProviderParse, fmt.Sprintf("%s: %s", errMsgProcessProviderParse, string(out)), err) } if resp.Version != 1 { return credentials.Value{ProviderName: ProviderName}, awserr.New( ErrCodeProcessProviderVersion, errMsgProcessProviderVersion, nil) } if len(resp.AccessKeyID) == 0 { return credentials.Value{ProviderName: ProviderName}, awserr.New( ErrCodeProcessProviderRequired, errMsgProcessProviderMissKey, nil) } if len(resp.SecretAccessKey) == 0 { return credentials.Value{ProviderName: ProviderName}, awserr.New( ErrCodeProcessProviderRequired, errMsgProcessProviderMissSecret, nil) } // Handle expiration p.staticCreds = resp.Expiration == nil if resp.Expiration != nil { p.SetExpiration(*resp.Expiration, p.ExpiryWindow) } return credentials.Value{ ProviderName: ProviderName, AccessKeyID: resp.AccessKeyID, SecretAccessKey: resp.SecretAccessKey, SessionToken: resp.SessionToken, }, nil } // IsExpired returns true if the credentials retrieved are expired, or not yet // retrieved. func (p *ProcessProvider) IsExpired() bool { if p.staticCreds { return false } return p.Expiry.IsExpired() } // prepareCommand prepares the command to be executed. func (p *ProcessProvider) prepareCommand() error { var cmdArgs []string if runtime.GOOS == "windows" { cmdArgs = []string{"cmd.exe", "/C"} } else { cmdArgs = []string{"sh", "-c"} } if len(p.originalCommand) == 0 { p.originalCommand = make([]string, len(p.command.Args)) copy(p.originalCommand, p.command.Args) // check for empty command because it succeeds if len(strings.TrimSpace(p.originalCommand[0])) < 1 { return awserr.New( ErrCodeProcessProviderExecution, fmt.Sprintf( "%s: %s", errMsgProcessProviderPrepareCmd, errMsgProcessProviderEmptyCmd), nil) } } cmdArgs = append(cmdArgs, p.originalCommand...) p.command = exec.Command(cmdArgs[0], cmdArgs[1:]...) p.command.Env = os.Environ() return nil } // executeCredentialProcess starts the credential process on the OS and // returns the results or an error. func (p *ProcessProvider) executeCredentialProcess() ([]byte, error) { if err := p.prepareCommand(); err != nil { return nil, err } // Setup the pipes outReadPipe, outWritePipe, err := os.Pipe() if err != nil { return nil, awserr.New( ErrCodeProcessProviderExecution, errMsgProcessProviderPipe, err) } p.command.Stderr = os.Stderr // display stderr on console for MFA p.command.Stdout = outWritePipe // get creds json on process's stdout p.command.Stdin = os.Stdin // enable stdin for MFA output := bytes.NewBuffer(make([]byte, 0, p.MaxBufSize)) stdoutCh := make(chan error, 1) go readInput( io.LimitReader(outReadPipe, int64(p.MaxBufSize)), output, stdoutCh) execCh := make(chan error, 1) go executeCommand(*p.command, execCh) finished := false var errors []error for !finished { select { case readError := <-stdoutCh: errors = appendError(errors, readError) finished = true case execError := <-execCh: err := outWritePipe.Close() errors = appendError(errors, err) errors = appendError(errors, execError) if errors != nil { return output.Bytes(), awserr.NewBatchError( ErrCodeProcessProviderExecution, errMsgProcessProviderProcess, errors) } case <-time.After(p.Timeout): finished = true return output.Bytes(), awserr.NewBatchError( ErrCodeProcessProviderExecution, errMsgProcessProviderTimeout, errors) // errors can be nil } } out := output.Bytes() if runtime.GOOS == "windows" { // windows adds slashes to quotes out = []byte(strings.Replace(string(out), `\"`, `"`, -1)) } return out, nil } // appendError conveniently checks for nil before appending slice func appendError(errors []error, err error) []error { if err != nil { return append(errors, err) } return errors } func executeCommand(cmd exec.Cmd, exec chan error) { // Start the command err := cmd.Start() if err == nil { err = cmd.Wait() } exec <- err } func readInput(r io.Reader, w io.Writer, read chan error) { tee := io.TeeReader(r, w) _, err := ioutil.ReadAll(tee) if err == io.EOF { err = nil } read <- err // will only arrive here when write end of pipe is closed }
427
session-manager-plugin
aws
Go
package processcreds_test import ( "bytes" "encoding/json" "fmt" "io" "io/ioutil" "os" "os/exec" "runtime" "strings" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/credentials/processcreds" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/aws-sdk-go/internal/sdktesting" ) func TestProcessProviderFromSessionCfg(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() os.Setenv("AWS_SDK_LOAD_CONFIG", "1") if runtime.GOOS == "windows" { os.Setenv("AWS_CONFIG_FILE", "testdata\\shconfig_win.ini") } else { os.Setenv("AWS_CONFIG_FILE", "testdata/shconfig.ini") } sess, err := session.NewSession(&aws.Config{ Region: aws.String("region")}, ) if err != nil { t.Errorf("error getting session: %v", err) } creds, err := sess.Config.Credentials.Get() if err != nil { t.Errorf("error getting credentials: %v", err) } if e, a := "accessKey", creds.AccessKeyID; e != a { t.Errorf("expected %v, got %v", e, a) } if e, a := "secret", creds.SecretAccessKey; e != a { t.Errorf("expected %v, got %v", e, a) } if e, a := "tokenDefault", creds.SessionToken; e != a { t.Errorf("expected %v, got %v", e, a) } } func TestProcessProviderFromSessionWithProfileCfg(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() os.Setenv("AWS_SDK_LOAD_CONFIG", "1") os.Setenv("AWS_PROFILE", "non_expire") if runtime.GOOS == "windows" { os.Setenv("AWS_CONFIG_FILE", "testdata\\shconfig_win.ini") } else { os.Setenv("AWS_CONFIG_FILE", "testdata/shconfig.ini") } sess, err := session.NewSession(&aws.Config{ Region: aws.String("region")}, ) if err != nil { t.Errorf("error getting session: %v", err) } creds, err := sess.Config.Credentials.Get() if err != nil { t.Errorf("error getting credentials: %v", err) } if e, a := "nonDefaultToken", creds.SessionToken; e != a { t.Errorf("expected %v, got %v", e, a) } } func TestProcessProviderNotFromCredProcCfg(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() os.Setenv("AWS_SDK_LOAD_CONFIG", "1") os.Setenv("AWS_PROFILE", "not_alone") if runtime.GOOS == "windows" { os.Setenv("AWS_CONFIG_FILE", "testdata\\shconfig_win.ini") } else { os.Setenv("AWS_CONFIG_FILE", "testdata/shconfig.ini") } sess, err := session.NewSession(&aws.Config{ Region: aws.String("region")}, ) if err != nil { t.Errorf("error getting session: %v", err) } creds, err := sess.Config.Credentials.Get() if err != nil { t.Errorf("error getting credentials: %v", err) } if e, a := "notFromCredProcAccess", creds.AccessKeyID; e != a { t.Errorf("expected %v, got %v", e, a) } if e, a := "notFromCredProcSecret", creds.SecretAccessKey; e != a { t.Errorf("expected %v, got %v", e, a) } } func TestProcessProviderFromSessionCrd(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() if runtime.GOOS == "windows" { os.Setenv("AWS_SHARED_CREDENTIALS_FILE", "testdata\\shcred_win.ini") } else { os.Setenv("AWS_SHARED_CREDENTIALS_FILE", "testdata/shcred.ini") } sess, err := session.NewSession(&aws.Config{ Region: aws.String("region")}, ) if err != nil { t.Errorf("error getting session: %v", err) } creds, err := sess.Config.Credentials.Get() if err != nil { t.Errorf("error getting credentials: %v", err) } if e, a := "accessKey", creds.AccessKeyID; e != a { t.Errorf("expected %v, got %v", e, a) } if e, a := "secret", creds.SecretAccessKey; e != a { t.Errorf("expected %v, got %v", e, a) } if e, a := "tokenDefault", creds.SessionToken; e != a { t.Errorf("expected %v, got %v", e, a) } } func TestProcessProviderFromSessionWithProfileCrd(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() os.Setenv("AWS_PROFILE", "non_expire") if runtime.GOOS == "windows" { os.Setenv("AWS_SHARED_CREDENTIALS_FILE", "testdata\\shcred_win.ini") } else { os.Setenv("AWS_SHARED_CREDENTIALS_FILE", "testdata/shcred.ini") } sess, err := session.NewSession(&aws.Config{ Region: aws.String("region")}, ) if err != nil { t.Errorf("error getting session: %v", err) } creds, err := sess.Config.Credentials.Get() if err != nil { t.Errorf("error getting credentials: %v", err) } if e, a := "nonDefaultToken", creds.SessionToken; e != a { t.Errorf("expected %v, got %v", e, a) } } func TestProcessProviderNotFromCredProcCrd(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() os.Setenv("AWS_PROFILE", "not_alone") if runtime.GOOS == "windows" { os.Setenv("AWS_SHARED_CREDENTIALS_FILE", "testdata\\shcred_win.ini") } else { os.Setenv("AWS_SHARED_CREDENTIALS_FILE", "testdata/shcred.ini") } sess, err := session.NewSession(&aws.Config{ Region: aws.String("region")}, ) if err != nil { t.Errorf("error getting session: %v", err) } creds, err := sess.Config.Credentials.Get() if err != nil { t.Errorf("error getting credentials: %v", err) } if e, a := "notFromCredProcAccess", creds.AccessKeyID; e != a { t.Errorf("expected %v, got %v", e, a) } if e, a := "notFromCredProcSecret", creds.SecretAccessKey; e != a { t.Errorf("expected %v, got %v", e, a) } } func TestProcessProviderBadCommand(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() creds := processcreds.NewCredentials("/bad/process") _, err := creds.Get() if err.(awserr.Error).Code() != processcreds.ErrCodeProcessProviderExecution { t.Errorf("expected %v, got %v", processcreds.ErrCodeProcessProviderExecution, err) } } func TestProcessProviderMoreEmptyCommands(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() creds := processcreds.NewCredentials("") _, err := creds.Get() if err.(awserr.Error).Code() != processcreds.ErrCodeProcessProviderExecution { t.Errorf("expected %v, got %v", processcreds.ErrCodeProcessProviderExecution, err) } } func TestProcessProviderExpectErrors(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() creds := processcreds.NewCredentials( fmt.Sprintf( "%s %s", getOSCat(), strings.Join( []string{"testdata", "malformed.json"}, string(os.PathSeparator)))) _, err := creds.Get() if err.(awserr.Error).Code() != processcreds.ErrCodeProcessProviderParse { t.Errorf("expected %v, got %v", processcreds.ErrCodeProcessProviderParse, err) } creds = processcreds.NewCredentials( fmt.Sprintf("%s %s", getOSCat(), strings.Join( []string{"testdata", "wrongversion.json"}, string(os.PathSeparator)))) _, err = creds.Get() if err.(awserr.Error).Code() != processcreds.ErrCodeProcessProviderVersion { t.Errorf("expected %v, got %v", processcreds.ErrCodeProcessProviderVersion, err) } creds = processcreds.NewCredentials( fmt.Sprintf( "%s %s", getOSCat(), strings.Join( []string{"testdata", "missingkey.json"}, string(os.PathSeparator)))) _, err = creds.Get() if err.(awserr.Error).Code() != processcreds.ErrCodeProcessProviderRequired { t.Errorf("expected %v, got %v", processcreds.ErrCodeProcessProviderRequired, err) } creds = processcreds.NewCredentials( fmt.Sprintf( "%s %s", getOSCat(), strings.Join( []string{"testdata", "missingsecret.json"}, string(os.PathSeparator)))) _, err = creds.Get() if err.(awserr.Error).Code() != processcreds.ErrCodeProcessProviderRequired { t.Errorf("expected %v, got %v", processcreds.ErrCodeProcessProviderRequired, err) } } func TestProcessProviderTimeout(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() command := "/bin/sleep 2" if runtime.GOOS == "windows" { // "timeout" command does not work due to pipe redirection command = "ping -n 2 127.0.0.1>nul" } creds := processcreds.NewCredentialsTimeout( command, time.Duration(1)*time.Second) if _, err := creds.Get(); err == nil || err.(awserr.Error).Code() != processcreds.ErrCodeProcessProviderExecution || err.(awserr.Error).Message() != "credential process timed out" { t.Errorf("expected %v, got %v", processcreds.ErrCodeProcessProviderExecution, err) } } func TestProcessProviderWithLongSessionToken(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() creds := processcreds.NewCredentials( fmt.Sprintf( "%s %s", getOSCat(), strings.Join( []string{"testdata", "longsessiontoken.json"}, string(os.PathSeparator)))) v, err := creds.Get() if err != nil { t.Errorf("expected %v, got %v", "no error", err) } // Text string same length as session token returned by AWS for AssumeRoleWithWebIdentity e := "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" if a := v.SessionToken; e != a { t.Errorf("expected %v, got %v", e, a) } } type credentialTest struct { Version int AccessKeyID string `json:"AccessKeyId"` SecretAccessKey string Expiration string } func TestProcessProviderStatic(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() // static creds := processcreds.NewCredentials( fmt.Sprintf( "%s %s", getOSCat(), strings.Join( []string{"testdata", "static.json"}, string(os.PathSeparator)))) _, err := creds.Get() if err != nil { t.Errorf("expected %v, got %v", "no error", err) } if creds.IsExpired() { t.Errorf("expected %v, got %v", "static credentials/not expired", "expired") } } func TestProcessProviderNotExpired(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() // non-static, not expired exp := &credentialTest{} exp.Version = 1 exp.AccessKeyID = "accesskey" exp.SecretAccessKey = "secretkey" exp.Expiration = time.Now().Add(1 * time.Hour).UTC().Format(time.RFC3339) b, err := json.Marshal(exp) if err != nil { t.Errorf("expected %v, got %v", "no error", err) } tmpFile, err := ioutil.TempFile(os.TempDir(), "tmp_expiring") if err != nil { t.Errorf("expected %v, got %v", "no error", err) } if _, err = io.Copy(tmpFile, bytes.NewReader(b)); err != nil { t.Errorf("expected %v, got %v", "no error", err) } defer func() { if err = tmpFile.Close(); err != nil { t.Errorf("expected %v, got %v", "no error", err) } if err = os.Remove(tmpFile.Name()); err != nil { t.Errorf("expected %v, got %v", "no error", err) } }() creds := processcreds.NewCredentials( fmt.Sprintf("%s %s", getOSCat(), tmpFile.Name())) _, err = creds.Get() if err != nil { t.Errorf("expected %v, got %v", "no error", err) } if creds.IsExpired() { t.Errorf("expected %v, got %v", "not expired", "expired") } } func TestProcessProviderExpired(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() // non-static, expired exp := &credentialTest{} exp.Version = 1 exp.AccessKeyID = "accesskey" exp.SecretAccessKey = "secretkey" exp.Expiration = time.Now().Add(-1 * time.Hour).UTC().Format(time.RFC3339) b, err := json.Marshal(exp) if err != nil { t.Errorf("expected %v, got %v", "no error", err) } tmpFile, err := ioutil.TempFile(os.TempDir(), "tmp_expired") if err != nil { t.Errorf("expected %v, got %v", "no error", err) } if _, err = io.Copy(tmpFile, bytes.NewReader(b)); err != nil { t.Errorf("expected %v, got %v", "no error", err) } defer func() { if err = tmpFile.Close(); err != nil { t.Errorf("expected %v, got %v", "no error", err) } if err = os.Remove(tmpFile.Name()); err != nil { t.Errorf("expected %v, got %v", "no error", err) } }() creds := processcreds.NewCredentials( fmt.Sprintf("%s %s", getOSCat(), tmpFile.Name())) _, err = creds.Get() if err != nil { t.Errorf("expected %v, got %v", "no error", err) } if !creds.IsExpired() { t.Errorf("expected %v, got %v", "expired", "not expired") } } func TestProcessProviderForceExpire(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() // non-static, not expired // setup test credentials file exp := &credentialTest{} exp.Version = 1 exp.AccessKeyID = "accesskey" exp.SecretAccessKey = "secretkey" exp.Expiration = time.Now().Add(1 * time.Hour).UTC().Format(time.RFC3339) b, err := json.Marshal(exp) if err != nil { t.Errorf("expected %v, got %v", "no error", err) } tmpFile, err := ioutil.TempFile(os.TempDir(), "tmp_force_expire") if err != nil { t.Errorf("expected %v, got %v", "no error", err) } if _, err = io.Copy(tmpFile, bytes.NewReader(b)); err != nil { t.Errorf("expected %v, got %v", "no error", err) } defer func() { if err = tmpFile.Close(); err != nil { t.Errorf("expected %v, got %v", "no error", err) } if err = os.Remove(tmpFile.Name()); err != nil { t.Errorf("expected %v, got %v", "no error", err) } }() // get credentials from file creds := processcreds.NewCredentials( fmt.Sprintf("%s %s", getOSCat(), tmpFile.Name())) if _, err = creds.Get(); err != nil { t.Errorf("expected %v, got %v", "no error", err) } if creds.IsExpired() { t.Errorf("expected %v, got %v", "not expired", "expired") } // force expire creds creds.Expire() if !creds.IsExpired() { t.Errorf("expected %v, got %v", "expired", "not expired") } // renew creds if _, err = creds.Get(); err != nil { t.Errorf("expected %v, got %v", "no error", err) } if creds.IsExpired() { t.Errorf("expected %v, got %v", "not expired", "expired") } } func TestProcessProviderAltConstruct(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() // constructing with exec.Cmd instead of string myCommand := exec.Command( fmt.Sprintf( "%s %s", getOSCat(), strings.Join( []string{"testdata", "static.json"}, string(os.PathSeparator)))) creds := processcreds.NewCredentialsCommand(myCommand, func(opt *processcreds.ProcessProvider) { opt.Timeout = time.Duration(1) * time.Second }) _, err := creds.Get() if err != nil { t.Errorf("expected %v, got %v", "no error", err) } if creds.IsExpired() { t.Errorf("expected %v, got %v", "static credentials/not expired", "expired") } } func BenchmarkProcessProvider(b *testing.B) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() creds := processcreds.NewCredentials( fmt.Sprintf( "%s %s", getOSCat(), strings.Join( []string{"testdata", "static.json"}, string(os.PathSeparator)))) _, err := creds.Get() if err != nil { b.Fatal(err) } b.ResetTimer() for i := 0; i < b.N; i++ { _, err := creds.Get() if err != nil { b.Fatal(err) } } } func getOSCat() string { if runtime.GOOS == "windows" { return "type" } return "cat" }
570
session-manager-plugin
aws
Go
// Package ssocreds provides a credential provider for retrieving temporary AWS credentials using an SSO access token. // // IMPORTANT: The provider in this package does not initiate or perform the AWS SSO login flow. The SDK provider // expects that you have already performed the SSO login flow using AWS CLI using the "aws sso login" command, or by // some other mechanism. The provider must find a valid non-expired access token for the AWS SSO user portal URL in // ~/.aws/sso/cache. If a cached token is not found, it is expired, or the file is malformed an error will be returned. // // Loading AWS SSO credentials with the AWS shared configuration file // // You can use configure AWS SSO credentials from the AWS shared configuration file by // providing the specifying the required keys in the profile: // // sso_account_id // sso_region // sso_role_name // sso_start_url // // For example, the following defines a profile "devsso" and specifies the AWS SSO parameters that defines the target // account, role, sign-on portal, and the region where the user portal is located. Note: all SSO arguments must be // provided, or an error will be returned. // // [profile devsso] // sso_start_url = https://my-sso-portal.awsapps.com/start // sso_role_name = SSOReadOnlyRole // sso_region = us-east-1 // sso_account_id = 123456789012 // // Using the config module, you can load the AWS SDK shared configuration, and specify that this profile be used to // retrieve credentials. For example: // // sess, err := session.NewSessionWithOptions(session.Options{ // SharedConfigState: session.SharedConfigEnable, // Profile: "devsso", // }) // if err != nil { // return err // } // // Programmatically loading AWS SSO credentials directly // // You can programmatically construct the AWS SSO Provider in your application, and provide the necessary information // to load and retrieve temporary credentials using an access token from ~/.aws/sso/cache. // // svc := sso.New(sess, &aws.Config{ // Region: aws.String("us-west-2"), // Client Region must correspond to the AWS SSO user portal region // }) // // provider := ssocreds.NewCredentialsWithClient(svc, "123456789012", "SSOReadOnlyRole", "https://my-sso-portal.awsapps.com/start") // // credentials, err := provider.Get() // if err != nil { // return err // } // // Additional Resources // // Configuring the AWS CLI to use AWS Single Sign-On: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html // // AWS Single Sign-On User Guide: https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html package ssocreds
61
session-manager-plugin
aws
Go
// +build !windows package ssocreds import "os" func getHomeDirectory() string { return os.Getenv("HOME") }
10
session-manager-plugin
aws
Go
package ssocreds import "os" func getHomeDirectory() string { return os.Getenv("USERPROFILE") }
8
session-manager-plugin
aws
Go
package ssocreds import ( "crypto/sha1" "encoding/hex" "encoding/json" "fmt" "io/ioutil" "path/filepath" "strings" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/service/sso" "github.com/aws/aws-sdk-go/service/sso/ssoiface" ) // ErrCodeSSOProviderInvalidToken is the code type that is returned if loaded token has expired or is otherwise invalid. // To refresh the SSO session run aws sso login with the corresponding profile. const ErrCodeSSOProviderInvalidToken = "SSOProviderInvalidToken" const invalidTokenMessage = "the SSO session has expired or is invalid" func init() { nowTime = time.Now defaultCacheLocation = defaultCacheLocationImpl } var nowTime func() time.Time // ProviderName is the name of the provider used to specify the source of credentials. const ProviderName = "SSOProvider" var defaultCacheLocation func() string func defaultCacheLocationImpl() string { return filepath.Join(getHomeDirectory(), ".aws", "sso", "cache") } // Provider is an AWS credential provider that retrieves temporary AWS credentials by exchanging an SSO login token. type Provider struct { credentials.Expiry // The Client which is configured for the AWS Region where the AWS SSO user portal is located. Client ssoiface.SSOAPI // The AWS account that is assigned to the user. AccountID string // The role name that is assigned to the user. RoleName string // The URL that points to the organization's AWS Single Sign-On (AWS SSO) user portal. StartURL string } // NewCredentials returns a new AWS Single Sign-On (AWS SSO) credential provider. The ConfigProvider is expected to be configured // for the AWS Region where the AWS SSO user portal is located. func NewCredentials(configProvider client.ConfigProvider, accountID, roleName, startURL string, optFns ...func(provider *Provider)) *credentials.Credentials { return NewCredentialsWithClient(sso.New(configProvider), accountID, roleName, startURL, optFns...) } // NewCredentialsWithClient returns a new AWS Single Sign-On (AWS SSO) credential provider. The provided client is expected to be configured // for the AWS Region where the AWS SSO user portal is located. func NewCredentialsWithClient(client ssoiface.SSOAPI, accountID, roleName, startURL string, optFns ...func(provider *Provider)) *credentials.Credentials { p := &Provider{ Client: client, AccountID: accountID, RoleName: roleName, StartURL: startURL, } for _, fn := range optFns { fn(p) } return credentials.NewCredentials(p) } // Retrieve retrieves temporary AWS credentials from the configured Amazon Single Sign-On (AWS SSO) user portal // by exchanging the accessToken present in ~/.aws/sso/cache. func (p *Provider) Retrieve() (credentials.Value, error) { return p.RetrieveWithContext(aws.BackgroundContext()) } // RetrieveWithContext retrieves temporary AWS credentials from the configured Amazon Single Sign-On (AWS SSO) user portal // by exchanging the accessToken present in ~/.aws/sso/cache. func (p *Provider) RetrieveWithContext(ctx credentials.Context) (credentials.Value, error) { tokenFile, err := loadTokenFile(p.StartURL) if err != nil { return credentials.Value{}, err } output, err := p.Client.GetRoleCredentialsWithContext(ctx, &sso.GetRoleCredentialsInput{ AccessToken: &tokenFile.AccessToken, AccountId: &p.AccountID, RoleName: &p.RoleName, }) if err != nil { return credentials.Value{}, err } expireTime := time.Unix(0, aws.Int64Value(output.RoleCredentials.Expiration)*int64(time.Millisecond)).UTC() p.SetExpiration(expireTime, 0) return credentials.Value{ AccessKeyID: aws.StringValue(output.RoleCredentials.AccessKeyId), SecretAccessKey: aws.StringValue(output.RoleCredentials.SecretAccessKey), SessionToken: aws.StringValue(output.RoleCredentials.SessionToken), ProviderName: ProviderName, }, nil } func getCacheFileName(url string) (string, error) { hash := sha1.New() _, err := hash.Write([]byte(url)) if err != nil { return "", err } return strings.ToLower(hex.EncodeToString(hash.Sum(nil))) + ".json", nil } type rfc3339 time.Time func (r *rfc3339) UnmarshalJSON(bytes []byte) error { var value string if err := json.Unmarshal(bytes, &value); err != nil { return err } parse, err := time.Parse(time.RFC3339, value) if err != nil { return fmt.Errorf("expected RFC3339 timestamp: %v", err) } *r = rfc3339(parse) return nil } type token struct { AccessToken string `json:"accessToken"` ExpiresAt rfc3339 `json:"expiresAt"` Region string `json:"region,omitempty"` StartURL string `json:"startUrl,omitempty"` } func (t token) Expired() bool { return nowTime().Round(0).After(time.Time(t.ExpiresAt)) } func loadTokenFile(startURL string) (t token, err error) { key, err := getCacheFileName(startURL) if err != nil { return token{}, awserr.New(ErrCodeSSOProviderInvalidToken, invalidTokenMessage, err) } fileBytes, err := ioutil.ReadFile(filepath.Join(defaultCacheLocation(), key)) if err != nil { return token{}, awserr.New(ErrCodeSSOProviderInvalidToken, invalidTokenMessage, err) } if err := json.Unmarshal(fileBytes, &t); err != nil { return token{}, awserr.New(ErrCodeSSOProviderInvalidToken, invalidTokenMessage, err) } if len(t.AccessToken) == 0 { return token{}, awserr.New(ErrCodeSSOProviderInvalidToken, invalidTokenMessage, nil) } if t.Expired() { return token{}, awserr.New(ErrCodeSSOProviderInvalidToken, invalidTokenMessage, nil) } return t, nil }
181
session-manager-plugin
aws
Go
// +build go1.9 package ssocreds import ( "fmt" "reflect" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/service/sso" "github.com/aws/aws-sdk-go/service/sso/ssoiface" ) type mockClient struct { ssoiface.SSOAPI t *testing.T Output *sso.GetRoleCredentialsOutput Err error ExpectedAccountID string ExpectedAccessToken string ExpectedRoleName string ExpectedClientRegion string Response func(mockClient) (*sso.GetRoleCredentialsOutput, error) } func (m mockClient) GetRoleCredentialsWithContext(ctx aws.Context, params *sso.GetRoleCredentialsInput, _ ...request.Option) (*sso.GetRoleCredentialsOutput, error) { m.t.Helper() if len(m.ExpectedAccountID) > 0 { if e, a := m.ExpectedAccountID, aws.StringValue(params.AccountId); e != a { m.t.Errorf("expect %v, got %v", e, a) } } if len(m.ExpectedAccessToken) > 0 { if e, a := m.ExpectedAccessToken, aws.StringValue(params.AccessToken); e != a { m.t.Errorf("expect %v, got %v", e, a) } } if len(m.ExpectedRoleName) > 0 { if e, a := m.ExpectedRoleName, aws.StringValue(params.RoleName); e != a { m.t.Errorf("expect %v, got %v", e, a) } } if m.Response == nil { return &sso.GetRoleCredentialsOutput{}, nil } return m.Response(m) } func swapCacheLocation(dir string) func() { original := defaultCacheLocation defaultCacheLocation = func() string { return dir } return func() { defaultCacheLocation = original } } func swapNowTime(referenceTime time.Time) func() { original := nowTime nowTime = func() time.Time { return referenceTime } return func() { nowTime = original } } func TestProvider(t *testing.T) { restoreCache := swapCacheLocation("testdata") defer restoreCache() restoreTime := swapNowTime(time.Date(2021, 01, 19, 19, 50, 0, 0, time.UTC)) defer restoreTime() cases := map[string]struct { Client mockClient AccountID string Region string RoleName string StartURL string ExpectedErr bool ExpectedCredentials credentials.Value ExpectedExpire time.Time }{ "missing required parameter values": { StartURL: "https://invalid-required", ExpectedErr: true, }, "valid required parameter values": { Client: mockClient{ ExpectedAccountID: "012345678901", ExpectedRoleName: "TestRole", ExpectedClientRegion: "us-west-2", ExpectedAccessToken: "dGhpcyBpcyBub3QgYSByZWFsIHZhbHVl", Response: func(mock mockClient) (*sso.GetRoleCredentialsOutput, error) { return &sso.GetRoleCredentialsOutput{ RoleCredentials: &sso.RoleCredentials{ AccessKeyId: aws.String("AccessKey"), SecretAccessKey: aws.String("SecretKey"), SessionToken: aws.String("SessionToken"), Expiration: aws.Int64(1611177743123), }, }, nil }, }, AccountID: "012345678901", Region: "us-west-2", RoleName: "TestRole", StartURL: "https://valid-required-only", ExpectedCredentials: credentials.Value{ AccessKeyID: "AccessKey", SecretAccessKey: "SecretKey", SessionToken: "SessionToken", ProviderName: ProviderName, }, ExpectedExpire: time.Date(2021, 01, 20, 21, 22, 23, 0.123e9, time.UTC), }, "expired access token": { StartURL: "https://expired", ExpectedErr: true, }, "api error": { Client: mockClient{ ExpectedAccountID: "012345678901", ExpectedRoleName: "TestRole", ExpectedClientRegion: "us-west-2", ExpectedAccessToken: "dGhpcyBpcyBub3QgYSByZWFsIHZhbHVl", Response: func(mock mockClient) (*sso.GetRoleCredentialsOutput, error) { return nil, fmt.Errorf("api error") }, }, AccountID: "012345678901", Region: "us-west-2", RoleName: "TestRole", StartURL: "https://valid-required-only", ExpectedErr: true, }, } for name, tt := range cases { t.Run(name, func(t *testing.T) { tt.Client.t = t provider := &Provider{ Client: tt.Client, AccountID: tt.AccountID, RoleName: tt.RoleName, StartURL: tt.StartURL, } provider.Expiry.CurrentTime = nowTime credentials, err := provider.Retrieve() if (err != nil) != tt.ExpectedErr { t.Errorf("expect error: %v", tt.ExpectedErr) } if e, a := tt.ExpectedCredentials, credentials; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if !tt.ExpectedExpire.IsZero() { if e, a := tt.ExpectedExpire, provider.ExpiresAt(); !e.Equal(a) { t.Errorf("expect %v, got %v", e, a) } } }) } }
185
session-manager-plugin
aws
Go
/* Package stscreds are credential Providers to retrieve STS AWS credentials. STS provides multiple ways to retrieve credentials which can be used when making future AWS service API operation calls. The SDK will ensure that per instance of credentials.Credentials all requests to refresh the credentials will be synchronized. But, the SDK is unable to ensure synchronous usage of the AssumeRoleProvider if the value is shared between multiple Credentials, Sessions or service clients. Assume Role To assume an IAM role using STS with the SDK you can create a new Credentials with the SDKs's stscreds package. // Initial credentials loaded from SDK's default credential chain. Such as // the environment, shared credentials (~/.aws/credentials), or EC2 Instance // Role. These credentials will be used to to make the STS Assume Role API. sess := session.Must(session.NewSession()) // Create the credentials from AssumeRoleProvider to assume the role // referenced by the "myRoleARN" ARN. creds := stscreds.NewCredentials(sess, "myRoleArn") // Create service client value configured for credentials // from assumed role. svc := s3.New(sess, &aws.Config{Credentials: creds}) Assume Role with static MFA Token To assume an IAM role with a MFA token you can either specify a MFA token code directly or provide a function to prompt the user each time the credentials need to refresh the role's credentials. Specifying the TokenCode should be used for short lived operations that will not need to be refreshed, and when you do not want to have direct control over the user provides their MFA token. With TokenCode the AssumeRoleProvider will be not be able to refresh the role's credentials. // Create the credentials from AssumeRoleProvider to assume the role // referenced by the "myRoleARN" ARN using the MFA token code provided. creds := stscreds.NewCredentials(sess, "myRoleArn", func(p *stscreds.AssumeRoleProvider) { p.SerialNumber = aws.String("myTokenSerialNumber") p.TokenCode = aws.String("00000000") }) // Create service client value configured for credentials // from assumed role. svc := s3.New(sess, &aws.Config{Credentials: creds}) Assume Role with MFA Token Provider To assume an IAM role with MFA for longer running tasks where the credentials may need to be refreshed setting the TokenProvider field of AssumeRoleProvider will allow the credential provider to prompt for new MFA token code when the role's credentials need to be refreshed. The StdinTokenProvider function is available to prompt on stdin to retrieve the MFA token code from the user. You can also implement custom prompts by satisfing the TokenProvider function signature. Using StdinTokenProvider with multiple AssumeRoleProviders, or Credentials will have undesirable results as the StdinTokenProvider will not be synchronized. A single Credentials with an AssumeRoleProvider can be shared safely. // Create the credentials from AssumeRoleProvider to assume the role // referenced by the "myRoleARN" ARN. Prompting for MFA token from stdin. creds := stscreds.NewCredentials(sess, "myRoleArn", func(p *stscreds.AssumeRoleProvider) { p.SerialNumber = aws.String("myTokenSerialNumber") p.TokenProvider = stscreds.StdinTokenProvider }) // Create service client value configured for credentials // from assumed role. svc := s3.New(sess, &aws.Config{Credentials: creds}) */ package stscreds import ( "fmt" "os" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/internal/sdkrand" "github.com/aws/aws-sdk-go/service/sts" ) // StdinTokenProvider will prompt on stderr and read from stdin for a string value. // An error is returned if reading from stdin fails. // // Use this function to read MFA tokens from stdin. The function makes no attempt // to make atomic prompts from stdin across multiple gorouties. // // Using StdinTokenProvider with multiple AssumeRoleProviders, or Credentials will // have undesirable results as the StdinTokenProvider will not be synchronized. A // single Credentials with an AssumeRoleProvider can be shared safely // // Will wait forever until something is provided on the stdin. func StdinTokenProvider() (string, error) { var v string fmt.Fprintf(os.Stderr, "Assume Role MFA token code: ") _, err := fmt.Scanln(&v) return v, err } // ProviderName provides a name of AssumeRole provider const ProviderName = "AssumeRoleProvider" // AssumeRoler represents the minimal subset of the STS client API used by this provider. type AssumeRoler interface { AssumeRole(input *sts.AssumeRoleInput) (*sts.AssumeRoleOutput, error) } type assumeRolerWithContext interface { AssumeRoleWithContext(aws.Context, *sts.AssumeRoleInput, ...request.Option) (*sts.AssumeRoleOutput, error) } // DefaultDuration is the default amount of time in minutes that the credentials // will be valid for. var DefaultDuration = time.Duration(15) * time.Minute // AssumeRoleProvider retrieves temporary credentials from the STS service, and // keeps track of their expiration time. // // This credential provider will be used by the SDKs default credential change // when shared configuration is enabled, and the shared config or shared credentials // file configure assume role. See Session docs for how to do this. // // AssumeRoleProvider does not provide any synchronization and it is not safe // to share this value across multiple Credentials, Sessions, or service clients // without also sharing the same Credentials instance. type AssumeRoleProvider struct { credentials.Expiry // STS client to make assume role request with. Client AssumeRoler // Role to be assumed. RoleARN string // Session name, if you wish to reuse the credentials elsewhere. RoleSessionName string // Optional, you can pass tag key-value pairs to your session. These tags are called session tags. Tags []*sts.Tag // A list of keys for session tags that you want to set as transitive. // If you set a tag key as transitive, the corresponding key and value passes to subsequent sessions in a role chain. TransitiveTagKeys []*string // Expiry duration of the STS credentials. Defaults to 15 minutes if not set. Duration time.Duration // Optional ExternalID to pass along, defaults to nil if not set. ExternalID *string // The policy plain text must be 2048 bytes or shorter. However, an internal // conversion compresses it into a packed binary format with a separate limit. // The PackedPolicySize response element indicates by percentage how close to // the upper size limit the policy is, with 100% equaling the maximum allowed // size. Policy *string // The ARNs of IAM managed policies you want to use as managed session policies. // The policies must exist in the same account as the role. // // This parameter is optional. You can provide up to 10 managed policy ARNs. // However, the plain text that you use for both inline and managed session // policies can't exceed 2,048 characters. // // An AWS conversion compresses the passed session policies and session tags // into a packed binary format that has a separate limit. Your request can fail // for this limit even if your plain text meets the other requirements. The // PackedPolicySize response element indicates by percentage how close the policies // and tags for your request are to the upper size limit. // // Passing policies to this operation returns new temporary credentials. The // resulting session's permissions are the intersection of the role's identity-based // policy and the session policies. You can use the role's temporary credentials // in subsequent AWS API calls to access resources in the account that owns // the role. You cannot use session policies to grant more permissions than // those allowed by the identity-based policy of the role that is being assumed. // For more information, see Session Policies (https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session) // in the IAM User Guide. PolicyArns []*sts.PolicyDescriptorType // The identification number of the MFA device that is associated with the user // who is making the AssumeRole call. Specify this value if the trust policy // of the role being assumed includes a condition that requires MFA authentication. // The value is either the serial number for a hardware device (such as GAHT12345678) // or an Amazon Resource Name (ARN) for a virtual device (such as arn:aws:iam::123456789012:mfa/user). SerialNumber *string // The value provided by the MFA device, if the trust policy of the role being // assumed requires MFA (that is, if the policy includes a condition that tests // for MFA). If the role being assumed requires MFA and if the TokenCode value // is missing or expired, the AssumeRole call returns an "access denied" error. // // If SerialNumber is set and neither TokenCode nor TokenProvider are also // set an error will be returned. TokenCode *string // Async method of providing MFA token code for assuming an IAM role with MFA. // The value returned by the function will be used as the TokenCode in the Retrieve // call. See StdinTokenProvider for a provider that prompts and reads from stdin. // // This token provider will be called when ever the assumed role's // credentials need to be refreshed when SerialNumber is also set and // TokenCode is not set. // // If both TokenCode and TokenProvider is set, TokenProvider will be used and // TokenCode is ignored. TokenProvider func() (string, error) // ExpiryWindow will allow the credentials to trigger refreshing prior to // the credentials actually expiring. This is beneficial so race conditions // with expiring credentials do not cause request to fail unexpectedly // due to ExpiredTokenException exceptions. // // So a ExpiryWindow of 10s would cause calls to IsExpired() to return true // 10 seconds before the credentials are actually expired. // // If ExpiryWindow is 0 or less it will be ignored. ExpiryWindow time.Duration // MaxJitterFrac reduces the effective Duration of each credential requested // by a random percentage between 0 and MaxJitterFraction. MaxJitterFrac must // have a value between 0 and 1. Any other value may lead to expected behavior. // With a MaxJitterFrac value of 0, default) will no jitter will be used. // // For example, with a Duration of 30m and a MaxJitterFrac of 0.1, the // AssumeRole call will be made with an arbitrary Duration between 27m and // 30m. // // MaxJitterFrac should not be negative. MaxJitterFrac float64 } // NewCredentials returns a pointer to a new Credentials value wrapping the // AssumeRoleProvider. The credentials will expire every 15 minutes and the // role will be named after a nanosecond timestamp of this operation. The // Credentials value will attempt to refresh the credentials using the provider // when Credentials.Get is called, if the cached credentials are expiring. // // Takes a Config provider to create the STS client. The ConfigProvider is // satisfied by the session.Session type. // // It is safe to share the returned Credentials with multiple Sessions and // service clients. All access to the credentials and refreshing them // will be synchronized. func NewCredentials(c client.ConfigProvider, roleARN string, options ...func(*AssumeRoleProvider)) *credentials.Credentials { p := &AssumeRoleProvider{ Client: sts.New(c), RoleARN: roleARN, Duration: DefaultDuration, } for _, option := range options { option(p) } return credentials.NewCredentials(p) } // NewCredentialsWithClient returns a pointer to a new Credentials value wrapping the // AssumeRoleProvider. The credentials will expire every 15 minutes and the // role will be named after a nanosecond timestamp of this operation. The // Credentials value will attempt to refresh the credentials using the provider // when Credentials.Get is called, if the cached credentials are expiring. // // Takes an AssumeRoler which can be satisfied by the STS client. // // It is safe to share the returned Credentials with multiple Sessions and // service clients. All access to the credentials and refreshing them // will be synchronized. func NewCredentialsWithClient(svc AssumeRoler, roleARN string, options ...func(*AssumeRoleProvider)) *credentials.Credentials { p := &AssumeRoleProvider{ Client: svc, RoleARN: roleARN, Duration: DefaultDuration, } for _, option := range options { option(p) } return credentials.NewCredentials(p) } // Retrieve generates a new set of temporary credentials using STS. func (p *AssumeRoleProvider) Retrieve() (credentials.Value, error) { return p.RetrieveWithContext(aws.BackgroundContext()) } // RetrieveWithContext generates a new set of temporary credentials using STS. func (p *AssumeRoleProvider) RetrieveWithContext(ctx credentials.Context) (credentials.Value, error) { // Apply defaults where parameters are not set. if p.RoleSessionName == "" { // Try to work out a role name that will hopefully end up unique. p.RoleSessionName = fmt.Sprintf("%d", time.Now().UTC().UnixNano()) } if p.Duration == 0 { // Expire as often as AWS permits. p.Duration = DefaultDuration } jitter := time.Duration(sdkrand.SeededRand.Float64() * p.MaxJitterFrac * float64(p.Duration)) input := &sts.AssumeRoleInput{ DurationSeconds: aws.Int64(int64((p.Duration - jitter) / time.Second)), RoleArn: aws.String(p.RoleARN), RoleSessionName: aws.String(p.RoleSessionName), ExternalId: p.ExternalID, Tags: p.Tags, PolicyArns: p.PolicyArns, TransitiveTagKeys: p.TransitiveTagKeys, } if p.Policy != nil { input.Policy = p.Policy } if p.SerialNumber != nil { if p.TokenCode != nil { input.SerialNumber = p.SerialNumber input.TokenCode = p.TokenCode } else if p.TokenProvider != nil { input.SerialNumber = p.SerialNumber code, err := p.TokenProvider() if err != nil { return credentials.Value{ProviderName: ProviderName}, err } input.TokenCode = aws.String(code) } else { return credentials.Value{ProviderName: ProviderName}, awserr.New("AssumeRoleTokenNotAvailable", "assume role with MFA enabled, but neither TokenCode nor TokenProvider are set", nil) } } var roleOutput *sts.AssumeRoleOutput var err error if c, ok := p.Client.(assumeRolerWithContext); ok { roleOutput, err = c.AssumeRoleWithContext(ctx, input) } else { roleOutput, err = p.Client.AssumeRole(input) } if err != nil { return credentials.Value{ProviderName: ProviderName}, err } // We will proactively generate new credentials before they expire. p.SetExpiration(*roleOutput.Credentials.Expiration, p.ExpiryWindow) return credentials.Value{ AccessKeyID: *roleOutput.Credentials.AccessKeyId, SecretAccessKey: *roleOutput.Credentials.SecretAccessKey, SessionToken: *roleOutput.Credentials.SessionToken, ProviderName: ProviderName, }, nil }
368
session-manager-plugin
aws
Go
package stscreds import ( "fmt" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/service/sts" ) type stubSTS struct { TestInput func(*sts.AssumeRoleInput) } func (s *stubSTS) AssumeRole(input *sts.AssumeRoleInput) (*sts.AssumeRoleOutput, error) { if s.TestInput != nil { s.TestInput(input) } expiry := time.Now().Add(60 * time.Minute) return &sts.AssumeRoleOutput{ Credentials: &sts.Credentials{ // Just reflect the role arn to the provider. AccessKeyId: input.RoleArn, SecretAccessKey: aws.String("assumedSecretAccessKey"), SessionToken: aws.String("assumedSessionToken"), Expiration: &expiry, }, }, nil } type stubSTSWithContext struct { stubSTS called chan struct{} } func (s *stubSTSWithContext) AssumeRoleWithContext(context credentials.Context, input *sts.AssumeRoleInput, option ...request.Option) (*sts.AssumeRoleOutput, error) { <-s.called return s.stubSTS.AssumeRole(input) } func TestAssumeRoleProvider(t *testing.T) { stub := &stubSTS{} p := &AssumeRoleProvider{ Client: stub, RoleARN: "roleARN", } creds, err := p.Retrieve() if err != nil { t.Errorf("expect nil, got %v", err) } if e, a := "roleARN", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "assumedSecretAccessKey", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "assumedSessionToken", creds.SessionToken; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestAssumeRoleProvider_WithTokenCode(t *testing.T) { stub := &stubSTS{ TestInput: func(in *sts.AssumeRoleInput) { if e, a := "0123456789", *in.SerialNumber; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "code", *in.TokenCode; e != a { t.Errorf("expect %v, got %v", e, a) } }, } p := &AssumeRoleProvider{ Client: stub, RoleARN: "roleARN", SerialNumber: aws.String("0123456789"), TokenCode: aws.String("code"), } creds, err := p.Retrieve() if err != nil { t.Errorf("expect nil, got %v", err) } if e, a := "roleARN", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "assumedSecretAccessKey", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "assumedSessionToken", creds.SessionToken; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestAssumeRoleProvider_WithTokenProvider(t *testing.T) { stub := &stubSTS{ TestInput: func(in *sts.AssumeRoleInput) { if e, a := "0123456789", *in.SerialNumber; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "code", *in.TokenCode; e != a { t.Errorf("expect %v, got %v", e, a) } }, } p := &AssumeRoleProvider{ Client: stub, RoleARN: "roleARN", SerialNumber: aws.String("0123456789"), TokenProvider: func() (string, error) { return "code", nil }, } creds, err := p.Retrieve() if err != nil { t.Errorf("expect nil, got %v", err) } if e, a := "roleARN", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "assumedSecretAccessKey", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "assumedSessionToken", creds.SessionToken; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestAssumeRoleProvider_WithTokenProviderError(t *testing.T) { stub := &stubSTS{ TestInput: func(in *sts.AssumeRoleInput) { t.Errorf("API request should not of been called") }, } p := &AssumeRoleProvider{ Client: stub, RoleARN: "roleARN", SerialNumber: aws.String("0123456789"), TokenProvider: func() (string, error) { return "", fmt.Errorf("error occurred") }, } creds, err := p.Retrieve() if err == nil { t.Errorf("expect error") } if v := creds.AccessKeyID; len(v) != 0 { t.Errorf("expect empty, got %v", v) } if v := creds.SecretAccessKey; len(v) != 0 { t.Errorf("expect empty, got %v", v) } if v := creds.SessionToken; len(v) != 0 { t.Errorf("expect empty, got %v", v) } } func TestAssumeRoleProvider_MFAWithNoToken(t *testing.T) { stub := &stubSTS{ TestInput: func(in *sts.AssumeRoleInput) { t.Errorf("API request should not of been called") }, } p := &AssumeRoleProvider{ Client: stub, RoleARN: "roleARN", SerialNumber: aws.String("0123456789"), } creds, err := p.Retrieve() if err == nil { t.Errorf("expect error") } if v := creds.AccessKeyID; len(v) != 0 { t.Errorf("expect empty, got %v", v) } if v := creds.SecretAccessKey; len(v) != 0 { t.Errorf("expect empty, got %v", v) } if v := creds.SessionToken; len(v) != 0 { t.Errorf("expect empty, got %v", v) } } func BenchmarkAssumeRoleProvider(b *testing.B) { stub := &stubSTS{} p := &AssumeRoleProvider{ Client: stub, RoleARN: "roleARN", } b.ResetTimer() for i := 0; i < b.N; i++ { if _, err := p.Retrieve(); err != nil { b.Fatal(err) } } } func TestAssumeRoleProvider_WithTags(t *testing.T) { stub := &stubSTS{ TestInput: func(in *sts.AssumeRoleInput) { if *in.TransitiveTagKeys[0] != "TagName" { t.Errorf("TransitiveTagKeys not passed along") } if *in.Tags[0].Key != "TagName" || *in.Tags[0].Value != "TagValue" { t.Errorf("Tags not passed along") } }, } p := &AssumeRoleProvider{ Client: stub, RoleARN: "roleARN", Tags: []*sts.Tag{ { Key: aws.String("TagName"), Value: aws.String("TagValue"), }, }, TransitiveTagKeys: []*string{aws.String("TagName")}, } _, err := p.Retrieve() if err != nil { t.Errorf("expect error") } } func TestAssumeRoleProvider_RetrieveWithContext(t *testing.T) { stub := &stubSTSWithContext{ called: make(chan struct{}), } p := &AssumeRoleProvider{ Client: stub, RoleARN: "roleARN", } go func() { stub.called <- struct{}{} }() creds, err := p.RetrieveWithContext(aws.BackgroundContext()) if err != nil { t.Errorf("expect nil, got %v", err) } if e, a := "roleARN", creds.AccessKeyID; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "assumedSecretAccessKey", creds.SecretAccessKey; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "assumedSessionToken", creds.SessionToken; e != a { t.Errorf("expect %v, got %v", e, a) } }
267
session-manager-plugin
aws
Go
package stscreds import ( "fmt" "io/ioutil" "strconv" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/service/sts" "github.com/aws/aws-sdk-go/service/sts/stsiface" ) const ( // ErrCodeWebIdentity will be used as an error code when constructing // a new error to be returned during session creation or retrieval. ErrCodeWebIdentity = "WebIdentityErr" // WebIdentityProviderName is the web identity provider name WebIdentityProviderName = "WebIdentityCredentials" ) // now is used to return a time.Time object representing // the current time. This can be used to easily test and // compare test values. var now = time.Now // TokenFetcher shuold return WebIdentity token bytes or an error type TokenFetcher interface { FetchToken(credentials.Context) ([]byte, error) } // FetchTokenPath is a path to a WebIdentity token file type FetchTokenPath string // FetchToken returns a token by reading from the filesystem func (f FetchTokenPath) FetchToken(ctx credentials.Context) ([]byte, error) { data, err := ioutil.ReadFile(string(f)) if err != nil { errMsg := fmt.Sprintf("unable to read file at %s", f) return nil, awserr.New(ErrCodeWebIdentity, errMsg, err) } return data, nil } // WebIdentityRoleProvider is used to retrieve credentials using // an OIDC token. type WebIdentityRoleProvider struct { credentials.Expiry PolicyArns []*sts.PolicyDescriptorType // Duration the STS credentials will be valid for. Truncated to seconds. // If unset, the assumed role will use AssumeRoleWithWebIdentity's default // expiry duration. See // https://docs.aws.amazon.com/sdk-for-go/api/service/sts/#STS.AssumeRoleWithWebIdentity // for more information. Duration time.Duration // The amount of time the credentials will be refreshed before they expire. // This is useful refresh credentials before they expire to reduce risk of // using credentials as they expire. If unset, will default to no expiry // window. ExpiryWindow time.Duration client stsiface.STSAPI tokenFetcher TokenFetcher roleARN string roleSessionName string } // NewWebIdentityCredentials will return a new set of credentials with a given // configuration, role arn, and token file path. func NewWebIdentityCredentials(c client.ConfigProvider, roleARN, roleSessionName, path string) *credentials.Credentials { svc := sts.New(c) p := NewWebIdentityRoleProvider(svc, roleARN, roleSessionName, path) return credentials.NewCredentials(p) } // NewWebIdentityRoleProvider will return a new WebIdentityRoleProvider with the // provided stsiface.STSAPI func NewWebIdentityRoleProvider(svc stsiface.STSAPI, roleARN, roleSessionName, path string) *WebIdentityRoleProvider { return NewWebIdentityRoleProviderWithToken(svc, roleARN, roleSessionName, FetchTokenPath(path)) } // NewWebIdentityRoleProviderWithToken will return a new WebIdentityRoleProvider with the // provided stsiface.STSAPI and a TokenFetcher func NewWebIdentityRoleProviderWithToken(svc stsiface.STSAPI, roleARN, roleSessionName string, tokenFetcher TokenFetcher) *WebIdentityRoleProvider { return &WebIdentityRoleProvider{ client: svc, tokenFetcher: tokenFetcher, roleARN: roleARN, roleSessionName: roleSessionName, } } // Retrieve will attempt to assume a role from a token which is located at // 'WebIdentityTokenFilePath' specified destination and if that is empty an // error will be returned. func (p *WebIdentityRoleProvider) Retrieve() (credentials.Value, error) { return p.RetrieveWithContext(aws.BackgroundContext()) } // RetrieveWithContext will attempt to assume a role from a token which is located at // 'WebIdentityTokenFilePath' specified destination and if that is empty an // error will be returned. func (p *WebIdentityRoleProvider) RetrieveWithContext(ctx credentials.Context) (credentials.Value, error) { b, err := p.tokenFetcher.FetchToken(ctx) if err != nil { return credentials.Value{}, awserr.New(ErrCodeWebIdentity, "failed fetching WebIdentity token: ", err) } sessionName := p.roleSessionName if len(sessionName) == 0 { // session name is used to uniquely identify a session. This simply // uses unix time in nanoseconds to uniquely identify sessions. sessionName = strconv.FormatInt(now().UnixNano(), 10) } var duration *int64 if p.Duration != 0 { duration = aws.Int64(int64(p.Duration / time.Second)) } req, resp := p.client.AssumeRoleWithWebIdentityRequest(&sts.AssumeRoleWithWebIdentityInput{ PolicyArns: p.PolicyArns, RoleArn: &p.roleARN, RoleSessionName: &sessionName, WebIdentityToken: aws.String(string(b)), DurationSeconds: duration, }) req.SetContext(ctx) // InvalidIdentityToken error is a temporary error that can occur // when assuming an Role with a JWT web identity token. req.RetryErrorCodes = append(req.RetryErrorCodes, sts.ErrCodeInvalidIdentityTokenException) if err := req.Send(); err != nil { return credentials.Value{}, awserr.New(ErrCodeWebIdentity, "failed to retrieve credentials", err) } p.SetExpiration(aws.TimeValue(resp.Credentials.Expiration), p.ExpiryWindow) value := credentials.Value{ AccessKeyID: aws.StringValue(resp.Credentials.AccessKeyId), SecretAccessKey: aws.StringValue(resp.Credentials.SecretAccessKey), SessionToken: aws.StringValue(resp.Credentials.SessionToken), ProviderName: WebIdentityProviderName, } return value, nil }
155
session-manager-plugin
aws
Go
// +build go1.7 package stscreds_test import ( "net/http" "reflect" "strings" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/corehandlers" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/credentials/stscreds" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/awstesting/unit" "github.com/aws/aws-sdk-go/service/sts" ) func TestWebIdentityProviderRetrieve(t *testing.T) { var reqCount int cases := map[string]struct { onSendReq func(*testing.T, *request.Request) roleARN string tokenFilepath string sessionName string duration time.Duration expectedError string expectedCredValue credentials.Value }{ "session name case": { roleARN: "arn01234567890123456789", tokenFilepath: "testdata/token.jwt", sessionName: "foo", onSendReq: func(t *testing.T, r *request.Request) { input := r.Params.(*sts.AssumeRoleWithWebIdentityInput) if e, a := "foo", *input.RoleSessionName; e != a { t.Errorf("expected %v, but received %v", e, a) } if input.DurationSeconds != nil { t.Errorf("expect no duration, got %v", *input.DurationSeconds) } data := r.Data.(*sts.AssumeRoleWithWebIdentityOutput) *data = sts.AssumeRoleWithWebIdentityOutput{ Credentials: &sts.Credentials{ Expiration: aws.Time(time.Now()), AccessKeyId: aws.String("access-key-id"), SecretAccessKey: aws.String("secret-access-key"), SessionToken: aws.String("session-token"), }, } }, expectedCredValue: credentials.Value{ AccessKeyID: "access-key-id", SecretAccessKey: "secret-access-key", SessionToken: "session-token", ProviderName: stscreds.WebIdentityProviderName, }, }, "with duration": { roleARN: "arn01234567890123456789", tokenFilepath: "testdata/token.jwt", sessionName: "foo", duration: 15 * time.Minute, onSendReq: func(t *testing.T, r *request.Request) { input := r.Params.(*sts.AssumeRoleWithWebIdentityInput) if e, a := int64((15*time.Minute)/time.Second), *input.DurationSeconds; e != a { t.Errorf("expect %v duration, got %v", e, a) } data := r.Data.(*sts.AssumeRoleWithWebIdentityOutput) *data = sts.AssumeRoleWithWebIdentityOutput{ Credentials: &sts.Credentials{ Expiration: aws.Time(time.Now()), AccessKeyId: aws.String("access-key-id"), SecretAccessKey: aws.String("secret-access-key"), SessionToken: aws.String("session-token"), }, } }, expectedCredValue: credentials.Value{ AccessKeyID: "access-key-id", SecretAccessKey: "secret-access-key", SessionToken: "session-token", ProviderName: stscreds.WebIdentityProviderName, }, }, "invalid token retry": { roleARN: "arn01234567890123456789", tokenFilepath: "testdata/token.jwt", sessionName: "foo", onSendReq: func(t *testing.T, r *request.Request) { input := r.Params.(*sts.AssumeRoleWithWebIdentityInput) if e, a := "foo", *input.RoleSessionName; !reflect.DeepEqual(e, a) { t.Errorf("expected %v, but received %v", e, a) } if reqCount == 0 { r.HTTPResponse.StatusCode = 400 r.Error = awserr.New(sts.ErrCodeInvalidIdentityTokenException, "some error message", nil) return } data := r.Data.(*sts.AssumeRoleWithWebIdentityOutput) *data = sts.AssumeRoleWithWebIdentityOutput{ Credentials: &sts.Credentials{ Expiration: aws.Time(time.Now()), AccessKeyId: aws.String("access-key-id"), SecretAccessKey: aws.String("secret-access-key"), SessionToken: aws.String("session-token"), }, } }, expectedCredValue: credentials.Value{ AccessKeyID: "access-key-id", SecretAccessKey: "secret-access-key", SessionToken: "session-token", ProviderName: stscreds.WebIdentityProviderName, }, }, } for name, c := range cases { t.Run(name, func(t *testing.T) { reqCount = 0 svc := sts.New(unit.Session, &aws.Config{ Logger: t, }) svc.Handlers.Send.Swap(corehandlers.SendHandler.Name, request.NamedHandler{ Name: "custom send stub handler", Fn: func(r *request.Request) { r.HTTPResponse = &http.Response{ StatusCode: 200, Header: http.Header{}, } c.onSendReq(t, r) reqCount++ }, }) svc.Handlers.UnmarshalMeta.Clear() svc.Handlers.Unmarshal.Clear() svc.Handlers.UnmarshalError.Clear() p := stscreds.NewWebIdentityRoleProvider(svc, c.roleARN, c.sessionName, c.tokenFilepath) p.Duration = c.duration credValue, err := p.Retrieve() if len(c.expectedError) != 0 { if err == nil { t.Fatalf("expect error, got none") } if e, a := c.expectedError, err.Error(); !strings.Contains(a, e) { t.Fatalf("expect error to contain %v, got %v", e, a) } return } if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := c.expectedCredValue, credValue; !reflect.DeepEqual(e, a) { t.Errorf("expected %v, but received %v", e, a) } }) } }
171
session-manager-plugin
aws
Go
package crr import ( "sync/atomic" ) // EndpointCache is an LRU cache that holds a series of endpoints // based on some key. The datastructure makes use of a read write // mutex to enable asynchronous use. type EndpointCache struct { endpoints syncMap endpointLimit int64 // size is used to count the number elements in the cache. // The atomic package is used to ensure this size is accurate when // using multiple goroutines. size int64 } // NewEndpointCache will return a newly initialized cache with a limit // of endpointLimit entries. func NewEndpointCache(endpointLimit int64) *EndpointCache { return &EndpointCache{ endpointLimit: endpointLimit, endpoints: newSyncMap(), } } // get is a concurrent safe get operation that will retrieve an endpoint // based on endpointKey. A boolean will also be returned to illustrate whether // or not the endpoint had been found. func (c *EndpointCache) get(endpointKey string) (Endpoint, bool) { endpoint, ok := c.endpoints.Load(endpointKey) if !ok { return Endpoint{}, false } c.endpoints.Store(endpointKey, endpoint) return endpoint.(Endpoint), true } // Has returns if the enpoint cache contains a valid entry for the endpoint key // provided. func (c *EndpointCache) Has(endpointKey string) bool { endpoint, ok := c.get(endpointKey) _, found := endpoint.GetValidAddress() return ok && found } // Get will retrieve a weighted address based off of the endpoint key. If an endpoint // should be retrieved, due to not existing or the current endpoint has expired // the Discoverer object that was passed in will attempt to discover a new endpoint // and add that to the cache. func (c *EndpointCache) Get(d Discoverer, endpointKey string, required bool) (WeightedAddress, error) { var err error endpoint, ok := c.get(endpointKey) weighted, found := endpoint.GetValidAddress() shouldGet := !ok || !found if required && shouldGet { if endpoint, err = c.discover(d, endpointKey); err != nil { return WeightedAddress{}, err } weighted, _ = endpoint.GetValidAddress() } else if shouldGet { go c.discover(d, endpointKey) } return weighted, nil } // Add is a concurrent safe operation that will allow new endpoints to be added // to the cache. If the cache is full, the number of endpoints equal endpointLimit, // then this will remove the oldest entry before adding the new endpoint. func (c *EndpointCache) Add(endpoint Endpoint) { // de-dups multiple adds of an endpoint with a pre-existing key if iface, ok := c.endpoints.Load(endpoint.Key); ok { e := iface.(Endpoint) if e.Len() > 0 { return } } c.endpoints.Store(endpoint.Key, endpoint) size := atomic.AddInt64(&c.size, 1) if size > 0 && size > c.endpointLimit { c.deleteRandomKey() } } // deleteRandomKey will delete a random key from the cache. If // no key was deleted false will be returned. func (c *EndpointCache) deleteRandomKey() bool { atomic.AddInt64(&c.size, -1) found := false c.endpoints.Range(func(key, value interface{}) bool { found = true c.endpoints.Delete(key) return false }) return found } // discover will get and store and endpoint using the Discoverer. func (c *EndpointCache) discover(d Discoverer, endpointKey string) (Endpoint, error) { endpoint, err := d.Discover() if err != nil { return Endpoint{}, err } endpoint.Key = endpointKey c.Add(endpoint) return endpoint, nil }
120
session-manager-plugin
aws
Go
package crr import ( "net/url" "reflect" "testing" ) func urlParse(uri string) *url.URL { u, _ := url.Parse(uri) return u } func TestCacheAdd(t *testing.T) { cases := []struct { limit int64 endpoints []Endpoint validKeys map[string]Endpoint expectedSize int }{ { limit: 5, endpoints: []Endpoint{ { Key: "foo", Addresses: []WeightedAddress{ { URL: urlParse("http://0"), }, }, }, { Key: "bar", Addresses: []WeightedAddress{ { URL: urlParse("http://1"), }, }, }, { Key: "baz", Addresses: []WeightedAddress{ { URL: urlParse("http://2"), }, }, }, { Key: "qux", Addresses: []WeightedAddress{ { URL: urlParse("http://3"), }, }, }, { Key: "moo", Addresses: []WeightedAddress{ { URL: urlParse("http://4"), }, }, }, }, validKeys: map[string]Endpoint{ "foo": Endpoint{ Key: "foo", Addresses: []WeightedAddress{ { URL: urlParse("http://0"), }, }, }, "bar": Endpoint{ Key: "bar", Addresses: []WeightedAddress{ { URL: urlParse("http://1"), }, }, }, "baz": Endpoint{ Key: "baz", Addresses: []WeightedAddress{ { URL: urlParse("http://2"), }, }, }, "qux": Endpoint{ Key: "qux", Addresses: []WeightedAddress{ { URL: urlParse("http://3"), }, }, }, "moo": Endpoint{ Key: "moo", Addresses: []WeightedAddress{ { URL: urlParse("http://4"), }, }, }, }, expectedSize: 5, }, { limit: 2, endpoints: []Endpoint{ { Key: "bar", Addresses: []WeightedAddress{ { URL: urlParse("http://1"), }, }, }, { Key: "foo", Addresses: []WeightedAddress{ { URL: urlParse("http://0"), }, }, }, { Key: "baz", Addresses: []WeightedAddress{ { URL: urlParse("http://2"), }, }, }, { Key: "qux", Addresses: []WeightedAddress{ { URL: urlParse("http://3"), }, }, }, { Key: "moo", Addresses: []WeightedAddress{ { URL: urlParse("http://4"), }, }, }, }, validKeys: map[string]Endpoint{ "foo": Endpoint{ Key: "foo", Addresses: []WeightedAddress{ { URL: urlParse("http://0"), }, }, }, "bar": Endpoint{ Key: "bar", Addresses: []WeightedAddress{ { URL: urlParse("http://1"), }, }, }, "baz": Endpoint{ Key: "baz", Addresses: []WeightedAddress{ { URL: urlParse("http://2"), }, }, }, "qux": Endpoint{ Key: "qux", Addresses: []WeightedAddress{ { URL: urlParse("http://3"), }, }, }, "moo": Endpoint{ Key: "moo", Addresses: []WeightedAddress{ { URL: urlParse("http://4"), }, }, }, }, expectedSize: 2, }, } for _, c := range cases { cache := NewEndpointCache(c.limit) for _, endpoint := range c.endpoints { cache.Add(endpoint) } count := 0 endpoints := map[string]Endpoint{} cache.endpoints.Range(func(key, value interface{}) bool { count++ endpoints[key.(string)] = value.(Endpoint) return true }) if e, a := c.expectedSize, cache.size; int64(e) != a { t.Errorf("expected %v, but received %v", e, a) } if e, a := c.expectedSize, count; e != a { t.Errorf("expected %v, but received %v", e, a) } for k, ep := range endpoints { endpoint, ok := c.validKeys[k] if !ok { t.Errorf("unrecognized key %q in cache", k) } if e, a := endpoint, ep; !reflect.DeepEqual(e, a) { t.Errorf("expected %v, but received %v", e, a) } } } } func TestCacheGet(t *testing.T) { cases := []struct { addEndpoints []Endpoint validKeys map[string]Endpoint limit int64 }{ { limit: 5, addEndpoints: []Endpoint{ { Key: "foo", Addresses: []WeightedAddress{ { URL: urlParse("http://0"), }, }, }, { Key: "bar", Addresses: []WeightedAddress{ { URL: urlParse("http://1"), }, }, }, { Key: "baz", Addresses: []WeightedAddress{ { URL: urlParse("http://2"), }, }, }, { Key: "qux", Addresses: []WeightedAddress{ { URL: urlParse("http://3"), }, }, }, { Key: "moo", Addresses: []WeightedAddress{ { URL: urlParse("http://4"), }, }, }, }, validKeys: map[string]Endpoint{ "foo": Endpoint{ Key: "foo", Addresses: []WeightedAddress{ { URL: urlParse("http://0"), }, }, }, "bar": Endpoint{ Key: "bar", Addresses: []WeightedAddress{ { URL: urlParse("http://1"), }, }, }, "baz": Endpoint{ Key: "baz", Addresses: []WeightedAddress{ { URL: urlParse("http://2"), }, }, }, "qux": Endpoint{ Key: "qux", Addresses: []WeightedAddress{ { URL: urlParse("http://3"), }, }, }, "moo": Endpoint{ Key: "moo", Addresses: []WeightedAddress{ { URL: urlParse("http://4"), }, }, }, }, }, { limit: 2, addEndpoints: []Endpoint{ { Key: "bar", Addresses: []WeightedAddress{ { URL: urlParse("http://1"), }, }, }, { Key: "foo", Addresses: []WeightedAddress{ { URL: urlParse("http://0"), }, }, }, { Key: "baz", Addresses: []WeightedAddress{ { URL: urlParse("http://2"), }, }, }, { Key: "qux", Addresses: []WeightedAddress{ { URL: urlParse("http://3"), }, }, }, { Key: "moo", Addresses: []WeightedAddress{ { URL: urlParse("http://4"), }, }, }, }, validKeys: map[string]Endpoint{ "foo": Endpoint{ Key: "foo", Addresses: []WeightedAddress{ { URL: urlParse("http://0"), }, }, }, "bar": Endpoint{ Key: "bar", Addresses: []WeightedAddress{ { URL: urlParse("http://1"), }, }, }, "baz": Endpoint{ Key: "baz", Addresses: []WeightedAddress{ { URL: urlParse("http://2"), }, }, }, "qux": Endpoint{ Key: "qux", Addresses: []WeightedAddress{ { URL: urlParse("http://3"), }, }, }, "moo": Endpoint{ Key: "moo", Addresses: []WeightedAddress{ { URL: urlParse("http://4"), }, }, }, }, }, } for _, c := range cases { cache := NewEndpointCache(c.limit) for _, endpoint := range c.addEndpoints { cache.Add(endpoint) } keys := []string{} cache.endpoints.Range(func(key, value interface{}) bool { a := value.(Endpoint) e, ok := c.validKeys[key.(string)] if !ok { t.Errorf("unrecognized key %q in cache", key.(string)) } if !reflect.DeepEqual(e, a) { t.Errorf("expected %v, but received %v", e, a) } keys = append(keys, key.(string)) return true }) for _, key := range keys { a, ok := cache.get(key) if !ok { t.Errorf("expected key to be present: %q", key) } e := c.validKeys[key] if !reflect.DeepEqual(e, a) { t.Errorf("expected %v, but received %v", e, a) } } } }
453
session-manager-plugin
aws
Go
package crr import ( "net/url" "sort" "strings" "time" "github.com/aws/aws-sdk-go/aws" ) // Endpoint represents an endpoint used in endpoint discovery. type Endpoint struct { Key string Addresses WeightedAddresses } // WeightedAddresses represents a list of WeightedAddress. type WeightedAddresses []WeightedAddress // WeightedAddress represents an address with a given weight. type WeightedAddress struct { URL *url.URL Expired time.Time } // HasExpired will return whether or not the endpoint has expired with // the exception of a zero expiry meaning does not expire. func (e WeightedAddress) HasExpired() bool { return e.Expired.Before(time.Now()) } // Add will add a given WeightedAddress to the address list of Endpoint. func (e *Endpoint) Add(addr WeightedAddress) { e.Addresses = append(e.Addresses, addr) } // Len returns the number of valid endpoints where valid means the endpoint // has not expired. func (e *Endpoint) Len() int { validEndpoints := 0 for _, endpoint := range e.Addresses { if endpoint.HasExpired() { continue } validEndpoints++ } return validEndpoints } // GetValidAddress will return a non-expired weight endpoint func (e *Endpoint) GetValidAddress() (WeightedAddress, bool) { for i := 0; i < len(e.Addresses); i++ { we := e.Addresses[i] if we.HasExpired() { e.Addresses = append(e.Addresses[:i], e.Addresses[i+1:]...) i-- continue } return we, true } return WeightedAddress{}, false } // Discoverer is an interface used to discovery which endpoint hit. This // allows for specifics about what parameters need to be used to be contained // in the Discoverer implementor. type Discoverer interface { Discover() (Endpoint, error) } // BuildEndpointKey will sort the keys in alphabetical order and then retrieve // the values in that order. Those values are then concatenated together to form // the endpoint key. func BuildEndpointKey(params map[string]*string) string { keys := make([]string, len(params)) i := 0 for k := range params { keys[i] = k i++ } sort.Strings(keys) values := make([]string, len(params)) for i, k := range keys { if params[k] == nil { continue } values[i] = aws.StringValue(params[k]) } return strings.Join(values, ".") }
100
session-manager-plugin
aws
Go
// +build go1.9 package crr import ( "sync" ) type syncMap sync.Map func newSyncMap() syncMap { return syncMap{} } func (m *syncMap) Load(key interface{}) (interface{}, bool) { return (*sync.Map)(m).Load(key) } func (m *syncMap) Store(key interface{}, value interface{}) { (*sync.Map)(m).Store(key, value) } func (m *syncMap) Delete(key interface{}) { (*sync.Map)(m).Delete(key) } func (m *syncMap) Range(f func(interface{}, interface{}) bool) { (*sync.Map)(m).Range(f) }
30
session-manager-plugin
aws
Go
// +build !go1.9 package crr import ( "sync" ) type syncMap struct { container map[interface{}]interface{} lock sync.RWMutex } func newSyncMap() syncMap { return syncMap{ container: map[interface{}]interface{}{}, } } func (m *syncMap) Load(key interface{}) (interface{}, bool) { m.lock.RLock() defer m.lock.RUnlock() v, ok := m.container[key] return v, ok } func (m *syncMap) Store(key interface{}, value interface{}) { m.lock.Lock() defer m.lock.Unlock() m.container[key] = value } func (m *syncMap) Delete(key interface{}) { m.lock.Lock() defer m.lock.Unlock() delete(m.container, key) } func (m *syncMap) Range(f func(interface{}, interface{}) bool) { for k, v := range m.container { if !f(k, v) { return } } }
49
session-manager-plugin
aws
Go
package crr import ( "reflect" "testing" ) func TestRangeDelete(t *testing.T) { m := newSyncMap() for i := 0; i < 10; i++ { m.Store(i, i*10) } m.Range(func(key, value interface{}) bool { m.Delete(key) return true }) expectedMap := map[interface{}]interface{}{} actualMap := map[interface{}]interface{}{} m.Range(func(key, value interface{}) bool { actualMap[key] = value return true }) if e, a := len(expectedMap), len(actualMap); e != a { t.Errorf("expected map size %d, but received %d", e, a) } if e, a := expectedMap, actualMap; !reflect.DeepEqual(e, a) { t.Errorf("expected %v, but received %v", e, a) } } func TestRangeStore(t *testing.T) { m := newSyncMap() for i := 0; i < 10; i++ { m.Store(i, i*10) } m.Range(func(key, value interface{}) bool { v := value.(int) m.Store(key, v+1) return true }) expectedMap := map[interface{}]interface{}{ 0: 1, 1: 11, 2: 21, 3: 31, 4: 41, 5: 51, 6: 61, 7: 71, 8: 81, 9: 91, } actualMap := map[interface{}]interface{}{} m.Range(func(key, value interface{}) bool { actualMap[key] = value return true }) if e, a := len(expectedMap), len(actualMap); e != a { t.Errorf("expected map size %d, but received %d", e, a) } if e, a := expectedMap, actualMap; !reflect.DeepEqual(e, a) { t.Errorf("expected %v, but received %v", e, a) } } func TestRangeGet(t *testing.T) { m := newSyncMap() for i := 0; i < 10; i++ { m.Store(i, i*10) } m.Range(func(key, value interface{}) bool { m.Load(key) return true }) expectedMap := map[interface{}]interface{}{ 0: 0, 1: 10, 2: 20, 3: 30, 4: 40, 5: 50, 6: 60, 7: 70, 8: 80, 9: 90, } actualMap := map[interface{}]interface{}{} m.Range(func(key, value interface{}) bool { actualMap[key] = value return true }) if e, a := len(expectedMap), len(actualMap); e != a { t.Errorf("expected map size %d, but received %d", e, a) } if e, a := expectedMap, actualMap; !reflect.DeepEqual(e, a) { t.Errorf("expected %v, but received %v", e, a) } }
111
session-manager-plugin
aws
Go
// +build go1.7 package csm import "testing" func TestAddressWithDefaults(t *testing.T) { cases := map[string]struct { Host, Port string Expect string }{ "ip": { Host: "127.0.0.2", Port: "", Expect: "127.0.0.2:31000", }, "localhost": { Host: "localhost", Port: "", Expect: "127.0.0.1:31000", }, "uppercase localhost": { Host: "LOCALHOST", Port: "", Expect: "127.0.0.1:31000", }, "port": { Host: "localhost", Port: "32000", Expect: "127.0.0.1:32000", }, "ip6": { Host: "::1", Port: "", Expect: "[::1]:31000", }, "unset": { Host: "", Port: "", Expect: "127.0.0.1:31000", }, } for name, c := range cases { t.Run(name, func(t *testing.T) { actual := AddressWithDefaults(c.Host, c.Port) if e, a := c.Expect, actual; e != a { t.Errorf("expect %v, got %v", e, a) } }) } }
41
session-manager-plugin
aws
Go
// Package csm provides the Client Side Monitoring (CSM) client which enables // sending metrics via UDP connection to the CSM agent. This package provides // control options, and configuration for the CSM client. The client can be // controlled manually, or automatically via the SDK's Session configuration. // // Enabling CSM client via SDK's Session configuration // // The CSM client can be enabled automatically via SDK's Session configuration. // The SDK's session configuration enables the CSM client if the AWS_CSM_PORT // environment variable is set to a non-empty value. // // The configuration options for the CSM client via the SDK's session // configuration are: // // * AWS_CSM_PORT=<port number> // The port number the CSM agent will receive metrics on. // // * AWS_CSM_HOST=<hostname or ip> // The hostname, or IP address the CSM agent will receive metrics on. // Without port number. // // Manually enabling the CSM client // // The CSM client can be started, paused, and resumed manually. The Start // function will enable the CSM client to publish metrics to the CSM agent. It // is safe to call Start concurrently, but if Start is called additional times // with different ClientID or address it will panic. // // r, err := csm.Start("clientID", ":31000") // if err != nil { // panic(fmt.Errorf("failed starting CSM: %v", err)) // } // // When controlling the CSM client manually, you must also inject its request // handlers into the SDK's Session configuration for the SDK's API clients to // publish metrics. // // sess, err := session.NewSession(&aws.Config{}) // if err != nil { // panic(fmt.Errorf("failed loading session: %v", err)) // } // // // Add CSM client's metric publishing request handlers to the SDK's // // Session Configuration. // r.InjectHandlers(&sess.Handlers) // // Controlling CSM client // // Once the CSM client has been enabled the Get function will return a Reporter // value that you can use to pause and resume the metrics published to the CSM // agent. If Get function is called before the reporter is enabled with the // Start function or via SDK's Session configuration nil will be returned. // // The Pause method can be called to stop the CSM client publishing metrics to // the CSM agent. The Continue method will resume metric publishing. // // // Get the CSM client Reporter. // r := csm.Get() // // // Will pause monitoring // r.Pause() // resp, err = client.GetObject(&s3.GetObjectInput{ // Bucket: aws.String("bucket"), // Key: aws.String("key"), // }) // // // Resume monitoring // r.Continue() package csm
70
session-manager-plugin
aws
Go
package csm import ( "fmt" "strings" "sync" ) var ( lock sync.Mutex ) const ( // DefaultPort is used when no port is specified. DefaultPort = "31000" // DefaultHost is the host that will be used when none is specified. DefaultHost = "127.0.0.1" ) // AddressWithDefaults returns a CSM address built from the host and port // values. If the host or port is not set, default values will be used // instead. If host is "localhost" it will be replaced with "127.0.0.1". func AddressWithDefaults(host, port string) string { if len(host) == 0 || strings.EqualFold(host, "localhost") { host = DefaultHost } if len(port) == 0 { port = DefaultPort } // Only IP6 host can contain a colon if strings.Contains(host, ":") { return "[" + host + "]:" + port } return host + ":" + port } // Start will start a long running go routine to capture // client side metrics. Calling start multiple time will only // start the metric listener once and will panic if a different // client ID or port is passed in. // // r, err := csm.Start("clientID", "127.0.0.1:31000") // if err != nil { // panic(fmt.Errorf("expected no error, but received %v", err)) // } // sess := session.NewSession() // r.InjectHandlers(sess.Handlers) // // svc := s3.New(sess) // out, err := svc.GetObject(&s3.GetObjectInput{ // Bucket: aws.String("bucket"), // Key: aws.String("key"), // }) func Start(clientID string, url string) (*Reporter, error) { lock.Lock() defer lock.Unlock() if sender == nil { sender = newReporter(clientID, url) } else { if sender.clientID != clientID { panic(fmt.Errorf("inconsistent client IDs. %q was expected, but received %q", sender.clientID, clientID)) } if sender.url != url { panic(fmt.Errorf("inconsistent URLs. %q was expected, but received %q", sender.url, url)) } } if err := connect(url); err != nil { sender = nil return nil, err } return sender, nil } // Get will return a reporter if one exists, if one does not exist, nil will // be returned. func Get() *Reporter { lock.Lock() defer lock.Unlock() return sender }
90
session-manager-plugin
aws
Go
package csm import ( "encoding/json" "fmt" "net" "testing" ) func startUDPServer(done chan struct{}, fn func([]byte)) (string, error) { addr, err := net.ResolveUDPAddr("udp", "127.0.0.1:0") if err != nil { return "", err } conn, err := net.ListenUDP("udp", addr) if err != nil { return "", err } buf := make([]byte, 1024) go func() { defer conn.Close() for { select { case <-done: return default: } n, _, err := conn.ReadFromUDP(buf) fn(buf[:n]) if err != nil { panic(err) } } }() return conn.LocalAddr().String(), nil } func TestDifferentParams(t *testing.T) { defer func() { if r := recover(); r == nil { t.Errorf("expected panic with different parameters") } }() Start("clientID2", ":0") } var MetricsCh = make(chan map[string]interface{}, 1) var Done = make(chan struct{}) func init() { url, err := startUDPServer(Done, func(b []byte) { m := map[string]interface{}{} if err := json.Unmarshal(b, &m); err != nil { panic(fmt.Sprintf("expected no error, but received %v", err)) } MetricsCh <- m }) if err != nil { panic(err) } _, err = Start("clientID", url) if err != nil { panic(err) } }
75
session-manager-plugin
aws
Go
package csm_test import ( "fmt" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/csm" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/aws-sdk-go/service/s3" ) func ExampleStart() { r, err := csm.Start("clientID", ":31000") if err != nil { panic(fmt.Errorf("failed starting CSM: %v", err)) } sess, err := session.NewSession(&aws.Config{}) if err != nil { panic(fmt.Errorf("failed loading session: %v", err)) } r.InjectHandlers(&sess.Handlers) client := s3.New(sess) client.GetObject(&s3.GetObjectInput{ Bucket: aws.String("bucket"), Key: aws.String("key"), }) // Pauses monitoring r.Pause() client.GetObject(&s3.GetObjectInput{ Bucket: aws.String("bucket"), Key: aws.String("key"), }) // Resume monitoring r.Continue() }
41
session-manager-plugin
aws
Go
package csm import ( "strconv" "time" "github.com/aws/aws-sdk-go/aws" ) type metricTime time.Time func (t metricTime) MarshalJSON() ([]byte, error) { ns := time.Duration(time.Time(t).UnixNano()) return []byte(strconv.FormatInt(int64(ns/time.Millisecond), 10)), nil } type metric struct { ClientID *string `json:"ClientId,omitempty"` API *string `json:"Api,omitempty"` Service *string `json:"Service,omitempty"` Timestamp *metricTime `json:"Timestamp,omitempty"` Type *string `json:"Type,omitempty"` Version *int `json:"Version,omitempty"` AttemptCount *int `json:"AttemptCount,omitempty"` Latency *int `json:"Latency,omitempty"` Fqdn *string `json:"Fqdn,omitempty"` UserAgent *string `json:"UserAgent,omitempty"` AttemptLatency *int `json:"AttemptLatency,omitempty"` SessionToken *string `json:"SessionToken,omitempty"` Region *string `json:"Region,omitempty"` AccessKey *string `json:"AccessKey,omitempty"` HTTPStatusCode *int `json:"HttpStatusCode,omitempty"` XAmzID2 *string `json:"XAmzId2,omitempty"` XAmzRequestID *string `json:"XAmznRequestId,omitempty"` AWSException *string `json:"AwsException,omitempty"` AWSExceptionMessage *string `json:"AwsExceptionMessage,omitempty"` SDKException *string `json:"SdkException,omitempty"` SDKExceptionMessage *string `json:"SdkExceptionMessage,omitempty"` FinalHTTPStatusCode *int `json:"FinalHttpStatusCode,omitempty"` FinalAWSException *string `json:"FinalAwsException,omitempty"` FinalAWSExceptionMessage *string `json:"FinalAwsExceptionMessage,omitempty"` FinalSDKException *string `json:"FinalSdkException,omitempty"` FinalSDKExceptionMessage *string `json:"FinalSdkExceptionMessage,omitempty"` DestinationIP *string `json:"DestinationIp,omitempty"` ConnectionReused *int `json:"ConnectionReused,omitempty"` AcquireConnectionLatency *int `json:"AcquireConnectionLatency,omitempty"` ConnectLatency *int `json:"ConnectLatency,omitempty"` RequestLatency *int `json:"RequestLatency,omitempty"` DNSLatency *int `json:"DnsLatency,omitempty"` TCPLatency *int `json:"TcpLatency,omitempty"` SSLLatency *int `json:"SslLatency,omitempty"` MaxRetriesExceeded *int `json:"MaxRetriesExceeded,omitempty"` } func (m *metric) TruncateFields() { m.ClientID = truncateString(m.ClientID, 255) m.UserAgent = truncateString(m.UserAgent, 256) m.AWSException = truncateString(m.AWSException, 128) m.AWSExceptionMessage = truncateString(m.AWSExceptionMessage, 512) m.SDKException = truncateString(m.SDKException, 128) m.SDKExceptionMessage = truncateString(m.SDKExceptionMessage, 512) m.FinalAWSException = truncateString(m.FinalAWSException, 128) m.FinalAWSExceptionMessage = truncateString(m.FinalAWSExceptionMessage, 512) m.FinalSDKException = truncateString(m.FinalSDKException, 128) m.FinalSDKExceptionMessage = truncateString(m.FinalSDKExceptionMessage, 512) } func truncateString(v *string, l int) *string { if v != nil && len(*v) > l { nv := (*v)[:l] return &nv } return v } func (m *metric) SetException(e metricException) { switch te := e.(type) { case awsException: m.AWSException = aws.String(te.exception) m.AWSExceptionMessage = aws.String(te.message) case sdkException: m.SDKException = aws.String(te.exception) m.SDKExceptionMessage = aws.String(te.message) } } func (m *metric) SetFinalException(e metricException) { switch te := e.(type) { case awsException: m.FinalAWSException = aws.String(te.exception) m.FinalAWSExceptionMessage = aws.String(te.message) case sdkException: m.FinalSDKException = aws.String(te.exception) m.FinalSDKExceptionMessage = aws.String(te.message) } }
110
session-manager-plugin
aws
Go
package csm import ( "sync/atomic" ) const ( runningEnum = iota pausedEnum ) var ( // MetricsChannelSize of metrics to hold in the channel MetricsChannelSize = 100 ) type metricChan struct { ch chan metric paused *int64 } func newMetricChan(size int) metricChan { return metricChan{ ch: make(chan metric, size), paused: new(int64), } } func (ch *metricChan) Pause() { atomic.StoreInt64(ch.paused, pausedEnum) } func (ch *metricChan) Continue() { atomic.StoreInt64(ch.paused, runningEnum) } func (ch *metricChan) IsPaused() bool { v := atomic.LoadInt64(ch.paused) return v == pausedEnum } // Push will push metrics to the metric channel if the channel // is not paused func (ch *metricChan) Push(m metric) bool { if ch.IsPaused() { return false } select { case ch.ch <- m: return true default: return false } }
56
session-manager-plugin
aws
Go
package csm import ( "testing" ) func TestMetricChanPush(t *testing.T) { ch := newMetricChan(5) defer close(ch.ch) pushed := ch.Push(metric{}) if !pushed { t.Errorf("expected metrics to be pushed") } if e, a := 1, len(ch.ch); e != a { t.Errorf("expected %d, but received %d", e, a) } } func TestMetricChanPauseContinue(t *testing.T) { ch := newMetricChan(5) defer close(ch.ch) ch.Pause() if !ch.IsPaused() { t.Errorf("expected to be paused, but did not pause properly") } ch.Continue() if ch.IsPaused() { t.Errorf("expected to be not paused, but did not continue properly") } pushed := ch.Push(metric{}) if !pushed { t.Errorf("expected metrics to be pushed") } if e, a := 1, len(ch.ch); e != a { t.Errorf("expected %d, but received %d", e, a) } } func TestMetricChanPushWhenPaused(t *testing.T) { ch := newMetricChan(5) defer close(ch.ch) ch.Pause() pushed := ch.Push(metric{}) if pushed { t.Errorf("expected metrics to not be pushed") } if e, a := 0, len(ch.ch); e != a { t.Errorf("expected %d, but received %d", e, a) } } func TestMetricChanNonBlocking(t *testing.T) { ch := newMetricChan(0) defer close(ch.ch) pushed := ch.Push(metric{}) if pushed { t.Errorf("expected metrics to be not pushed") } if e, a := 0, len(ch.ch); e != a { t.Errorf("expected %d, but received %d", e, a) } }
73
session-manager-plugin
aws
Go
package csm type metricException interface { Exception() string Message() string } type requestException struct { exception string message string } func (e requestException) Exception() string { return e.exception } func (e requestException) Message() string { return e.message } type awsException struct { requestException } type sdkException struct { requestException }
27
session-manager-plugin
aws
Go
// +build go1.7 package csm import ( "reflect" "testing" "github.com/aws/aws-sdk-go/aws" ) func TestTruncateString(t *testing.T) { cases := map[string]struct { Val string Len int Expect string }{ "no change": { Val: "123456789", Len: 10, Expect: "123456789", }, "max len": { Val: "1234567890", Len: 10, Expect: "1234567890", }, "too long": { Val: "12345678901", Len: 10, Expect: "1234567890", }, } for name, c := range cases { t.Run(name, func(t *testing.T) { v := c.Val actual := truncateString(&v, c.Len) if e, a := c.Val, v; e != a { t.Errorf("expect input value not to change, %v, %v", e, a) } if e, a := c.Expect, *actual; e != a { t.Errorf("expect %v, got %v", e, a) } }) } } func TestMetric_SetException(t *testing.T) { cases := map[string]struct { Exc metricException Expect metric Final bool }{ "aws exc": { Exc: awsException{ requestException{exception: "abc", message: "123"}, }, Expect: metric{ AWSException: aws.String("abc"), AWSExceptionMessage: aws.String("123"), }, }, "sdk exc": { Exc: sdkException{ requestException{exception: "abc", message: "123"}, }, Expect: metric{ SDKException: aws.String("abc"), SDKExceptionMessage: aws.String("123"), }, }, "final aws exc": { Exc: awsException{ requestException{exception: "abc", message: "123"}, }, Expect: metric{ FinalAWSException: aws.String("abc"), FinalAWSExceptionMessage: aws.String("123"), }, Final: true, }, "final sdk exc": { Exc: sdkException{ requestException{exception: "abc", message: "123"}, }, Expect: metric{ FinalSDKException: aws.String("abc"), FinalSDKExceptionMessage: aws.String("123"), }, Final: true, }, } for name, c := range cases { t.Run(name, func(t *testing.T) { var m metric if c.Final { m.SetFinalException(c.Exc) } else { m.SetException(c.Exc) } if e, a := c.Expect, m; !reflect.DeepEqual(e, a) { t.Errorf("expect:\n%#v\nactual:\n%#v\n", e, a) } }) } }
107
session-manager-plugin
aws
Go
package csm import ( "encoding/json" "net" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/request" ) // Reporter will gather metrics of API requests made and // send those metrics to the CSM endpoint. type Reporter struct { clientID string url string conn net.Conn metricsCh metricChan done chan struct{} } var ( sender *Reporter ) func connect(url string) error { const network = "udp" if err := sender.connect(network, url); err != nil { return err } if sender.done == nil { sender.done = make(chan struct{}) go sender.start() } return nil } func newReporter(clientID, url string) *Reporter { return &Reporter{ clientID: clientID, url: url, metricsCh: newMetricChan(MetricsChannelSize), } } func (rep *Reporter) sendAPICallAttemptMetric(r *request.Request) { if rep == nil { return } now := time.Now() creds, _ := r.Config.Credentials.Get() m := metric{ ClientID: aws.String(rep.clientID), API: aws.String(r.Operation.Name), Service: aws.String(r.ClientInfo.ServiceID), Timestamp: (*metricTime)(&now), UserAgent: aws.String(r.HTTPRequest.Header.Get("User-Agent")), Region: r.Config.Region, Type: aws.String("ApiCallAttempt"), Version: aws.Int(1), XAmzRequestID: aws.String(r.RequestID), AttemptLatency: aws.Int(int(now.Sub(r.AttemptTime).Nanoseconds() / int64(time.Millisecond))), AccessKey: aws.String(creds.AccessKeyID), } if r.HTTPResponse != nil { m.HTTPStatusCode = aws.Int(r.HTTPResponse.StatusCode) } if r.Error != nil { if awserr, ok := r.Error.(awserr.Error); ok { m.SetException(getMetricException(awserr)) } } m.TruncateFields() rep.metricsCh.Push(m) } func getMetricException(err awserr.Error) metricException { msg := err.Error() code := err.Code() switch code { case request.ErrCodeRequestError, request.ErrCodeSerialization, request.CanceledErrorCode: return sdkException{ requestException{exception: code, message: msg}, } default: return awsException{ requestException{exception: code, message: msg}, } } } func (rep *Reporter) sendAPICallMetric(r *request.Request) { if rep == nil { return } now := time.Now() m := metric{ ClientID: aws.String(rep.clientID), API: aws.String(r.Operation.Name), Service: aws.String(r.ClientInfo.ServiceID), Timestamp: (*metricTime)(&now), UserAgent: aws.String(r.HTTPRequest.Header.Get("User-Agent")), Type: aws.String("ApiCall"), AttemptCount: aws.Int(r.RetryCount + 1), Region: r.Config.Region, Latency: aws.Int(int(time.Since(r.Time) / time.Millisecond)), XAmzRequestID: aws.String(r.RequestID), MaxRetriesExceeded: aws.Int(boolIntValue(r.RetryCount >= r.MaxRetries())), } if r.HTTPResponse != nil { m.FinalHTTPStatusCode = aws.Int(r.HTTPResponse.StatusCode) } if r.Error != nil { if awserr, ok := r.Error.(awserr.Error); ok { m.SetFinalException(getMetricException(awserr)) } } m.TruncateFields() // TODO: Probably want to figure something out for logging dropped // metrics rep.metricsCh.Push(m) } func (rep *Reporter) connect(network, url string) error { if rep.conn != nil { rep.conn.Close() } conn, err := net.Dial(network, url) if err != nil { return awserr.New("UDPError", "Could not connect", err) } rep.conn = conn return nil } func (rep *Reporter) close() { if rep.done != nil { close(rep.done) } rep.metricsCh.Pause() } func (rep *Reporter) start() { defer func() { rep.metricsCh.Pause() }() for { select { case <-rep.done: rep.done = nil return case m := <-rep.metricsCh.ch: // TODO: What to do with this error? Probably should just log b, err := json.Marshal(m) if err != nil { continue } rep.conn.Write(b) } } } // Pause will pause the metric channel preventing any new metrics from being // added. It is safe to call concurrently with other calls to Pause, but if // called concurently with Continue can lead to unexpected state. func (rep *Reporter) Pause() { lock.Lock() defer lock.Unlock() if rep == nil { return } rep.close() } // Continue will reopen the metric channel and allow for monitoring to be // resumed. It is safe to call concurrently with other calls to Continue, but // if called concurently with Pause can lead to unexpected state. func (rep *Reporter) Continue() { lock.Lock() defer lock.Unlock() if rep == nil { return } if !rep.metricsCh.IsPaused() { return } rep.metricsCh.Continue() } // Client side metric handler names const ( APICallMetricHandlerName = "awscsm.SendAPICallMetric" APICallAttemptMetricHandlerName = "awscsm.SendAPICallAttemptMetric" ) // InjectHandlers will will enable client side metrics and inject the proper // handlers to handle how metrics are sent. // // InjectHandlers is NOT safe to call concurrently. Calling InjectHandlers // multiple times may lead to unexpected behavior, (e.g. duplicate metrics). // // // Start must be called in order to inject the correct handlers // r, err := csm.Start("clientID", "127.0.0.1:8094") // if err != nil { // panic(fmt.Errorf("expected no error, but received %v", err)) // } // // sess := session.NewSession() // r.InjectHandlers(&sess.Handlers) // // // create a new service client with our client side metric session // svc := s3.New(sess) func (rep *Reporter) InjectHandlers(handlers *request.Handlers) { if rep == nil { return } handlers.Complete.PushFrontNamed(request.NamedHandler{ Name: APICallMetricHandlerName, Fn: rep.sendAPICallMetric, }) handlers.CompleteAttempt.PushFrontNamed(request.NamedHandler{ Name: APICallAttemptMetricHandlerName, Fn: rep.sendAPICallAttemptMetric, }) } // boolIntValue return 1 for true and 0 for false. func boolIntValue(b bool) int { if b { return 1 } return 0 }
265
session-manager-plugin
aws
Go
package csm import ( "net/http" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/client/metadata" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/defaults" "github.com/aws/aws-sdk-go/aws/request" ) func TestMaxRetriesExceeded(t *testing.T) { md := metadata.ClientInfo{ Endpoint: "http://127.0.0.1", } cfg := aws.Config{ Region: aws.String("foo"), Credentials: credentials.NewStaticCredentials("", "", ""), } op := &request.Operation{} cases := []struct { name string httpStatusCode int expectedMaxRetriesValue int expectedMetrics int }{ { name: "max retry reached", httpStatusCode: http.StatusBadGateway, expectedMaxRetriesValue: 1, }, { name: "status ok", httpStatusCode: http.StatusOK, expectedMaxRetriesValue: 0, }, } for _, c := range cases { r := request.New(cfg, md, defaults.Handlers(), client.DefaultRetryer{NumMaxRetries: 2}, op, nil, nil) reporter := newReporter("", "") r.Handlers.Send.Clear() reporter.InjectHandlers(&r.Handlers) r.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &http.Response{ StatusCode: c.httpStatusCode, } }) r.Send() for { m := <-reporter.metricsCh.ch if *m.Type != "ApiCall" { // ignore non-ApiCall metrics since MaxRetriesExceeded is only on ApiCall events continue } if val := *m.MaxRetriesExceeded; val != c.expectedMaxRetriesValue { t.Errorf("%s: expected %d, but received %d", c.name, c.expectedMaxRetriesValue, val) } break } } }
73
session-manager-plugin
aws
Go
// +build go1.7 package csm_test import ( "context" "fmt" "net/http" "net/http/httptest" "sort" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/client/metadata" "github.com/aws/aws-sdk-go/aws/csm" "github.com/aws/aws-sdk-go/aws/request" v4 "github.com/aws/aws-sdk-go/aws/signer/v4" "github.com/aws/aws-sdk-go/awstesting/unit" "github.com/aws/aws-sdk-go/private/protocol/jsonrpc" ) func TestReportingMetrics(t *testing.T) { sess := unit.Session.Copy(&aws.Config{ SleepDelay: func(time.Duration) {}, }) sess.Handlers.Validate.Clear() sess.Handlers.Sign.Clear() sess.Handlers.Send.Clear() reporter := csm.Get() if reporter == nil { t.Errorf("expected non-nil reporter") } reporter.InjectHandlers(&sess.Handlers) cases := map[string]struct { Request *request.Request ExpectMetrics []map[string]interface{} }{ "successful request": { Request: func() *request.Request { md := metadata.ClientInfo{} op := &request.Operation{Name: "OperationName"} req := request.New(*sess.Config, md, sess.Handlers, client.DefaultRetryer{NumMaxRetries: 3}, op, nil, nil) req.Handlers.Send.PushBack(func(r *request.Request) { req.HTTPResponse = &http.Response{ StatusCode: 200, Header: http.Header{}, } }) return req }(), ExpectMetrics: []map[string]interface{}{ { "Type": "ApiCallAttempt", "HttpStatusCode": float64(200), }, { "Type": "ApiCall", "FinalHttpStatusCode": float64(200), }, }, }, "failed request, no retry": { Request: func() *request.Request { md := metadata.ClientInfo{} op := &request.Operation{Name: "OperationName"} req := request.New(*sess.Config, md, sess.Handlers, client.DefaultRetryer{NumMaxRetries: 3}, op, nil, nil) req.Handlers.Send.PushBack(func(r *request.Request) { req.HTTPResponse = &http.Response{ StatusCode: 400, Header: http.Header{}, } req.Retryable = aws.Bool(false) req.Error = awserr.New("Error", "Message", nil) }) return req }(), ExpectMetrics: []map[string]interface{}{ { "Type": "ApiCallAttempt", "HttpStatusCode": float64(400), "AwsException": "Error", "AwsExceptionMessage": "Error: Message", }, { "Type": "ApiCall", "FinalHttpStatusCode": float64(400), "FinalAwsException": "Error", "FinalAwsExceptionMessage": "Error: Message", "AttemptCount": float64(1), }, }, }, "failed request, with retry": { Request: func() *request.Request { md := metadata.ClientInfo{} op := &request.Operation{Name: "OperationName"} req := request.New(*sess.Config, md, sess.Handlers, client.DefaultRetryer{NumMaxRetries: 1}, op, nil, nil) resps := []*http.Response{ { StatusCode: 500, Header: http.Header{}, }, { StatusCode: 500, Header: http.Header{}, }, } req.Handlers.Send.PushBack(func(r *request.Request) { req.HTTPResponse = resps[0] resps = resps[1:] }) return req }(), ExpectMetrics: []map[string]interface{}{ { "Type": "ApiCallAttempt", "HttpStatusCode": float64(500), "AwsException": "UnknownError", "AwsExceptionMessage": "UnknownError: unknown error", }, { "Type": "ApiCallAttempt", "HttpStatusCode": float64(500), "AwsException": "UnknownError", "AwsExceptionMessage": "UnknownError: unknown error", }, { "Type": "ApiCall", "FinalHttpStatusCode": float64(500), "FinalAwsException": "UnknownError", "FinalAwsExceptionMessage": "UnknownError: unknown error", "AttemptCount": float64(2), }, }, }, "success request, with retry": { Request: func() *request.Request { md := metadata.ClientInfo{} op := &request.Operation{Name: "OperationName"} req := request.New(*sess.Config, md, sess.Handlers, client.DefaultRetryer{NumMaxRetries: 3}, op, nil, nil) errs := []error{ awserr.New("AWSError", "aws error", nil), awserr.New(request.ErrCodeRequestError, "sdk error", nil), nil, } resps := []*http.Response{ { StatusCode: 500, Header: http.Header{}, }, { StatusCode: 500, Header: http.Header{}, }, { StatusCode: 200, Header: http.Header{}, }, } req.Handlers.Send.PushBack(func(r *request.Request) { req.HTTPResponse = resps[0] resps = resps[1:] req.Error = errs[0] errs = errs[1:] }) return req }(), ExpectMetrics: []map[string]interface{}{ { "Type": "ApiCallAttempt", "AwsException": "AWSError", "AwsExceptionMessage": "AWSError: aws error", "HttpStatusCode": float64(500), }, { "Type": "ApiCallAttempt", "SdkException": request.ErrCodeRequestError, "SdkExceptionMessage": request.ErrCodeRequestError + ": sdk error", "HttpStatusCode": float64(500), }, { "Type": "ApiCallAttempt", "AwsException": nil, "AwsExceptionMessage": nil, "SdkException": nil, "SdkExceptionMessage": nil, "HttpStatusCode": float64(200), }, { "Type": "ApiCall", "FinalHttpStatusCode": float64(200), "FinalAwsException": nil, "FinalAwsExceptionMessage": nil, "FinalSdkException": nil, "FinalSdkExceptionMessage": nil, "AttemptCount": float64(3), }, }, }, } for name, c := range cases { t.Run(name, func(t *testing.T) { ctx, cancelFn := context.WithTimeout(context.Background(), time.Second) defer cancelFn() c.Request.Send() for i := 0; i < len(c.ExpectMetrics); i++ { select { case m := <-csm.MetricsCh: for ek, ev := range c.ExpectMetrics[i] { if ev == nil { // must not be set if _, ok := m[ek]; ok { t.Errorf("%d, expect %v metric member, not to be set, %v", i, ek, m[ek]) } continue } if _, ok := m[ek]; !ok { t.Errorf("%d, expect %v metric member, keys: %v", i, ek, keys(m)) } if e, a := ev, m[ek]; e != a { t.Errorf("%d, expect %v:%v(%T), metric value, got %v(%T)", i, ek, e, e, a, a) } } case <-ctx.Done(): t.Errorf("timeout waiting for metrics") return } } var extraMetrics []map[string]interface{} Loop: for { select { case m := <-csm.MetricsCh: extraMetrics = append(extraMetrics, m) default: break Loop } } if len(extraMetrics) != 0 { t.Fatalf("unexpected metrics, %#v", extraMetrics) } }) } } type mockService struct { *client.Client } type input struct{} type output struct{} func (s *mockService) Request(i input) *request.Request { op := &request.Operation{ Name: "foo", HTTPMethod: "POST", HTTPPath: "/", } o := output{} req := s.NewRequest(op, &i, &o) return req } func BenchmarkWithCSM(b *testing.B) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.Write([]byte(fmt.Sprintf("{}"))) })) defer server.Close() cfg := aws.Config{ Endpoint: aws.String(server.URL), } sess := unit.Session.Copy(&cfg) r := csm.Get() r.InjectHandlers(&sess.Handlers) c := sess.ClientConfig("id", &cfg) svc := mockService{ client.New( *c.Config, metadata.ClientInfo{ ServiceName: "service", ServiceID: "id", SigningName: "signing", SigningRegion: "region", Endpoint: server.URL, APIVersion: "0", JSONVersion: "1.1", TargetPrefix: "prefix", }, c.Handlers, ), } svc.Handlers.Sign.PushBackNamed(v4.SignRequestHandler) svc.Handlers.Build.PushBackNamed(jsonrpc.BuildHandler) svc.Handlers.Unmarshal.PushBackNamed(jsonrpc.UnmarshalHandler) svc.Handlers.UnmarshalMeta.PushBackNamed(jsonrpc.UnmarshalMetaHandler) svc.Handlers.UnmarshalError.PushBackNamed(jsonrpc.UnmarshalErrorHandler) for i := 0; i < b.N; i++ { req := svc.Request(input{}) req.Send() } } func BenchmarkWithCSMNoUDPConnection(b *testing.B) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.Write([]byte(fmt.Sprintf("{}"))) })) defer server.Close() cfg := aws.Config{ Endpoint: aws.String(server.URL), } sess := unit.Session.Copy(&cfg) r := csm.Get() r.Pause() r.InjectHandlers(&sess.Handlers) defer r.Pause() c := sess.ClientConfig("id", &cfg) svc := mockService{ client.New( *c.Config, metadata.ClientInfo{ ServiceName: "service", ServiceID: "id", SigningName: "signing", SigningRegion: "region", Endpoint: server.URL, APIVersion: "0", JSONVersion: "1.1", TargetPrefix: "prefix", }, c.Handlers, ), } svc.Handlers.Sign.PushBackNamed(v4.SignRequestHandler) svc.Handlers.Build.PushBackNamed(jsonrpc.BuildHandler) svc.Handlers.Unmarshal.PushBackNamed(jsonrpc.UnmarshalHandler) svc.Handlers.UnmarshalMeta.PushBackNamed(jsonrpc.UnmarshalMetaHandler) svc.Handlers.UnmarshalError.PushBackNamed(jsonrpc.UnmarshalErrorHandler) for i := 0; i < b.N; i++ { req := svc.Request(input{}) req.Send() } } func BenchmarkWithoutCSM(b *testing.B) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.Write([]byte(fmt.Sprintf("{}"))) })) defer server.Close() cfg := aws.Config{ Endpoint: aws.String(server.URL), } sess := unit.Session.Copy(&cfg) c := sess.ClientConfig("id", &cfg) svc := mockService{ client.New( *c.Config, metadata.ClientInfo{ ServiceName: "service", ServiceID: "id", SigningName: "signing", SigningRegion: "region", Endpoint: server.URL, APIVersion: "0", JSONVersion: "1.1", TargetPrefix: "prefix", }, c.Handlers, ), } svc.Handlers.Sign.PushBackNamed(v4.SignRequestHandler) svc.Handlers.Build.PushBackNamed(jsonrpc.BuildHandler) svc.Handlers.Unmarshal.PushBackNamed(jsonrpc.UnmarshalHandler) svc.Handlers.UnmarshalMeta.PushBackNamed(jsonrpc.UnmarshalMetaHandler) svc.Handlers.UnmarshalError.PushBackNamed(jsonrpc.UnmarshalErrorHandler) for i := 0; i < b.N; i++ { req := svc.Request(input{}) req.Send() } } func keys(m map[string]interface{}) []string { ks := make([]string, 0, len(m)) for k := range m { ks = append(ks, k) } sort.Strings(ks) return ks }
418
session-manager-plugin
aws
Go
// Package defaults is a collection of helpers to retrieve the SDK's default // configuration and handlers. // // Generally this package shouldn't be used directly, but session.Session // instead. This package is useful when you need to reset the defaults // of a session or service client to the SDK defaults before setting // additional parameters. package defaults import ( "fmt" "net" "net/http" "net/url" "os" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/corehandlers" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/credentials/ec2rolecreds" "github.com/aws/aws-sdk-go/aws/credentials/endpointcreds" "github.com/aws/aws-sdk-go/aws/ec2metadata" "github.com/aws/aws-sdk-go/aws/endpoints" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/internal/shareddefaults" ) // A Defaults provides a collection of default values for SDK clients. type Defaults struct { Config *aws.Config Handlers request.Handlers } // Get returns the SDK's default values with Config and handlers pre-configured. func Get() Defaults { cfg := Config() handlers := Handlers() cfg.Credentials = CredChain(cfg, handlers) return Defaults{ Config: cfg, Handlers: handlers, } } // Config returns the default configuration without credentials. // To retrieve a config with credentials also included use // `defaults.Get().Config` instead. // // Generally you shouldn't need to use this method directly, but // is available if you need to reset the configuration of an // existing service client or session. func Config() *aws.Config { return aws.NewConfig(). WithCredentials(credentials.AnonymousCredentials). WithRegion(os.Getenv("AWS_REGION")). WithHTTPClient(http.DefaultClient). WithMaxRetries(aws.UseServiceDefaultRetries). WithLogger(aws.NewDefaultLogger()). WithLogLevel(aws.LogOff). WithEndpointResolver(endpoints.DefaultResolver()) } // Handlers returns the default request handlers. // // Generally you shouldn't need to use this method directly, but // is available if you need to reset the request handlers of an // existing service client or session. func Handlers() request.Handlers { var handlers request.Handlers handlers.Validate.PushBackNamed(corehandlers.ValidateEndpointHandler) handlers.Validate.AfterEachFn = request.HandlerListStopOnError handlers.Build.PushBackNamed(corehandlers.SDKVersionUserAgentHandler) handlers.Build.PushBackNamed(corehandlers.AddHostExecEnvUserAgentHander) handlers.Build.AfterEachFn = request.HandlerListStopOnError handlers.Sign.PushBackNamed(corehandlers.BuildContentLengthHandler) handlers.Send.PushBackNamed(corehandlers.ValidateReqSigHandler) handlers.Send.PushBackNamed(corehandlers.SendHandler) handlers.AfterRetry.PushBackNamed(corehandlers.AfterRetryHandler) handlers.ValidateResponse.PushBackNamed(corehandlers.ValidateResponseHandler) return handlers } // CredChain returns the default credential chain. // // Generally you shouldn't need to use this method directly, but // is available if you need to reset the credentials of an // existing service client or session's Config. func CredChain(cfg *aws.Config, handlers request.Handlers) *credentials.Credentials { return credentials.NewCredentials(&credentials.ChainProvider{ VerboseErrors: aws.BoolValue(cfg.CredentialsChainVerboseErrors), Providers: CredProviders(cfg, handlers), }) } // CredProviders returns the slice of providers used in // the default credential chain. // // For applications that need to use some other provider (for example use // different environment variables for legacy reasons) but still fall back // on the default chain of providers. This allows that default chaint to be // automatically updated func CredProviders(cfg *aws.Config, handlers request.Handlers) []credentials.Provider { return []credentials.Provider{ &credentials.EnvProvider{}, &credentials.SharedCredentialsProvider{Filename: "", Profile: ""}, RemoteCredProvider(*cfg, handlers), } } const ( httpProviderAuthorizationEnvVar = "AWS_CONTAINER_AUTHORIZATION_TOKEN" httpProviderEnvVar = "AWS_CONTAINER_CREDENTIALS_FULL_URI" ) // RemoteCredProvider returns a credentials provider for the default remote // endpoints such as EC2 or ECS Roles. func RemoteCredProvider(cfg aws.Config, handlers request.Handlers) credentials.Provider { if u := os.Getenv(httpProviderEnvVar); len(u) > 0 { return localHTTPCredProvider(cfg, handlers, u) } if uri := os.Getenv(shareddefaults.ECSCredsProviderEnvVar); len(uri) > 0 { u := fmt.Sprintf("%s%s", shareddefaults.ECSContainerCredentialsURI, uri) return httpCredProvider(cfg, handlers, u) } return ec2RoleProvider(cfg, handlers) } var lookupHostFn = net.LookupHost func isLoopbackHost(host string) (bool, error) { ip := net.ParseIP(host) if ip != nil { return ip.IsLoopback(), nil } // Host is not an ip, perform lookup addrs, err := lookupHostFn(host) if err != nil { return false, err } for _, addr := range addrs { if !net.ParseIP(addr).IsLoopback() { return false, nil } } return true, nil } func localHTTPCredProvider(cfg aws.Config, handlers request.Handlers, u string) credentials.Provider { var errMsg string parsed, err := url.Parse(u) if err != nil { errMsg = fmt.Sprintf("invalid URL, %v", err) } else { host := aws.URLHostname(parsed) if len(host) == 0 { errMsg = "unable to parse host from local HTTP cred provider URL" } else if isLoopback, loopbackErr := isLoopbackHost(host); loopbackErr != nil { errMsg = fmt.Sprintf("failed to resolve host %q, %v", host, loopbackErr) } else if !isLoopback { errMsg = fmt.Sprintf("invalid endpoint host, %q, only loopback hosts are allowed.", host) } } if len(errMsg) > 0 { if cfg.Logger != nil { cfg.Logger.Log("Ignoring, HTTP credential provider", errMsg, err) } return credentials.ErrorProvider{ Err: awserr.New("CredentialsEndpointError", errMsg, err), ProviderName: endpointcreds.ProviderName, } } return httpCredProvider(cfg, handlers, u) } func httpCredProvider(cfg aws.Config, handlers request.Handlers, u string) credentials.Provider { return endpointcreds.NewProviderClient(cfg, handlers, u, func(p *endpointcreds.Provider) { p.ExpiryWindow = 5 * time.Minute p.AuthorizationToken = os.Getenv(httpProviderAuthorizationEnvVar) }, ) } func ec2RoleProvider(cfg aws.Config, handlers request.Handlers) credentials.Provider { resolver := cfg.EndpointResolver if resolver == nil { resolver = endpoints.DefaultResolver() } e, _ := resolver.EndpointFor(endpoints.Ec2metadataServiceID, "") return &ec2rolecreds.EC2RoleProvider{ Client: ec2metadata.NewClient(cfg, handlers, e.URL, e.SigningRegion), ExpiryWindow: 5 * time.Minute, } }
208
session-manager-plugin
aws
Go
package defaults import ( "fmt" "os" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/credentials/ec2rolecreds" "github.com/aws/aws-sdk-go/aws/credentials/endpointcreds" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/internal/sdktesting" "github.com/aws/aws-sdk-go/internal/shareddefaults" ) func TestHTTPCredProvider(t *testing.T) { origFn := lookupHostFn defer func() { lookupHostFn = origFn }() lookupHostFn = func(host string) ([]string, error) { m := map[string]struct { Addrs []string Err error }{ "localhost": {Addrs: []string{"::1", "127.0.0.1"}}, "actuallylocal": {Addrs: []string{"127.0.0.2"}}, "notlocal": {Addrs: []string{"::1", "127.0.0.1", "192.168.1.10"}}, "www.example.com": {Addrs: []string{"10.10.10.10"}}, } h, ok := m[host] if !ok { t.Fatalf("unknown host in test, %v", host) return nil, fmt.Errorf("unknown host") } return h.Addrs, h.Err } cases := []struct { Host string AuthToken string Fail bool }{ {Host: "localhost", Fail: false}, {Host: "actuallylocal", Fail: false}, {Host: "127.0.0.1", Fail: false}, {Host: "127.1.1.1", Fail: false}, {Host: "[::1]", Fail: false}, {Host: "www.example.com", Fail: true}, {Host: "169.254.170.2", Fail: true}, {Host: "localhost", Fail: false, AuthToken: "Basic abc123"}, } restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() for i, c := range cases { u := fmt.Sprintf("http://%s/abc/123", c.Host) os.Setenv(httpProviderEnvVar, u) os.Setenv(httpProviderAuthorizationEnvVar, c.AuthToken) provider := RemoteCredProvider(aws.Config{}, request.Handlers{}) if provider == nil { t.Fatalf("%d, expect provider not to be nil, but was", i) } if c.Fail { creds, err := provider.Retrieve() if err == nil { t.Fatalf("%d, expect error but got none", i) } else { aerr := err.(awserr.Error) if e, a := "CredentialsEndpointError", aerr.Code(); e != a { t.Errorf("%d, expect %s error code, got %s", i, e, a) } } if e, a := endpointcreds.ProviderName, creds.ProviderName; e != a { t.Errorf("%d, expect %s provider name got %s", i, e, a) } } else { httpProvider := provider.(*endpointcreds.Provider) if e, a := u, httpProvider.Client.Endpoint; e != a { t.Errorf("%d, expect %q endpoint, got %q", i, e, a) } if e, a := c.AuthToken, httpProvider.AuthorizationToken; e != a { t.Errorf("%d, expect %q auth token, got %q", i, e, a) } } } } func TestECSCredProvider(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() os.Setenv(shareddefaults.ECSCredsProviderEnvVar, "/abc/123") provider := RemoteCredProvider(aws.Config{}, request.Handlers{}) if provider == nil { t.Fatalf("expect provider not to be nil, but was") } httpProvider := provider.(*endpointcreds.Provider) if httpProvider == nil { t.Fatalf("expect provider not to be nil, but was") } if e, a := "http://169.254.170.2/abc/123", httpProvider.Client.Endpoint; e != a { t.Errorf("expect %q endpoint, got %q", e, a) } } func TestDefaultEC2RoleProvider(t *testing.T) { provider := RemoteCredProvider(aws.Config{}, request.Handlers{}) if provider == nil { t.Fatalf("expect provider not to be nil, but was") } ec2Provider := provider.(*ec2rolecreds.EC2RoleProvider) if ec2Provider == nil { t.Fatalf("expect provider not to be nil, but was") } if e, a := "http://169.254.169.254", ec2Provider.Client.Endpoint; e != a { t.Errorf("expect %q endpoint, got %q", e, a) } }
127
session-manager-plugin
aws
Go
package defaults import ( "github.com/aws/aws-sdk-go/internal/shareddefaults" ) // SharedCredentialsFilename returns the SDK's default file path // for the shared credentials file. // // Builds the shared config file path based on the OS's platform. // // - Linux/Unix: $HOME/.aws/credentials // - Windows: %USERPROFILE%\.aws\credentials func SharedCredentialsFilename() string { return shareddefaults.SharedCredentialsFilename() } // SharedConfigFilename returns the SDK's default file path for // the shared config file. // // Builds the shared config file path based on the OS's platform. // // - Linux/Unix: $HOME/.aws/config // - Windows: %USERPROFILE%\.aws\config func SharedConfigFilename() string { return shareddefaults.SharedConfigFilename() }
28
session-manager-plugin
aws
Go
package ec2metadata import ( "encoding/json" "fmt" "net/http" "strconv" "strings" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/internal/sdkuri" ) // getToken uses the duration to return a token for EC2 metadata service, // or an error if the request failed. func (c *EC2Metadata) getToken(ctx aws.Context, duration time.Duration) (tokenOutput, error) { op := &request.Operation{ Name: "GetToken", HTTPMethod: "PUT", HTTPPath: "/latest/api/token", } var output tokenOutput req := c.NewRequest(op, nil, &output) req.SetContext(ctx) // remove the fetch token handler from the request handlers to avoid infinite recursion req.Handlers.Sign.RemoveByName(fetchTokenHandlerName) // Swap the unmarshalMetadataHandler with unmarshalTokenHandler on this request. req.Handlers.Unmarshal.Swap(unmarshalMetadataHandlerName, unmarshalTokenHandler) ttl := strconv.FormatInt(int64(duration/time.Second), 10) req.HTTPRequest.Header.Set(ttlHeader, ttl) err := req.Send() // Errors with bad request status should be returned. if err != nil { err = awserr.NewRequestFailure( awserr.New(req.HTTPResponse.Status, http.StatusText(req.HTTPResponse.StatusCode), err), req.HTTPResponse.StatusCode, req.RequestID) } return output, err } // GetMetadata uses the path provided to request information from the EC2 // instance metadata service. The content will be returned as a string, or // error if the request failed. func (c *EC2Metadata) GetMetadata(p string) (string, error) { return c.GetMetadataWithContext(aws.BackgroundContext(), p) } // GetMetadataWithContext uses the path provided to request information from the EC2 // instance metadata service. The content will be returned as a string, or // error if the request failed. func (c *EC2Metadata) GetMetadataWithContext(ctx aws.Context, p string) (string, error) { op := &request.Operation{ Name: "GetMetadata", HTTPMethod: "GET", HTTPPath: sdkuri.PathJoin("/latest/meta-data", p), } output := &metadataOutput{} req := c.NewRequest(op, nil, output) req.SetContext(ctx) err := req.Send() return output.Content, err } // GetUserData returns the userdata that was configured for the service. If // there is no user-data setup for the EC2 instance a "NotFoundError" error // code will be returned. func (c *EC2Metadata) GetUserData() (string, error) { return c.GetUserDataWithContext(aws.BackgroundContext()) } // GetUserDataWithContext returns the userdata that was configured for the service. If // there is no user-data setup for the EC2 instance a "NotFoundError" error // code will be returned. func (c *EC2Metadata) GetUserDataWithContext(ctx aws.Context) (string, error) { op := &request.Operation{ Name: "GetUserData", HTTPMethod: "GET", HTTPPath: "/latest/user-data", } output := &metadataOutput{} req := c.NewRequest(op, nil, output) req.SetContext(ctx) err := req.Send() return output.Content, err } // GetDynamicData uses the path provided to request information from the EC2 // instance metadata service for dynamic data. The content will be returned // as a string, or error if the request failed. func (c *EC2Metadata) GetDynamicData(p string) (string, error) { return c.GetDynamicDataWithContext(aws.BackgroundContext(), p) } // GetDynamicDataWithContext uses the path provided to request information from the EC2 // instance metadata service for dynamic data. The content will be returned // as a string, or error if the request failed. func (c *EC2Metadata) GetDynamicDataWithContext(ctx aws.Context, p string) (string, error) { op := &request.Operation{ Name: "GetDynamicData", HTTPMethod: "GET", HTTPPath: sdkuri.PathJoin("/latest/dynamic", p), } output := &metadataOutput{} req := c.NewRequest(op, nil, output) req.SetContext(ctx) err := req.Send() return output.Content, err } // GetInstanceIdentityDocument retrieves an identity document describing an // instance. Error is returned if the request fails or is unable to parse // the response. func (c *EC2Metadata) GetInstanceIdentityDocument() (EC2InstanceIdentityDocument, error) { return c.GetInstanceIdentityDocumentWithContext(aws.BackgroundContext()) } // GetInstanceIdentityDocumentWithContext retrieves an identity document describing an // instance. Error is returned if the request fails or is unable to parse // the response. func (c *EC2Metadata) GetInstanceIdentityDocumentWithContext(ctx aws.Context) (EC2InstanceIdentityDocument, error) { resp, err := c.GetDynamicDataWithContext(ctx, "instance-identity/document") if err != nil { return EC2InstanceIdentityDocument{}, awserr.New("EC2MetadataRequestError", "failed to get EC2 instance identity document", err) } doc := EC2InstanceIdentityDocument{} if err := json.NewDecoder(strings.NewReader(resp)).Decode(&doc); err != nil { return EC2InstanceIdentityDocument{}, awserr.New(request.ErrCodeSerialization, "failed to decode EC2 instance identity document", err) } return doc, nil } // IAMInfo retrieves IAM info from the metadata API func (c *EC2Metadata) IAMInfo() (EC2IAMInfo, error) { return c.IAMInfoWithContext(aws.BackgroundContext()) } // IAMInfoWithContext retrieves IAM info from the metadata API func (c *EC2Metadata) IAMInfoWithContext(ctx aws.Context) (EC2IAMInfo, error) { resp, err := c.GetMetadataWithContext(ctx, "iam/info") if err != nil { return EC2IAMInfo{}, awserr.New("EC2MetadataRequestError", "failed to get EC2 IAM info", err) } info := EC2IAMInfo{} if err := json.NewDecoder(strings.NewReader(resp)).Decode(&info); err != nil { return EC2IAMInfo{}, awserr.New(request.ErrCodeSerialization, "failed to decode EC2 IAM info", err) } if info.Code != "Success" { errMsg := fmt.Sprintf("failed to get EC2 IAM Info (%s)", info.Code) return EC2IAMInfo{}, awserr.New("EC2MetadataError", errMsg, nil) } return info, nil } // Region returns the region the instance is running in. func (c *EC2Metadata) Region() (string, error) { return c.RegionWithContext(aws.BackgroundContext()) } // RegionWithContext returns the region the instance is running in. func (c *EC2Metadata) RegionWithContext(ctx aws.Context) (string, error) { ec2InstanceIdentityDocument, err := c.GetInstanceIdentityDocumentWithContext(ctx) if err != nil { return "", err } // extract region from the ec2InstanceIdentityDocument region := ec2InstanceIdentityDocument.Region if len(region) == 0 { return "", awserr.New("EC2MetadataError", "invalid region received for ec2metadata instance", nil) } // returns region return region, nil } // Available returns if the application has access to the EC2 Metadata service. // Can be used to determine if application is running within an EC2 Instance and // the metadata service is available. func (c *EC2Metadata) Available() bool { return c.AvailableWithContext(aws.BackgroundContext()) } // AvailableWithContext returns if the application has access to the EC2 Metadata service. // Can be used to determine if application is running within an EC2 Instance and // the metadata service is available. func (c *EC2Metadata) AvailableWithContext(ctx aws.Context) bool { if _, err := c.GetMetadataWithContext(ctx, "instance-id"); err != nil { return false } return true } // An EC2IAMInfo provides the shape for unmarshaling // an IAM info from the metadata API type EC2IAMInfo struct { Code string LastUpdated time.Time InstanceProfileArn string InstanceProfileID string } // An EC2InstanceIdentityDocument provides the shape for unmarshaling // an instance identity document type EC2InstanceIdentityDocument struct { DevpayProductCodes []string `json:"devpayProductCodes"` MarketplaceProductCodes []string `json:"marketplaceProductCodes"` AvailabilityZone string `json:"availabilityZone"` PrivateIP string `json:"privateIp"` Version string `json:"version"` Region string `json:"region"` InstanceID string `json:"instanceId"` BillingProducts []string `json:"billingProducts"` InstanceType string `json:"instanceType"` AccountID string `json:"accountId"` PendingTime time.Time `json:"pendingTime"` ImageID string `json:"imageId"` KernelID string `json:"kernelId"` RamdiskID string `json:"ramdiskId"` Architecture string `json:"architecture"` }
251
session-manager-plugin
aws
Go
// +build go1.7 package ec2metadata_test import ( "bytes" "fmt" "io" "io/ioutil" "net/http" "net/http/httptest" "path" "reflect" "strings" "sync" "sync/atomic" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/ec2metadata" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/awstesting/unit" "github.com/aws/aws-sdk-go/internal/sdktesting" ) const instanceIdentityDocument = `{ "devpayProductCodes" : null, "marketplaceProductCodes" : [ "1abc2defghijklm3nopqrs4tu" ], "availabilityZone" : "us-east-1d", "privateIp" : "10.158.112.84", "version" : "2010-08-31", "region" : "us-east-1", "instanceId" : "i-1234567890abcdef0", "billingProducts" : null, "instanceType" : "t1.micro", "accountId" : "123456789012", "pendingTime" : "2015-11-19T16:32:11Z", "imageId" : "ami-5fb8c835", "kernelId" : "aki-919dcaf8", "ramdiskId" : null, "architecture" : "x86_64" }` const validIamInfo = `{ "Code" : "Success", "LastUpdated" : "2016-03-17T12:27:32Z", "InstanceProfileArn" : "arn:aws:iam::123456789012:instance-profile/my-instance-profile", "InstanceProfileId" : "AIPAABCDEFGHIJKLMN123" }` const unsuccessfulIamInfo = `{ "Code" : "Failed", "LastUpdated" : "2016-03-17T12:27:32Z", "InstanceProfileArn" : "arn:aws:iam::123456789012:instance-profile/my-instance-profile", "InstanceProfileId" : "AIPAABCDEFGHIJKLMN123" }` const ( ttlHeader = "x-aws-ec2-metadata-token-ttl-seconds" tokenHeader = "x-aws-ec2-metadata-token" ) type testType int const ( SecureTestType testType = iota InsecureTestType BadRequestTestType NotFoundRequestTestType InvalidTokenRequestTestType ServerErrorForTokenTestType pageNotFoundForTokenTestType pageNotFoundWith401TestType ) type testServer struct { t *testing.T tokens []string activeToken atomic.Value data string } type operationListProvider struct { operationsPerformed []string } func getTokenRequiredParams(t *testing.T, fn http.HandlerFunc) http.HandlerFunc { return func(w http.ResponseWriter, r *http.Request) { if e, a := "PUT", r.Method; e != a { t.Errorf("expect %v, http method got %v", e, a) http.Error(w, "wrong method", 400) return } if len(r.Header.Get(ttlHeader)) == 0 { t.Errorf("expect ttl header to be present in the request headers, got none") http.Error(w, "wrong method", 400) return } fn(w, r) } } func newTestServer(t *testing.T, testType testType, testServer *testServer) *httptest.Server { mux := http.NewServeMux() switch testType { case SecureTestType: mux.HandleFunc("/latest/api/token", getTokenRequiredParams(t, testServer.secureGetTokenHandler)) mux.HandleFunc("/", testServer.secureGetLatestHandler) case InsecureTestType: mux.HandleFunc("/latest/api/token", testServer.insecureGetTokenHandler) mux.HandleFunc("/", testServer.insecureGetLatestHandler) case BadRequestTestType: mux.HandleFunc("/latest/api/token", getTokenRequiredParams(t, testServer.badRequestGetTokenHandler)) mux.HandleFunc("/", testServer.badRequestGetLatestHandler) case NotFoundRequestTestType: mux.HandleFunc("/latest/api/token", getTokenRequiredParams(t, testServer.secureGetTokenHandler)) mux.HandleFunc("/", testServer.notFoundRequestGetLatestHandler) case InvalidTokenRequestTestType: mux.HandleFunc("/latest/api/token", getTokenRequiredParams(t, testServer.secureGetTokenHandler)) mux.HandleFunc("/", testServer.unauthorizedGetLatestHandler) case ServerErrorForTokenTestType: mux.HandleFunc("/latest/api/token", getTokenRequiredParams(t, testServer.serverErrorGetTokenHandler)) mux.HandleFunc("/", testServer.insecureGetLatestHandler) case pageNotFoundForTokenTestType: mux.HandleFunc("/latest/api/token", getTokenRequiredParams(t, testServer.pageNotFoundGetTokenHandler)) mux.HandleFunc("/", testServer.insecureGetLatestHandler) case pageNotFoundWith401TestType: mux.HandleFunc("/latest/api/token", getTokenRequiredParams(t, testServer.pageNotFoundGetTokenHandler)) mux.HandleFunc("/", testServer.unauthorizedGetLatestHandler) } return httptest.NewServer(mux) } func (s *testServer) secureGetTokenHandler(w http.ResponseWriter, r *http.Request) { token := s.tokens[0] // set the active token s.activeToken.Store(token) // rotate the token if len(s.tokens) > 1 { s.tokens = s.tokens[1:] } // set the header and response body w.Header().Set(ttlHeader, r.Header.Get(ttlHeader)) if activeToken, ok := s.activeToken.Load().(string); ok { w.Write([]byte(activeToken)) } else { s.t.Fatalf("Expected activeToken to be of type string, got %v", activeToken) } } func (s *testServer) secureGetLatestHandler(w http.ResponseWriter, r *http.Request) { if s.activeToken.Load() == nil { s.t.Errorf("expect token to have been requested, was not") http.Error(w, "", 401) return } if e, a := s.activeToken.Load(), r.Header.Get(tokenHeader); e != a { s.t.Errorf("expect %v token, got %v", e, a) http.Error(w, "", 401) return } w.Header().Set(ttlHeader, r.Header.Get(ttlHeader)) w.Write([]byte(s.data)) } func (s *testServer) insecureGetTokenHandler(w http.ResponseWriter, r *http.Request) { http.Error(w, "", 404) } func (s *testServer) insecureGetLatestHandler(w http.ResponseWriter, r *http.Request) { if len(r.Header.Get(tokenHeader)) != 0 { s.t.Errorf("Request token found, expected none") http.Error(w, "", 400) return } w.Write([]byte(s.data)) } func (s *testServer) badRequestGetTokenHandler(w http.ResponseWriter, r *http.Request) { http.Error(w, "", 400) } func (s *testServer) badRequestGetLatestHandler(w http.ResponseWriter, r *http.Request) { s.t.Errorf("Expected no call to this handler, incorrect behavior found") } func (s *testServer) notFoundRequestGetLatestHandler(w http.ResponseWriter, r *http.Request) { http.Error(w, "not found error", 404) } func (s *testServer) serverErrorGetTokenHandler(w http.ResponseWriter, r *http.Request) { http.Error(w, "", 403) } func (s *testServer) pageNotFoundGetTokenHandler(w http.ResponseWriter, r *http.Request) { http.Error(w, "Page not found error", 404) } func (s *testServer) unauthorizedGetLatestHandler(w http.ResponseWriter, r *http.Request) { http.Error(w, "", 401) } func (opListProvider *operationListProvider) addToOperationPerformedList(r *request.Request) { opListProvider.operationsPerformed = append(opListProvider.operationsPerformed, r.Operation.Name) } func TestEndpoint(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() c := ec2metadata.New(unit.Session) op := &request.Operation{ Name: "GetMetadata", HTTPMethod: "GET", HTTPPath: path.Join("/latest", "meta-data", "testpath"), } req := c.NewRequest(op, nil, nil) if e, a := "http://169.254.169.254/latest/meta-data/testpath", req.HTTPRequest.URL.String(); e != a { t.Errorf("expect %v, got %v", e, a) } } func TestGetMetadata(t *testing.T) { cases := map[string]struct { tokens []string NewServer func(t *testing.T, tokens []string) *httptest.Server expectedData string expectedError string expectedOperationsAttempted []string }{ "Insecure server success case": { NewServer: func(t *testing.T, tokens []string) *httptest.Server { testType := InsecureTestType Ts := &testServer{ t: t, tokens: tokens, data: "IMDSProfileForGoSDK", } return newTestServer(t, testType, Ts) }, expectedData: "IMDSProfileForGoSDK", expectedOperationsAttempted: []string{"GetToken", "GetMetadata", "GetMetadata"}, }, "Secure server success case": { tokens: []string{"firstToken", "secondToken", "thirdToken"}, NewServer: func(t *testing.T, tokens []string) *httptest.Server { testType := SecureTestType Ts := &testServer{ t: t, tokens: tokens, data: "IMDSProfileForGoSDK", } return newTestServer(t, testType, Ts) }, expectedData: "IMDSProfileForGoSDK", expectedError: "", expectedOperationsAttempted: []string{"GetToken", "GetMetadata", "GetMetadata"}, }, "Bad token request case": { tokens: []string{"firstToken", "secondToken", "thirdToken"}, NewServer: func(t *testing.T, tokens []string) *httptest.Server { testType := BadRequestTestType Ts := &testServer{ t: t, tokens: tokens, data: "IMDSProfileForGoSDK", } return newTestServer(t, testType, Ts) }, expectedError: "400", expectedOperationsAttempted: []string{"GetToken", "GetToken"}, }, "Not found no retry request case": { tokens: []string{"firstToken", "secondToken", "thirdToken"}, NewServer: func(t *testing.T, tokens []string) *httptest.Server { testType := NotFoundRequestTestType Ts := &testServer{ t: t, tokens: tokens, data: "IMDSProfileForGoSDK", } return newTestServer(t, testType, Ts) }, expectedError: "404", expectedOperationsAttempted: []string{"GetToken", "GetMetadata", "GetMetadata"}, }, "invalid token request case": { tokens: []string{"firstToken", "secondToken", "thirdToken"}, NewServer: func(t *testing.T, tokens []string) *httptest.Server { testType := InvalidTokenRequestTestType Ts := &testServer{ t: t, tokens: tokens, data: "IMDSProfileForGoSDK", } return newTestServer(t, testType, Ts) }, expectedError: "401", expectedOperationsAttempted: []string{"GetToken", "GetMetadata", "GetToken", "GetMetadata"}, }, "ServerErrorForTokenTestType": { NewServer: func(t *testing.T, tokens []string) *httptest.Server { testType := ServerErrorForTokenTestType Ts := &testServer{ t: t, tokens: []string{}, data: "IMDSProfileForGoSDK", } return newTestServer(t, testType, Ts) }, expectedData: "IMDSProfileForGoSDK", expectedOperationsAttempted: []string{"GetToken", "GetMetadata", "GetMetadata"}, }, } for name, x := range cases { t.Run(name, func(t *testing.T) { server := x.NewServer(t, x.tokens) defer server.Close() op := &operationListProvider{} c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) c.Handlers.CompleteAttempt.PushBack(op.addToOperationPerformedList) tokenCounter := -1 c.Handlers.Send.PushBack(func(r *request.Request) { switch r.Operation.Name { case "GetToken": tokenCounter++ case "GetMetadata": curToken := r.HTTPRequest.Header.Get("x-aws-ec2-metadata-token") if len(curToken) != 0 && curToken != x.tokens[tokenCounter] { t.Errorf("expect %v token, got %v", x.tokens[tokenCounter], curToken) } } }) resp, err := c.GetMetadata("some/path") // token should stay alive, since default duration is 26000 seconds resp, err = c.GetMetadata("some/path") if len(x.expectedError) != 0 { if err == nil { t.Fatalf("expect %v error, got none", x.expectedError) } if e, a := x.expectedError, err.Error(); !strings.Contains(a, e) { t.Fatalf("expect %v error, got %v", e, a) } } else if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := x.expectedData, resp; e != a { t.Fatalf("expect %v, got %v", e, a) } if e, a := x.expectedOperationsAttempted, op.operationsPerformed; !reflect.DeepEqual(e, a) { t.Errorf("expect %v operations, got %v", e, a) } }) } } func TestGetUserData_Error(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { reader := strings.NewReader(`<?xml version="1.0" encoding="iso-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>404 - Not Found</title> </head> <body> <h1>404 - Not Found</h1> </body> </html>`) w.Header().Set("Content-Type", "text/html") w.Header().Set("Content-Length", fmt.Sprintf("%d", reader.Len())) w.WriteHeader(http.StatusNotFound) io.Copy(w, reader) })) defer server.Close() c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) resp, err := c.GetUserData() if err == nil { t.Fatalf("expect error") } if len(resp) != 0 { t.Fatalf("expect empty, got %v", resp) } if requestFailedError, ok := err.(awserr.RequestFailure); ok { if e, a := http.StatusNotFound, requestFailedError.StatusCode(); e != a { t.Fatalf("expect %v, got %v", e, a) } } } func TestGetRegion(t *testing.T) { cases := map[string]struct { NewServer func(t *testing.T) *httptest.Server expectedData string expectedError string expectedOperationsPerformed []string }{ "Insecure server success case": { NewServer: func(t *testing.T) *httptest.Server { testType := InsecureTestType Ts := &testServer{ t: t, data: instanceIdentityDocument, } return newTestServer(t, testType, Ts) }, expectedData: "us-east-1", expectedOperationsPerformed: []string{"GetToken", "GetDynamicData"}, }, "Secure server success case": { NewServer: func(t *testing.T) *httptest.Server { testType := SecureTestType Ts := &testServer{ t: t, tokens: []string{"firstToken", "secondToken", "thirdToken"}, data: instanceIdentityDocument, } return newTestServer(t, testType, Ts) }, expectedData: "us-east-1", expectedOperationsPerformed: []string{"GetToken", "GetDynamicData"}, }, "Bad request case": { NewServer: func(t *testing.T) *httptest.Server { testType := BadRequestTestType Ts := &testServer{ t: t, tokens: []string{"firstToken", "secondToken", "thirdToken"}, data: instanceIdentityDocument, } return newTestServer(t, testType, Ts) }, expectedError: "400", expectedOperationsPerformed: []string{"GetToken", "GetDynamicData"}, }, "ServerErrorForTokenTestType": { NewServer: func(t *testing.T) *httptest.Server { testType := ServerErrorForTokenTestType Ts := &testServer{ t: t, tokens: []string{}, data: instanceIdentityDocument, } return newTestServer(t, testType, Ts) }, expectedData: "us-east-1", expectedOperationsPerformed: []string{"GetToken", "GetDynamicData"}, }, } for name, x := range cases { t.Run(name, func(t *testing.T) { server := x.NewServer(t) defer server.Close() op := &operationListProvider{} c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) c.Handlers.Complete.PushBack(op.addToOperationPerformedList) resp, err := c.Region() if len(x.expectedError) != 0 { if err == nil { t.Fatalf("expect %v error, got none", x.expectedError) } if e, a := x.expectedError, err.Error(); !strings.Contains(a, e) { t.Fatalf("expect %v error, got %v", e, a) } } else if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := x.expectedData, resp; e != a { t.Fatalf("expect %v, got %v", e, a) } if e, a := x.expectedOperationsPerformed, op.operationsPerformed; !reflect.DeepEqual(e, a) { t.Fatalf("expect %v operations, got %v", e, a) } }) } } func TestMetadataIAMInfo_success(t *testing.T) { cases := map[string]struct { NewServer func(t *testing.T) *httptest.Server expectedData string expectedError string expectedOperationsPerformed []string }{ "Insecure server success case": { NewServer: func(t *testing.T) *httptest.Server { testType := InsecureTestType Ts := &testServer{ t: t, data: validIamInfo, } return newTestServer(t, testType, Ts) }, expectedData: validIamInfo, expectedOperationsPerformed: []string{"GetToken", "GetMetadata"}, }, "Secure server success case": { NewServer: func(t *testing.T) *httptest.Server { testType := SecureTestType Ts := &testServer{ t: t, tokens: []string{"firstToken", "secondToken", "thirdToken"}, data: validIamInfo, } return newTestServer(t, testType, Ts) }, expectedData: validIamInfo, expectedOperationsPerformed: []string{"GetToken", "GetMetadata"}, }, } for name, x := range cases { t.Run(name, func(t *testing.T) { server := x.NewServer(t) defer server.Close() op := &operationListProvider{} c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) c.Handlers.Complete.PushBack(op.addToOperationPerformedList) iamInfo, err := c.IAMInfo() if len(x.expectedError) != 0 { if err == nil { t.Fatalf("expect %v error, got none", x.expectedError) } if e, a := x.expectedError, err.Error(); !strings.Contains(a, e) { t.Fatalf("expect %v error, got %v", e, a) } } else if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := "Success", iamInfo.Code; e != a { t.Fatalf("expect %v, got %v", e, a) } if e, a := "arn:aws:iam::123456789012:instance-profile/my-instance-profile", iamInfo.InstanceProfileArn; e != a { t.Fatalf("expect %v, got %v", e, a) } if e, a := "AIPAABCDEFGHIJKLMN123", iamInfo.InstanceProfileID; e != a { t.Fatalf("expect %v, got %v", e, a) } if e, a := x.expectedOperationsPerformed, op.operationsPerformed; !reflect.DeepEqual(e, a) { t.Fatalf("expect %v operations, got %v", e, a) } }) } } func TestMetadataIAMInfo_failure(t *testing.T) { cases := map[string]struct { NewServer func(t *testing.T) *httptest.Server expectedData string expectedError string expectedOperationsPerformed []string }{ "Insecure server success case": { NewServer: func(t *testing.T) *httptest.Server { testType := InsecureTestType Ts := &testServer{ t: t, tokens: nil, data: unsuccessfulIamInfo, } return newTestServer(t, testType, Ts) }, expectedData: unsuccessfulIamInfo, expectedOperationsPerformed: []string{"GetToken", "GetMetadata"}, }, "Secure server success case": { NewServer: func(t *testing.T) *httptest.Server { testType := SecureTestType Ts := &testServer{ t: t, tokens: []string{"firstToken", "secondToken", "thirdToken"}, data: unsuccessfulIamInfo, } return newTestServer(t, testType, Ts) }, expectedData: unsuccessfulIamInfo, expectedOperationsPerformed: []string{"GetToken", "GetMetadata"}, }, } for name, x := range cases { t.Run(name, func(t *testing.T) { server := x.NewServer(t) defer server.Close() op := &operationListProvider{} c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) c.Handlers.Complete.PushBack(op.addToOperationPerformedList) iamInfo, err := c.IAMInfo() if err == nil { t.Fatalf("expect error") } if e, a := "", iamInfo.Code; e != a { t.Fatalf("expect %v, got %v", e, a) } if e, a := "", iamInfo.InstanceProfileArn; e != a { t.Fatalf("expect %v, got %v", e, a) } if e, a := "", iamInfo.InstanceProfileID; e != a { t.Fatalf("expect %v, got %v", e, a) } if e, a := x.expectedOperationsPerformed, op.operationsPerformed; !reflect.DeepEqual(e, a) { t.Fatalf("expect %v operations, got %v", e, a) } }) } } func TestMetadataNotAvailable(t *testing.T) { c := ec2metadata.New(unit.Session) c.Handlers.Send.Clear() c.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &http.Response{ StatusCode: int(0), Status: http.StatusText(int(0)), Body: ioutil.NopCloser(bytes.NewReader([]byte{})), } r.Error = awserr.New(request.ErrCodeRequestError, "send request failed", nil) r.Retryable = aws.Bool(true) // network errors are retryable }) if c.Available() { t.Fatalf("expect not available") } } func TestMetadataErrorResponse(t *testing.T) { c := ec2metadata.New(unit.Session) c.Handlers.Send.Clear() c.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &http.Response{ StatusCode: http.StatusBadRequest, Status: http.StatusText(http.StatusBadRequest), Body: ioutil.NopCloser(strings.NewReader("error message text")), } r.Retryable = aws.Bool(false) // network errors are retryable }) data, err := c.GetMetadata("uri/path") if e, a := "error message text", err.Error(); !strings.Contains(a, e) { t.Fatalf("expect %v to be in %v", e, a) } if len(data) != 0 { t.Fatalf("expect empty, got %v", data) } } func TestEC2RoleProviderInstanceIdentity(t *testing.T) { cases := map[string]struct { NewServer func(t *testing.T) *httptest.Server expectedData string expectedOperationsPerformed []string }{ "Insecure server success case": { NewServer: func(t *testing.T) *httptest.Server { testType := InsecureTestType Ts := &testServer{ t: t, tokens: nil, data: instanceIdentityDocument, } return newTestServer(t, testType, Ts) }, expectedData: instanceIdentityDocument, expectedOperationsPerformed: []string{"GetToken", "GetDynamicData"}, }, "Secure server success case": { NewServer: func(t *testing.T) *httptest.Server { testType := SecureTestType Ts := &testServer{ t: t, tokens: []string{"firstToken", "secondToken", "thirdToken"}, data: instanceIdentityDocument, } return newTestServer(t, testType, Ts) }, expectedData: instanceIdentityDocument, expectedOperationsPerformed: []string{"GetToken", "GetDynamicData"}, }, } for name, x := range cases { t.Run(name, func(t *testing.T) { server := x.NewServer(t) defer server.Close() op := &operationListProvider{} c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) c.Handlers.Complete.PushBack(op.addToOperationPerformedList) doc, err := c.GetInstanceIdentityDocument() if err != nil { t.Fatalf("expected no error, got %v", err) } if e, a := doc.AccountID, "123456789012"; e != a { t.Fatalf("expect %v, got %v", e, a) } if e, a := doc.AvailabilityZone, "us-east-1d"; e != a { t.Fatalf("expect %v, got %v", e, a) } if e, a := doc.Region, "us-east-1"; e != a { t.Fatalf("expect %v, got %v", e, a) } if e, a := x.expectedOperationsPerformed, op.operationsPerformed; !reflect.DeepEqual(e, a) { t.Fatalf("expect %v operations, got %v", e, a) } }) } } func TestEC2MetadataRetryFailure(t *testing.T) { mux := http.NewServeMux() mux.HandleFunc("/latest/api/token", func(w http.ResponseWriter, r *http.Request) { if r.Method == "PUT" && r.Header.Get(ttlHeader) != "" { w.Header().Set(ttlHeader, "200") http.Error(w, "service unavailable", http.StatusServiceUnavailable) return } http.Error(w, "bad request", http.StatusBadRequest) }) // meta-data endpoint for this test, just returns the token mux.HandleFunc("/latest/meta-data/", func(w http.ResponseWriter, r *http.Request) { w.Write([]byte("profile_name")) }) server := httptest.NewServer(mux) defer server.Close() c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) c.Handlers.AfterRetry.PushBack(func(i *request.Request) { t.Logf("%v received, retrying operation %v", i.HTTPResponse.StatusCode, i.Operation.Name) }) c.Handlers.Complete.PushBack(func(i *request.Request) { t.Logf("%v operation exited with status %v", i.Operation.Name, i.HTTPResponse.StatusCode) }) resp, err := c.GetMetadata("some/path") if err != nil { t.Fatalf("Expected none, got error %v", err) } if resp != "profile_name" { t.Fatalf("Expected response to be profile_name, got %v", resp) } resp, err = c.GetMetadata("some/path") if err != nil { t.Fatalf("Expected none, got error %v", err) } if resp != "profile_name" { t.Fatalf("Expected response to be profile_name, got %v", resp) } } func TestEC2MetadataRetryOnce(t *testing.T) { var secureDataFlow bool var retry = true mux := http.NewServeMux() mux.HandleFunc("/latest/api/token", func(w http.ResponseWriter, r *http.Request) { if r.Method == "PUT" && r.Header.Get(ttlHeader) != "" { w.Header().Set(ttlHeader, "200") for retry { retry = false http.Error(w, "service unavailable", http.StatusServiceUnavailable) return } w.Write([]byte("token")) secureDataFlow = true return } http.Error(w, "bad request", http.StatusBadRequest) }) // meta-data endpoint for this test, just returns the token mux.HandleFunc("/latest/meta-data/", func(w http.ResponseWriter, r *http.Request) { w.Write([]byte(r.Header.Get(tokenHeader))) }) var tokenRetryCount int server := httptest.NewServer(mux) defer server.Close() c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) // Handler on client that logs if retried c.Handlers.AfterRetry.PushBack(func(i *request.Request) { t.Logf("%v received, retrying operation %v", i.HTTPResponse.StatusCode, i.Operation.Name) tokenRetryCount++ }) _, err := c.GetMetadata("some/path") if tokenRetryCount != 1 { t.Fatalf("Expected number of retries for fetching token to be 1, got %v", tokenRetryCount) } if !secureDataFlow { t.Fatalf("Expected secure data flow to be %v, got %v", secureDataFlow, !secureDataFlow) } if err != nil { t.Fatalf("Expected none, got error %v", err) } } func TestEC2Metadata_Concurrency(t *testing.T) { ts := &testServer{ t: t, tokens: []string{"firstToken"}, data: "IMDSProfileForSDKGo", } server := newTestServer(t, SecureTestType, ts) defer server.Close() c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) var wg sync.WaitGroup wg.Add(10) for i := 0; i < 10; i++ { go func() { defer wg.Done() for j := 0; j < 10; j++ { resp, err := c.GetMetadata("some/data") if err != nil { t.Errorf("expect no error, got %v", err) } if e, a := "IMDSProfileForSDKGo", resp; e != a { t.Errorf("expect %v, got %v", e, a) } } }() } wg.Wait() } func TestRequestOnMetadata(t *testing.T) { ts := &testServer{ t: t, tokens: []string{"firstToken", "secondToken"}, data: "profile_name", } server := newTestServer(t, SecureTestType, ts) defer server.Close() c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) req := c.NewRequest(&request.Operation{ Name: "Ec2Metadata request", HTTPMethod: "GET", HTTPPath: "/latest/foo", Paginator: nil, BeforePresignFn: nil, }, nil, nil) op := &operationListProvider{} c.Handlers.Complete.PushBack(op.addToOperationPerformedList) err := req.Send() if err != nil { t.Fatalf("expect no error, got %v", err) } if len(op.operationsPerformed) < 1 { t.Fatalf("Expected atleast one operation GetToken to be called on EC2Metadata client") return } if op.operationsPerformed[0] != "GetToken" { t.Fatalf("Expected GetToken operation to be called") } } func TestExhaustiveRetryToFetchToken(t *testing.T) { ts := &testServer{ t: t, tokens: []string{"firstToken", "secondToken"}, data: "IMDSProfileForSDKGo", } server := newTestServer(t, pageNotFoundForTokenTestType, ts) defer server.Close() op := &operationListProvider{} c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) c.Handlers.Complete.PushBack(op.addToOperationPerformedList) resp, err := c.GetMetadata("/some/path") if err != nil { t.Fatalf("Expected no error, got %v", err) } if e, a := "IMDSProfileForSDKGo", resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } resp, err = c.GetMetadata("/some/path") if err != nil { t.Fatalf("Expected no error, got %v", err) } if e, a := "IMDSProfileForSDKGo", resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } resp, err = c.GetMetadata("/some/path") if err != nil { t.Fatalf("Expected no error, got %v", err) } if e, a := "IMDSProfileForSDKGo", resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } resp, err = c.GetMetadata("/some/path") expectedOperationsPerformed := []string{"GetToken", "GetMetadata", "GetMetadata", "GetMetadata", "GetMetadata"} if err != nil { t.Fatalf("Expected no error, got %v", err) } if e, a := "IMDSProfileForSDKGo", resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } if e, a := expectedOperationsPerformed, op.operationsPerformed; !reflect.DeepEqual(e, a) { t.Fatalf("expect %v operations, got %v", e, a) } } func TestExhaustiveRetryWith401(t *testing.T) { ts := &testServer{ t: t, tokens: []string{"firstToken", "secondToken"}, data: "IMDSProfileForSDKGo", } server := newTestServer(t, pageNotFoundWith401TestType, ts) defer server.Close() op := &operationListProvider{} c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) c.Handlers.Complete.PushBack(op.addToOperationPerformedList) resp, err := c.GetMetadata("/some/path") if err == nil { t.Fatalf("Expected %v error, got none", err) } if e, a := "", resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } resp, err = c.GetMetadata("/some/path") if err == nil { t.Fatalf("Expected %v error, got none", err) } if e, a := "", resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } resp, err = c.GetMetadata("/some/path") if err == nil { t.Fatalf("Expected %v error, got none", err) } if e, a := "", resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } resp, err = c.GetMetadata("/some/path") expectedOperationsPerformed := []string{"GetToken", "GetMetadata", "GetToken", "GetMetadata", "GetToken", "GetMetadata", "GetToken", "GetMetadata"} if err == nil { t.Fatalf("Expected %v error, got none", err) } if e, a := "", resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } if e, a := expectedOperationsPerformed, op.operationsPerformed; !reflect.DeepEqual(e, a) { t.Fatalf("expect %v operations, got %v", e, a) } } func TestRequestTimeOut(t *testing.T) { mux := http.NewServeMux() done := make(chan bool) mux.HandleFunc("/latest/api/token", func(w http.ResponseWriter, r *http.Request) { // wait to read from channel done <-done }) mux.HandleFunc("/latest/", func(w http.ResponseWriter, r *http.Request) { if len(r.Header.Get(tokenHeader)) != 0 { http.Error(w, "", 400) return } w.Write([]byte("IMDSProfileForSDKGo")) }) server := httptest.NewServer(mux) defer server.Close() defer close(done) op := &operationListProvider{} c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) // for test, change the timeout to 100 ms c.Config.HTTPClient.Timeout = 100 * time.Millisecond c.Handlers.Complete.PushBack(op.addToOperationPerformedList) start := time.Now() resp, err := c.GetMetadata("/some/path") if e, a := 1*time.Second, time.Since(start); e < a { t.Fatalf("expected duration of test to be less than %v, got %v", e, a) } if e, a := "IMDSProfileForSDKGo", resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } if err != nil { t.Fatalf("Expected no error, got %v", err) } expectedOperationsPerformed := []string{"GetToken", "GetMetadata"} if e, a := expectedOperationsPerformed, op.operationsPerformed; !reflect.DeepEqual(e, a) { t.Fatalf("expect %v operations, got %v", e, a) } start = time.Now() resp, err = c.GetMetadata("/some/path") if e, a := 1*time.Second, time.Since(start); e < a { t.Fatalf("expected duration of test to be less than %v, got %v", e, a) } if e, a := "IMDSProfileForSDKGo", resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } if err != nil { t.Fatalf("Expected no error, got %v", err) } expectedOperationsPerformed = []string{"GetToken", "GetMetadata", "GetMetadata"} if e, a := expectedOperationsPerformed, op.operationsPerformed; !reflect.DeepEqual(e, a) { t.Fatalf("expect %v operations, got %v", e, a) } } func TestTokenExpiredBehavior(t *testing.T) { tokens := []string{"firstToken", "secondToken", "thirdToken"} var activeToken string mux := http.NewServeMux() mux.HandleFunc("/latest/api/token", func(w http.ResponseWriter, r *http.Request) { if r.Method == "PUT" && r.Header.Get(ttlHeader) != "" { // set ttl to 0, so TTL is expired. w.Header().Set(ttlHeader, "0") activeToken = tokens[0] if len(tokens) > 1 { tokens = tokens[1:] } w.Write([]byte(activeToken)) return } http.Error(w, "bad request", http.StatusBadRequest) }) // meta-data endpoint for this test, just returns the token mux.HandleFunc("/latest/meta-data/", func(w http.ResponseWriter, r *http.Request) { w.Header().Set(ttlHeader, r.Header.Get(ttlHeader)) w.Write([]byte(r.Header.Get(tokenHeader))) }) server := httptest.NewServer(mux) defer server.Close() op := &operationListProvider{} c := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(server.URL), }) c.Handlers.Complete.PushBack(op.addToOperationPerformedList) resp, err := c.GetMetadata("/some/path") if err != nil { t.Fatalf("Expected no error, got %v", err) } if e, a := activeToken, resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } // store the token received before var firstToken = activeToken resp, err = c.GetMetadata("/some/path") if err != nil { t.Fatalf("Expected no error, got %v", err) } if e, a := activeToken, resp; e != a { t.Fatalf("Expected %v, got %v", e, a) } // Since TTL is 0, we should have received a new token if firstToken == activeToken { t.Fatalf("Expected token should have expired, and not the same") } expectedOperationsPerformed := []string{"GetToken", "GetMetadata", "GetToken", "GetMetadata"} if e, a := expectedOperationsPerformed, op.operationsPerformed; !reflect.DeepEqual(e, a) { t.Fatalf("expect %v operations, got %v", e, a) } }
1,191
session-manager-plugin
aws
Go
// Package ec2metadata provides the client for making API calls to the // EC2 Metadata service. // // This package's client can be disabled completely by setting the environment // variable "AWS_EC2_METADATA_DISABLED=true". This environment variable set to // true instructs the SDK to disable the EC2 Metadata client. The client cannot // be used while the environment variable is set to true, (case insensitive). // // The endpoint of the EC2 IMDS client can be configured via the environment // variable, AWS_EC2_METADATA_SERVICE_ENDPOINT when creating the client with a // Session. See aws/session#Options.EC2IMDSEndpoint for more details. package ec2metadata import ( "bytes" "io" "net/http" "net/url" "os" "strconv" "strings" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/client/metadata" "github.com/aws/aws-sdk-go/aws/corehandlers" "github.com/aws/aws-sdk-go/aws/request" ) const ( // ServiceName is the name of the service. ServiceName = "ec2metadata" disableServiceEnvVar = "AWS_EC2_METADATA_DISABLED" // Headers for Token and TTL ttlHeader = "x-aws-ec2-metadata-token-ttl-seconds" tokenHeader = "x-aws-ec2-metadata-token" // Named Handler constants fetchTokenHandlerName = "FetchTokenHandler" unmarshalMetadataHandlerName = "unmarshalMetadataHandler" unmarshalTokenHandlerName = "unmarshalTokenHandler" enableTokenProviderHandlerName = "enableTokenProviderHandler" // TTL constants defaultTTL = 21600 * time.Second ttlExpirationWindow = 30 * time.Second ) // A EC2Metadata is an EC2 Metadata service Client. type EC2Metadata struct { *client.Client } // New creates a new instance of the EC2Metadata client with a session. // This client is safe to use across multiple goroutines. // // // Example: // // Create a EC2Metadata client from just a session. // svc := ec2metadata.New(mySession) // // // Create a EC2Metadata client with additional configuration // svc := ec2metadata.New(mySession, aws.NewConfig().WithLogLevel(aws.LogDebugHTTPBody)) func New(p client.ConfigProvider, cfgs ...*aws.Config) *EC2Metadata { c := p.ClientConfig(ServiceName, cfgs...) return NewClient(*c.Config, c.Handlers, c.Endpoint, c.SigningRegion) } // NewClient returns a new EC2Metadata client. Should be used to create // a client when not using a session. Generally using just New with a session // is preferred. // // Will remove the URL path from the endpoint provided to ensure the EC2 IMDS // client is able to communicate with the EC2 IMDS API. // // If an unmodified HTTP client is provided from the stdlib default, or no client // the EC2RoleProvider's EC2Metadata HTTP client's timeout will be shortened. // To disable this set Config.EC2MetadataDisableTimeoutOverride to false. Enabled by default. func NewClient(cfg aws.Config, handlers request.Handlers, endpoint, signingRegion string, opts ...func(*client.Client)) *EC2Metadata { if !aws.BoolValue(cfg.EC2MetadataDisableTimeoutOverride) && httpClientZero(cfg.HTTPClient) { // If the http client is unmodified and this feature is not disabled // set custom timeouts for EC2Metadata requests. cfg.HTTPClient = &http.Client{ // use a shorter timeout than default because the metadata // service is local if it is running, and to fail faster // if not running on an ec2 instance. Timeout: 1 * time.Second, } // max number of retries on the client operation cfg.MaxRetries = aws.Int(2) } if u, err := url.Parse(endpoint); err == nil { // Remove path from the endpoint since it will be added by requests. // This is an artifact of the SDK adding `/latest` to the endpoint for // EC2 IMDS, but this is now moved to the operation definition. u.Path = "" u.RawPath = "" endpoint = u.String() } svc := &EC2Metadata{ Client: client.New( cfg, metadata.ClientInfo{ ServiceName: ServiceName, ServiceID: ServiceName, Endpoint: endpoint, APIVersion: "latest", }, handlers, ), } // token provider instance tp := newTokenProvider(svc, defaultTTL) // NamedHandler for fetching token svc.Handlers.Sign.PushBackNamed(request.NamedHandler{ Name: fetchTokenHandlerName, Fn: tp.fetchTokenHandler, }) // NamedHandler for enabling token provider svc.Handlers.Complete.PushBackNamed(request.NamedHandler{ Name: enableTokenProviderHandlerName, Fn: tp.enableTokenProviderHandler, }) svc.Handlers.Unmarshal.PushBackNamed(unmarshalHandler) svc.Handlers.UnmarshalError.PushBack(unmarshalError) svc.Handlers.Validate.Clear() svc.Handlers.Validate.PushBack(validateEndpointHandler) // Disable the EC2 Metadata service if the environment variable is set. // This short-circuits the service's functionality to always fail to send // requests. if strings.ToLower(os.Getenv(disableServiceEnvVar)) == "true" { svc.Handlers.Send.SwapNamed(request.NamedHandler{ Name: corehandlers.SendHandler.Name, Fn: func(r *request.Request) { r.HTTPResponse = &http.Response{ Header: http.Header{}, } r.Error = awserr.New( request.CanceledErrorCode, "EC2 IMDS access disabled via "+disableServiceEnvVar+" env var", nil) }, }) } // Add additional options to the service config for _, option := range opts { option(svc.Client) } return svc } func httpClientZero(c *http.Client) bool { return c == nil || (c.Transport == nil && c.CheckRedirect == nil && c.Jar == nil && c.Timeout == 0) } type metadataOutput struct { Content string } type tokenOutput struct { Token string TTL time.Duration } // unmarshal token handler is used to parse the response of a getToken operation var unmarshalTokenHandler = request.NamedHandler{ Name: unmarshalTokenHandlerName, Fn: func(r *request.Request) { defer r.HTTPResponse.Body.Close() var b bytes.Buffer if _, err := io.Copy(&b, r.HTTPResponse.Body); err != nil { r.Error = awserr.NewRequestFailure(awserr.New(request.ErrCodeSerialization, "unable to unmarshal EC2 metadata response", err), r.HTTPResponse.StatusCode, r.RequestID) return } v := r.HTTPResponse.Header.Get(ttlHeader) data, ok := r.Data.(*tokenOutput) if !ok { return } data.Token = b.String() // TTL is in seconds i, err := strconv.ParseInt(v, 10, 64) if err != nil { r.Error = awserr.NewRequestFailure(awserr.New(request.ParamFormatErrCode, "unable to parse EC2 token TTL response", err), r.HTTPResponse.StatusCode, r.RequestID) return } t := time.Duration(i) * time.Second data.TTL = t }, } var unmarshalHandler = request.NamedHandler{ Name: unmarshalMetadataHandlerName, Fn: func(r *request.Request) { defer r.HTTPResponse.Body.Close() var b bytes.Buffer if _, err := io.Copy(&b, r.HTTPResponse.Body); err != nil { r.Error = awserr.NewRequestFailure(awserr.New(request.ErrCodeSerialization, "unable to unmarshal EC2 metadata response", err), r.HTTPResponse.StatusCode, r.RequestID) return } if data, ok := r.Data.(*metadataOutput); ok { data.Content = b.String() } }, } func unmarshalError(r *request.Request) { defer r.HTTPResponse.Body.Close() var b bytes.Buffer if _, err := io.Copy(&b, r.HTTPResponse.Body); err != nil { r.Error = awserr.NewRequestFailure( awserr.New(request.ErrCodeSerialization, "unable to unmarshal EC2 metadata error response", err), r.HTTPResponse.StatusCode, r.RequestID) return } // Response body format is not consistent between metadata endpoints. // Grab the error message as a string and include that as the source error r.Error = awserr.NewRequestFailure( awserr.New("EC2MetadataError", "failed to make EC2Metadata request\n"+b.String(), nil), r.HTTPResponse.StatusCode, r.RequestID) } func validateEndpointHandler(r *request.Request) { if r.ClientInfo.Endpoint == "" { r.Error = aws.ErrMissingEndpoint } }
246
session-manager-plugin
aws
Go
// +build go1.7 package ec2metadata_test import ( "net/http" "net/http/httptest" "os" "strings" "sync" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/ec2metadata" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/awstesting/unit" "github.com/aws/aws-sdk-go/internal/sdktesting" ) func TestClientOverrideDefaultHTTPClientTimeout(t *testing.T) { svc := ec2metadata.New(unit.Session) if e, a := http.DefaultClient, svc.Config.HTTPClient; e == a { t.Errorf("expect %v, not to equal %v", e, a) } if e, a := 1*time.Second, svc.Config.HTTPClient.Timeout; e != a { t.Errorf("expect %v to be %v", e, a) } } func TestClientNotOverrideDefaultHTTPClientTimeout(t *testing.T) { http.DefaultClient.Transport = &http.Transport{} defer func() { http.DefaultClient.Transport = nil }() svc := ec2metadata.New(unit.Session) if e, a := http.DefaultClient, svc.Config.HTTPClient; e != a { t.Errorf("expect %v, got %v", e, a) } tr := svc.Config.HTTPClient.Transport.(*http.Transport) if tr == nil { t.Fatalf("expect transport not to be nil") } if tr.Dial != nil { t.Errorf("expect dial to be nil, was not") } } func TestClientDisableOverrideDefaultHTTPClientTimeout(t *testing.T) { svc := ec2metadata.New(unit.Session, aws.NewConfig().WithEC2MetadataDisableTimeoutOverride(true)) if e, a := http.DefaultClient, svc.Config.HTTPClient; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestClientOverrideDefaultHTTPClientTimeoutRace(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.Write([]byte("us-east-1a")) })) defer server.Close() cfg := aws.NewConfig().WithEndpoint(server.URL) runEC2MetadataClients(t, cfg, 50) } func TestClientOverrideDefaultHTTPClientTimeoutRaceWithTransport(t *testing.T) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.Write([]byte("us-east-1a")) })) defer server.Close() cfg := aws.NewConfig().WithEndpoint(server.URL).WithHTTPClient(&http.Client{ Transport: &http.Transport{ DisableKeepAlives: true, }, }) runEC2MetadataClients(t, cfg, 50) } func TestClientDisableIMDS(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() os.Setenv("AWS_EC2_METADATA_DISABLED", "true") svc := ec2metadata.New(unit.Session) resp, err := svc.GetUserData() if err == nil { t.Fatalf("expect error, got none") } if len(resp) != 0 { t.Errorf("expect no response, got %v", resp) } aerr := err.(awserr.Error) if e, a := request.CanceledErrorCode, aerr.Code(); e != a { t.Errorf("expect %v error code, got %v", e, a) } if e, a := "AWS_EC2_METADATA_DISABLED", aerr.Message(); !strings.Contains(a, e) { t.Errorf("expect %v in error message, got %v", e, a) } } func TestClientStripPath(t *testing.T) { cases := map[string]struct { Endpoint string Expect string }{ "no change": { Endpoint: "http://example.aws", Expect: "http://example.aws", }, "strip path": { Endpoint: "http://example.aws/foo", Expect: "http://example.aws", }, } for name, c := range cases { t.Run(name, func(t *testing.T) { restoreEnvFn := sdktesting.StashEnv() defer restoreEnvFn() svc := ec2metadata.New(unit.Session, &aws.Config{ Endpoint: aws.String(c.Endpoint), }) if e, a := c.Expect, svc.ClientInfo.Endpoint; e != a { t.Errorf("expect %v endpoint, got %v", e, a) } }) } } func runEC2MetadataClients(t *testing.T, cfg *aws.Config, atOnce int) { var wg sync.WaitGroup wg.Add(atOnce) svc := ec2metadata.New(unit.Session, cfg) for i := 0; i < atOnce; i++ { go func() { defer wg.Done() _, err := svc.GetUserData() if err != nil { t.Errorf("expect no error, got %v", err) } }() } wg.Wait() }
158
session-manager-plugin
aws
Go
package ec2metadata import ( "net/http" "sync/atomic" "time" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/request" ) // A tokenProvider struct provides access to EC2Metadata client // and atomic instance of a token, along with configuredTTL for it. // tokenProvider also provides an atomic flag to disable the // fetch token operation. // The disabled member will use 0 as false, and 1 as true. type tokenProvider struct { client *EC2Metadata token atomic.Value configuredTTL time.Duration disabled uint32 } // A ec2Token struct helps use of token in EC2 Metadata service ops type ec2Token struct { token string credentials.Expiry } // newTokenProvider provides a pointer to a tokenProvider instance func newTokenProvider(c *EC2Metadata, duration time.Duration) *tokenProvider { return &tokenProvider{client: c, configuredTTL: duration} } // fetchTokenHandler fetches token for EC2Metadata service client by default. func (t *tokenProvider) fetchTokenHandler(r *request.Request) { // short-circuits to insecure data flow if tokenProvider is disabled. if v := atomic.LoadUint32(&t.disabled); v == 1 { return } if ec2Token, ok := t.token.Load().(ec2Token); ok && !ec2Token.IsExpired() { r.HTTPRequest.Header.Set(tokenHeader, ec2Token.token) return } output, err := t.client.getToken(r.Context(), t.configuredTTL) if err != nil { // change the disabled flag on token provider to true, // when error is request timeout error. if requestFailureError, ok := err.(awserr.RequestFailure); ok { switch requestFailureError.StatusCode() { case http.StatusForbidden, http.StatusNotFound, http.StatusMethodNotAllowed: atomic.StoreUint32(&t.disabled, 1) case http.StatusBadRequest: r.Error = requestFailureError } // Check if request timed out while waiting for response if e, ok := requestFailureError.OrigErr().(awserr.Error); ok { if e.Code() == request.ErrCodeRequestError { atomic.StoreUint32(&t.disabled, 1) } } } return } newToken := ec2Token{ token: output.Token, } newToken.SetExpiration(time.Now().Add(output.TTL), ttlExpirationWindow) t.token.Store(newToken) // Inject token header to the request. if ec2Token, ok := t.token.Load().(ec2Token); ok { r.HTTPRequest.Header.Set(tokenHeader, ec2Token.token) } } // enableTokenProviderHandler enables the token provider func (t *tokenProvider) enableTokenProviderHandler(r *request.Request) { // If the error code status is 401, we enable the token provider if e, ok := r.Error.(awserr.RequestFailure); ok && e != nil && e.StatusCode() == http.StatusUnauthorized { t.token.Store(ec2Token{}) atomic.StoreUint32(&t.disabled, 0) } }
94
session-manager-plugin
aws
Go
package endpoints import ( "encoding/json" "fmt" "io" "github.com/aws/aws-sdk-go/aws/awserr" ) type modelDefinition map[string]json.RawMessage // A DecodeModelOptions are the options for how the endpoints model definition // are decoded. type DecodeModelOptions struct { SkipCustomizations bool } // Set combines all of the option functions together. func (d *DecodeModelOptions) Set(optFns ...func(*DecodeModelOptions)) { for _, fn := range optFns { fn(d) } } // DecodeModel unmarshals a Regions and Endpoint model definition file into // a endpoint Resolver. If the file format is not supported, or an error occurs // when unmarshaling the model an error will be returned. // // Casting the return value of this func to a EnumPartitions will // allow you to get a list of the partitions in the order the endpoints // will be resolved in. // // resolver, err := endpoints.DecodeModel(reader) // // partitions := resolver.(endpoints.EnumPartitions).Partitions() // for _, p := range partitions { // // ... inspect partitions // } func DecodeModel(r io.Reader, optFns ...func(*DecodeModelOptions)) (Resolver, error) { var opts DecodeModelOptions opts.Set(optFns...) // Get the version of the partition file to determine what // unmarshaling model to use. modelDef := modelDefinition{} if err := json.NewDecoder(r).Decode(&modelDef); err != nil { return nil, newDecodeModelError("failed to decode endpoints model", err) } var version string if b, ok := modelDef["version"]; ok { version = string(b) } else { return nil, newDecodeModelError("endpoints version not found in model", nil) } if version == "3" { return decodeV3Endpoints(modelDef, opts) } return nil, newDecodeModelError( fmt.Sprintf("endpoints version %s, not supported", version), nil) } func decodeV3Endpoints(modelDef modelDefinition, opts DecodeModelOptions) (Resolver, error) { b, ok := modelDef["partitions"] if !ok { return nil, newDecodeModelError("endpoints model missing partitions", nil) } ps := partitions{} if err := json.Unmarshal(b, &ps); err != nil { return nil, newDecodeModelError("failed to decode endpoints model", err) } if opts.SkipCustomizations { return ps, nil } // Customization for i := 0; i < len(ps); i++ { p := &ps[i] custAddS3DualStack(p) custRegionalS3(p) custRmIotDataService(p) custFixAppAutoscalingChina(p) custFixAppAutoscalingUsGov(p) } return ps, nil } func custAddS3DualStack(p *partition) { if !(p.ID == "aws" || p.ID == "aws-cn" || p.ID == "aws-us-gov") { return } custAddDualstack(p, "s3") custAddDualstack(p, "s3-control") } func custRegionalS3(p *partition) { if p.ID != "aws" { return } service, ok := p.Services["s3"] if !ok { return } // If global endpoint already exists no customization needed. if _, ok := service.Endpoints["aws-global"]; ok { return } service.PartitionEndpoint = "aws-global" service.Endpoints["us-east-1"] = endpoint{} service.Endpoints["aws-global"] = endpoint{ Hostname: "s3.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, } p.Services["s3"] = service } func custAddDualstack(p *partition, svcName string) { s, ok := p.Services[svcName] if !ok { return } s.Defaults.HasDualStack = boxedTrue s.Defaults.DualStackHostname = "{service}.dualstack.{region}.{dnsSuffix}" p.Services[svcName] = s } func custRmIotDataService(p *partition) { delete(p.Services, "data.iot") } func custFixAppAutoscalingChina(p *partition) { if p.ID != "aws-cn" { return } const serviceName = "application-autoscaling" s, ok := p.Services[serviceName] if !ok { return } const expectHostname = `autoscaling.{region}.amazonaws.com` if e, a := s.Defaults.Hostname, expectHostname; e != a { fmt.Printf("custFixAppAutoscalingChina: ignoring customization, expected %s, got %s\n", e, a) return } s.Defaults.Hostname = expectHostname + ".cn" p.Services[serviceName] = s } func custFixAppAutoscalingUsGov(p *partition) { if p.ID != "aws-us-gov" { return } const serviceName = "application-autoscaling" s, ok := p.Services[serviceName] if !ok { return } if a := s.Defaults.CredentialScope.Service; a != "" { fmt.Printf("custFixAppAutoscalingUsGov: ignoring customization, expected empty credential scope service, got %s\n", a) return } if a := s.Defaults.Hostname; a != "" { fmt.Printf("custFixAppAutoscalingUsGov: ignoring customization, expected empty hostname, got %s\n", a) return } s.Defaults.CredentialScope.Service = "application-autoscaling" s.Defaults.Hostname = "autoscaling.{region}.amazonaws.com" p.Services[serviceName] = s } type decodeModelError struct { awsError } func newDecodeModelError(msg string, err error) decodeModelError { return decodeModelError{ awsError: awserr.New("DecodeEndpointsModelError", msg, err), } }
203
session-manager-plugin
aws
Go
package endpoints import ( "strings" "testing" ) func TestDecodeEndpoints_V3(t *testing.T) { const v3Doc = ` { "version": 3, "partitions": [ { "defaults": { "hostname": "{service}.{region}.{dnsSuffix}", "protocols": [ "https" ], "signatureVersions": [ "v4" ] }, "dnsSuffix": "amazonaws.com", "partition": "aws", "partitionName": "AWS Standard", "regionRegex": "^(us|eu|ap|sa|ca)\\-\\w+\\-\\d+$", "regions": { "ap-northeast-1": { "description": "Asia Pacific (Tokyo)" } }, "services": { "acm": { "endpoints": { "ap-northeast-1": {} } }, "s3": { "endpoints": { "ap-northeast-1": {} } } } } ] }` resolver, err := DecodeModel(strings.NewReader(v3Doc)) if err != nil { t.Fatalf("expected no error, got %v", err) } endpoint, err := resolver.EndpointFor("acm", "ap-northeast-1") if err != nil { t.Fatalf("failed to resolve endpoint, %v", err) } if a, e := endpoint.URL, "https://acm.ap-northeast-1.amazonaws.com"; a != e { t.Errorf("expected %q URL got %q", e, a) } p := resolver.(partitions)[0] s3Defaults := p.Services["s3"].Defaults if a, e := s3Defaults.HasDualStack, boxedTrue; a != e { t.Errorf("expect s3 service to have dualstack enabled") } if a, e := s3Defaults.DualStackHostname, "{service}.dualstack.{region}.{dnsSuffix}"; a != e { t.Errorf("expect s3 dualstack host pattern to be %q, got %q", e, a) } } func TestDecodeEndpoints_NoPartitions(t *testing.T) { const doc = `{ "version": 3 }` resolver, err := DecodeModel(strings.NewReader(doc)) if err == nil { t.Fatalf("expected error") } if resolver != nil { t.Errorf("expect resolver to be nil") } } func TestDecodeEndpoints_UnsupportedVersion(t *testing.T) { const doc = `{ "version": 2 }` resolver, err := DecodeModel(strings.NewReader(doc)) if err == nil { t.Fatalf("expected error decoding model") } if resolver != nil { t.Errorf("expect resolver to be nil") } } func TestDecodeModelOptionsSet(t *testing.T) { var actual DecodeModelOptions actual.Set(func(o *DecodeModelOptions) { o.SkipCustomizations = true }) expect := DecodeModelOptions{ SkipCustomizations: true, } if actual != expect { t.Errorf("expect %v options got %v", expect, actual) } } func TestCustFixAppAutoscalingChina(t *testing.T) { const doc = ` { "version": 3, "partitions": [{ "defaults" : { "hostname" : "{service}.{region}.{dnsSuffix}", "protocols" : [ "https" ], "signatureVersions" : [ "v4" ] }, "dnsSuffix" : "amazonaws.com.cn", "partition" : "aws-cn", "partitionName" : "AWS China", "regionRegex" : "^cn\\-\\w+\\-\\d+$", "regions" : { "cn-north-1" : { "description" : "China (Beijing)" }, "cn-northwest-1" : { "description" : "China (Ningxia)" } }, "services" : { "application-autoscaling" : { "defaults" : { "credentialScope" : { "service" : "application-autoscaling" }, "hostname" : "autoscaling.{region}.amazonaws.com", "protocols" : [ "http", "https" ] }, "endpoints" : { "cn-north-1" : { }, "cn-northwest-1" : { } } } } }] }` resolver, err := DecodeModel(strings.NewReader(doc)) if err != nil { t.Fatalf("expect no error, got %v", err) } endpoint, err := resolver.EndpointFor( "application-autoscaling", "cn-northwest-1", ) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := `https://autoscaling.cn-northwest-1.amazonaws.com.cn`, endpoint.URL; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestCustFixAppAutoscalingUsGov(t *testing.T) { const doc = ` { "version": 3, "partitions": [{ "defaults" : { "hostname" : "{service}.{region}.{dnsSuffix}", "protocols" : [ "https" ], "signatureVersions" : [ "v4" ] }, "dnsSuffix" : "amazonaws.com", "partition" : "aws-us-gov", "partitionName" : "AWS GovCloud (US)", "regionRegex" : "^us\\-gov\\-\\w+\\-\\d+$", "regions" : { "us-gov-east-1" : { "description" : "AWS GovCloud (US-East)" }, "us-gov-west-1" : { "description" : "AWS GovCloud (US)" } }, "services" : { "application-autoscaling" : { "endpoints" : { "us-gov-east-1" : { }, "us-gov-west-1" : { } } } } }] }` resolver, err := DecodeModel(strings.NewReader(doc)) if err != nil { t.Fatalf("expect no error, got %v", err) } endpoint, err := resolver.EndpointFor( "application-autoscaling", "us-gov-west-1", ) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := `https://autoscaling.us-gov-west-1.amazonaws.com`, endpoint.URL; e != a { t.Errorf("expect %v, got %v", e, a) } }
220
session-manager-plugin
aws
Go
// Code generated by aws/endpoints/v3model_codegen.go. DO NOT EDIT. package endpoints import ( "regexp" ) // Partition identifiers const ( AwsPartitionID = "aws" // AWS Standard partition. AwsCnPartitionID = "aws-cn" // AWS China partition. AwsUsGovPartitionID = "aws-us-gov" // AWS GovCloud (US) partition. AwsIsoPartitionID = "aws-iso" // AWS ISO (US) partition. AwsIsoBPartitionID = "aws-iso-b" // AWS ISOB (US) partition. ) // AWS Standard partition's regions. const ( AfSouth1RegionID = "af-south-1" // Africa (Cape Town). ApEast1RegionID = "ap-east-1" // Asia Pacific (Hong Kong). ApNortheast1RegionID = "ap-northeast-1" // Asia Pacific (Tokyo). ApNortheast2RegionID = "ap-northeast-2" // Asia Pacific (Seoul). ApNortheast3RegionID = "ap-northeast-3" // Asia Pacific (Osaka). ApSouth1RegionID = "ap-south-1" // Asia Pacific (Mumbai). ApSoutheast1RegionID = "ap-southeast-1" // Asia Pacific (Singapore). ApSoutheast2RegionID = "ap-southeast-2" // Asia Pacific (Sydney). CaCentral1RegionID = "ca-central-1" // Canada (Central). EuCentral1RegionID = "eu-central-1" // Europe (Frankfurt). EuNorth1RegionID = "eu-north-1" // Europe (Stockholm). EuSouth1RegionID = "eu-south-1" // Europe (Milan). EuWest1RegionID = "eu-west-1" // Europe (Ireland). EuWest2RegionID = "eu-west-2" // Europe (London). EuWest3RegionID = "eu-west-3" // Europe (Paris). MeSouth1RegionID = "me-south-1" // Middle East (Bahrain). SaEast1RegionID = "sa-east-1" // South America (Sao Paulo). UsEast1RegionID = "us-east-1" // US East (N. Virginia). UsEast2RegionID = "us-east-2" // US East (Ohio). UsWest1RegionID = "us-west-1" // US West (N. California). UsWest2RegionID = "us-west-2" // US West (Oregon). ) // AWS China partition's regions. const ( CnNorth1RegionID = "cn-north-1" // China (Beijing). CnNorthwest1RegionID = "cn-northwest-1" // China (Ningxia). ) // AWS GovCloud (US) partition's regions. const ( UsGovEast1RegionID = "us-gov-east-1" // AWS GovCloud (US-East). UsGovWest1RegionID = "us-gov-west-1" // AWS GovCloud (US-West). ) // AWS ISO (US) partition's regions. const ( UsIsoEast1RegionID = "us-iso-east-1" // US ISO East. ) // AWS ISOB (US) partition's regions. const ( UsIsobEast1RegionID = "us-isob-east-1" // US ISOB East (Ohio). ) // DefaultResolver returns an Endpoint resolver that will be able // to resolve endpoints for: AWS Standard, AWS China, AWS GovCloud (US), AWS ISO (US), and AWS ISOB (US). // // Use DefaultPartitions() to get the list of the default partitions. func DefaultResolver() Resolver { return defaultPartitions } // DefaultPartitions returns a list of the partitions the SDK is bundled // with. The available partitions are: AWS Standard, AWS China, AWS GovCloud (US), AWS ISO (US), and AWS ISOB (US). // // partitions := endpoints.DefaultPartitions // for _, p := range partitions { // // ... inspect partitions // } func DefaultPartitions() []Partition { return defaultPartitions.Partitions() } var defaultPartitions = partitions{ awsPartition, awscnPartition, awsusgovPartition, awsisoPartition, awsisobPartition, } // AwsPartition returns the Resolver for AWS Standard. func AwsPartition() Partition { return awsPartition.Partition() } var awsPartition = partition{ ID: "aws", Name: "AWS Standard", DNSSuffix: "amazonaws.com", RegionRegex: regionRegex{ Regexp: func() *regexp.Regexp { reg, _ := regexp.Compile("^(us|eu|ap|sa|ca|me|af)\\-\\w+\\-\\d+$") return reg }(), }, Defaults: endpoint{ Hostname: "{service}.{region}.{dnsSuffix}", Protocols: []string{"https"}, SignatureVersions: []string{"v4"}, }, Regions: regions{ "af-south-1": region{ Description: "Africa (Cape Town)", }, "ap-east-1": region{ Description: "Asia Pacific (Hong Kong)", }, "ap-northeast-1": region{ Description: "Asia Pacific (Tokyo)", }, "ap-northeast-2": region{ Description: "Asia Pacific (Seoul)", }, "ap-northeast-3": region{ Description: "Asia Pacific (Osaka)", }, "ap-south-1": region{ Description: "Asia Pacific (Mumbai)", }, "ap-southeast-1": region{ Description: "Asia Pacific (Singapore)", }, "ap-southeast-2": region{ Description: "Asia Pacific (Sydney)", }, "ca-central-1": region{ Description: "Canada (Central)", }, "eu-central-1": region{ Description: "Europe (Frankfurt)", }, "eu-north-1": region{ Description: "Europe (Stockholm)", }, "eu-south-1": region{ Description: "Europe (Milan)", }, "eu-west-1": region{ Description: "Europe (Ireland)", }, "eu-west-2": region{ Description: "Europe (London)", }, "eu-west-3": region{ Description: "Europe (Paris)", }, "me-south-1": region{ Description: "Middle East (Bahrain)", }, "sa-east-1": region{ Description: "South America (Sao Paulo)", }, "us-east-1": region{ Description: "US East (N. Virginia)", }, "us-east-2": region{ Description: "US East (Ohio)", }, "us-west-1": region{ Description: "US West (N. California)", }, "us-west-2": region{ Description: "US West (Oregon)", }, }, Services: services{ "a4b": service{ Endpoints: endpoints{ "us-east-1": endpoint{}, }, }, "access-analyzer": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "access-analyzer-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "access-analyzer-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "access-analyzer-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "access-analyzer-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "access-analyzer-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "acm": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "ca-central-1-fips": endpoint{ Hostname: "acm-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "acm-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "acm-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "acm-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "acm-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "acm-pca": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "acm-pca-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "acm-pca-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "acm-pca-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "acm-pca-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "acm-pca-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "airflow": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "amplify": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "amplifybackend": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "api.detective": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "api.detective-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "api.detective-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "api.detective-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "api.detective-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "api.ecr": service{ Endpoints: endpoints{ "af-south-1": endpoint{ Hostname: "api.ecr.af-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "af-south-1", }, }, "ap-east-1": endpoint{ Hostname: "api.ecr.ap-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-east-1", }, }, "ap-northeast-1": endpoint{ Hostname: "api.ecr.ap-northeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "ap-northeast-2": endpoint{ Hostname: "api.ecr.ap-northeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-2", }, }, "ap-northeast-3": endpoint{ Hostname: "api.ecr.ap-northeast-3.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-3", }, }, "ap-south-1": endpoint{ Hostname: "api.ecr.ap-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-south-1", }, }, "ap-southeast-1": endpoint{ Hostname: "api.ecr.ap-southeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "ap-southeast-2": endpoint{ Hostname: "api.ecr.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "ca-central-1": endpoint{ Hostname: "api.ecr.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "eu-central-1": endpoint{ Hostname: "api.ecr.eu-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "eu-north-1": endpoint{ Hostname: "api.ecr.eu-north-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-north-1", }, }, "eu-south-1": endpoint{ Hostname: "api.ecr.eu-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-south-1", }, }, "eu-west-1": endpoint{ Hostname: "api.ecr.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "eu-west-2": endpoint{ Hostname: "api.ecr.eu-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "eu-west-3": endpoint{ Hostname: "api.ecr.eu-west-3.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-3", }, }, "fips-dkr-us-east-1": endpoint{ Hostname: "ecr-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-dkr-us-east-2": endpoint{ Hostname: "ecr-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-dkr-us-west-1": endpoint{ Hostname: "ecr-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-dkr-us-west-2": endpoint{ Hostname: "ecr-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "fips-us-east-1": endpoint{ Hostname: "ecr-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "ecr-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "ecr-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "ecr-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{ Hostname: "api.ecr.me-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "me-south-1", }, }, "sa-east-1": endpoint{ Hostname: "api.ecr.sa-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "sa-east-1", }, }, "us-east-1": endpoint{ Hostname: "api.ecr.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{ Hostname: "api.ecr.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{ Hostname: "api.ecr.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{ Hostname: "api.ecr.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "api.elastic-inference": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{ Hostname: "api.elastic-inference.ap-northeast-1.amazonaws.com", }, "ap-northeast-2": endpoint{ Hostname: "api.elastic-inference.ap-northeast-2.amazonaws.com", }, "eu-west-1": endpoint{ Hostname: "api.elastic-inference.eu-west-1.amazonaws.com", }, "us-east-1": endpoint{ Hostname: "api.elastic-inference.us-east-1.amazonaws.com", }, "us-east-2": endpoint{ Hostname: "api.elastic-inference.us-east-2.amazonaws.com", }, "us-west-2": endpoint{ Hostname: "api.elastic-inference.us-west-2.amazonaws.com", }, }, }, "api.fleethub.iot": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "api.fleethub.iot-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "api.fleethub.iot-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "api.fleethub.iot-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-2": endpoint{ Hostname: "api.fleethub.iot-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "api.mediatailor": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "api.pricing": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "pricing", }, }, Endpoints: endpoints{ "ap-south-1": endpoint{}, "us-east-1": endpoint{}, }, }, "api.sagemaker": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "api-fips.sagemaker.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "api-fips.sagemaker.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "api-fips.sagemaker.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "api-fips.sagemaker.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "apigateway": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "app-integrations": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "appflow": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "application-autoscaling": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "appmesh": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "apprunner": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "appstream2": service{ Defaults: endpoint{ Protocols: []string{"https"}, CredentialScope: credentialScope{ Service: "appstream", }, }, Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "fips": endpoint{ Hostname: "appstream2-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "appsync": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "athena": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "athena-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "athena-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "athena-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "athena-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "autoscaling": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "autoscaling-plans": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "backup": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "batch": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "fips.batch.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "fips.batch.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "fips.batch.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "fips.batch.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "budgets": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "budgets.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, }, }, "ce": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "ce.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, }, }, "chime": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedFalse, Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "chime.us-east-1.amazonaws.com", Protocols: []string{"https"}, CredentialScope: credentialScope{ Region: "us-east-1", }, }, }, }, "cloud9": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "clouddirectory": service{ Endpoints: endpoints{ "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "cloudformation": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "cloudformation-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "cloudformation-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "cloudformation-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "cloudformation-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "cloudfront": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "cloudfront.amazonaws.com", Protocols: []string{"http", "https"}, CredentialScope: credentialScope{ Region: "us-east-1", }, }, }, }, "cloudhsm": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "cloudhsmv2": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "cloudhsm", }, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "cloudsearch": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "cloudtrail": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "cloudtrail-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "cloudtrail-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "cloudtrail-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "cloudtrail-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "codeartifact": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "codebuild": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "codebuild-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "codebuild-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "codebuild-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "codebuild-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "codecommit": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips": endpoint{ Hostname: "codecommit-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "codedeploy": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "codedeploy-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "codedeploy-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "codedeploy-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "codedeploy-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "codeguru-reviewer": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "codepipeline": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "codepipeline-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "codepipeline-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "codepipeline-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "codepipeline-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "codepipeline-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "codestar": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "codestar-connections": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "cognito-identity": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "cognito-identity-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "cognito-identity-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-2": endpoint{ Hostname: "cognito-identity-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "cognito-idp": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "cognito-idp-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "cognito-idp-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "cognito-idp-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "cognito-idp-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "cognito-sync": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "comprehend": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "comprehend-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "comprehend-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-2": endpoint{ Hostname: "comprehend-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "comprehendmedical": service{ Endpoints: endpoints{ "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "comprehendmedical-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "comprehendmedical-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-2": endpoint{ Hostname: "comprehendmedical-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "config": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "config-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "config-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "config-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "config-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "connect": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "contact-lens": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "cur": service{ Endpoints: endpoints{ "us-east-1": endpoint{}, }, }, "data.mediastore": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "dataexchange": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "datapipeline": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "datasync": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "datasync-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "datasync-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "datasync-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "datasync-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "datasync-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "dax": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "devicefarm": service{ Endpoints: endpoints{ "us-west-2": endpoint{}, }, }, "directconnect": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "directconnect-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "directconnect-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "directconnect-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "directconnect-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "discovery": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "dms": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "dms-fips": endpoint{ Hostname: "dms-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "docdb": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{ Hostname: "rds.ap-northeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "ap-northeast-2": endpoint{ Hostname: "rds.ap-northeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-2", }, }, "ap-south-1": endpoint{ Hostname: "rds.ap-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-south-1", }, }, "ap-southeast-1": endpoint{ Hostname: "rds.ap-southeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "ap-southeast-2": endpoint{ Hostname: "rds.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "ca-central-1": endpoint{ Hostname: "rds.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "eu-central-1": endpoint{ Hostname: "rds.eu-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "eu-west-1": endpoint{ Hostname: "rds.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "eu-west-2": endpoint{ Hostname: "rds.eu-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "eu-west-3": endpoint{ Hostname: "rds.eu-west-3.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-3", }, }, "sa-east-1": endpoint{ Hostname: "rds.sa-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "sa-east-1", }, }, "us-east-1": endpoint{ Hostname: "rds.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{ Hostname: "rds.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-2": endpoint{ Hostname: "rds.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "ds": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "ds-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "ds-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "ds-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "ds-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "ds-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "dynamodb": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "ca-central-1-fips": endpoint{ Hostname: "dynamodb-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "local": endpoint{ Hostname: "localhost:8000", Protocols: []string{"http"}, CredentialScope: credentialScope{ Region: "us-east-1", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "dynamodb-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "dynamodb-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "dynamodb-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "dynamodb-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "ebs": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "ebs-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "ebs-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "ebs-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "ebs-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "ebs-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "ec2": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "ec2-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "ec2-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "ec2-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "ec2-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "ec2-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "ecs": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "ecs-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "ecs-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "ecs-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "ecs-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "eks": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "fips.eks.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "fips.eks.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "fips.eks.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "fips.eks.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "elasticache": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips": endpoint{ Hostname: "elasticache-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "elasticbeanstalk": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "elasticbeanstalk-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "elasticbeanstalk-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "elasticbeanstalk-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "elasticbeanstalk-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "elasticfilesystem": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-af-south-1": endpoint{ Hostname: "elasticfilesystem-fips.af-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "af-south-1", }, }, "fips-ap-east-1": endpoint{ Hostname: "elasticfilesystem-fips.ap-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-east-1", }, }, "fips-ap-northeast-1": endpoint{ Hostname: "elasticfilesystem-fips.ap-northeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "fips-ap-northeast-2": endpoint{ Hostname: "elasticfilesystem-fips.ap-northeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-2", }, }, "fips-ap-northeast-3": endpoint{ Hostname: "elasticfilesystem-fips.ap-northeast-3.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-3", }, }, "fips-ap-south-1": endpoint{ Hostname: "elasticfilesystem-fips.ap-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-south-1", }, }, "fips-ap-southeast-1": endpoint{ Hostname: "elasticfilesystem-fips.ap-southeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "fips-ap-southeast-2": endpoint{ Hostname: "elasticfilesystem-fips.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "fips-ca-central-1": endpoint{ Hostname: "elasticfilesystem-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-eu-central-1": endpoint{ Hostname: "elasticfilesystem-fips.eu-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "fips-eu-north-1": endpoint{ Hostname: "elasticfilesystem-fips.eu-north-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-north-1", }, }, "fips-eu-south-1": endpoint{ Hostname: "elasticfilesystem-fips.eu-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-south-1", }, }, "fips-eu-west-1": endpoint{ Hostname: "elasticfilesystem-fips.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "fips-eu-west-2": endpoint{ Hostname: "elasticfilesystem-fips.eu-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "fips-eu-west-3": endpoint{ Hostname: "elasticfilesystem-fips.eu-west-3.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-3", }, }, "fips-me-south-1": endpoint{ Hostname: "elasticfilesystem-fips.me-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "me-south-1", }, }, "fips-sa-east-1": endpoint{ Hostname: "elasticfilesystem-fips.sa-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "sa-east-1", }, }, "fips-us-east-1": endpoint{ Hostname: "elasticfilesystem-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "elasticfilesystem-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "elasticfilesystem-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "elasticfilesystem-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "elasticloadbalancing": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "elasticloadbalancing-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "elasticloadbalancing-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "elasticloadbalancing-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "elasticloadbalancing-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "elasticmapreduce": service{ Defaults: endpoint{ SSLCommonName: "{region}.{service}.{dnsSuffix}", Protocols: []string{"https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{ SSLCommonName: "{service}.{region}.{dnsSuffix}", }, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "elasticmapreduce-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "elasticmapreduce-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "elasticmapreduce-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "elasticmapreduce-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "elasticmapreduce-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{ SSLCommonName: "{service}.{region}.{dnsSuffix}", }, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "elastictranscoder": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "email": service{ Endpoints: endpoints{ "ap-south-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "emr-containers": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "emr-containers-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "emr-containers-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "emr-containers-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "emr-containers-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "emr-containers-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "entitlement.marketplace": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "aws-marketplace", }, }, Endpoints: endpoints{ "us-east-1": endpoint{}, }, }, "es": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips": endpoint{ Hostname: "es-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "events": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "events-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "events-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "events-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "events-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "finspace": service{ Endpoints: endpoints{ "ca-central-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "finspace-api": service{ Endpoints: endpoints{ "ca-central-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "firehose": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "firehose-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "firehose-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "firehose-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "firehose-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "fms": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-af-south-1": endpoint{ Hostname: "fms-fips.af-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "af-south-1", }, }, "fips-ap-east-1": endpoint{ Hostname: "fms-fips.ap-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-east-1", }, }, "fips-ap-northeast-1": endpoint{ Hostname: "fms-fips.ap-northeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "fips-ap-northeast-2": endpoint{ Hostname: "fms-fips.ap-northeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-2", }, }, "fips-ap-south-1": endpoint{ Hostname: "fms-fips.ap-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-south-1", }, }, "fips-ap-southeast-1": endpoint{ Hostname: "fms-fips.ap-southeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "fips-ap-southeast-2": endpoint{ Hostname: "fms-fips.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "fips-ca-central-1": endpoint{ Hostname: "fms-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-eu-central-1": endpoint{ Hostname: "fms-fips.eu-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "fips-eu-south-1": endpoint{ Hostname: "fms-fips.eu-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-south-1", }, }, "fips-eu-west-1": endpoint{ Hostname: "fms-fips.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "fips-eu-west-2": endpoint{ Hostname: "fms-fips.eu-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "fips-eu-west-3": endpoint{ Hostname: "fms-fips.eu-west-3.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-3", }, }, "fips-me-south-1": endpoint{ Hostname: "fms-fips.me-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "me-south-1", }, }, "fips-sa-east-1": endpoint{ Hostname: "fms-fips.sa-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "sa-east-1", }, }, "fips-us-east-1": endpoint{ Hostname: "fms-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "fms-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "fms-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "fms-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "forecast": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "forecast-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "forecast-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-2": endpoint{ Hostname: "forecast-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "forecastquery": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "forecastquery-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "forecastquery-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-2": endpoint{ Hostname: "forecastquery-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "fsx": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-prod-ca-central-1": endpoint{ Hostname: "fsx-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-prod-us-east-1": endpoint{ Hostname: "fsx-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-prod-us-east-2": endpoint{ Hostname: "fsx-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-prod-us-west-1": endpoint{ Hostname: "fsx-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-prod-us-west-2": endpoint{ Hostname: "fsx-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "gamelift": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "glacier": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "glacier-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "glacier-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "glacier-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "glacier-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "glacier-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "glue": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "glue-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "glue-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "glue-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "glue-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "greengrass": service{ IsRegionalized: boxedTrue, Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "groundstation": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "groundstation-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "groundstation-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-2": endpoint{ Hostname: "groundstation-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "guardduty": service{ IsRegionalized: boxedTrue, Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "guardduty-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "guardduty-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "guardduty-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "guardduty-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "health": service{ Endpoints: endpoints{ "fips-us-east-2": endpoint{ Hostname: "health-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, }, }, "healthlake": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "honeycode": service{ Endpoints: endpoints{ "us-west-2": endpoint{}, }, }, "iam": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "iam.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "iam-fips": endpoint{ Hostname: "iam-fips.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, }, }, "identitystore": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "importexport": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "importexport.amazonaws.com", SignatureVersions: []string{"v2", "v4"}, CredentialScope: credentialScope{ Region: "us-east-1", Service: "IngestionService", }, }, }, }, "inspector": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "inspector-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "inspector-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "inspector-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "inspector-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "iot": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "execute-api", }, }, Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "iotanalytics": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "iotevents": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "ioteventsdata": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{ Hostname: "data.iotevents.ap-northeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "ap-northeast-2": endpoint{ Hostname: "data.iotevents.ap-northeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-2", }, }, "ap-southeast-1": endpoint{ Hostname: "data.iotevents.ap-southeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "ap-southeast-2": endpoint{ Hostname: "data.iotevents.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "eu-central-1": endpoint{ Hostname: "data.iotevents.eu-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "eu-west-1": endpoint{ Hostname: "data.iotevents.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "eu-west-2": endpoint{ Hostname: "data.iotevents.eu-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "us-east-1": endpoint{ Hostname: "data.iotevents.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{ Hostname: "data.iotevents.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-2": endpoint{ Hostname: "data.iotevents.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "iotsecuredtunneling": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "iotthingsgraph": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "iotthingsgraph", }, }, Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-2": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "iotwireless": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{ Hostname: "api.iotwireless.ap-northeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "ap-southeast-2": endpoint{ Hostname: "api.iotwireless.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "eu-west-1": endpoint{ Hostname: "api.iotwireless.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "us-east-1": endpoint{ Hostname: "api.iotwireless.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-west-2": endpoint{ Hostname: "api.iotwireless.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "kafka": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "kinesis": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "kinesis-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "kinesis-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "kinesis-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "kinesis-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "kinesisanalytics": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "kinesisvideo": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "kms": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "lakeformation": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "lakeformation-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "lakeformation-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "lakeformation-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "lakeformation-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "lambda": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "lambda-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "lambda-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "lambda-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "lambda-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "license-manager": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "license-manager-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "license-manager-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "license-manager-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "license-manager-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "lightsail": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "logs": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "logs-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "logs-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "logs-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "logs-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "lookoutequipment": service{ Endpoints: endpoints{ "ap-northeast-2": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, }, }, "lookoutvision": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "machinelearning": service{ Endpoints: endpoints{ "eu-west-1": endpoint{}, "us-east-1": endpoint{}, }, }, "macie": service{ Endpoints: endpoints{ "fips-us-east-1": endpoint{ Hostname: "macie-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-west-2": endpoint{ Hostname: "macie-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "macie2": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "macie2-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "macie2-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "macie2-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "macie2-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "managedblockchain": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, }, }, "marketplacecommerceanalytics": service{ Endpoints: endpoints{ "us-east-1": endpoint{}, }, }, "mediaconnect": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "mediaconvert": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "mediaconvert-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "mediaconvert-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "mediaconvert-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "mediaconvert-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "mediaconvert-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "medialive": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "medialive-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "medialive-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-2": endpoint{ Hostname: "medialive-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "mediapackage": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "mediastore": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "metering.marketplace": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "aws-marketplace", }, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "mgh": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "mobileanalytics": service{ Endpoints: endpoints{ "us-east-1": endpoint{}, }, }, "models.lex": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "lex", }, }, Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "models-fips.lex.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "models-fips.lex.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "monitoring": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "monitoring-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "monitoring-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "monitoring-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "monitoring-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "mq": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "mq-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "mq-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "mq-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "mq-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "mturk-requester": service{ IsRegionalized: boxedFalse, Endpoints: endpoints{ "sandbox": endpoint{ Hostname: "mturk-requester-sandbox.us-east-1.amazonaws.com", }, "us-east-1": endpoint{}, }, }, "neptune": service{ Endpoints: endpoints{ "ap-east-1": endpoint{ Hostname: "rds.ap-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-east-1", }, }, "ap-northeast-1": endpoint{ Hostname: "rds.ap-northeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "ap-northeast-2": endpoint{ Hostname: "rds.ap-northeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-2", }, }, "ap-south-1": endpoint{ Hostname: "rds.ap-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-south-1", }, }, "ap-southeast-1": endpoint{ Hostname: "rds.ap-southeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "ap-southeast-2": endpoint{ Hostname: "rds.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "ca-central-1": endpoint{ Hostname: "rds.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "eu-central-1": endpoint{ Hostname: "rds.eu-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "eu-north-1": endpoint{ Hostname: "rds.eu-north-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-north-1", }, }, "eu-west-1": endpoint{ Hostname: "rds.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "eu-west-2": endpoint{ Hostname: "rds.eu-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "eu-west-3": endpoint{ Hostname: "rds.eu-west-3.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-3", }, }, "me-south-1": endpoint{ Hostname: "rds.me-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "me-south-1", }, }, "sa-east-1": endpoint{ Hostname: "rds.sa-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "sa-east-1", }, }, "us-east-1": endpoint{ Hostname: "rds.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{ Hostname: "rds.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{ Hostname: "rds.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{ Hostname: "rds.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "oidc": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{ Hostname: "oidc.ap-northeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "ap-northeast-2": endpoint{ Hostname: "oidc.ap-northeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-2", }, }, "ap-south-1": endpoint{ Hostname: "oidc.ap-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-south-1", }, }, "ap-southeast-1": endpoint{ Hostname: "oidc.ap-southeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "ap-southeast-2": endpoint{ Hostname: "oidc.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "ca-central-1": endpoint{ Hostname: "oidc.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "eu-central-1": endpoint{ Hostname: "oidc.eu-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "eu-north-1": endpoint{ Hostname: "oidc.eu-north-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-north-1", }, }, "eu-west-1": endpoint{ Hostname: "oidc.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "eu-west-2": endpoint{ Hostname: "oidc.eu-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "eu-west-3": endpoint{ Hostname: "oidc.eu-west-3.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-3", }, }, "us-east-1": endpoint{ Hostname: "oidc.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{ Hostname: "oidc.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-2": endpoint{ Hostname: "oidc.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "opsworks": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "opsworks-cm": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "organizations": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "organizations.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-aws-global": endpoint{ Hostname: "organizations-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, }, }, "outposts": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "outposts-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "outposts-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "outposts-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "outposts-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "outposts-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "personalize": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "pinpoint": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "mobiletargeting", }, }, Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "pinpoint-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-west-2": endpoint{ Hostname: "pinpoint-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{ Hostname: "pinpoint.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-west-2": endpoint{ Hostname: "pinpoint.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "polly": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "polly-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "polly-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "polly-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "polly-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "portal.sso": service{ Endpoints: endpoints{ "ap-southeast-1": endpoint{ Hostname: "portal.sso.ap-southeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "ap-southeast-2": endpoint{ Hostname: "portal.sso.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "ca-central-1": endpoint{ Hostname: "portal.sso.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "eu-central-1": endpoint{ Hostname: "portal.sso.eu-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "eu-west-1": endpoint{ Hostname: "portal.sso.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "eu-west-2": endpoint{ Hostname: "portal.sso.eu-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "us-east-1": endpoint{ Hostname: "portal.sso.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{ Hostname: "portal.sso.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-2": endpoint{ Hostname: "portal.sso.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "profile": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "projects.iot1click": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "qldb": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "qldb-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "qldb-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-2": endpoint{ Hostname: "qldb-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "ram": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "ram-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "ram-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "ram-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "ram-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "ram-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "rds": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "rds-fips.ca-central-1": endpoint{ Hostname: "rds-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "rds-fips.us-east-1": endpoint{ Hostname: "rds-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "rds-fips.us-east-2": endpoint{ Hostname: "rds-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "rds-fips.us-west-1": endpoint{ Hostname: "rds-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "rds-fips.us-west-2": endpoint{ Hostname: "rds-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "sa-east-1": endpoint{}, "us-east-1": endpoint{ SSLCommonName: "{service}.{dnsSuffix}", }, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "redshift": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "redshift-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "redshift-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "redshift-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "redshift-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "redshift-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "rekognition": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "rekognition-fips.ca-central-1": endpoint{ Hostname: "rekognition-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "rekognition-fips.us-east-1": endpoint{ Hostname: "rekognition-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "rekognition-fips.us-east-2": endpoint{ Hostname: "rekognition-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "rekognition-fips.us-west-1": endpoint{ Hostname: "rekognition-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "rekognition-fips.us-west-2": endpoint{ Hostname: "rekognition-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "resource-groups": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "resource-groups-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "resource-groups-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "resource-groups-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "resource-groups-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "robomaker": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "route53": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "route53.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-aws-global": endpoint{ Hostname: "route53-fips.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, }, }, "route53-recovery-control-config": service{ Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "route53-recovery-control-config.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "route53domains": service{ Endpoints: endpoints{ "us-east-1": endpoint{}, }, }, "route53resolver": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "runtime.lex": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "lex", }, }, Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "runtime-fips.lex.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "runtime-fips.lex.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "runtime.sagemaker": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "runtime-fips.sagemaker.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "runtime-fips.sagemaker.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "runtime-fips.sagemaker.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "runtime-fips.sagemaker.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "s3": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedTrue, Defaults: endpoint{ Protocols: []string{"http", "https"}, SignatureVersions: []string{"s3v4"}, HasDualStack: boxedTrue, DualStackHostname: "{service}.dualstack.{region}.{dnsSuffix}", }, Endpoints: endpoints{ "accesspoint-af-south-1": endpoint{ Hostname: "s3-accesspoint.af-south-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-ap-east-1": endpoint{ Hostname: "s3-accesspoint.ap-east-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-ap-northeast-1": endpoint{ Hostname: "s3-accesspoint.ap-northeast-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-ap-northeast-2": endpoint{ Hostname: "s3-accesspoint.ap-northeast-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-ap-northeast-3": endpoint{ Hostname: "s3-accesspoint.ap-northeast-3.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-ap-south-1": endpoint{ Hostname: "s3-accesspoint.ap-south-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-ap-southeast-1": endpoint{ Hostname: "s3-accesspoint.ap-southeast-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-ap-southeast-2": endpoint{ Hostname: "s3-accesspoint.ap-southeast-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-ca-central-1": endpoint{ Hostname: "s3-accesspoint.ca-central-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-eu-central-1": endpoint{ Hostname: "s3-accesspoint.eu-central-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-eu-north-1": endpoint{ Hostname: "s3-accesspoint.eu-north-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-eu-south-1": endpoint{ Hostname: "s3-accesspoint.eu-south-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-eu-west-1": endpoint{ Hostname: "s3-accesspoint.eu-west-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-eu-west-2": endpoint{ Hostname: "s3-accesspoint.eu-west-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-eu-west-3": endpoint{ Hostname: "s3-accesspoint.eu-west-3.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-me-south-1": endpoint{ Hostname: "s3-accesspoint.me-south-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-sa-east-1": endpoint{ Hostname: "s3-accesspoint.sa-east-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-us-east-1": endpoint{ Hostname: "s3-accesspoint.us-east-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-us-east-2": endpoint{ Hostname: "s3-accesspoint.us-east-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-us-west-1": endpoint{ Hostname: "s3-accesspoint.us-west-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-us-west-2": endpoint{ Hostname: "s3-accesspoint.us-west-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{ Hostname: "s3.ap-northeast-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{ Hostname: "s3.ap-southeast-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "ap-southeast-2": endpoint{ Hostname: "s3.ap-southeast-2.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "aws-global": endpoint{ Hostname: "s3.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, CredentialScope: credentialScope{ Region: "us-east-1", }, }, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{ Hostname: "s3.eu-west-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-accesspoint-ca-central-1": endpoint{ Hostname: "s3-accesspoint-fips.ca-central-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "fips-accesspoint-us-east-1": endpoint{ Hostname: "s3-accesspoint-fips.us-east-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "fips-accesspoint-us-east-2": endpoint{ Hostname: "s3-accesspoint-fips.us-east-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "fips-accesspoint-us-west-1": endpoint{ Hostname: "s3-accesspoint-fips.us-west-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "fips-accesspoint-us-west-2": endpoint{ Hostname: "s3-accesspoint-fips.us-west-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "me-south-1": endpoint{}, "s3-external-1": endpoint{ Hostname: "s3-external-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, CredentialScope: credentialScope{ Region: "us-east-1", }, }, "sa-east-1": endpoint{ Hostname: "s3.sa-east-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "us-east-1": endpoint{ Hostname: "s3.us-east-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "us-east-2": endpoint{}, "us-west-1": endpoint{ Hostname: "s3.us-west-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "us-west-2": endpoint{ Hostname: "s3.us-west-2.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, }, }, "s3-control": service{ Defaults: endpoint{ Protocols: []string{"https"}, SignatureVersions: []string{"s3v4"}, HasDualStack: boxedTrue, DualStackHostname: "{service}.dualstack.{region}.{dnsSuffix}", }, Endpoints: endpoints{ "ap-northeast-1": endpoint{ Hostname: "s3-control.ap-northeast-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "ap-northeast-2": endpoint{ Hostname: "s3-control.ap-northeast-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "ap-northeast-2", }, }, "ap-northeast-3": endpoint{ Hostname: "s3-control.ap-northeast-3.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "ap-northeast-3", }, }, "ap-south-1": endpoint{ Hostname: "s3-control.ap-south-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "ap-south-1", }, }, "ap-southeast-1": endpoint{ Hostname: "s3-control.ap-southeast-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "ap-southeast-2": endpoint{ Hostname: "s3-control.ap-southeast-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "ca-central-1": endpoint{ Hostname: "s3-control.ca-central-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "ca-central-1-fips": endpoint{ Hostname: "s3-control-fips.ca-central-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "eu-central-1": endpoint{ Hostname: "s3-control.eu-central-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "eu-north-1": endpoint{ Hostname: "s3-control.eu-north-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "eu-north-1", }, }, "eu-west-1": endpoint{ Hostname: "s3-control.eu-west-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "eu-west-2": endpoint{ Hostname: "s3-control.eu-west-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "eu-west-3": endpoint{ Hostname: "s3-control.eu-west-3.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "eu-west-3", }, }, "sa-east-1": endpoint{ Hostname: "s3-control.sa-east-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "sa-east-1", }, }, "us-east-1": endpoint{ Hostname: "s3-control.us-east-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-1-fips": endpoint{ Hostname: "s3-control-fips.us-east-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{ Hostname: "s3-control.us-east-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-east-2-fips": endpoint{ Hostname: "s3-control-fips.us-east-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{ Hostname: "s3-control.us-west-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-1-fips": endpoint{ Hostname: "s3-control-fips.us-west-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{ Hostname: "s3-control.us-west-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-west-2-fips": endpoint{ Hostname: "s3-control-fips.us-west-2.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "savingsplans": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "savingsplans.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, }, }, "schemas": service{ Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "sdb": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, SignatureVersions: []string{"v2"}, }, Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-west-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{ Hostname: "sdb.amazonaws.com", }, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "secretsmanager": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "secretsmanager-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "secretsmanager-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "secretsmanager-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "secretsmanager-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "securityhub": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "securityhub-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "securityhub-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "securityhub-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "securityhub-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "serverlessrepo": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "ap-east-1": endpoint{ Protocols: []string{"https"}, }, "ap-northeast-1": endpoint{ Protocols: []string{"https"}, }, "ap-northeast-2": endpoint{ Protocols: []string{"https"}, }, "ap-south-1": endpoint{ Protocols: []string{"https"}, }, "ap-southeast-1": endpoint{ Protocols: []string{"https"}, }, "ap-southeast-2": endpoint{ Protocols: []string{"https"}, }, "ca-central-1": endpoint{ Protocols: []string{"https"}, }, "eu-central-1": endpoint{ Protocols: []string{"https"}, }, "eu-north-1": endpoint{ Protocols: []string{"https"}, }, "eu-west-1": endpoint{ Protocols: []string{"https"}, }, "eu-west-2": endpoint{ Protocols: []string{"https"}, }, "eu-west-3": endpoint{ Protocols: []string{"https"}, }, "me-south-1": endpoint{ Protocols: []string{"https"}, }, "sa-east-1": endpoint{ Protocols: []string{"https"}, }, "us-east-1": endpoint{ Protocols: []string{"https"}, }, "us-east-2": endpoint{ Protocols: []string{"https"}, }, "us-west-1": endpoint{ Protocols: []string{"https"}, }, "us-west-2": endpoint{ Protocols: []string{"https"}, }, }, }, "servicecatalog": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "servicecatalog-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "servicecatalog-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "servicecatalog-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "servicecatalog-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "servicecatalog-appregistry": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "servicecatalog-appregistry-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "servicecatalog-appregistry-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "servicecatalog-appregistry-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "servicecatalog-appregistry-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "servicecatalog-appregistry-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "servicediscovery": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "servicediscovery-fips": endpoint{ Hostname: "servicediscovery-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "servicequotas": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "session.qldb": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "session.qldb-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "session.qldb-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-2": endpoint{ Hostname: "session.qldb-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "shield": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedFalse, Defaults: endpoint{ SSLCommonName: "shield.us-east-1.amazonaws.com", Protocols: []string{"https"}, }, Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "shield.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-aws-global": endpoint{ Hostname: "shield-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, }, }, "sms": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "sms-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "sms-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "sms-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "sms-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "snowball": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ap-northeast-1": endpoint{ Hostname: "snowball-fips.ap-northeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "fips-ap-northeast-2": endpoint{ Hostname: "snowball-fips.ap-northeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-2", }, }, "fips-ap-northeast-3": endpoint{ Hostname: "snowball-fips.ap-northeast-3.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-3", }, }, "fips-ap-south-1": endpoint{ Hostname: "snowball-fips.ap-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-south-1", }, }, "fips-ap-southeast-1": endpoint{ Hostname: "snowball-fips.ap-southeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "fips-ap-southeast-2": endpoint{ Hostname: "snowball-fips.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "fips-ca-central-1": endpoint{ Hostname: "snowball-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-eu-central-1": endpoint{ Hostname: "snowball-fips.eu-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "fips-eu-west-1": endpoint{ Hostname: "snowball-fips.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "fips-eu-west-2": endpoint{ Hostname: "snowball-fips.eu-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "fips-eu-west-3": endpoint{ Hostname: "snowball-fips.eu-west-3.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-3", }, }, "fips-sa-east-1": endpoint{ Hostname: "snowball-fips.sa-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "sa-east-1", }, }, "fips-us-east-1": endpoint{ Hostname: "snowball-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "snowball-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "snowball-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "snowball-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "sns": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "sns-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "sns-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "sns-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "sns-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "sqs": service{ Defaults: endpoint{ SSLCommonName: "{region}.queue.{dnsSuffix}", Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "sqs-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "sqs-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "sqs-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "sqs-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{ SSLCommonName: "queue.{dnsSuffix}", }, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "ssm": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "ssm-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "ssm-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "ssm-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "ssm-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "ssm-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "states": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "states-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "states-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "states-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "states-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "storagegateway": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips": endpoint{ Hostname: "storagegateway-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "streams.dynamodb": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, CredentialScope: credentialScope{ Service: "dynamodb", }, }, Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "ca-central-1-fips": endpoint{ Hostname: "dynamodb-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "local": endpoint{ Hostname: "localhost:8000", Protocols: []string{"http"}, CredentialScope: credentialScope{ Region: "us-east-1", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "dynamodb-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "dynamodb-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "dynamodb-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "dynamodb-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "sts": service{ PartitionEndpoint: "aws-global", Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "aws-global": endpoint{ Hostname: "sts.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "sts-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "sts-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "sts-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "sts-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "support": service{ PartitionEndpoint: "aws-global", Endpoints: endpoints{ "aws-global": endpoint{ Hostname: "support.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, }, }, "swf": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "swf-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "swf-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "swf-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "swf-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "tagging": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "transcribe": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "fips.transcribe.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "fips.transcribe.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "fips.transcribe.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "fips.transcribe.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "transcribestreaming": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-2": endpoint{}, }, }, "transfer": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-ca-central-1": endpoint{ Hostname: "transfer-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-us-east-1": endpoint{ Hostname: "transfer-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "transfer-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "transfer-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "transfer-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, "translate": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "translate-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "translate-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "translate-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "waf": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-fips": endpoint{ Hostname: "waf-fips.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "aws-global": endpoint{ Hostname: "waf.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, }, }, "waf-regional": service{ Endpoints: endpoints{ "af-south-1": endpoint{ Hostname: "waf-regional.af-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "af-south-1", }, }, "ap-east-1": endpoint{ Hostname: "waf-regional.ap-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-east-1", }, }, "ap-northeast-1": endpoint{ Hostname: "waf-regional.ap-northeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "ap-northeast-2": endpoint{ Hostname: "waf-regional.ap-northeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-2", }, }, "ap-northeast-3": endpoint{ Hostname: "waf-regional.ap-northeast-3.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-3", }, }, "ap-south-1": endpoint{ Hostname: "waf-regional.ap-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-south-1", }, }, "ap-southeast-1": endpoint{ Hostname: "waf-regional.ap-southeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "ap-southeast-2": endpoint{ Hostname: "waf-regional.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "ca-central-1": endpoint{ Hostname: "waf-regional.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "eu-central-1": endpoint{ Hostname: "waf-regional.eu-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "eu-north-1": endpoint{ Hostname: "waf-regional.eu-north-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-north-1", }, }, "eu-south-1": endpoint{ Hostname: "waf-regional.eu-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-south-1", }, }, "eu-west-1": endpoint{ Hostname: "waf-regional.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "eu-west-2": endpoint{ Hostname: "waf-regional.eu-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "eu-west-3": endpoint{ Hostname: "waf-regional.eu-west-3.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-3", }, }, "fips-af-south-1": endpoint{ Hostname: "waf-regional-fips.af-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "af-south-1", }, }, "fips-ap-east-1": endpoint{ Hostname: "waf-regional-fips.ap-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-east-1", }, }, "fips-ap-northeast-1": endpoint{ Hostname: "waf-regional-fips.ap-northeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-1", }, }, "fips-ap-northeast-2": endpoint{ Hostname: "waf-regional-fips.ap-northeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-2", }, }, "fips-ap-northeast-3": endpoint{ Hostname: "waf-regional-fips.ap-northeast-3.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-northeast-3", }, }, "fips-ap-south-1": endpoint{ Hostname: "waf-regional-fips.ap-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-south-1", }, }, "fips-ap-southeast-1": endpoint{ Hostname: "waf-regional-fips.ap-southeast-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-1", }, }, "fips-ap-southeast-2": endpoint{ Hostname: "waf-regional-fips.ap-southeast-2.amazonaws.com", CredentialScope: credentialScope{ Region: "ap-southeast-2", }, }, "fips-ca-central-1": endpoint{ Hostname: "waf-regional-fips.ca-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "ca-central-1", }, }, "fips-eu-central-1": endpoint{ Hostname: "waf-regional-fips.eu-central-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-central-1", }, }, "fips-eu-north-1": endpoint{ Hostname: "waf-regional-fips.eu-north-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-north-1", }, }, "fips-eu-south-1": endpoint{ Hostname: "waf-regional-fips.eu-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-south-1", }, }, "fips-eu-west-1": endpoint{ Hostname: "waf-regional-fips.eu-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-1", }, }, "fips-eu-west-2": endpoint{ Hostname: "waf-regional-fips.eu-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-2", }, }, "fips-eu-west-3": endpoint{ Hostname: "waf-regional-fips.eu-west-3.amazonaws.com", CredentialScope: credentialScope{ Region: "eu-west-3", }, }, "fips-me-south-1": endpoint{ Hostname: "waf-regional-fips.me-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "me-south-1", }, }, "fips-sa-east-1": endpoint{ Hostname: "waf-regional-fips.sa-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "sa-east-1", }, }, "fips-us-east-1": endpoint{ Hostname: "waf-regional-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "waf-regional-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "waf-regional-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "waf-regional-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{ Hostname: "waf-regional.me-south-1.amazonaws.com", CredentialScope: credentialScope{ Region: "me-south-1", }, }, "sa-east-1": endpoint{ Hostname: "waf-regional.sa-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "sa-east-1", }, }, "us-east-1": endpoint{ Hostname: "waf-regional.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{ Hostname: "waf-regional.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{ Hostname: "waf-regional.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{ Hostname: "waf-regional.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, "workdocs": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "eu-west-1": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "workdocs-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-west-2": endpoint{ Hostname: "workdocs-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "workmail": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "eu-west-1": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "workspaces": service{ Endpoints: endpoints{ "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "workspaces-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-west-2": endpoint{ Hostname: "workspaces-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-west-2": endpoint{}, }, }, "xray": service{ Endpoints: endpoints{ "af-south-1": endpoint{}, "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-south-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "fips-us-east-1": endpoint{ Hostname: "xray-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "fips-us-east-2": endpoint{ Hostname: "xray-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "fips-us-west-1": endpoint{ Hostname: "xray-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "fips-us-west-2": endpoint{ Hostname: "xray-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-2": endpoint{}, "us-west-1": endpoint{}, "us-west-2": endpoint{}, }, }, }, } // AwsCnPartition returns the Resolver for AWS China. func AwsCnPartition() Partition { return awscnPartition.Partition() } var awscnPartition = partition{ ID: "aws-cn", Name: "AWS China", DNSSuffix: "amazonaws.com.cn", RegionRegex: regionRegex{ Regexp: func() *regexp.Regexp { reg, _ := regexp.Compile("^cn\\-\\w+\\-\\d+$") return reg }(), }, Defaults: endpoint{ Hostname: "{service}.{region}.{dnsSuffix}", Protocols: []string{"https"}, SignatureVersions: []string{"v4"}, }, Regions: regions{ "cn-north-1": region{ Description: "China (Beijing)", }, "cn-northwest-1": region{ Description: "China (Ningxia)", }, }, Services: services{ "access-analyzer": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "acm": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "api.ecr": service{ Endpoints: endpoints{ "cn-north-1": endpoint{ Hostname: "api.ecr.cn-north-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-north-1", }, }, "cn-northwest-1": endpoint{ Hostname: "api.ecr.cn-northwest-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "api.sagemaker": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "apigateway": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "application-autoscaling": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "appsync": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "athena": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "autoscaling": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "autoscaling-plans": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "backup": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "batch": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "budgets": service{ PartitionEndpoint: "aws-cn-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-cn-global": endpoint{ Hostname: "budgets.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "ce": service{ PartitionEndpoint: "aws-cn-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-cn-global": endpoint{ Hostname: "ce.cn-northwest-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "cloudformation": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "cloudfront": service{ PartitionEndpoint: "aws-cn-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-cn-global": endpoint{ Hostname: "cloudfront.cn-northwest-1.amazonaws.com.cn", Protocols: []string{"http", "https"}, CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "cloudtrail": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "codebuild": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "codecommit": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "codedeploy": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "cognito-identity": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, }, }, "config": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "cur": service{ Endpoints: endpoints{ "cn-northwest-1": endpoint{}, }, }, "dax": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "directconnect": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "dms": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "docdb": service{ Endpoints: endpoints{ "cn-northwest-1": endpoint{ Hostname: "rds.cn-northwest-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "ds": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "dynamodb": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "ebs": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "ec2": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "ecs": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "eks": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "elasticache": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "elasticbeanstalk": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "elasticfilesystem": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, "fips-cn-north-1": endpoint{ Hostname: "elasticfilesystem-fips.cn-north-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-north-1", }, }, "fips-cn-northwest-1": endpoint{ Hostname: "elasticfilesystem-fips.cn-northwest-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "elasticloadbalancing": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "elasticmapreduce": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "es": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "events": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "firehose": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "fsx": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "gamelift": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "glacier": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "glue": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "greengrass": service{ IsRegionalized: boxedTrue, Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, }, }, "guardduty": service{ IsRegionalized: boxedTrue, Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "health": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "iam": service{ PartitionEndpoint: "aws-cn-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-cn-global": endpoint{ Hostname: "iam.cn-north-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-north-1", }, }, }, }, "iot": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "execute-api", }, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "iotanalytics": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, }, }, "iotevents": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, }, }, "ioteventsdata": service{ Endpoints: endpoints{ "cn-north-1": endpoint{ Hostname: "data.iotevents.cn-north-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-north-1", }, }, }, }, "iotsecuredtunneling": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "kafka": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "kinesis": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "kinesisanalytics": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "kms": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "lakeformation": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "lambda": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "license-manager": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "logs": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "mediaconvert": service{ Endpoints: endpoints{ "cn-northwest-1": endpoint{ Hostname: "subscribe.mediaconvert.cn-northwest-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "monitoring": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "mq": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "neptune": service{ Endpoints: endpoints{ "cn-north-1": endpoint{ Hostname: "rds.cn-north-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-north-1", }, }, "cn-northwest-1": endpoint{ Hostname: "rds.cn-northwest-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "organizations": service{ PartitionEndpoint: "aws-cn-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-cn-global": endpoint{ Hostname: "organizations.cn-northwest-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "personalize": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, }, }, "polly": service{ Endpoints: endpoints{ "cn-northwest-1": endpoint{}, }, }, "ram": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "rds": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "redshift": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "resource-groups": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "route53": service{ PartitionEndpoint: "aws-cn-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-cn-global": endpoint{ Hostname: "route53.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "route53resolver": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "runtime.sagemaker": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "s3": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, SignatureVersions: []string{"s3v4"}, HasDualStack: boxedTrue, DualStackHostname: "{service}.dualstack.{region}.{dnsSuffix}", }, Endpoints: endpoints{ "accesspoint-cn-north-1": endpoint{ Hostname: "s3-accesspoint.cn-north-1.amazonaws.com.cn", SignatureVersions: []string{"s3v4"}, }, "accesspoint-cn-northwest-1": endpoint{ Hostname: "s3-accesspoint.cn-northwest-1.amazonaws.com.cn", SignatureVersions: []string{"s3v4"}, }, "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "s3-control": service{ Defaults: endpoint{ Protocols: []string{"https"}, SignatureVersions: []string{"s3v4"}, HasDualStack: boxedTrue, DualStackHostname: "{service}.dualstack.{region}.{dnsSuffix}", }, Endpoints: endpoints{ "cn-north-1": endpoint{ Hostname: "s3-control.cn-north-1.amazonaws.com.cn", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "cn-north-1", }, }, "cn-northwest-1": endpoint{ Hostname: "s3-control.cn-northwest-1.amazonaws.com.cn", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "secretsmanager": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "securityhub": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "serverlessrepo": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{ Protocols: []string{"https"}, }, "cn-northwest-1": endpoint{ Protocols: []string{"https"}, }, }, }, "servicecatalog": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "servicediscovery": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "sms": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "snowball": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, "fips-cn-north-1": endpoint{ Hostname: "snowball-fips.cn-north-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-north-1", }, }, "fips-cn-northwest-1": endpoint{ Hostname: "snowball-fips.cn-northwest-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "sns": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "sqs": service{ Defaults: endpoint{ SSLCommonName: "{region}.queue.{dnsSuffix}", Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "ssm": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "states": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "storagegateway": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "streams.dynamodb": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, CredentialScope: credentialScope{ Service: "dynamodb", }, }, Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "sts": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "support": service{ PartitionEndpoint: "aws-cn-global", Endpoints: endpoints{ "aws-cn-global": endpoint{ Hostname: "support.cn-north-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-north-1", }, }, }, }, "swf": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "tagging": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "transcribe": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "cn-north-1": endpoint{ Hostname: "cn.transcribe.cn-north-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-north-1", }, }, "cn-northwest-1": endpoint{ Hostname: "cn.transcribe.cn-northwest-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "transcribestreaming": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "transfer": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, "waf-regional": service{ Endpoints: endpoints{ "cn-north-1": endpoint{ Hostname: "waf-regional.cn-north-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-north-1", }, }, "cn-northwest-1": endpoint{ Hostname: "waf-regional.cn-northwest-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, "fips-cn-north-1": endpoint{ Hostname: "waf-regional-fips.cn-north-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-north-1", }, }, "fips-cn-northwest-1": endpoint{ Hostname: "waf-regional-fips.cn-northwest-1.amazonaws.com.cn", CredentialScope: credentialScope{ Region: "cn-northwest-1", }, }, }, }, "workspaces": service{ Endpoints: endpoints{ "cn-northwest-1": endpoint{}, }, }, "xray": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, }, } // AwsUsGovPartition returns the Resolver for AWS GovCloud (US). func AwsUsGovPartition() Partition { return awsusgovPartition.Partition() } var awsusgovPartition = partition{ ID: "aws-us-gov", Name: "AWS GovCloud (US)", DNSSuffix: "amazonaws.com", RegionRegex: regionRegex{ Regexp: func() *regexp.Regexp { reg, _ := regexp.Compile("^us\\-gov\\-\\w+\\-\\d+$") return reg }(), }, Defaults: endpoint{ Hostname: "{service}.{region}.{dnsSuffix}", Protocols: []string{"https"}, SignatureVersions: []string{"v4"}, }, Regions: regions{ "us-gov-east-1": region{ Description: "AWS GovCloud (US-East)", }, "us-gov-west-1": region{ Description: "AWS GovCloud (US-West)", }, }, Services: services{ "access-analyzer": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "access-analyzer.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "access-analyzer.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "acm": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "acm.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "acm.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "acm-pca": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "acm-pca.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "acm-pca.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "api.detective": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-east-1-fips": endpoint{ Hostname: "api.detective-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "api.detective-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "api.ecr": service{ Endpoints: endpoints{ "fips-dkr-us-gov-east-1": endpoint{ Hostname: "ecr-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-dkr-us-gov-west-1": endpoint{ Hostname: "ecr-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "fips-us-gov-east-1": endpoint{ Hostname: "ecr-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "ecr-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{ Hostname: "api.ecr.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "api.ecr.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "api.sagemaker": service{ Endpoints: endpoints{ "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "api-fips.sagemaker.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1-fips-secondary": endpoint{ Hostname: "api.sagemaker.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "apigateway": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "application-autoscaling": service{ Defaults: endpoint{ Hostname: "autoscaling.{region}.amazonaws.com", Protocols: []string{"http", "https"}, CredentialScope: credentialScope{ Service: "application-autoscaling", }, }, Endpoints: endpoints{ "us-gov-east-1": endpoint{ Protocols: []string{"http", "https"}, }, "us-gov-west-1": endpoint{ Protocols: []string{"http", "https"}, }, }, }, "appstream2": service{ Defaults: endpoint{ Protocols: []string{"https"}, CredentialScope: credentialScope{ Service: "appstream", }, }, Endpoints: endpoints{ "fips": endpoint{ Hostname: "appstream2-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{}, }, }, "athena": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "athena-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "athena-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "autoscaling": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Protocols: []string{"http", "https"}, }, "us-gov-west-1": endpoint{ Protocols: []string{"http", "https"}, }, }, }, "autoscaling-plans": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "us-gov-east-1": endpoint{ Protocols: []string{"http", "https"}, }, "us-gov-west-1": endpoint{ Protocols: []string{"http", "https"}, }, }, }, "backup": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "batch": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "batch.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "batch.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "clouddirectory": service{ Endpoints: endpoints{ "us-gov-west-1": endpoint{}, }, }, "cloudformation": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "cloudformation.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "cloudformation.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "cloudhsm": service{ Endpoints: endpoints{ "us-gov-west-1": endpoint{}, }, }, "cloudhsmv2": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "cloudhsm", }, }, Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "cloudtrail": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "cloudtrail.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "cloudtrail.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "codebuild": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-east-1-fips": endpoint{ Hostname: "codebuild-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "codebuild-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "codecommit": service{ Endpoints: endpoints{ "fips": endpoint{ Hostname: "codecommit-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "codedeploy": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-east-1-fips": endpoint{ Hostname: "codedeploy-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "codedeploy-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "codepipeline": service{ Endpoints: endpoints{ "fips-us-gov-west-1": endpoint{ Hostname: "codepipeline-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{}, }, }, "cognito-identity": service{ Endpoints: endpoints{ "fips-us-gov-west-1": endpoint{ Hostname: "cognito-identity-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{}, }, }, "cognito-idp": service{ Endpoints: endpoints{ "fips-us-gov-west-1": endpoint{ Hostname: "cognito-idp-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{}, }, }, "comprehend": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "fips-us-gov-west-1": endpoint{ Hostname: "comprehend-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{}, }, }, "comprehendmedical": service{ Endpoints: endpoints{ "fips-us-gov-west-1": endpoint{ Hostname: "comprehendmedical-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{}, }, }, "config": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "config.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "config.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "connect": service{ Endpoints: endpoints{ "us-gov-west-1": endpoint{}, }, }, "datasync": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "datasync-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "datasync-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "directconnect": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "directconnect.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "directconnect.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "dms": service{ Endpoints: endpoints{ "dms-fips": endpoint{ Hostname: "dms.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "docdb": service{ Endpoints: endpoints{ "us-gov-west-1": endpoint{ Hostname: "rds.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "ds": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "ds-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "ds-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "dynamodb": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-east-1-fips": endpoint{ Hostname: "dynamodb.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "dynamodb.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "ebs": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "ec2": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "ec2.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "ec2.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "ecs": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "ecs-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "ecs-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "eks": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "eks.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "eks.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "elasticache": service{ Endpoints: endpoints{ "fips": endpoint{ Hostname: "elasticache.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "elasticbeanstalk": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "elasticbeanstalk.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "elasticbeanstalk.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "elasticfilesystem": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "elasticfilesystem-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "elasticfilesystem-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "elasticloadbalancing": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "elasticloadbalancing.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "elasticloadbalancing.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{ Protocols: []string{"http", "https"}, }, }, }, "elasticmapreduce": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "elasticmapreduce.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "elasticmapreduce.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{ Protocols: []string{"https"}, }, }, }, "email": service{ Endpoints: endpoints{ "fips-us-gov-west-1": endpoint{ Hostname: "email-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{}, }, }, "es": service{ Endpoints: endpoints{ "fips": endpoint{ Hostname: "es-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "events": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "events.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "events.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "firehose": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "firehose-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "firehose-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "fms": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "fms-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "fms-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "fsx": service{ Endpoints: endpoints{ "fips-prod-us-gov-east-1": endpoint{ Hostname: "fsx-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-prod-us-gov-west-1": endpoint{ Hostname: "fsx-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "glacier": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "glacier.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "glacier.us-gov-west-1.amazonaws.com", Protocols: []string{"http", "https"}, CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "glue": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "glue-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "glue-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "greengrass": service{ IsRegionalized: boxedTrue, Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "dataplane-us-gov-east-1": endpoint{ Hostname: "greengrass-ats.iot.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "dataplane-us-gov-west-1": endpoint{ Hostname: "greengrass-ats.iot.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "fips-us-gov-east-1": endpoint{ Hostname: "greengrass-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-east-1": endpoint{ Hostname: "greengrass.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "greengrass.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "guardduty": service{ IsRegionalized: boxedTrue, Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-east-1-fips": endpoint{ Hostname: "guardduty.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "guardduty.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "health": service{ Endpoints: endpoints{ "fips-us-gov-west-1": endpoint{ Hostname: "health-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "iam": service{ PartitionEndpoint: "aws-us-gov-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-us-gov-global": endpoint{ Hostname: "iam.us-gov.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "iam-govcloud-fips": endpoint{ Hostname: "iam.us-gov.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "inspector": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "inspector-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "inspector-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "iot": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "execute-api", }, }, Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "iotsecuredtunneling": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "kafka": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "kinesis": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "kinesis.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "kinesis.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "kinesisanalytics": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "kms": service{ Endpoints: endpoints{ "ProdFips": endpoint{ Hostname: "kms-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "lakeformation": service{ Endpoints: endpoints{ "fips-us-gov-west-1": endpoint{ Hostname: "lakeformation-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{}, }, }, "lambda": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "lambda-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "lambda-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "license-manager": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "license-manager-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "license-manager-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "logs": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "logs.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "logs.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "mediaconvert": service{ Endpoints: endpoints{ "us-gov-west-1": endpoint{ Hostname: "mediaconvert.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "metering.marketplace": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "aws-marketplace", }, }, Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "models.lex": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "lex", }, }, Endpoints: endpoints{ "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "models-fips.lex.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "monitoring": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "monitoring.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "monitoring.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "mq": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "mq-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "mq-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "neptune": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "rds.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "rds.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "organizations": service{ PartitionEndpoint: "aws-us-gov-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-us-gov-global": endpoint{ Hostname: "organizations.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "fips-aws-us-gov-global": endpoint{ Hostname: "organizations.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "outposts": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "outposts.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "outposts.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "pinpoint": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "mobiletargeting", }, }, Endpoints: endpoints{ "fips-us-gov-west-1": endpoint{ Hostname: "pinpoint-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{ Hostname: "pinpoint.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "polly": service{ Endpoints: endpoints{ "fips-us-gov-west-1": endpoint{ Hostname: "polly-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{}, }, }, "ram": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "ram.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "ram.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "rds": service{ Endpoints: endpoints{ "rds.us-gov-east-1": endpoint{ Hostname: "rds.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "rds.us-gov-west-1": endpoint{ Hostname: "rds.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "redshift": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "redshift.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "redshift.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "rekognition": service{ Endpoints: endpoints{ "rekognition-fips.us-gov-west-1": endpoint{ Hostname: "rekognition-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{}, }, }, "resource-groups": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "resource-groups.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "resource-groups.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "route53": service{ PartitionEndpoint: "aws-us-gov-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-us-gov-global": endpoint{ Hostname: "route53.us-gov.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "fips-aws-us-gov-global": endpoint{ Hostname: "route53.us-gov.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "route53resolver": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "runtime.lex": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "lex", }, }, Endpoints: endpoints{ "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "runtime-fips.lex.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "runtime.sagemaker": service{ Endpoints: endpoints{ "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "runtime.sagemaker.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "s3": service{ Defaults: endpoint{ SignatureVersions: []string{"s3", "s3v4"}, HasDualStack: boxedTrue, DualStackHostname: "{service}.dualstack.{region}.{dnsSuffix}", }, Endpoints: endpoints{ "accesspoint-us-gov-east-1": endpoint{ Hostname: "s3-accesspoint.us-gov-east-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "accesspoint-us-gov-west-1": endpoint{ Hostname: "s3-accesspoint.us-gov-west-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "fips-accesspoint-us-gov-east-1": endpoint{ Hostname: "s3-accesspoint-fips.us-gov-east-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "fips-accesspoint-us-gov-west-1": endpoint{ Hostname: "s3-accesspoint-fips.us-gov-west-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, }, "fips-us-gov-west-1": endpoint{ Hostname: "s3-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{ Hostname: "s3.us-gov-east-1.amazonaws.com", Protocols: []string{"http", "https"}, }, "us-gov-west-1": endpoint{ Hostname: "s3.us-gov-west-1.amazonaws.com", Protocols: []string{"http", "https"}, }, }, }, "s3-control": service{ Defaults: endpoint{ Protocols: []string{"https"}, SignatureVersions: []string{"s3v4"}, HasDualStack: boxedTrue, DualStackHostname: "{service}.dualstack.{region}.{dnsSuffix}", }, Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "s3-control.us-gov-east-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-east-1-fips": endpoint{ Hostname: "s3-control-fips.us-gov-east-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "s3-control.us-gov-west-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1-fips": endpoint{ Hostname: "s3-control-fips.us-gov-west-1.amazonaws.com", SignatureVersions: []string{"s3v4"}, CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "secretsmanager": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-east-1-fips": endpoint{ Hostname: "secretsmanager-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "secretsmanager-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "securityhub": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "securityhub-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "securityhub-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "serverlessrepo": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "serverlessrepo.us-gov-east-1.amazonaws.com", Protocols: []string{"https"}, CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "serverlessrepo.us-gov-west-1.amazonaws.com", Protocols: []string{"https"}, CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "servicecatalog": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-east-1-fips": endpoint{ Hostname: "servicecatalog-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "servicecatalog-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "servicecatalog-appregistry": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "servicecatalog-appregistry.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "servicecatalog-appregistry.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "servicequotas": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "servicequotas.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "servicequotas.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "sms": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "sms-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "sms-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "snowball": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "snowball-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "snowball-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "sns": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "sns.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "sns.us-gov-west-1.amazonaws.com", Protocols: []string{"http", "https"}, CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "sqs": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "sqs.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "sqs.us-gov-west-1.amazonaws.com", SSLCommonName: "{region}.queue.{dnsSuffix}", Protocols: []string{"http", "https"}, CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "ssm": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "ssm.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "ssm.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "states": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "states-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "states.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "storagegateway": service{ Endpoints: endpoints{ "fips": endpoint{ Hostname: "storagegateway-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "streams.dynamodb": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "dynamodb", }, }, Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-east-1-fips": endpoint{ Hostname: "dynamodb.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "dynamodb.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "sts": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-east-1-fips": endpoint{ Hostname: "sts.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "sts.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "support": service{ PartitionEndpoint: "aws-us-gov-global", Endpoints: endpoints{ "aws-us-gov-global": endpoint{ Hostname: "support.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "support.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "swf": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{ Hostname: "swf.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "swf.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "tagging": service{ Endpoints: endpoints{ "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "transcribe": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "fips.transcribe.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "fips.transcribe.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "transfer": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "transfer-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "transfer-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, "translate": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "us-gov-west-1": endpoint{}, "us-gov-west-1-fips": endpoint{ Hostname: "translate-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "waf-regional": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "waf-regional-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "waf-regional-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{ Hostname: "waf-regional.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "us-gov-west-1": endpoint{ Hostname: "waf-regional.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, }, }, "workspaces": service{ Endpoints: endpoints{ "fips-us-gov-west-1": endpoint{ Hostname: "workspaces-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-west-1": endpoint{}, }, }, "xray": service{ Endpoints: endpoints{ "fips-us-gov-east-1": endpoint{ Hostname: "xray-fips.us-gov-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-east-1", }, }, "fips-us-gov-west-1": endpoint{ Hostname: "xray-fips.us-gov-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-gov-west-1", }, }, "us-gov-east-1": endpoint{}, "us-gov-west-1": endpoint{}, }, }, }, } // AwsIsoPartition returns the Resolver for AWS ISO (US). func AwsIsoPartition() Partition { return awsisoPartition.Partition() } var awsisoPartition = partition{ ID: "aws-iso", Name: "AWS ISO (US)", DNSSuffix: "c2s.ic.gov", RegionRegex: regionRegex{ Regexp: func() *regexp.Regexp { reg, _ := regexp.Compile("^us\\-iso\\-\\w+\\-\\d+$") return reg }(), }, Defaults: endpoint{ Hostname: "{service}.{region}.{dnsSuffix}", Protocols: []string{"https"}, SignatureVersions: []string{"v4"}, }, Regions: regions{ "us-iso-east-1": region{ Description: "US ISO East", }, }, Services: services{ "api.ecr": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{ Hostname: "api.ecr.us-iso-east-1.c2s.ic.gov", CredentialScope: credentialScope{ Region: "us-iso-east-1", }, }, }, }, "api.sagemaker": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "apigateway": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "application-autoscaling": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "autoscaling": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{ Protocols: []string{"http", "https"}, }, }, }, "cloudformation": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "cloudtrail": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "codedeploy": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "comprehend": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "config": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "datapipeline": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "directconnect": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "dms": service{ Endpoints: endpoints{ "dms-fips": endpoint{ Hostname: "dms.us-iso-east-1.c2s.ic.gov", CredentialScope: credentialScope{ Region: "us-iso-east-1", }, }, "us-iso-east-1": endpoint{}, }, }, "ds": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "dynamodb": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{ Protocols: []string{"http", "https"}, }, }, }, "ec2": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "ecs": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "elasticache": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "elasticfilesystem": service{ Endpoints: endpoints{ "fips-us-iso-east-1": endpoint{ Hostname: "elasticfilesystem-fips.us-iso-east-1.c2s.ic.gov", CredentialScope: credentialScope{ Region: "us-iso-east-1", }, }, "us-iso-east-1": endpoint{}, }, }, "elasticloadbalancing": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{ Protocols: []string{"http", "https"}, }, }, }, "elasticmapreduce": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{ Protocols: []string{"https"}, }, }, }, "es": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "events": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "firehose": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "glacier": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{ Protocols: []string{"http", "https"}, }, }, }, "health": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "iam": service{ PartitionEndpoint: "aws-iso-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-iso-global": endpoint{ Hostname: "iam.us-iso-east-1.c2s.ic.gov", CredentialScope: credentialScope{ Region: "us-iso-east-1", }, }, }, }, "kinesis": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "kms": service{ Endpoints: endpoints{ "ProdFips": endpoint{ Hostname: "kms-fips.us-iso-east-1.c2s.ic.gov", CredentialScope: credentialScope{ Region: "us-iso-east-1", }, }, "us-iso-east-1": endpoint{}, }, }, "lambda": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "license-manager": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "logs": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "medialive": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "mediapackage": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "monitoring": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "outposts": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "ram": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "rds": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "redshift": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "route53": service{ PartitionEndpoint: "aws-iso-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-iso-global": endpoint{ Hostname: "route53.c2s.ic.gov", CredentialScope: credentialScope{ Region: "us-iso-east-1", }, }, }, }, "runtime.sagemaker": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "s3": service{ Defaults: endpoint{ SignatureVersions: []string{"s3v4"}, }, Endpoints: endpoints{ "us-iso-east-1": endpoint{ Protocols: []string{"http", "https"}, SignatureVersions: []string{"s3v4"}, }, }, }, "secretsmanager": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "snowball": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "sns": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{ Protocols: []string{"http", "https"}, }, }, }, "sqs": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{ Protocols: []string{"http", "https"}, }, }, }, "ssm": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "states": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "streams.dynamodb": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, CredentialScope: credentialScope{ Service: "dynamodb", }, }, Endpoints: endpoints{ "us-iso-east-1": endpoint{ Protocols: []string{"http", "https"}, }, }, }, "sts": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "support": service{ PartitionEndpoint: "aws-iso-global", Endpoints: endpoints{ "aws-iso-global": endpoint{ Hostname: "support.us-iso-east-1.c2s.ic.gov", CredentialScope: credentialScope{ Region: "us-iso-east-1", }, }, }, }, "swf": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "transcribe": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "transcribestreaming": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "translate": service{ Defaults: endpoint{ Protocols: []string{"https"}, }, Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, "workspaces": service{ Endpoints: endpoints{ "us-iso-east-1": endpoint{}, }, }, }, } // AwsIsoBPartition returns the Resolver for AWS ISOB (US). func AwsIsoBPartition() Partition { return awsisobPartition.Partition() } var awsisobPartition = partition{ ID: "aws-iso-b", Name: "AWS ISOB (US)", DNSSuffix: "sc2s.sgov.gov", RegionRegex: regionRegex{ Regexp: func() *regexp.Regexp { reg, _ := regexp.Compile("^us\\-isob\\-\\w+\\-\\d+$") return reg }(), }, Defaults: endpoint{ Hostname: "{service}.{region}.{dnsSuffix}", Protocols: []string{"https"}, SignatureVersions: []string{"v4"}, }, Regions: regions{ "us-isob-east-1": region{ Description: "US ISOB East (Ohio)", }, }, Services: services{ "api.ecr": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{ Hostname: "api.ecr.us-isob-east-1.sc2s.sgov.gov", CredentialScope: credentialScope{ Region: "us-isob-east-1", }, }, }, }, "application-autoscaling": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "autoscaling": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "cloudformation": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "cloudtrail": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "codedeploy": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "config": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "directconnect": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "dms": service{ Endpoints: endpoints{ "dms-fips": endpoint{ Hostname: "dms.us-isob-east-1.sc2s.sgov.gov", CredentialScope: credentialScope{ Region: "us-isob-east-1", }, }, "us-isob-east-1": endpoint{}, }, }, "ds": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "dynamodb": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "ec2": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "ecs": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "elasticache": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "elasticloadbalancing": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{ Protocols: []string{"https"}, }, }, }, "elasticmapreduce": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "es": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "events": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "glacier": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "health": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "iam": service{ PartitionEndpoint: "aws-iso-b-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-iso-b-global": endpoint{ Hostname: "iam.us-isob-east-1.sc2s.sgov.gov", CredentialScope: credentialScope{ Region: "us-isob-east-1", }, }, }, }, "kinesis": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "kms": service{ Endpoints: endpoints{ "ProdFips": endpoint{ Hostname: "kms-fips.us-isob-east-1.sc2s.sgov.gov", CredentialScope: credentialScope{ Region: "us-isob-east-1", }, }, "us-isob-east-1": endpoint{}, }, }, "lambda": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "license-manager": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "logs": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "monitoring": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "rds": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "redshift": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "route53": service{ PartitionEndpoint: "aws-iso-b-global", IsRegionalized: boxedFalse, Endpoints: endpoints{ "aws-iso-b-global": endpoint{ Hostname: "route53.sc2s.sgov.gov", CredentialScope: credentialScope{ Region: "us-isob-east-1", }, }, }, }, "s3": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, SignatureVersions: []string{"s3v4"}, }, Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "snowball": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "sns": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "sqs": service{ Defaults: endpoint{ SSLCommonName: "{region}.queue.{dnsSuffix}", Protocols: []string{"http", "https"}, }, Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "ssm": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "states": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "streams.dynamodb": service{ Defaults: endpoint{ Protocols: []string{"http", "https"}, CredentialScope: credentialScope{ Service: "dynamodb", }, }, Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "sts": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, "support": service{ PartitionEndpoint: "aws-iso-b-global", Endpoints: endpoints{ "aws-iso-b-global": endpoint{ Hostname: "support.us-isob-east-1.sc2s.sgov.gov", CredentialScope: credentialScope{ Region: "us-isob-east-1", }, }, }, }, "swf": service{ Endpoints: endpoints{ "us-isob-east-1": endpoint{}, }, }, }, }
11,274
session-manager-plugin
aws
Go
package endpoints // Service identifiers // // Deprecated: Use client package's EndpointsID value instead of these // ServiceIDs. These IDs are not maintained, and are out of date. const ( A4bServiceID = "a4b" // A4b. AcmServiceID = "acm" // Acm. AcmPcaServiceID = "acm-pca" // AcmPca. ApiMediatailorServiceID = "api.mediatailor" // ApiMediatailor. ApiPricingServiceID = "api.pricing" // ApiPricing. ApiSagemakerServiceID = "api.sagemaker" // ApiSagemaker. ApigatewayServiceID = "apigateway" // Apigateway. ApplicationAutoscalingServiceID = "application-autoscaling" // ApplicationAutoscaling. Appstream2ServiceID = "appstream2" // Appstream2. AppsyncServiceID = "appsync" // Appsync. AthenaServiceID = "athena" // Athena. AutoscalingServiceID = "autoscaling" // Autoscaling. AutoscalingPlansServiceID = "autoscaling-plans" // AutoscalingPlans. BatchServiceID = "batch" // Batch. BudgetsServiceID = "budgets" // Budgets. CeServiceID = "ce" // Ce. ChimeServiceID = "chime" // Chime. Cloud9ServiceID = "cloud9" // Cloud9. ClouddirectoryServiceID = "clouddirectory" // Clouddirectory. CloudformationServiceID = "cloudformation" // Cloudformation. CloudfrontServiceID = "cloudfront" // Cloudfront. CloudhsmServiceID = "cloudhsm" // Cloudhsm. Cloudhsmv2ServiceID = "cloudhsmv2" // Cloudhsmv2. CloudsearchServiceID = "cloudsearch" // Cloudsearch. CloudtrailServiceID = "cloudtrail" // Cloudtrail. CodebuildServiceID = "codebuild" // Codebuild. CodecommitServiceID = "codecommit" // Codecommit. CodedeployServiceID = "codedeploy" // Codedeploy. CodepipelineServiceID = "codepipeline" // Codepipeline. CodestarServiceID = "codestar" // Codestar. CognitoIdentityServiceID = "cognito-identity" // CognitoIdentity. CognitoIdpServiceID = "cognito-idp" // CognitoIdp. CognitoSyncServiceID = "cognito-sync" // CognitoSync. ComprehendServiceID = "comprehend" // Comprehend. ConfigServiceID = "config" // Config. CurServiceID = "cur" // Cur. DatapipelineServiceID = "datapipeline" // Datapipeline. DaxServiceID = "dax" // Dax. DevicefarmServiceID = "devicefarm" // Devicefarm. DirectconnectServiceID = "directconnect" // Directconnect. DiscoveryServiceID = "discovery" // Discovery. DmsServiceID = "dms" // Dms. DsServiceID = "ds" // Ds. DynamodbServiceID = "dynamodb" // Dynamodb. Ec2ServiceID = "ec2" // Ec2. Ec2metadataServiceID = "ec2metadata" // Ec2metadata. EcrServiceID = "ecr" // Ecr. EcsServiceID = "ecs" // Ecs. ElasticacheServiceID = "elasticache" // Elasticache. ElasticbeanstalkServiceID = "elasticbeanstalk" // Elasticbeanstalk. ElasticfilesystemServiceID = "elasticfilesystem" // Elasticfilesystem. ElasticloadbalancingServiceID = "elasticloadbalancing" // Elasticloadbalancing. ElasticmapreduceServiceID = "elasticmapreduce" // Elasticmapreduce. ElastictranscoderServiceID = "elastictranscoder" // Elastictranscoder. EmailServiceID = "email" // Email. EntitlementMarketplaceServiceID = "entitlement.marketplace" // EntitlementMarketplace. EsServiceID = "es" // Es. EventsServiceID = "events" // Events. FirehoseServiceID = "firehose" // Firehose. FmsServiceID = "fms" // Fms. GameliftServiceID = "gamelift" // Gamelift. GlacierServiceID = "glacier" // Glacier. GlueServiceID = "glue" // Glue. GreengrassServiceID = "greengrass" // Greengrass. GuarddutyServiceID = "guardduty" // Guardduty. HealthServiceID = "health" // Health. IamServiceID = "iam" // Iam. ImportexportServiceID = "importexport" // Importexport. InspectorServiceID = "inspector" // Inspector. IotServiceID = "iot" // Iot. IotanalyticsServiceID = "iotanalytics" // Iotanalytics. KinesisServiceID = "kinesis" // Kinesis. KinesisanalyticsServiceID = "kinesisanalytics" // Kinesisanalytics. KinesisvideoServiceID = "kinesisvideo" // Kinesisvideo. KmsServiceID = "kms" // Kms. LambdaServiceID = "lambda" // Lambda. LightsailServiceID = "lightsail" // Lightsail. LogsServiceID = "logs" // Logs. MachinelearningServiceID = "machinelearning" // Machinelearning. MarketplacecommerceanalyticsServiceID = "marketplacecommerceanalytics" // Marketplacecommerceanalytics. MediaconvertServiceID = "mediaconvert" // Mediaconvert. MedialiveServiceID = "medialive" // Medialive. MediapackageServiceID = "mediapackage" // Mediapackage. MediastoreServiceID = "mediastore" // Mediastore. MeteringMarketplaceServiceID = "metering.marketplace" // MeteringMarketplace. MghServiceID = "mgh" // Mgh. MobileanalyticsServiceID = "mobileanalytics" // Mobileanalytics. ModelsLexServiceID = "models.lex" // ModelsLex. MonitoringServiceID = "monitoring" // Monitoring. MturkRequesterServiceID = "mturk-requester" // MturkRequester. NeptuneServiceID = "neptune" // Neptune. OpsworksServiceID = "opsworks" // Opsworks. OpsworksCmServiceID = "opsworks-cm" // OpsworksCm. OrganizationsServiceID = "organizations" // Organizations. PinpointServiceID = "pinpoint" // Pinpoint. PollyServiceID = "polly" // Polly. RdsServiceID = "rds" // Rds. RedshiftServiceID = "redshift" // Redshift. RekognitionServiceID = "rekognition" // Rekognition. ResourceGroupsServiceID = "resource-groups" // ResourceGroups. Route53ServiceID = "route53" // Route53. Route53domainsServiceID = "route53domains" // Route53domains. RuntimeLexServiceID = "runtime.lex" // RuntimeLex. RuntimeSagemakerServiceID = "runtime.sagemaker" // RuntimeSagemaker. S3ServiceID = "s3" // S3. S3ControlServiceID = "s3-control" // S3Control. SagemakerServiceID = "api.sagemaker" // Sagemaker. SdbServiceID = "sdb" // Sdb. SecretsmanagerServiceID = "secretsmanager" // Secretsmanager. ServerlessrepoServiceID = "serverlessrepo" // Serverlessrepo. ServicecatalogServiceID = "servicecatalog" // Servicecatalog. ServicediscoveryServiceID = "servicediscovery" // Servicediscovery. ShieldServiceID = "shield" // Shield. SmsServiceID = "sms" // Sms. SnowballServiceID = "snowball" // Snowball. SnsServiceID = "sns" // Sns. SqsServiceID = "sqs" // Sqs. SsmServiceID = "ssm" // Ssm. StatesServiceID = "states" // States. StoragegatewayServiceID = "storagegateway" // Storagegateway. StreamsDynamodbServiceID = "streams.dynamodb" // StreamsDynamodb. StsServiceID = "sts" // Sts. SupportServiceID = "support" // Support. SwfServiceID = "swf" // Swf. TaggingServiceID = "tagging" // Tagging. TransferServiceID = "transfer" // Transfer. TranslateServiceID = "translate" // Translate. WafServiceID = "waf" // Waf. WafRegionalServiceID = "waf-regional" // WafRegional. WorkdocsServiceID = "workdocs" // Workdocs. WorkmailServiceID = "workmail" // Workmail. WorkspacesServiceID = "workspaces" // Workspaces. XrayServiceID = "xray" // Xray. )
142
session-manager-plugin
aws
Go
// Package endpoints provides the types and functionality for defining regions // and endpoints, as well as querying those definitions. // // The SDK's Regions and Endpoints metadata is code generated into the endpoints // package, and is accessible via the DefaultResolver function. This function // returns a endpoint Resolver will search the metadata and build an associated // endpoint if one is found. The default resolver will search all partitions // known by the SDK. e.g AWS Standard (aws), AWS China (aws-cn), and // AWS GovCloud (US) (aws-us-gov). // . // // Enumerating Regions and Endpoint Metadata // // Casting the Resolver returned by DefaultResolver to a EnumPartitions interface // will allow you to get access to the list of underlying Partitions with the // Partitions method. This is helpful if you want to limit the SDK's endpoint // resolving to a single partition, or enumerate regions, services, and endpoints // in the partition. // // resolver := endpoints.DefaultResolver() // partitions := resolver.(endpoints.EnumPartitions).Partitions() // // for _, p := range partitions { // fmt.Println("Regions for", p.ID()) // for id, _ := range p.Regions() { // fmt.Println("*", id) // } // // fmt.Println("Services for", p.ID()) // for id, _ := range p.Services() { // fmt.Println("*", id) // } // } // // Using Custom Endpoints // // The endpoints package also gives you the ability to use your own logic how // endpoints are resolved. This is a great way to define a custom endpoint // for select services, without passing that logic down through your code. // // If a type implements the Resolver interface it can be used to resolve // endpoints. To use this with the SDK's Session and Config set the value // of the type to the EndpointsResolver field of aws.Config when initializing // the session, or service client. // // In addition the ResolverFunc is a wrapper for a func matching the signature // of Resolver.EndpointFor, converting it to a type that satisfies the // Resolver interface. // // // myCustomResolver := func(service, region string, optFns ...func(*endpoints.Options)) (endpoints.ResolvedEndpoint, error) { // if service == endpoints.S3ServiceID { // return endpoints.ResolvedEndpoint{ // URL: "s3.custom.endpoint.com", // SigningRegion: "custom-signing-region", // }, nil // } // // return endpoints.DefaultResolver().EndpointFor(service, region, optFns...) // } // // sess := session.Must(session.NewSession(&aws.Config{ // Region: aws.String("us-west-2"), // EndpointResolver: endpoints.ResolverFunc(myCustomResolver), // })) package endpoints
67
session-manager-plugin
aws
Go
package endpoints import ( "fmt" "regexp" "strings" "github.com/aws/aws-sdk-go/aws/awserr" ) // Options provide the configuration needed to direct how the // endpoints will be resolved. type Options struct { // DisableSSL forces the endpoint to be resolved as HTTP. // instead of HTTPS if the service supports it. DisableSSL bool // Sets the resolver to resolve the endpoint as a dualstack endpoint // for the service. If dualstack support for a service is not known and // StrictMatching is not enabled a dualstack endpoint for the service will // be returned. This endpoint may not be valid. If StrictMatching is // enabled only services that are known to support dualstack will return // dualstack endpoints. UseDualStack bool // Enables strict matching of services and regions resolved endpoints. // If the partition doesn't enumerate the exact service and region an // error will be returned. This option will prevent returning endpoints // that look valid, but may not resolve to any real endpoint. StrictMatching bool // Enables resolving a service endpoint based on the region provided if the // service does not exist. The service endpoint ID will be used as the service // domain name prefix. By default the endpoint resolver requires the service // to be known when resolving endpoints. // // If resolving an endpoint on the partition list the provided region will // be used to determine which partition's domain name pattern to the service // endpoint ID with. If both the service and region are unknown and resolving // the endpoint on partition list an UnknownEndpointError error will be returned. // // If resolving and endpoint on a partition specific resolver that partition's // domain name pattern will be used with the service endpoint ID. If both // region and service do not exist when resolving an endpoint on a specific // partition the partition's domain pattern will be used to combine the // endpoint and region together. // // This option is ignored if StrictMatching is enabled. ResolveUnknownService bool // Specifies the EC2 Instance Metadata Service default endpoint selection mode (IPv4 or IPv6) EC2MetadataEndpointMode EC2IMDSEndpointModeState // STS Regional Endpoint flag helps with resolving the STS endpoint STSRegionalEndpoint STSRegionalEndpoint // S3 Regional Endpoint flag helps with resolving the S3 endpoint S3UsEast1RegionalEndpoint S3UsEast1RegionalEndpoint } // EC2IMDSEndpointModeState is an enum configuration variable describing the client endpoint mode. type EC2IMDSEndpointModeState uint // Enumeration values for EC2IMDSEndpointModeState const ( EC2IMDSEndpointModeStateUnset EC2IMDSEndpointModeState = iota EC2IMDSEndpointModeStateIPv4 EC2IMDSEndpointModeStateIPv6 ) // SetFromString sets the EC2IMDSEndpointModeState based on the provided string value. Unknown values will default to EC2IMDSEndpointModeStateUnset func (e *EC2IMDSEndpointModeState) SetFromString(v string) error { v = strings.TrimSpace(v) switch { case len(v) == 0: *e = EC2IMDSEndpointModeStateUnset case strings.EqualFold(v, "IPv6"): *e = EC2IMDSEndpointModeStateIPv6 case strings.EqualFold(v, "IPv4"): *e = EC2IMDSEndpointModeStateIPv4 default: return fmt.Errorf("unknown EC2 IMDS endpoint mode, must be either IPv6 or IPv4") } return nil } // STSRegionalEndpoint is an enum for the states of the STS Regional Endpoint // options. type STSRegionalEndpoint int func (e STSRegionalEndpoint) String() string { switch e { case LegacySTSEndpoint: return "legacy" case RegionalSTSEndpoint: return "regional" case UnsetSTSEndpoint: return "" default: return "unknown" } } const ( // UnsetSTSEndpoint represents that STS Regional Endpoint flag is not specified. UnsetSTSEndpoint STSRegionalEndpoint = iota // LegacySTSEndpoint represents when STS Regional Endpoint flag is specified // to use legacy endpoints. LegacySTSEndpoint // RegionalSTSEndpoint represents when STS Regional Endpoint flag is specified // to use regional endpoints. RegionalSTSEndpoint ) // GetSTSRegionalEndpoint function returns the STSRegionalEndpointFlag based // on the input string provided in env config or shared config by the user. // // `legacy`, `regional` are the only case-insensitive valid strings for // resolving the STS regional Endpoint flag. func GetSTSRegionalEndpoint(s string) (STSRegionalEndpoint, error) { switch { case strings.EqualFold(s, "legacy"): return LegacySTSEndpoint, nil case strings.EqualFold(s, "regional"): return RegionalSTSEndpoint, nil default: return UnsetSTSEndpoint, fmt.Errorf("unable to resolve the value of STSRegionalEndpoint for %v", s) } } // S3UsEast1RegionalEndpoint is an enum for the states of the S3 us-east-1 // Regional Endpoint options. type S3UsEast1RegionalEndpoint int func (e S3UsEast1RegionalEndpoint) String() string { switch e { case LegacyS3UsEast1Endpoint: return "legacy" case RegionalS3UsEast1Endpoint: return "regional" case UnsetS3UsEast1Endpoint: return "" default: return "unknown" } } const ( // UnsetS3UsEast1Endpoint represents that S3 Regional Endpoint flag is not // specified. UnsetS3UsEast1Endpoint S3UsEast1RegionalEndpoint = iota // LegacyS3UsEast1Endpoint represents when S3 Regional Endpoint flag is // specified to use legacy endpoints. LegacyS3UsEast1Endpoint // RegionalS3UsEast1Endpoint represents when S3 Regional Endpoint flag is // specified to use regional endpoints. RegionalS3UsEast1Endpoint ) // GetS3UsEast1RegionalEndpoint function returns the S3UsEast1RegionalEndpointFlag based // on the input string provided in env config or shared config by the user. // // `legacy`, `regional` are the only case-insensitive valid strings for // resolving the S3 regional Endpoint flag. func GetS3UsEast1RegionalEndpoint(s string) (S3UsEast1RegionalEndpoint, error) { switch { case strings.EqualFold(s, "legacy"): return LegacyS3UsEast1Endpoint, nil case strings.EqualFold(s, "regional"): return RegionalS3UsEast1Endpoint, nil default: return UnsetS3UsEast1Endpoint, fmt.Errorf("unable to resolve the value of S3UsEast1RegionalEndpoint for %v", s) } } // Set combines all of the option functions together. func (o *Options) Set(optFns ...func(*Options)) { for _, fn := range optFns { fn(o) } } // DisableSSLOption sets the DisableSSL options. Can be used as a functional // option when resolving endpoints. func DisableSSLOption(o *Options) { o.DisableSSL = true } // UseDualStackOption sets the UseDualStack option. Can be used as a functional // option when resolving endpoints. func UseDualStackOption(o *Options) { o.UseDualStack = true } // StrictMatchingOption sets the StrictMatching option. Can be used as a functional // option when resolving endpoints. func StrictMatchingOption(o *Options) { o.StrictMatching = true } // ResolveUnknownServiceOption sets the ResolveUnknownService option. Can be used // as a functional option when resolving endpoints. func ResolveUnknownServiceOption(o *Options) { o.ResolveUnknownService = true } // STSRegionalEndpointOption enables the STS endpoint resolver behavior to resolve // STS endpoint to their regional endpoint, instead of the global endpoint. func STSRegionalEndpointOption(o *Options) { o.STSRegionalEndpoint = RegionalSTSEndpoint } // A Resolver provides the interface for functionality to resolve endpoints. // The build in Partition and DefaultResolver return value satisfy this interface. type Resolver interface { EndpointFor(service, region string, opts ...func(*Options)) (ResolvedEndpoint, error) } // ResolverFunc is a helper utility that wraps a function so it satisfies the // Resolver interface. This is useful when you want to add additional endpoint // resolving logic, or stub out specific endpoints with custom values. type ResolverFunc func(service, region string, opts ...func(*Options)) (ResolvedEndpoint, error) // EndpointFor wraps the ResolverFunc function to satisfy the Resolver interface. func (fn ResolverFunc) EndpointFor(service, region string, opts ...func(*Options)) (ResolvedEndpoint, error) { return fn(service, region, opts...) } var schemeRE = regexp.MustCompile("^([^:]+)://") // AddScheme adds the HTTP or HTTPS schemes to a endpoint URL if there is no // scheme. If disableSSL is true HTTP will set HTTP instead of the default HTTPS. // // If disableSSL is set, it will only set the URL's scheme if the URL does not // contain a scheme. func AddScheme(endpoint string, disableSSL bool) string { if !schemeRE.MatchString(endpoint) { scheme := "https" if disableSSL { scheme = "http" } endpoint = fmt.Sprintf("%s://%s", scheme, endpoint) } return endpoint } // EnumPartitions a provides a way to retrieve the underlying partitions that // make up the SDK's default Resolver, or any resolver decoded from a model // file. // // Use this interface with DefaultResolver and DecodeModels to get the list of // Partitions. type EnumPartitions interface { Partitions() []Partition } // RegionsForService returns a map of regions for the partition and service. // If either the partition or service does not exist false will be returned // as the second parameter. // // This example shows how to get the regions for DynamoDB in the AWS partition. // rs, exists := endpoints.RegionsForService(endpoints.DefaultPartitions(), endpoints.AwsPartitionID, endpoints.DynamodbServiceID) // // This is equivalent to using the partition directly. // rs := endpoints.AwsPartition().Services()[endpoints.DynamodbServiceID].Regions() func RegionsForService(ps []Partition, partitionID, serviceID string) (map[string]Region, bool) { for _, p := range ps { if p.ID() != partitionID { continue } if _, ok := p.p.Services[serviceID]; !(ok || serviceID == Ec2metadataServiceID) { break } s := Service{ id: serviceID, p: p.p, } return s.Regions(), true } return map[string]Region{}, false } // PartitionForRegion returns the first partition which includes the region // passed in. This includes both known regions and regions which match // a pattern supported by the partition which may include regions that are // not explicitly known by the partition. Use the Regions method of the // returned Partition if explicit support is needed. func PartitionForRegion(ps []Partition, regionID string) (Partition, bool) { for _, p := range ps { if _, ok := p.p.Regions[regionID]; ok || p.p.RegionRegex.MatchString(regionID) { return p, true } } return Partition{}, false } // A Partition provides the ability to enumerate the partition's regions // and services. type Partition struct { id, dnsSuffix string p *partition } // DNSSuffix returns the base domain name of the partition. func (p Partition) DNSSuffix() string { return p.dnsSuffix } // ID returns the identifier of the partition. func (p Partition) ID() string { return p.id } // EndpointFor attempts to resolve the endpoint based on service and region. // See Options for information on configuring how the endpoint is resolved. // // If the service cannot be found in the metadata the UnknownServiceError // error will be returned. This validation will occur regardless if // StrictMatching is enabled. To enable resolving unknown services set the // "ResolveUnknownService" option to true. When StrictMatching is disabled // this option allows the partition resolver to resolve a endpoint based on // the service endpoint ID provided. // // When resolving endpoints you can choose to enable StrictMatching. This will // require the provided service and region to be known by the partition. // If the endpoint cannot be strictly resolved an error will be returned. This // mode is useful to ensure the endpoint resolved is valid. Without // StrictMatching enabled the endpoint returned may look valid but may not work. // StrictMatching requires the SDK to be updated if you want to take advantage // of new regions and services expansions. // // Errors that can be returned. // * UnknownServiceError // * UnknownEndpointError func (p Partition) EndpointFor(service, region string, opts ...func(*Options)) (ResolvedEndpoint, error) { return p.p.EndpointFor(service, region, opts...) } // Regions returns a map of Regions indexed by their ID. This is useful for // enumerating over the regions in a partition. func (p Partition) Regions() map[string]Region { rs := make(map[string]Region, len(p.p.Regions)) for id, r := range p.p.Regions { rs[id] = Region{ id: id, desc: r.Description, p: p.p, } } return rs } // Services returns a map of Service indexed by their ID. This is useful for // enumerating over the services in a partition. func (p Partition) Services() map[string]Service { ss := make(map[string]Service, len(p.p.Services)) for id := range p.p.Services { ss[id] = Service{ id: id, p: p.p, } } // Since we have removed the customization that injected this into the model // we still need to pretend that this is a modeled service. if _, ok := ss[Ec2metadataServiceID]; !ok { ss[Ec2metadataServiceID] = Service{ id: Ec2metadataServiceID, p: p.p, } } return ss } // A Region provides information about a region, and ability to resolve an // endpoint from the context of a region, given a service. type Region struct { id, desc string p *partition } // ID returns the region's identifier. func (r Region) ID() string { return r.id } // Description returns the region's description. The region description // is free text, it can be empty, and it may change between SDK releases. func (r Region) Description() string { return r.desc } // ResolveEndpoint resolves an endpoint from the context of the region given // a service. See Partition.EndpointFor for usage and errors that can be returned. func (r Region) ResolveEndpoint(service string, opts ...func(*Options)) (ResolvedEndpoint, error) { return r.p.EndpointFor(service, r.id, opts...) } // Services returns a list of all services that are known to be in this region. func (r Region) Services() map[string]Service { ss := map[string]Service{} for id, s := range r.p.Services { if _, ok := s.Endpoints[r.id]; ok { ss[id] = Service{ id: id, p: r.p, } } } return ss } // A Service provides information about a service, and ability to resolve an // endpoint from the context of a service, given a region. type Service struct { id string p *partition } // ID returns the identifier for the service. func (s Service) ID() string { return s.id } // ResolveEndpoint resolves an endpoint from the context of a service given // a region. See Partition.EndpointFor for usage and errors that can be returned. func (s Service) ResolveEndpoint(region string, opts ...func(*Options)) (ResolvedEndpoint, error) { return s.p.EndpointFor(s.id, region, opts...) } // Regions returns a map of Regions that the service is present in. // // A region is the AWS region the service exists in. Whereas a Endpoint is // an URL that can be resolved to a instance of a service. func (s Service) Regions() map[string]Region { rs := map[string]Region{} service, ok := s.p.Services[s.id] // Since ec2metadata customization has been removed we need to check // if it was defined in non-standard endpoints.json file. If it's not // then we can return the empty map as there is no regional-endpoints for IMDS. // Otherwise, we iterate need to iterate the non-standard model. if s.id == Ec2metadataServiceID && !ok { return rs } for id := range service.Endpoints { if r, ok := s.p.Regions[id]; ok { rs[id] = Region{ id: id, desc: r.Description, p: s.p, } } } return rs } // Endpoints returns a map of Endpoints indexed by their ID for all known // endpoints for a service. // // A region is the AWS region the service exists in. Whereas a Endpoint is // an URL that can be resolved to a instance of a service. func (s Service) Endpoints() map[string]Endpoint { es := make(map[string]Endpoint, len(s.p.Services[s.id].Endpoints)) for id := range s.p.Services[s.id].Endpoints { es[id] = Endpoint{ id: id, serviceID: s.id, p: s.p, } } return es } // A Endpoint provides information about endpoints, and provides the ability // to resolve that endpoint for the service, and the region the endpoint // represents. type Endpoint struct { id string serviceID string p *partition } // ID returns the identifier for an endpoint. func (e Endpoint) ID() string { return e.id } // ServiceID returns the identifier the endpoint belongs to. func (e Endpoint) ServiceID() string { return e.serviceID } // ResolveEndpoint resolves an endpoint from the context of a service and // region the endpoint represents. See Partition.EndpointFor for usage and // errors that can be returned. func (e Endpoint) ResolveEndpoint(opts ...func(*Options)) (ResolvedEndpoint, error) { return e.p.EndpointFor(e.serviceID, e.id, opts...) } // A ResolvedEndpoint is an endpoint that has been resolved based on a partition // service, and region. type ResolvedEndpoint struct { // The endpoint URL URL string // The endpoint partition PartitionID string // The region that should be used for signing requests. SigningRegion string // The service name that should be used for signing requests. SigningName string // States that the signing name for this endpoint was derived from metadata // passed in, but was not explicitly modeled. SigningNameDerived bool // The signing method that should be used for signing requests. SigningMethod string } // So that the Error interface type can be included as an anonymous field // in the requestError struct and not conflict with the error.Error() method. type awsError awserr.Error // A EndpointNotFoundError is returned when in StrictMatching mode, and the // endpoint for the service and region cannot be found in any of the partitions. type EndpointNotFoundError struct { awsError Partition string Service string Region string } // A UnknownServiceError is returned when the service does not resolve to an // endpoint. Includes a list of all known services for the partition. Returned // when a partition does not support the service. type UnknownServiceError struct { awsError Partition string Service string Known []string } // NewUnknownServiceError builds and returns UnknownServiceError. func NewUnknownServiceError(p, s string, known []string) UnknownServiceError { return UnknownServiceError{ awsError: awserr.New("UnknownServiceError", "could not resolve endpoint for unknown service", nil), Partition: p, Service: s, Known: known, } } // String returns the string representation of the error. func (e UnknownServiceError) Error() string { extra := fmt.Sprintf("partition: %q, service: %q", e.Partition, e.Service) if len(e.Known) > 0 { extra += fmt.Sprintf(", known: %v", e.Known) } return awserr.SprintError(e.Code(), e.Message(), extra, e.OrigErr()) } // String returns the string representation of the error. func (e UnknownServiceError) String() string { return e.Error() } // A UnknownEndpointError is returned when in StrictMatching mode and the // service is valid, but the region does not resolve to an endpoint. Includes // a list of all known endpoints for the service. type UnknownEndpointError struct { awsError Partition string Service string Region string Known []string } // NewUnknownEndpointError builds and returns UnknownEndpointError. func NewUnknownEndpointError(p, s, r string, known []string) UnknownEndpointError { return UnknownEndpointError{ awsError: awserr.New("UnknownEndpointError", "could not resolve endpoint", nil), Partition: p, Service: s, Region: r, Known: known, } } // String returns the string representation of the error. func (e UnknownEndpointError) Error() string { extra := fmt.Sprintf("partition: %q, service: %q, region: %q", e.Partition, e.Service, e.Region) if len(e.Known) > 0 { extra += fmt.Sprintf(", known: %v", e.Known) } return awserr.SprintError(e.Code(), e.Message(), extra, e.OrigErr()) } // String returns the string representation of the error. func (e UnknownEndpointError) String() string { return e.Error() }
616
session-manager-plugin
aws
Go
package endpoints import "testing" func TestEnumDefaultPartitions(t *testing.T) { resolver := DefaultResolver() enum, ok := resolver.(EnumPartitions) if ok != true { t.Fatalf("resolver must satisfy EnumPartition interface") } ps := enum.Partitions() if a, e := len(ps), len(defaultPartitions); a != e { t.Errorf("expected %d partitions, got %d", e, a) } } func TestEnumDefaultRegions(t *testing.T) { expectPart := defaultPartitions[0] partEnum := defaultPartitions[0].Partition() regEnum := partEnum.Regions() if a, e := len(regEnum), len(expectPart.Regions); a != e { t.Errorf("expected %d regions, got %d", e, a) } } func TestEnumPartitionServices(t *testing.T) { expectPart := testPartitions[0] partEnum := testPartitions[0].Partition() if a, e := partEnum.ID(), "part-id"; a != e { t.Errorf("expect %q partition ID, got %q", e, a) } svcEnum := partEnum.Services() // Expect the number of services in the partition + ec2metadata if a, e := len(svcEnum), len(expectPart.Services)+1; a != e { t.Errorf("expected %d regions, got %d", e, a) } } func TestEnumRegionServices(t *testing.T) { p := testPartitions[0].Partition() rs := p.Regions() if a, e := len(rs), 2; a != e { t.Errorf("expect %d regions got %d", e, a) } if _, ok := rs["us-east-1"]; !ok { t.Errorf("expect us-east-1 region to be found, was not") } if _, ok := rs["us-west-2"]; !ok { t.Errorf("expect us-west-2 region to be found, was not") } r := rs["us-east-1"] if a, e := r.ID(), "us-east-1"; a != e { t.Errorf("expect %q region ID, got %q", e, a) } if a, e := r.Description(), "region description"; a != e { t.Errorf("expect %q region Description, got %q", e, a) } ss := r.Services() if a, e := len(ss), 1; a != e { t.Errorf("expect %d services for us-east-1, got %d", e, a) } if _, ok := ss["service1"]; !ok { t.Errorf("expect service1 service to be found, was not") } resolved, err := r.ResolveEndpoint("service1") if err != nil { t.Fatalf("expect no error, got %v", err) } if a, e := resolved.URL, "https://service1.us-east-1.amazonaws.com"; a != e { t.Errorf("expect %q resolved URL, got %q", e, a) } } func TestEnumServiceRegions(t *testing.T) { p := testPartitions[0].Partition() rs := p.Services()["service1"].Regions() if e, a := 2, len(rs); e != a { t.Errorf("expect %d regions, got %d", e, a) } if _, ok := rs["us-east-1"]; !ok { t.Errorf("expect region to be found") } if _, ok := rs["us-west-2"]; !ok { t.Errorf("expect region to be found") } } func TestEnumServicesEndpoints(t *testing.T) { p := testPartitions[0].Partition() ss := p.Services() // Expect the number of services in the partition + ec2metadata if a, e := len(ss), 6; a != e { t.Errorf("expect %d regions got %d", e, a) } if _, ok := ss["service1"]; !ok { t.Errorf("expect service1 region to be found, was not") } if _, ok := ss["service2"]; !ok { t.Errorf("expect service2 region to be found, was not") } s := ss["service1"] if a, e := s.ID(), "service1"; a != e { t.Errorf("expect %q service ID, got %q", e, a) } resolved, err := s.ResolveEndpoint("us-west-2") if err != nil { t.Fatalf("expect no error, got %v", err) } if a, e := resolved.URL, "https://service1.us-west-2.amazonaws.com"; a != e { t.Errorf("expect %q resolved URL, got %q", e, a) } } func TestEnumEndpoints(t *testing.T) { p := testPartitions[0].Partition() s := p.Services()["service1"] es := s.Endpoints() if a, e := len(es), 2; a != e { t.Errorf("expect %d endpoints for service2, got %d", e, a) } if _, ok := es["us-east-1"]; !ok { t.Errorf("expect us-east-1 to be found, was not") } e := es["us-east-1"] if a, e := e.ID(), "us-east-1"; a != e { t.Errorf("expect %q endpoint ID, got %q", e, a) } if a, e := e.ServiceID(), "service1"; a != e { t.Errorf("expect %q service ID, got %q", e, a) } resolved, err := e.ResolveEndpoint() if err != nil { t.Fatalf("expect no error, got %v", err) } if a, e := resolved.URL, "https://service1.us-east-1.amazonaws.com"; a != e { t.Errorf("expect %q resolved URL, got %q", e, a) } } func TestResolveEndpointForPartition(t *testing.T) { enum := testPartitions.Partitions()[0] expected, err := testPartitions.EndpointFor("service1", "us-east-1") if err != nil { t.Fatalf("unexpected error, %v", err) } actual, err := enum.EndpointFor("service1", "us-east-1") if err != nil { t.Fatalf("unexpected error, %v", err) } if expected != actual { t.Errorf("expect resolved endpoint to be %v, but got %v", expected, actual) } } func TestAddScheme(t *testing.T) { cases := []struct { In string Expect string DisableSSL bool }{ { In: "https://example.com", Expect: "https://example.com", }, { In: "example.com", Expect: "https://example.com", }, { In: "http://example.com", Expect: "http://example.com", }, { In: "example.com", Expect: "http://example.com", DisableSSL: true, }, { In: "https://example.com", Expect: "https://example.com", DisableSSL: true, }, } for i, c := range cases { actual := AddScheme(c.In, c.DisableSSL) if actual != c.Expect { t.Errorf("%d, expect URL to be %q, got %q", i, c.Expect, actual) } } } func TestResolverFunc(t *testing.T) { var resolver Resolver resolver = ResolverFunc(func(s, r string, opts ...func(*Options)) (ResolvedEndpoint, error) { return ResolvedEndpoint{ URL: "https://service.region.dnssuffix.com", SigningRegion: "region", SigningName: "service", }, nil }) resolved, err := resolver.EndpointFor("service", "region", func(o *Options) { o.DisableSSL = true }) if err != nil { t.Fatalf("expect no error, got %v", err) } if a, e := resolved.URL, "https://service.region.dnssuffix.com"; a != e { t.Errorf("expect %q endpoint URL, got %q", e, a) } if a, e := resolved.SigningRegion, "region"; a != e { t.Errorf("expect %q region, got %q", e, a) } if a, e := resolved.SigningName, "service"; a != e { t.Errorf("expect %q signing name, got %q", e, a) } } func TestOptionsSet(t *testing.T) { var actual Options actual.Set(DisableSSLOption, UseDualStackOption, StrictMatchingOption) expect := Options{ DisableSSL: true, UseDualStack: true, StrictMatching: true, } if actual != expect { t.Errorf("expect %v options got %v", expect, actual) } } func TestRegionsForService(t *testing.T) { ps := DefaultPartitions() var expect map[string]Region var serviceID string for _, s := range ps[0].Services() { expect = s.Regions() serviceID = s.ID() if len(expect) > 0 { break } } actual, ok := RegionsForService(ps, ps[0].ID(), serviceID) if !ok { t.Fatalf("expect regions to be found, was not") } if len(actual) == 0 { t.Fatalf("expect service %s to have regions", serviceID) } if e, a := len(expect), len(actual); e != a { t.Fatalf("expect %d regions, got %d", e, a) } for id, r := range actual { if e, a := id, r.ID(); e != a { t.Errorf("expect %s region id, got %s", e, a) } if _, ok := expect[id]; !ok { t.Errorf("expect %s region to be found", id) } if a, e := r.Description(), expect[id].desc; a != e { t.Errorf("expect %q region Description, got %q", e, a) } } } func TestRegionsForService_NotFound(t *testing.T) { ps := testPartitions.Partitions() actual, ok := RegionsForService(ps, ps[0].ID(), "service-not-exists") if ok { t.Fatalf("expect no regions to be found, but were") } if len(actual) != 0 { t.Errorf("expect no regions, got %v", actual) } } func TestPartitionForRegion(t *testing.T) { ps := DefaultPartitions() expect := ps[len(ps)%2] var regionID string for id := range expect.Regions() { regionID = id break } actual, ok := PartitionForRegion(ps, regionID) if !ok { t.Fatalf("expect partition to be found") } if e, a := expect.DNSSuffix(), actual.DNSSuffix(); e != a { t.Errorf("expect %s partition DNSSuffix, got %s", e, a) } if e, a := expect.ID(), actual.ID(); e != a { t.Errorf("expect %s partition ID, got %s", e, a) } } func TestPartitionForRegion_NotFound(t *testing.T) { ps := DefaultPartitions() actual, ok := PartitionForRegion(ps, "regionNotExists") if ok { t.Errorf("expect no partition to be found, got %v", actual) } } func TestEC2MetadataEndpoint(t *testing.T) { cases := []struct { Options Options Expected string }{ { Expected: ec2MetadataEndpointIPv4, }, { Options: Options{ EC2MetadataEndpointMode: EC2IMDSEndpointModeStateIPv4, }, Expected: ec2MetadataEndpointIPv4, }, { Options: Options{ EC2MetadataEndpointMode: EC2IMDSEndpointModeStateIPv6, }, Expected: ec2MetadataEndpointIPv6, }, } for _, p := range DefaultPartitions() { var region string for r := range p.Regions() { region = r break } for _, c := range cases { endpoint, err := p.EndpointFor("ec2metadata", region, func(options *Options) { *options = c.Options }) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := c.Expected, endpoint.URL; e != a { t.Errorf("exect %v, got %v", e, a) } } } }
394
session-manager-plugin
aws
Go
package endpoints_test import ( "fmt" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/endpoints" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/aws-sdk-go/service/s3" "github.com/aws/aws-sdk-go/service/sqs" ) func ExampleEnumPartitions() { resolver := endpoints.DefaultResolver() partitions := resolver.(endpoints.EnumPartitions).Partitions() for _, p := range partitions { fmt.Println("Regions for", p.ID()) for id := range p.Regions() { fmt.Println("*", id) } fmt.Println("Services for", p.ID()) for id := range p.Services() { fmt.Println("*", id) } } } func ExampleResolverFunc() { myCustomResolver := func(service, region string, optFns ...func(*endpoints.Options)) (endpoints.ResolvedEndpoint, error) { if service == endpoints.S3ServiceID { return endpoints.ResolvedEndpoint{ URL: "s3.custom.endpoint.com", SigningRegion: "custom-signing-region", }, nil } return endpoints.DefaultResolver().EndpointFor(service, region, optFns...) } sess := session.Must(session.NewSession(&aws.Config{ Region: aws.String("us-west-2"), EndpointResolver: endpoints.ResolverFunc(myCustomResolver), })) // Create the S3 service client with the shared session. This will // automatically use the S3 custom endpoint configured in the custom // endpoint resolver wrapping the default endpoint resolver. s3Svc := s3.New(sess) // Operation calls will be made to the custom endpoint. s3Svc.GetObject(&s3.GetObjectInput{ Bucket: aws.String("myBucket"), Key: aws.String("myObjectKey"), }) // Create the SQS service client with the shared session. This will // fallback to the default endpoint resolver because the customization // passes any non S3 service endpoint resolve to the default resolver. sqsSvc := sqs.New(sess) // Operation calls will be made to the default endpoint for SQS for the // region configured. sqsSvc.ReceiveMessage(&sqs.ReceiveMessageInput{ QueueUrl: aws.String("my-queue-url"), }) }
67
session-manager-plugin
aws
Go
package endpoints var legacyGlobalRegions = map[string]map[string]struct{}{ "sts": { "ap-northeast-1": {}, "ap-south-1": {}, "ap-southeast-1": {}, "ap-southeast-2": {}, "ca-central-1": {}, "eu-central-1": {}, "eu-north-1": {}, "eu-west-1": {}, "eu-west-2": {}, "eu-west-3": {}, "sa-east-1": {}, "us-east-1": {}, "us-east-2": {}, "us-west-1": {}, "us-west-2": {}, }, "s3": { "us-east-1": {}, }, }
25
session-manager-plugin
aws
Go
package endpoints import ( "fmt" "regexp" "strconv" "strings" ) const ( ec2MetadataEndpointIPv6 = "http://[fd00:ec2::254]/latest" ec2MetadataEndpointIPv4 = "http://169.254.169.254/latest" ) var regionValidationRegex = regexp.MustCompile(`^[[:alnum:]]([[:alnum:]\-]*[[:alnum:]])?$`) type partitions []partition func (ps partitions) EndpointFor(service, region string, opts ...func(*Options)) (ResolvedEndpoint, error) { var opt Options opt.Set(opts...) for i := 0; i < len(ps); i++ { if !ps[i].canResolveEndpoint(service, region, opt.StrictMatching) { continue } return ps[i].EndpointFor(service, region, opts...) } // If loose matching fallback to first partition format to use // when resolving the endpoint. if !opt.StrictMatching && len(ps) > 0 { return ps[0].EndpointFor(service, region, opts...) } return ResolvedEndpoint{}, NewUnknownEndpointError("all partitions", service, region, []string{}) } // Partitions satisfies the EnumPartitions interface and returns a list // of Partitions representing each partition represented in the SDK's // endpoints model. func (ps partitions) Partitions() []Partition { parts := make([]Partition, 0, len(ps)) for i := 0; i < len(ps); i++ { parts = append(parts, ps[i].Partition()) } return parts } type partition struct { ID string `json:"partition"` Name string `json:"partitionName"` DNSSuffix string `json:"dnsSuffix"` RegionRegex regionRegex `json:"regionRegex"` Defaults endpoint `json:"defaults"` Regions regions `json:"regions"` Services services `json:"services"` } func (p partition) Partition() Partition { return Partition{ dnsSuffix: p.DNSSuffix, id: p.ID, p: &p, } } func (p partition) canResolveEndpoint(service, region string, strictMatch bool) bool { s, hasService := p.Services[service] _, hasEndpoint := s.Endpoints[region] if hasEndpoint && hasService { return true } if strictMatch { return false } return p.RegionRegex.MatchString(region) } func allowLegacyEmptyRegion(service string) bool { legacy := map[string]struct{}{ "budgets": {}, "ce": {}, "chime": {}, "cloudfront": {}, "ec2metadata": {}, "iam": {}, "importexport": {}, "organizations": {}, "route53": {}, "sts": {}, "support": {}, "waf": {}, } _, allowed := legacy[service] return allowed } func (p partition) EndpointFor(service, region string, opts ...func(*Options)) (resolved ResolvedEndpoint, err error) { var opt Options opt.Set(opts...) s, hasService := p.Services[service] if service == Ec2metadataServiceID && !hasService { endpoint := getEC2MetadataEndpoint(p.ID, service, opt.EC2MetadataEndpointMode) return endpoint, nil } if len(service) == 0 || !(hasService || opt.ResolveUnknownService) { // Only return error if the resolver will not fallback to creating // endpoint based on service endpoint ID passed in. return resolved, NewUnknownServiceError(p.ID, service, serviceList(p.Services)) } if len(region) == 0 && allowLegacyEmptyRegion(service) && len(s.PartitionEndpoint) != 0 { region = s.PartitionEndpoint } if (service == "sts" && opt.STSRegionalEndpoint != RegionalSTSEndpoint) || (service == "s3" && opt.S3UsEast1RegionalEndpoint != RegionalS3UsEast1Endpoint) { if _, ok := legacyGlobalRegions[service][region]; ok { region = "aws-global" } } e, hasEndpoint := s.endpointForRegion(region) if len(region) == 0 || (!hasEndpoint && opt.StrictMatching) { return resolved, NewUnknownEndpointError(p.ID, service, region, endpointList(s.Endpoints)) } defs := []endpoint{p.Defaults, s.Defaults} return e.resolve(service, p.ID, region, p.DNSSuffix, defs, opt) } func getEC2MetadataEndpoint(partitionID, service string, mode EC2IMDSEndpointModeState) ResolvedEndpoint { switch mode { case EC2IMDSEndpointModeStateIPv6: return ResolvedEndpoint{ URL: ec2MetadataEndpointIPv6, PartitionID: partitionID, SigningRegion: "aws-global", SigningName: service, SigningNameDerived: true, SigningMethod: "v4", } case EC2IMDSEndpointModeStateIPv4: fallthrough default: return ResolvedEndpoint{ URL: ec2MetadataEndpointIPv4, PartitionID: partitionID, SigningRegion: "aws-global", SigningName: service, SigningNameDerived: true, SigningMethod: "v4", } } } func serviceList(ss services) []string { list := make([]string, 0, len(ss)) for k := range ss { list = append(list, k) } return list } func endpointList(es endpoints) []string { list := make([]string, 0, len(es)) for k := range es { list = append(list, k) } return list } type regionRegex struct { *regexp.Regexp } func (rr *regionRegex) UnmarshalJSON(b []byte) (err error) { // Strip leading and trailing quotes regex, err := strconv.Unquote(string(b)) if err != nil { return fmt.Errorf("unable to strip quotes from regex, %v", err) } rr.Regexp, err = regexp.Compile(regex) if err != nil { return fmt.Errorf("unable to unmarshal region regex, %v", err) } return nil } type regions map[string]region type region struct { Description string `json:"description"` } type services map[string]service type service struct { PartitionEndpoint string `json:"partitionEndpoint"` IsRegionalized boxedBool `json:"isRegionalized,omitempty"` Defaults endpoint `json:"defaults"` Endpoints endpoints `json:"endpoints"` } func (s *service) endpointForRegion(region string) (endpoint, bool) { if e, ok := s.Endpoints[region]; ok { return e, true } if s.IsRegionalized == boxedFalse { return s.Endpoints[s.PartitionEndpoint], region == s.PartitionEndpoint } // Unable to find any matching endpoint, return // blank that will be used for generic endpoint creation. return endpoint{}, false } type endpoints map[string]endpoint type endpoint struct { Hostname string `json:"hostname"` Protocols []string `json:"protocols"` CredentialScope credentialScope `json:"credentialScope"` // Custom fields not modeled HasDualStack boxedBool `json:"-"` DualStackHostname string `json:"-"` // Signature Version not used SignatureVersions []string `json:"signatureVersions"` // SSLCommonName not used. SSLCommonName string `json:"sslCommonName"` } const ( defaultProtocol = "https" defaultSigner = "v4" ) var ( protocolPriority = []string{"https", "http"} signerPriority = []string{"v4", "v2"} ) func getByPriority(s []string, p []string, def string) string { if len(s) == 0 { return def } for i := 0; i < len(p); i++ { for j := 0; j < len(s); j++ { if s[j] == p[i] { return s[j] } } } return s[0] } func (e endpoint) resolve(service, partitionID, region, dnsSuffix string, defs []endpoint, opts Options) (ResolvedEndpoint, error) { var merged endpoint for _, def := range defs { merged.mergeIn(def) } merged.mergeIn(e) e = merged signingRegion := e.CredentialScope.Region if len(signingRegion) == 0 { signingRegion = region } signingName := e.CredentialScope.Service var signingNameDerived bool if len(signingName) == 0 { signingName = service signingNameDerived = true } hostname := e.Hostname // Offset the hostname for dualstack if enabled if opts.UseDualStack && e.HasDualStack == boxedTrue { hostname = e.DualStackHostname region = signingRegion } if !validateInputRegion(region) { return ResolvedEndpoint{}, fmt.Errorf("invalid region identifier format provided") } u := strings.Replace(hostname, "{service}", service, 1) u = strings.Replace(u, "{region}", region, 1) u = strings.Replace(u, "{dnsSuffix}", dnsSuffix, 1) scheme := getEndpointScheme(e.Protocols, opts.DisableSSL) u = fmt.Sprintf("%s://%s", scheme, u) return ResolvedEndpoint{ URL: u, PartitionID: partitionID, SigningRegion: signingRegion, SigningName: signingName, SigningNameDerived: signingNameDerived, SigningMethod: getByPriority(e.SignatureVersions, signerPriority, defaultSigner), }, nil } func getEndpointScheme(protocols []string, disableSSL bool) string { if disableSSL { return "http" } return getByPriority(protocols, protocolPriority, defaultProtocol) } func (e *endpoint) mergeIn(other endpoint) { if len(other.Hostname) > 0 { e.Hostname = other.Hostname } if len(other.Protocols) > 0 { e.Protocols = other.Protocols } if len(other.SignatureVersions) > 0 { e.SignatureVersions = other.SignatureVersions } if len(other.CredentialScope.Region) > 0 { e.CredentialScope.Region = other.CredentialScope.Region } if len(other.CredentialScope.Service) > 0 { e.CredentialScope.Service = other.CredentialScope.Service } if len(other.SSLCommonName) > 0 { e.SSLCommonName = other.SSLCommonName } if other.HasDualStack != boxedBoolUnset { e.HasDualStack = other.HasDualStack } if len(other.DualStackHostname) > 0 { e.DualStackHostname = other.DualStackHostname } } type credentialScope struct { Region string `json:"region"` Service string `json:"service"` } type boxedBool int func (b *boxedBool) UnmarshalJSON(buf []byte) error { v, err := strconv.ParseBool(string(buf)) if err != nil { return err } if v { *b = boxedTrue } else { *b = boxedFalse } return nil } const ( boxedBoolUnset boxedBool = iota boxedFalse boxedTrue ) func validateInputRegion(region string) bool { return regionValidationRegex.MatchString(region) }
388
session-manager-plugin
aws
Go
// +build codegen package endpoints import ( "fmt" "io" "reflect" "strings" "text/template" "unicode" ) // A CodeGenOptions are the options for code generating the endpoints into // Go code from the endpoints model definition. type CodeGenOptions struct { // Options for how the model will be decoded. DecodeModelOptions DecodeModelOptions // Disables code generation of the service endpoint prefix IDs defined in // the model. DisableGenerateServiceIDs bool } // Set combines all of the option functions together func (d *CodeGenOptions) Set(optFns ...func(*CodeGenOptions)) { for _, fn := range optFns { fn(d) } } // CodeGenModel given a endpoints model file will decode it and attempt to // generate Go code from the model definition. Error will be returned if // the code is unable to be generated, or decoded. func CodeGenModel(modelFile io.Reader, outFile io.Writer, optFns ...func(*CodeGenOptions)) error { var opts CodeGenOptions opts.Set(optFns...) resolver, err := DecodeModel(modelFile, func(d *DecodeModelOptions) { *d = opts.DecodeModelOptions }) if err != nil { return err } v := struct { Resolver CodeGenOptions }{ Resolver: resolver, CodeGenOptions: opts, } tmpl := template.Must(template.New("tmpl").Funcs(funcMap).Parse(v3Tmpl)) if err := tmpl.ExecuteTemplate(outFile, "defaults", v); err != nil { return fmt.Errorf("failed to execute template, %v", err) } return nil } func toSymbol(v string) string { out := []rune{} for _, c := range strings.Title(v) { if !(unicode.IsNumber(c) || unicode.IsLetter(c)) { continue } out = append(out, c) } return string(out) } func quoteString(v string) string { return fmt.Sprintf("%q", v) } func regionConstName(p, r string) string { return toSymbol(p) + toSymbol(r) } func partitionGetter(id string) string { return fmt.Sprintf("%sPartition", toSymbol(id)) } func partitionVarName(id string) string { return fmt.Sprintf("%sPartition", strings.ToLower(toSymbol(id))) } func listPartitionNames(ps partitions) string { names := []string{} switch len(ps) { case 1: return ps[0].Name case 2: return fmt.Sprintf("%s and %s", ps[0].Name, ps[1].Name) default: for i, p := range ps { if i == len(ps)-1 { names = append(names, "and "+p.Name) } else { names = append(names, p.Name) } } return strings.Join(names, ", ") } } func boxedBoolIfSet(msg string, v boxedBool) string { switch v { case boxedTrue: return fmt.Sprintf(msg, "boxedTrue") case boxedFalse: return fmt.Sprintf(msg, "boxedFalse") default: return "" } } func stringIfSet(msg, v string) string { if len(v) == 0 { return "" } return fmt.Sprintf(msg, v) } func stringSliceIfSet(msg string, vs []string) string { if len(vs) == 0 { return "" } names := []string{} for _, v := range vs { names = append(names, `"`+v+`"`) } return fmt.Sprintf(msg, strings.Join(names, ",")) } func endpointIsSet(v endpoint) bool { return !reflect.DeepEqual(v, endpoint{}) } func serviceSet(ps partitions) map[string]struct{} { set := map[string]struct{}{} for _, p := range ps { for id := range p.Services { set[id] = struct{}{} } } return set } var funcMap = template.FuncMap{ "ToSymbol": toSymbol, "QuoteString": quoteString, "RegionConst": regionConstName, "PartitionGetter": partitionGetter, "PartitionVarName": partitionVarName, "ListPartitionNames": listPartitionNames, "BoxedBoolIfSet": boxedBoolIfSet, "StringIfSet": stringIfSet, "StringSliceIfSet": stringSliceIfSet, "EndpointIsSet": endpointIsSet, "ServicesSet": serviceSet, } const v3Tmpl = ` {{ define "defaults" -}} // Code generated by aws/endpoints/v3model_codegen.go. DO NOT EDIT. package endpoints import ( "regexp" ) {{ template "partition consts" $.Resolver }} {{ range $_, $partition := $.Resolver }} {{ template "partition region consts" $partition }} {{ end }} {{ if not $.DisableGenerateServiceIDs -}} {{ template "service consts" $.Resolver }} {{- end }} {{ template "endpoint resolvers" $.Resolver }} {{- end }} {{ define "partition consts" }} // Partition identifiers const ( {{ range $_, $p := . -}} {{ ToSymbol $p.ID }}PartitionID = {{ QuoteString $p.ID }} // {{ $p.Name }} partition. {{ end -}} ) {{- end }} {{ define "partition region consts" }} // {{ .Name }} partition's regions. const ( {{ range $id, $region := .Regions -}} {{ ToSymbol $id }}RegionID = {{ QuoteString $id }} // {{ $region.Description }}. {{ end -}} ) {{- end }} {{ define "service consts" }} // Service identifiers const ( {{ $serviceSet := ServicesSet . -}} {{ range $id, $_ := $serviceSet -}} {{ ToSymbol $id }}ServiceID = {{ QuoteString $id }} // {{ ToSymbol $id }}. {{ end -}} ) {{- end }} {{ define "endpoint resolvers" }} // DefaultResolver returns an Endpoint resolver that will be able // to resolve endpoints for: {{ ListPartitionNames . }}. // // Use DefaultPartitions() to get the list of the default partitions. func DefaultResolver() Resolver { return defaultPartitions } // DefaultPartitions returns a list of the partitions the SDK is bundled // with. The available partitions are: {{ ListPartitionNames . }}. // // partitions := endpoints.DefaultPartitions // for _, p := range partitions { // // ... inspect partitions // } func DefaultPartitions() []Partition { return defaultPartitions.Partitions() } var defaultPartitions = partitions{ {{ range $_, $partition := . -}} {{ PartitionVarName $partition.ID }}, {{ end }} } {{ range $_, $partition := . -}} {{ $name := PartitionGetter $partition.ID -}} // {{ $name }} returns the Resolver for {{ $partition.Name }}. func {{ $name }}() Partition { return {{ PartitionVarName $partition.ID }}.Partition() } var {{ PartitionVarName $partition.ID }} = {{ template "gocode Partition" $partition }} {{ end }} {{ end }} {{ define "default partitions" }} func DefaultPartitions() []Partition { return []partition{ {{ range $_, $partition := . -}} // {{ ToSymbol $partition.ID}}Partition(), {{ end }} } } {{ end }} {{ define "gocode Partition" -}} partition{ {{ StringIfSet "ID: %q,\n" .ID -}} {{ StringIfSet "Name: %q,\n" .Name -}} {{ StringIfSet "DNSSuffix: %q,\n" .DNSSuffix -}} RegionRegex: {{ template "gocode RegionRegex" .RegionRegex }}, {{ if EndpointIsSet .Defaults -}} Defaults: {{ template "gocode Endpoint" .Defaults }}, {{- end }} Regions: {{ template "gocode Regions" .Regions }}, Services: {{ template "gocode Services" .Services }}, } {{- end }} {{ define "gocode RegionRegex" -}} regionRegex{ Regexp: func() *regexp.Regexp{ reg, _ := regexp.Compile({{ QuoteString .Regexp.String }}) return reg }(), } {{- end }} {{ define "gocode Regions" -}} regions{ {{ range $id, $region := . -}} "{{ $id }}": {{ template "gocode Region" $region }}, {{ end -}} } {{- end }} {{ define "gocode Region" -}} region{ {{ StringIfSet "Description: %q,\n" .Description -}} } {{- end }} {{ define "gocode Services" -}} services{ {{ range $id, $service := . -}} "{{ $id }}": {{ template "gocode Service" $service }}, {{ end }} } {{- end }} {{ define "gocode Service" -}} service{ {{ StringIfSet "PartitionEndpoint: %q,\n" .PartitionEndpoint -}} {{ BoxedBoolIfSet "IsRegionalized: %s,\n" .IsRegionalized -}} {{ if EndpointIsSet .Defaults -}} Defaults: {{ template "gocode Endpoint" .Defaults -}}, {{- end }} {{ if .Endpoints -}} Endpoints: {{ template "gocode Endpoints" .Endpoints }}, {{- end }} } {{- end }} {{ define "gocode Endpoints" -}} endpoints{ {{ range $id, $endpoint := . -}} "{{ $id }}": {{ template "gocode Endpoint" $endpoint }}, {{ end }} } {{- end }} {{ define "gocode Endpoint" -}} endpoint{ {{ StringIfSet "Hostname: %q,\n" .Hostname -}} {{ StringIfSet "SSLCommonName: %q,\n" .SSLCommonName -}} {{ StringSliceIfSet "Protocols: []string{%s},\n" .Protocols -}} {{ StringSliceIfSet "SignatureVersions: []string{%s},\n" .SignatureVersions -}} {{ if or .CredentialScope.Region .CredentialScope.Service -}} CredentialScope: credentialScope{ {{ StringIfSet "Region: %q,\n" .CredentialScope.Region -}} {{ StringIfSet "Service: %q,\n" .CredentialScope.Service -}} }, {{- end }} {{ BoxedBoolIfSet "HasDualStack: %s,\n" .HasDualStack -}} {{ StringIfSet "DualStackHostname: %q,\n" .DualStackHostname -}} } {{- end }} `
352
session-manager-plugin
aws
Go
// +build go1.7 package endpoints import ( "regexp" "testing" ) func TestEndpointFor_STSRegionalFlag(t *testing.T) { // mock STS regional endpoints model mockSTSModelPartition := partition{ ID: "aws", Name: "AWS Standard", DNSSuffix: "amazonaws.com", RegionRegex: regionRegex{ Regexp: func() *regexp.Regexp { reg, _ := regexp.Compile("^(us|eu|ap|sa|ca|me)\\-\\w+\\-\\d+$") return reg }(), }, Defaults: endpoint{ Hostname: "{service}.{region}.{dnsSuffix}", Protocols: []string{"https"}, SignatureVersions: []string{"v4"}, }, Regions: regions{ "ap-east-1": region{ Description: "Asia Pacific (Hong Kong)", }, "ap-northeast-1": region{ Description: "Asia Pacific (Tokyo)", }, "ap-northeast-2": region{ Description: "Asia Pacific (Seoul)", }, "ap-south-1": region{ Description: "Asia Pacific (Mumbai)", }, "ap-southeast-1": region{ Description: "Asia Pacific (Singapore)", }, "ap-southeast-2": region{ Description: "Asia Pacific (Sydney)", }, "ca-central-1": region{ Description: "Canada (Central)", }, "eu-central-1": region{ Description: "EU (Frankfurt)", }, "eu-north-1": region{ Description: "EU (Stockholm)", }, "eu-west-1": region{ Description: "EU (Ireland)", }, "eu-west-2": region{ Description: "EU (London)", }, "eu-west-3": region{ Description: "EU (Paris)", }, "me-south-1": region{ Description: "Middle East (Bahrain)", }, "sa-east-1": region{ Description: "South America (Sao Paulo)", }, "us-east-1": region{ Description: "US East (N. Virginia)", }, "us-east-2": region{ Description: "US East (Ohio)", }, "us-west-1": region{ Description: "US West (N. California)", }, "us-west-2": region{ Description: "US West (Oregon)", }, }, Services: services{ "sts": service{ PartitionEndpoint: "aws-global", Defaults: endpoint{}, Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{}, "ap-northeast-2": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{}, "ap-southeast-2": endpoint{}, "aws-global": endpoint{ Hostname: "sts.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{}, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "sa-east-1": endpoint{}, "us-east-1": endpoint{}, "us-east-1-fips": endpoint{ Hostname: "sts-fips.us-east-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "us-east-2": endpoint{}, "us-east-2-fips": endpoint{ Hostname: "sts-fips.us-east-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-2", }, }, "us-west-1": endpoint{}, "us-west-1-fips": endpoint{ Hostname: "sts-fips.us-west-1.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-1", }, }, "us-west-2": endpoint{}, "us-west-2-fips": endpoint{ Hostname: "sts-fips.us-west-2.amazonaws.com", CredentialScope: credentialScope{ Region: "us-west-2", }, }, }, }, }, } // resolver for mock STS regional endpoints model resolver := mockSTSModelPartition cases := map[string]struct { service, region string regional bool ExpectURL, ExpectSigningMethod, ExpectSigningRegion string ExpectSigningNameDerived bool }{ // STS Endpoints resolver tests : "sts/us-west-2/regional": { service: "sts", region: "us-west-2", regional: true, ExpectURL: "https://sts.us-west-2.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-west-2", }, "sts/us-west-2/legacy": { service: "sts", region: "us-west-2", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/ap-east-1/regional": { service: "sts", region: "ap-east-1", regional: true, ExpectURL: "https://sts.ap-east-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "ap-east-1", }, "sts/ap-east-1/legacy": { service: "sts", region: "ap-east-1", regional: false, ExpectURL: "https://sts.ap-east-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "ap-east-1", }, "sts/us-west-2-fips/regional": { service: "sts", region: "us-west-2-fips", regional: true, ExpectURL: "https://sts-fips.us-west-2.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-west-2", }, "sts/us-west-2-fips/legacy": { service: "sts", region: "us-west-2-fips", regional: false, ExpectURL: "https://sts-fips.us-west-2.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-west-2", }, "sts/aws-global/regional": { service: "sts", region: "aws-global", regional: true, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/aws-global/legacy": { service: "sts", region: "aws-global", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/ap-south-1/regional": { service: "sts", region: "ap-south-1", regional: true, ExpectURL: "https://sts.ap-south-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "ap-south-1", }, "sts/ap-south-1/legacy": { service: "sts", region: "ap-south-1", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/ap-northeast-1/regional": { service: "sts", region: "ap-northeast-1", regional: true, ExpectURL: "https://sts.ap-northeast-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "ap-northeast-1", }, "sts/ap-northeast-1/legacy": { service: "sts", region: "ap-northeast-1", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/ap-southeast-1/regional": { service: "sts", region: "ap-southeast-1", regional: true, ExpectURL: "https://sts.ap-southeast-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "ap-southeast-1", }, "sts/ap-southeast-1/legacy": { service: "sts", region: "ap-southeast-1", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/ca-central-1/regional": { service: "sts", region: "ca-central-1", regional: true, ExpectURL: "https://sts.ca-central-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "ca-central-1", }, "sts/ca-central-1/legacy": { service: "sts", region: "ca-central-1", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/eu-central-1/regional": { service: "sts", region: "eu-central-1", regional: true, ExpectURL: "https://sts.eu-central-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "eu-central-1", }, "sts/eu-central-1/legacy": { service: "sts", region: "eu-central-1", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/eu-north-1/regional": { service: "sts", region: "eu-north-1", regional: true, ExpectURL: "https://sts.eu-north-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "eu-north-1", }, "sts/eu-north-1/legacy": { service: "sts", region: "eu-north-1", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/eu-west-1/regional": { service: "sts", region: "eu-west-1", regional: true, ExpectURL: "https://sts.eu-west-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "eu-west-1", }, "sts/eu-west-1/legacy": { service: "sts", region: "eu-west-1", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/eu-west-2/regional": { service: "sts", region: "eu-west-2", regional: true, ExpectURL: "https://sts.eu-west-2.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "eu-west-2", }, "sts/eu-west-2/legacy": { service: "sts", region: "eu-west-2", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/eu-west-3/regional": { service: "sts", region: "eu-west-3", regional: true, ExpectURL: "https://sts.eu-west-3.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "eu-west-3", }, "sts/eu-west-3/legacy": { service: "sts", region: "eu-west-3", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/sa-east-1/regional": { service: "sts", region: "sa-east-1", regional: true, ExpectURL: "https://sts.sa-east-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "sa-east-1", }, "sts/sa-east-1/legacy": { service: "sts", region: "sa-east-1", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/us-east-1/regional": { service: "sts", region: "us-east-1", regional: true, ExpectURL: "https://sts.us-east-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/us-east-1/legacy": { service: "sts", region: "us-east-1", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/us-east-2/regional": { service: "sts", region: "us-east-2", regional: true, ExpectURL: "https://sts.us-east-2.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-2", }, "sts/us-east-2/legacy": { service: "sts", region: "us-east-2", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, "sts/us-west-1/regional": { service: "sts", region: "us-west-1", regional: true, ExpectURL: "https://sts.us-west-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-west-1", }, "sts/us-west-1/legacy": { service: "sts", region: "us-west-1", regional: false, ExpectURL: "https://sts.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "us-east-1", }, } for name, c := range cases { t.Run(name, func(t *testing.T) { var optionSlice []func(o *Options) optionSlice = append(optionSlice, func(o *Options) { if c.regional { o.STSRegionalEndpoint = RegionalSTSEndpoint } }) actual, err := resolver.EndpointFor(c.service, c.region, optionSlice...) if err != nil { t.Fatalf("failed to resolve endpoint, %v", err) } if e, a := c.ExpectURL, actual.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := c.ExpectSigningMethod, actual.SigningMethod; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := c.ExpectSigningNameDerived, actual.SigningNameDerived; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := c.ExpectSigningRegion, actual.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } }) } } func TestEndpointFor_S3UsEast1RegionalFlag(t *testing.T) { // mock S3 regional endpoints model mockS3ModelPartition := partition{ ID: "aws", Name: "AWS Standard", DNSSuffix: "amazonaws.com", RegionRegex: regionRegex{ Regexp: func() *regexp.Regexp { reg, _ := regexp.Compile("^(us|eu|ap|sa|ca|me)\\-\\w+\\-\\d+$") return reg }(), }, Defaults: endpoint{ Hostname: "{service}.{region}.{dnsSuffix}", Protocols: []string{"https"}, SignatureVersions: []string{"v4"}, }, Regions: regions{ "ap-east-1": region{ Description: "Asia Pacific (Hong Kong)", }, "ap-northeast-1": region{ Description: "Asia Pacific (Tokyo)", }, "ap-northeast-2": region{ Description: "Asia Pacific (Seoul)", }, "ap-south-1": region{ Description: "Asia Pacific (Mumbai)", }, "ap-southeast-1": region{ Description: "Asia Pacific (Singapore)", }, "ap-southeast-2": region{ Description: "Asia Pacific (Sydney)", }, "ca-central-1": region{ Description: "Canada (Central)", }, "eu-central-1": region{ Description: "EU (Frankfurt)", }, "eu-north-1": region{ Description: "EU (Stockholm)", }, "eu-west-1": region{ Description: "EU (Ireland)", }, "eu-west-2": region{ Description: "EU (London)", }, "eu-west-3": region{ Description: "EU (Paris)", }, "me-south-1": region{ Description: "Middle East (Bahrain)", }, "sa-east-1": region{ Description: "South America (Sao Paulo)", }, "us-east-1": region{ Description: "US East (N. Virginia)", }, "us-east-2": region{ Description: "US East (Ohio)", }, "us-west-1": region{ Description: "US West (N. California)", }, "us-west-2": region{ Description: "US West (Oregon)", }, }, Services: services{ "s3": service{ PartitionEndpoint: "aws-global", IsRegionalized: boxedTrue, Defaults: endpoint{ Protocols: []string{"http", "https"}, SignatureVersions: []string{"s3v4"}, HasDualStack: boxedTrue, DualStackHostname: "{service}.dualstack.{region}.{dnsSuffix}", }, Endpoints: endpoints{ "ap-east-1": endpoint{}, "ap-northeast-1": endpoint{ Hostname: "s3.ap-northeast-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "ap-northeast-2": endpoint{}, "ap-northeast-3": endpoint{}, "ap-south-1": endpoint{}, "ap-southeast-1": endpoint{ Hostname: "s3.ap-southeast-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "ap-southeast-2": endpoint{ Hostname: "s3.ap-southeast-2.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "aws-global": endpoint{ Hostname: "s3.amazonaws.com", CredentialScope: credentialScope{ Region: "us-east-1", }, }, "ca-central-1": endpoint{}, "eu-central-1": endpoint{}, "eu-north-1": endpoint{}, "eu-west-1": endpoint{ Hostname: "s3.eu-west-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "eu-west-2": endpoint{}, "eu-west-3": endpoint{}, "me-south-1": endpoint{}, "s3-external-1": endpoint{ Hostname: "s3-external-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, CredentialScope: credentialScope{ Region: "us-east-1", }, }, "sa-east-1": endpoint{ Hostname: "s3.sa-east-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "us-east-1": endpoint{ Hostname: "s3.us-east-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "us-east-2": endpoint{}, "us-west-1": endpoint{ Hostname: "s3.us-west-1.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, "us-west-2": endpoint{ Hostname: "s3.us-west-2.amazonaws.com", SignatureVersions: []string{"s3", "s3v4"}, }, }, }, }, } // resolver for mock S3 regional endpoints model resolver := mockS3ModelPartition cases := map[string]struct { service, region string regional S3UsEast1RegionalEndpoint ExpectURL string ExpectSigningRegion string }{ // S3 Endpoints resolver tests: "s3/us-east-1/regional": { service: "s3", region: "us-east-1", regional: RegionalS3UsEast1Endpoint, ExpectURL: "https://s3.us-east-1.amazonaws.com", ExpectSigningRegion: "us-east-1", }, "s3/us-east-1/legacy": { service: "s3", region: "us-east-1", ExpectURL: "https://s3.amazonaws.com", ExpectSigningRegion: "us-east-1", }, "s3/us-west-1/regional": { service: "s3", region: "us-west-1", regional: RegionalS3UsEast1Endpoint, ExpectURL: "https://s3.us-west-1.amazonaws.com", ExpectSigningRegion: "us-west-1", }, "s3/us-west-1/legacy": { service: "s3", region: "us-west-1", regional: RegionalS3UsEast1Endpoint, ExpectURL: "https://s3.us-west-1.amazonaws.com", ExpectSigningRegion: "us-west-1", }, } for name, c := range cases { t.Run(name, func(t *testing.T) { var optionSlice []func(o *Options) optionSlice = append(optionSlice, func(o *Options) { o.S3UsEast1RegionalEndpoint = c.regional }) actual, err := resolver.EndpointFor(c.service, c.region, optionSlice...) if err != nil { t.Fatalf("failed to resolve endpoint, %v", err) } if e, a := c.ExpectURL, actual.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := c.ExpectSigningRegion, actual.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } }) } } func TestSTSRegionalEndpoint_CNPartition(t *testing.T) { mockSTSCNPartition := partition{ ID: "aws-cn", Name: "AWS China", DNSSuffix: "amazonaws.com.cn", RegionRegex: regionRegex{ Regexp: func() *regexp.Regexp { reg, _ := regexp.Compile("^cn\\-\\w+\\-\\d+$") return reg }(), }, Defaults: endpoint{ Hostname: "{service}.{region}.{dnsSuffix}", Protocols: []string{"https"}, SignatureVersions: []string{"v4"}, }, Regions: regions{ "cn-north-1": region{ Description: "China (Beijing)", }, "cn-northwest-1": region{ Description: "China (Ningxia)", }, }, Services: services{ "sts": service{ Endpoints: endpoints{ "cn-north-1": endpoint{}, "cn-northwest-1": endpoint{}, }, }, }, } resolver := mockSTSCNPartition cases := map[string]struct { service, region string regional bool ExpectURL, ExpectSigningMethod, ExpectSigningRegion string ExpectSigningNameDerived bool }{ "sts/cn-north-1/regional": { service: "sts", region: "cn-north-1", regional: true, ExpectURL: "https://sts.cn-north-1.amazonaws.com.cn", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "cn-north-1", }, "sts/cn-north-1/legacy": { service: "sts", region: "cn-north-1", regional: false, ExpectURL: "https://sts.cn-north-1.amazonaws.com.cn", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "cn-north-1", }, } for name, c := range cases { var optionSlice []func(o *Options) t.Run(name, func(t *testing.T) { if c.regional { optionSlice = append(optionSlice, STSRegionalEndpointOption) } actual, err := resolver.EndpointFor(c.service, c.region, optionSlice...) if err != nil { t.Fatalf("failed to resolve endpoint, %v", err) } if e, a := c.ExpectURL, actual.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := c.ExpectSigningMethod, actual.SigningMethod; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := c.ExpectSigningNameDerived, actual.SigningNameDerived; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := c.ExpectSigningRegion, actual.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } }) } }
793
session-manager-plugin
aws
Go
package endpoints import "regexp" var testPartitions = partitions{ partition{ ID: "part-id", Name: "partitionName", DNSSuffix: "amazonaws.com", RegionRegex: regionRegex{ Regexp: func() *regexp.Regexp { reg, _ := regexp.Compile("^(us|eu|ap|sa|ca)\\-\\w+\\-\\d+$") return reg }(), }, Defaults: endpoint{ Hostname: "{service}.{region}.{dnsSuffix}", Protocols: []string{"https"}, SignatureVersions: []string{"v4"}, }, Regions: regions{ "us-east-1": region{ Description: "region description", }, "us-west-2": region{}, }, Services: services{ "s3": service{}, "service1": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "service1", }, }, Endpoints: endpoints{ "us-east-1": {}, "us-west-2": { HasDualStack: boxedTrue, DualStackHostname: "{service}.dualstack.{region}.{dnsSuffix}", }, }, }, "service2": service{ Defaults: endpoint{ CredentialScope: credentialScope{ Service: "service2", }, }, }, "httpService": service{ Defaults: endpoint{ Protocols: []string{"http"}, }, }, "globalService": service{ IsRegionalized: boxedFalse, PartitionEndpoint: "aws-global", Endpoints: endpoints{ "aws-global": endpoint{ CredentialScope: credentialScope{ Region: "us-east-1", }, Hostname: "globalService.amazonaws.com", }, "fips-aws-global": endpoint{ CredentialScope: credentialScope{ Region: "us-east-1", }, Hostname: "globalService-fips.amazonaws.com", }, }, }, }, }, }
76
session-manager-plugin
aws
Go
// +build go1.7 package endpoints import ( "encoding/json" "reflect" "regexp" "strconv" "strings" "testing" ) func TestUnmarshalRegionRegex(t *testing.T) { var input = []byte(` { "regionRegex": "^(us|eu|ap|sa|ca)\\-\\w+\\-\\d+$" }`) p := partition{} err := json.Unmarshal(input, &p) if err != nil { t.Fatalf("expect no error, got %v", err) } expectRegexp, err := regexp.Compile(`^(us|eu|ap|sa|ca)\-\w+\-\d+$`) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := expectRegexp.String(), p.RegionRegex.Regexp.String(); e != a { t.Errorf("expect %v, got %v", e, a) } } func TestUnmarshalRegion(t *testing.T) { var input = []byte(` { "aws-global": { "description": "AWS partition-global endpoint" }, "us-east-1": { "description": "US East (N. Virginia)" } }`) rs := regions{} err := json.Unmarshal(input, &rs) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := 2, len(rs); e != a { t.Errorf("expect %v len, got %v", e, a) } r, ok := rs["aws-global"] if !ok { t.Errorf("expect found, was not") } if e, a := "AWS partition-global endpoint", r.Description; e != a { t.Errorf("expect %v, got %v", e, a) } r, ok = rs["us-east-1"] if !ok { t.Errorf("expect found, was not") } if e, a := "US East (N. Virginia)", r.Description; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestUnmarshalServices(t *testing.T) { var input = []byte(` { "acm": { "endpoints": { "us-east-1": {} } }, "apigateway": { "isRegionalized": true, "endpoints": { "us-east-1": {}, "us-west-2": {} } }, "notRegionalized": { "isRegionalized": false, "endpoints": { "us-east-1": {}, "us-west-2": {} } } }`) ss := services{} err := json.Unmarshal(input, &ss) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := 3, len(ss); e != a { t.Errorf("expect %v len, got %v", e, a) } s, ok := ss["acm"] if !ok { t.Errorf("expect found, was not") } if e, a := 1, len(s.Endpoints); e != a { t.Errorf("expect %v len, got %v", e, a) } if e, a := boxedBoolUnset, s.IsRegionalized; e != a { t.Errorf("expect %v, got %v", e, a) } s, ok = ss["apigateway"] if !ok { t.Errorf("expect found, was not") } if e, a := 2, len(s.Endpoints); e != a { t.Errorf("expect %v len, got %v", e, a) } if e, a := boxedTrue, s.IsRegionalized; e != a { t.Errorf("expect %v, got %v", e, a) } s, ok = ss["notRegionalized"] if !ok { t.Errorf("expect found, was not") } if e, a := 2, len(s.Endpoints); e != a { t.Errorf("expect %v len, got %v", e, a) } if e, a := boxedFalse, s.IsRegionalized; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestUnmarshalEndpoints(t *testing.T) { var inputs = []byte(` { "aws-global": { "hostname": "cloudfront.amazonaws.com", "protocols": [ "http", "https" ], "signatureVersions": [ "v4" ], "credentialScope": { "region": "us-east-1", "service": "serviceName" }, "sslCommonName": "commonName" }, "us-east-1": {} }`) es := endpoints{} err := json.Unmarshal(inputs, &es) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := 2, len(es); e != a { t.Errorf("expect %v len, got %v", e, a) } s, ok := es["aws-global"] if !ok { t.Errorf("expect found, was not") } if e, a := "cloudfront.amazonaws.com", s.Hostname; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := []string{"http", "https"}, s.Protocols; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if e, a := []string{"v4"}, s.SignatureVersions; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if e, a := (credentialScope{"us-east-1", "serviceName"}), s.CredentialScope; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "commonName", s.SSLCommonName; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestEndpointResolve(t *testing.T) { defs := []endpoint{ { Hostname: "{service}.{region}.{dnsSuffix}", SignatureVersions: []string{"v2"}, SSLCommonName: "sslCommonName", }, { Hostname: "other-hostname", Protocols: []string{"http"}, CredentialScope: credentialScope{ Region: "signing_region", Service: "signing_service", }, }, } e := endpoint{ Hostname: "{service}.{region}.{dnsSuffix}", Protocols: []string{"http", "https"}, SignatureVersions: []string{"v4"}, SSLCommonName: "new sslCommonName", } resolved, err := e.resolve("service", "partitionID", "region", "dnsSuffix", defs, Options{}, ) if err != nil { t.Errorf("expected no error, got %v", err) } if e, a := "https://service.region.dnsSuffix", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "signing_service", resolved.SigningName; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "signing_region", resolved.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "v4", resolved.SigningMethod; e != a { t.Errorf("expect %v, got %v", e, a) } // Check Invalid Region Identifier Format _, err = e.resolve("service", "partitionID", "notvalid.com", "dnsSuffix", defs, Options{}, ) if err == nil { t.Errorf("expected err, got nil") } } func TestEndpointMergeIn(t *testing.T) { expected := endpoint{ Hostname: "other hostname", Protocols: []string{"http"}, SignatureVersions: []string{"v4"}, SSLCommonName: "ssl common name", CredentialScope: credentialScope{ Region: "region", Service: "service", }, } actual := endpoint{} actual.mergeIn(endpoint{ Hostname: "other hostname", Protocols: []string{"http"}, SignatureVersions: []string{"v4"}, SSLCommonName: "ssl common name", CredentialScope: credentialScope{ Region: "region", Service: "service", }, }) if e, a := expected, actual; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } } func TestResolveEndpoint(t *testing.T) { resolved, err := testPartitions.EndpointFor("service2", "us-west-2") if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := "https://service2.us-west-2.amazonaws.com", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "us-west-2", resolved.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "service2", resolved.SigningName; e != a { t.Errorf("expect %v, got %v", e, a) } if resolved.SigningNameDerived { t.Errorf("expect the signing name not to be derived, but was") } } func TestResolveEndpoint_DisableSSL(t *testing.T) { resolved, err := testPartitions.EndpointFor("service2", "us-west-2", DisableSSLOption) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := "http://service2.us-west-2.amazonaws.com", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "us-west-2", resolved.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "service2", resolved.SigningName; e != a { t.Errorf("expect %v, got %v", e, a) } if resolved.SigningNameDerived { t.Errorf("expect the signing name not to be derived, but was") } } func TestResolveEndpoint_UseDualStack(t *testing.T) { resolved, err := testPartitions.EndpointFor("service1", "us-west-2", UseDualStackOption) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := "https://service1.dualstack.us-west-2.amazonaws.com", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "us-west-2", resolved.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "service1", resolved.SigningName; e != a { t.Errorf("expect %v, got %v", e, a) } if resolved.SigningNameDerived { t.Errorf("expect the signing name not to be derived, but was") } } func TestResolveEndpoint_HTTPProtocol(t *testing.T) { resolved, err := testPartitions.EndpointFor("httpService", "us-west-2") if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := "http://httpService.us-west-2.amazonaws.com", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "us-west-2", resolved.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "httpService", resolved.SigningName; e != a { t.Errorf("expect %v, got %v", e, a) } if !resolved.SigningNameDerived { t.Errorf("expect the signing name to be derived") } } func TestResolveEndpoint_UnknownService(t *testing.T) { _, err := testPartitions.EndpointFor("unknownservice", "us-west-2") if err == nil { t.Errorf("expect error, got none") } _, ok := err.(UnknownServiceError) if !ok { t.Errorf("expect error to be UnknownServiceError") } } func TestResolveEndpoint_ResolveUnknownService(t *testing.T) { resolved, err := testPartitions.EndpointFor("unknown-service", "us-region-1", ResolveUnknownServiceOption) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := "https://unknown-service.us-region-1.amazonaws.com", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "us-region-1", resolved.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "unknown-service", resolved.SigningName; e != a { t.Errorf("expect %v, got %v", e, a) } if !resolved.SigningNameDerived { t.Errorf("expect the signing name to be derived") } } func TestResolveEndpoint_UnknownMatchedRegion(t *testing.T) { resolved, err := testPartitions.EndpointFor("service2", "us-region-1") if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := "https://service2.us-region-1.amazonaws.com", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "us-region-1", resolved.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "service2", resolved.SigningName; e != a { t.Errorf("expect %v, got %v", e, a) } if resolved.SigningNameDerived { t.Errorf("expect the signing name not to be derived, but was") } } func TestResolveEndpoint_UnknownRegion(t *testing.T) { resolved, err := testPartitions.EndpointFor("service2", "unknownregion") if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := "https://service2.unknownregion.amazonaws.com", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "unknownregion", resolved.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "service2", resolved.SigningName; e != a { t.Errorf("expect %v, got %v", e, a) } if resolved.SigningNameDerived { t.Errorf("expect the signing name not to be derived, but was") } } func TestResolveEndpoint_StrictPartitionUnknownEndpoint(t *testing.T) { _, err := testPartitions[0].EndpointFor("service2", "unknownregion", StrictMatchingOption) if err == nil { t.Errorf("expect error, got none") } _, ok := err.(UnknownEndpointError) if !ok { t.Errorf("expect error to be UnknownEndpointError") } } func TestResolveEndpoint_StrictPartitionsUnknownEndpoint(t *testing.T) { _, err := testPartitions.EndpointFor("service2", "us-region-1", StrictMatchingOption) if err == nil { t.Errorf("expect error, got none") } _, ok := err.(UnknownEndpointError) if !ok { t.Errorf("expect error to be UnknownEndpointError") } } func TestResolveEndpoint_NotRegionalized(t *testing.T) { resolved, err := testPartitions.EndpointFor("globalService", "us-west-2") if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := "https://globalService.amazonaws.com", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "us-east-1", resolved.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "globalService", resolved.SigningName; e != a { t.Errorf("expect %v, got %v", e, a) } if !resolved.SigningNameDerived { t.Errorf("expect the signing name to be derived") } } func TestResolveEndpoint_AwsGlobal(t *testing.T) { resolved, err := testPartitions.EndpointFor("globalService", "aws-global") if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := "https://globalService.amazonaws.com", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "us-east-1", resolved.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "globalService", resolved.SigningName; e != a { t.Errorf("expect %v, got %v", e, a) } if !resolved.SigningNameDerived { t.Errorf("expect the signing name to be derived") } } func TestEndpointFor_RegionalFlag(t *testing.T) { // AwsPartition resolver for STS regional endpoints in AWS Partition resolver := AwsPartition() cases := map[string]struct { service, region string regional bool ExpectURL, ExpectSigningMethod, ExpectSigningRegion string ExpectSigningNameDerived bool }{ "acm/ap-northeast-1/regional": { service: "acm", region: "ap-northeast-1", regional: true, ExpectURL: "https://acm.ap-northeast-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "ap-northeast-1", }, "acm/ap-northeast-1/legacy": { service: "acm", region: "ap-northeast-1", regional: false, ExpectURL: "https://acm.ap-northeast-1.amazonaws.com", ExpectSigningMethod: "v4", ExpectSigningNameDerived: true, ExpectSigningRegion: "ap-northeast-1", }, } for name, c := range cases { t.Run(name, func(t *testing.T) { var optionSlice []func(o *Options) optionSlice = append(optionSlice, func(o *Options) { if c.regional { o.STSRegionalEndpoint = RegionalSTSEndpoint } }) actual, err := resolver.EndpointFor(c.service, c.region, optionSlice...) if err != nil { t.Fatalf("failed to resolve endpoint, %v", err) } if e, a := c.ExpectURL, actual.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := c.ExpectSigningMethod, actual.SigningMethod; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := c.ExpectSigningNameDerived, actual.SigningNameDerived; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := c.ExpectSigningRegion, actual.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } }) } } func TestEndpointFor_EmptyRegion(t *testing.T) { // skip this test for partitions outside `aws` partition if DefaultPartitions()[0].id != "aws" { t.Skip() } cases := map[string]struct { Service string Region string RealRegion string ExpectErr string }{ // Legacy services that previous accepted empty region "budgets": {Service: "budgets", RealRegion: "aws-global"}, "ce": {Service: "ce", RealRegion: "aws-global"}, "chime": {Service: "chime", RealRegion: "aws-global"}, "ec2metadata": {Service: "ec2metadata", RealRegion: "aws-global"}, "iam": {Service: "iam", RealRegion: "aws-global"}, "importexport": {Service: "importexport", RealRegion: "aws-global"}, "organizations": {Service: "organizations", RealRegion: "aws-global"}, "route53": {Service: "route53", RealRegion: "aws-global"}, "sts": {Service: "sts", RealRegion: "aws-global"}, "support": {Service: "support", RealRegion: "aws-global"}, "waf": {Service: "waf", RealRegion: "aws-global"}, // Other services "s3": {Service: "s3", Region: "us-east-1", RealRegion: "us-east-1"}, "s3 no region": {Service: "s3", ExpectErr: "could not resolve endpoint"}, } for name, c := range cases { t.Run(name, func(t *testing.T) { actual, err := DefaultResolver().EndpointFor(c.Service, c.Region) if len(c.ExpectErr) != 0 { if e, a := c.ExpectErr, err.Error(); !strings.Contains(a, e) { t.Errorf("expect %q error in %q", e, a) } return } if err != nil { t.Fatalf("expect no error got, %v", err) } expect, err := DefaultResolver().EndpointFor(c.Service, c.RealRegion) if err != nil { t.Fatalf("failed to get endpoint for default resolver") } if e, a := expect.URL, actual.URL; e != a { t.Errorf("expect %v URL, got %v", e, a) } if e, a := expect.SigningRegion, actual.SigningRegion; e != a { t.Errorf("expect %v signing region, got %v", e, a) } }) } } func TestRegionValidator(t *testing.T) { cases := []struct { Region string Valid bool }{ 0: { Region: "us-east-1", Valid: true, }, 1: { Region: "invalid.com", Valid: false, }, 2: { Region: "@invalid.com/%23", Valid: false, }, 3: { Region: "local", Valid: true, }, 4: { Region: "9-west-1", Valid: true, }, } for i, tt := range cases { t.Run(strconv.Itoa(i), func(t *testing.T) { if e, a := tt.Valid, validateInputRegion(tt.Region); e != a { t.Errorf("expected %v, got %v", e, a) } }) } } func TestResolveEndpoint_FipsAwsGlobal(t *testing.T) { resolved, err := testPartitions.EndpointFor("globalService", "fips-aws-global") if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := "https://globalService-fips.amazonaws.com", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "us-east-1", resolved.SigningRegion; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "globalService", resolved.SigningName; e != a { t.Errorf("expect %v, got %v", e, a) } if !resolved.SigningNameDerived { t.Errorf("expect the signing name to be derived") } } func TestEC2MetadataService(t *testing.T) { unmodelled := partition{ ID: "unmodelled", Name: "partition with unmodelled ec2metadata", Services: map[string]service{ "foo": { Endpoints: endpoints{ "us-west-2": endpoint{ Hostname: "foo.us-west-2.amazonaws.com", Protocols: []string{"http"}, SignatureVersions: []string{"v4"}, }, }, }, }, Regions: map[string]region{ "us-west-2": {Description: "us-west-2 region"}, }, } modelled := partition{ ID: "modelled", Name: "partition with modelled ec2metadata", Services: map[string]service{ "ec2metadata": { Endpoints: endpoints{ "us-west-2": endpoint{ Hostname: "custom.localhost/latest", Protocols: []string{"http"}, SignatureVersions: []string{"v4"}, }, }, }, "foo": { Endpoints: endpoints{ "us-west-2": endpoint{ Hostname: "foo.us-west-2.amazonaws.com", Protocols: []string{"http"}, SignatureVersions: []string{"v4"}, }, }, }, }, Regions: map[string]region{ "us-west-2": {Description: "us-west-2 region"}, }, } uServices := unmodelled.Partition().Services() if s, ok := uServices[Ec2metadataServiceID]; !ok { t.Errorf("expect ec2metadata to be present") } else { if regions := s.Regions(); len(regions) != 0 { t.Errorf("expect no regions for ec2metadata, got %v", len(regions)) } if resolved, err := unmodelled.EndpointFor(Ec2metadataServiceID, "us-west-2"); err != nil { t.Errorf("expect no error, got %v", err) } else if e, a := ec2MetadataEndpointIPv4, resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } } if s, ok := uServices["foo"]; !ok { t.Errorf("expect foo to be present") } else if regions := s.Regions(); len(regions) == 0 { t.Errorf("expect region endpoints for foo. got none") } mServices := modelled.Partition().Services() if s, ok := mServices[Ec2metadataServiceID]; !ok { t.Errorf("expect ec2metadata to be present") } else if regions := s.Regions(); len(regions) == 0 { t.Errorf("expect region for ec2metadata, got none") } else { if resolved, err := modelled.EndpointFor(Ec2metadataServiceID, "us-west-2"); err != nil { t.Errorf("expect no error, got %v", err) } else if e, a := "http://custom.localhost/latest", resolved.URL; e != a { t.Errorf("expect %v, got %v", e, a) } } if s, ok := mServices["foo"]; !ok { t.Errorf("expect foo to be present") } else if regions := s.Regions(); len(regions) == 0 { t.Errorf("expect region endpoints for foo, got none") } }
759
session-manager-plugin
aws
Go
package request import ( "strings" ) func isErrConnectionReset(err error) bool { if strings.Contains(err.Error(), "read: connection reset") { return false } if strings.Contains(err.Error(), "use of closed network connection") || strings.Contains(err.Error(), "connection reset") || strings.Contains(err.Error(), "broken pipe") { return true } return false }
20
session-manager-plugin
aws
Go
// +build go1.7 package request_test import ( "net/http" "reflect" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/client/metadata" "github.com/aws/aws-sdk-go/aws/corehandlers" "github.com/aws/aws-sdk-go/aws/request" v4 "github.com/aws/aws-sdk-go/aws/signer/v4" "github.com/aws/aws-sdk-go/awstesting/unit" "github.com/aws/aws-sdk-go/private/protocol/jsonrpc" ) type connResetCloser struct { Err error } func (rc *connResetCloser) Read(b []byte) (int, error) { return 0, rc.Err } func (rc *connResetCloser) Close() error { return nil } func TestSerializationErrConnectionReset_accept(t *testing.T) { cases := map[string]struct { Err error ExpectAttempts int }{ "accept with temporary": { Err: errAcceptConnectionResetStub, ExpectAttempts: 6, }, "read not temporary": { Err: errReadConnectionResetStub, ExpectAttempts: 1, }, "write with temporary": { Err: errWriteConnectionResetStub, ExpectAttempts: 6, }, "write broken pipe with temporary": { Err: errWriteBrokenPipeStub, ExpectAttempts: 6, }, "generic connection reset": { Err: errConnectionResetStub, ExpectAttempts: 6, }, "use of closed network connection": { Err: errUseOfClosedConnectionStub, ExpectAttempts: 6, }, } for name, c := range cases { t.Run(name, func(t *testing.T) { count := 0 handlers := request.Handlers{} handlers.Send.PushBack(func(r *request.Request) { count++ r.HTTPResponse = &http.Response{} r.HTTPResponse.Body = &connResetCloser{ Err: c.Err, } }) handlers.Sign.PushBackNamed(v4.SignRequestHandler) handlers.Build.PushBackNamed(jsonrpc.BuildHandler) handlers.Unmarshal.PushBackNamed(jsonrpc.UnmarshalHandler) handlers.UnmarshalMeta.PushBackNamed(jsonrpc.UnmarshalMetaHandler) handlers.UnmarshalError.PushBackNamed(jsonrpc.UnmarshalErrorHandler) handlers.AfterRetry.PushBackNamed(corehandlers.AfterRetryHandler) op := &request.Operation{ Name: "op", HTTPMethod: "POST", HTTPPath: "/", } meta := metadata.ClientInfo{ ServiceName: "fooService", SigningName: "foo", SigningRegion: "foo", Endpoint: "localhost", APIVersion: "2001-01-01", JSONVersion: "1.1", TargetPrefix: "Foo", } cfg := unit.Session.Config.Copy() cfg.MaxRetries = aws.Int(5) cfg.SleepDelay = func(time.Duration) {} req := request.New( *cfg, meta, handlers, client.DefaultRetryer{NumMaxRetries: 5}, op, &struct{}{}, &struct{}{}, ) osErr := c.Err req.ApplyOptions(request.WithResponseReadTimeout(time.Second)) err := req.Send() if err == nil { t.Error("Expected error 'SerializationError', but received nil") } if aerr, ok := err.(awserr.Error); ok && aerr.Code() != request.ErrCodeSerialization { t.Errorf("Expected 'SerializationError', but received %q", aerr.Code()) } else if !ok { t.Errorf("Expected 'awserr.Error', but received %v", reflect.TypeOf(err)) } else if aerr.OrigErr().Error() != osErr.Error() { t.Errorf("Expected %q, but received %q", osErr.Error(), aerr.OrigErr().Error()) } if e, a := c.ExpectAttempts, count; e != a { t.Errorf("Expected %v, but received %v", e, a) } }) } }
133
session-manager-plugin
aws
Go
package request import ( "fmt" "strings" ) // A Handlers provides a collection of request handlers for various // stages of handling requests. type Handlers struct { Validate HandlerList Build HandlerList BuildStream HandlerList Sign HandlerList Send HandlerList ValidateResponse HandlerList Unmarshal HandlerList UnmarshalStream HandlerList UnmarshalMeta HandlerList UnmarshalError HandlerList Retry HandlerList AfterRetry HandlerList CompleteAttempt HandlerList Complete HandlerList } // Copy returns a copy of this handler's lists. func (h *Handlers) Copy() Handlers { return Handlers{ Validate: h.Validate.copy(), Build: h.Build.copy(), BuildStream: h.BuildStream.copy(), Sign: h.Sign.copy(), Send: h.Send.copy(), ValidateResponse: h.ValidateResponse.copy(), Unmarshal: h.Unmarshal.copy(), UnmarshalStream: h.UnmarshalStream.copy(), UnmarshalError: h.UnmarshalError.copy(), UnmarshalMeta: h.UnmarshalMeta.copy(), Retry: h.Retry.copy(), AfterRetry: h.AfterRetry.copy(), CompleteAttempt: h.CompleteAttempt.copy(), Complete: h.Complete.copy(), } } // Clear removes callback functions for all handlers. func (h *Handlers) Clear() { h.Validate.Clear() h.Build.Clear() h.BuildStream.Clear() h.Send.Clear() h.Sign.Clear() h.Unmarshal.Clear() h.UnmarshalStream.Clear() h.UnmarshalMeta.Clear() h.UnmarshalError.Clear() h.ValidateResponse.Clear() h.Retry.Clear() h.AfterRetry.Clear() h.CompleteAttempt.Clear() h.Complete.Clear() } // IsEmpty returns if there are no handlers in any of the handlerlists. func (h *Handlers) IsEmpty() bool { if h.Validate.Len() != 0 { return false } if h.Build.Len() != 0 { return false } if h.BuildStream.Len() != 0 { return false } if h.Send.Len() != 0 { return false } if h.Sign.Len() != 0 { return false } if h.Unmarshal.Len() != 0 { return false } if h.UnmarshalStream.Len() != 0 { return false } if h.UnmarshalMeta.Len() != 0 { return false } if h.UnmarshalError.Len() != 0 { return false } if h.ValidateResponse.Len() != 0 { return false } if h.Retry.Len() != 0 { return false } if h.AfterRetry.Len() != 0 { return false } if h.CompleteAttempt.Len() != 0 { return false } if h.Complete.Len() != 0 { return false } return true } // A HandlerListRunItem represents an entry in the HandlerList which // is being run. type HandlerListRunItem struct { Index int Handler NamedHandler Request *Request } // A HandlerList manages zero or more handlers in a list. type HandlerList struct { list []NamedHandler // Called after each request handler in the list is called. If set // and the func returns true the HandlerList will continue to iterate // over the request handlers. If false is returned the HandlerList // will stop iterating. // // Should be used if extra logic to be performed between each handler // in the list. This can be used to terminate a list's iteration // based on a condition such as error like, HandlerListStopOnError. // Or for logging like HandlerListLogItem. AfterEachFn func(item HandlerListRunItem) bool } // A NamedHandler is a struct that contains a name and function callback. type NamedHandler struct { Name string Fn func(*Request) } // copy creates a copy of the handler list. func (l *HandlerList) copy() HandlerList { n := HandlerList{ AfterEachFn: l.AfterEachFn, } if len(l.list) == 0 { return n } n.list = append(make([]NamedHandler, 0, len(l.list)), l.list...) return n } // Clear clears the handler list. func (l *HandlerList) Clear() { l.list = l.list[0:0] } // Len returns the number of handlers in the list. func (l *HandlerList) Len() int { return len(l.list) } // PushBack pushes handler f to the back of the handler list. func (l *HandlerList) PushBack(f func(*Request)) { l.PushBackNamed(NamedHandler{"__anonymous", f}) } // PushBackNamed pushes named handler f to the back of the handler list. func (l *HandlerList) PushBackNamed(n NamedHandler) { if cap(l.list) == 0 { l.list = make([]NamedHandler, 0, 5) } l.list = append(l.list, n) } // PushFront pushes handler f to the front of the handler list. func (l *HandlerList) PushFront(f func(*Request)) { l.PushFrontNamed(NamedHandler{"__anonymous", f}) } // PushFrontNamed pushes named handler f to the front of the handler list. func (l *HandlerList) PushFrontNamed(n NamedHandler) { if cap(l.list) == len(l.list) { // Allocating new list required l.list = append([]NamedHandler{n}, l.list...) } else { // Enough room to prepend into list. l.list = append(l.list, NamedHandler{}) copy(l.list[1:], l.list) l.list[0] = n } } // Remove removes a NamedHandler n func (l *HandlerList) Remove(n NamedHandler) { l.RemoveByName(n.Name) } // RemoveByName removes a NamedHandler by name. func (l *HandlerList) RemoveByName(name string) { for i := 0; i < len(l.list); i++ { m := l.list[i] if m.Name == name { // Shift array preventing creating new arrays copy(l.list[i:], l.list[i+1:]) l.list[len(l.list)-1] = NamedHandler{} l.list = l.list[:len(l.list)-1] // decrement list so next check to length is correct i-- } } } // SwapNamed will swap out any existing handlers with the same name as the // passed in NamedHandler returning true if handlers were swapped. False is // returned otherwise. func (l *HandlerList) SwapNamed(n NamedHandler) (swapped bool) { for i := 0; i < len(l.list); i++ { if l.list[i].Name == n.Name { l.list[i].Fn = n.Fn swapped = true } } return swapped } // Swap will swap out all handlers matching the name passed in. The matched // handlers will be swapped in. True is returned if the handlers were swapped. func (l *HandlerList) Swap(name string, replace NamedHandler) bool { var swapped bool for i := 0; i < len(l.list); i++ { if l.list[i].Name == name { l.list[i] = replace swapped = true } } return swapped } // SetBackNamed will replace the named handler if it exists in the handler list. // If the handler does not exist the handler will be added to the end of the list. func (l *HandlerList) SetBackNamed(n NamedHandler) { if !l.SwapNamed(n) { l.PushBackNamed(n) } } // SetFrontNamed will replace the named handler if it exists in the handler list. // If the handler does not exist the handler will be added to the beginning of // the list. func (l *HandlerList) SetFrontNamed(n NamedHandler) { if !l.SwapNamed(n) { l.PushFrontNamed(n) } } // Run executes all handlers in the list with a given request object. func (l *HandlerList) Run(r *Request) { for i, h := range l.list { h.Fn(r) item := HandlerListRunItem{ Index: i, Handler: h, Request: r, } if l.AfterEachFn != nil && !l.AfterEachFn(item) { return } } } // HandlerListLogItem logs the request handler and the state of the // request's Error value. Always returns true to continue iterating // request handlers in a HandlerList. func HandlerListLogItem(item HandlerListRunItem) bool { if item.Request.Config.Logger == nil { return true } item.Request.Config.Logger.Log("DEBUG: RequestHandler", item.Index, item.Handler.Name, item.Request.Error) return true } // HandlerListStopOnError returns false to stop the HandlerList iterating // over request handlers if Request.Error is not nil. True otherwise // to continue iterating. func HandlerListStopOnError(item HandlerListRunItem) bool { return item.Request.Error == nil } // WithAppendUserAgent will add a string to the user agent prefixed with a // single white space. func WithAppendUserAgent(s string) Option { return func(r *Request) { r.Handlers.Build.PushBack(func(r2 *Request) { AddToUserAgent(r, s) }) } } // MakeAddToUserAgentHandler will add the name/version pair to the User-Agent request // header. If the extra parameters are provided they will be added as metadata to the // name/version pair resulting in the following format. // "name/version (extra0; extra1; ...)" // The user agent part will be concatenated with this current request's user agent string. func MakeAddToUserAgentHandler(name, version string, extra ...string) func(*Request) { ua := fmt.Sprintf("%s/%s", name, version) if len(extra) > 0 { ua += fmt.Sprintf(" (%s)", strings.Join(extra, "; ")) } return func(r *Request) { AddToUserAgent(r, ua) } } // MakeAddToUserAgentFreeFormHandler adds the input to the User-Agent request header. // The input string will be concatenated with the current request's user agent string. func MakeAddToUserAgentFreeFormHandler(s string) func(*Request) { return func(r *Request) { AddToUserAgent(r, s) } } // WithSetRequestHeaders updates the operation request's HTTP header to contain // the header key value pairs provided. If the header key already exists in the // request's HTTP header set, the existing value(s) will be replaced. func WithSetRequestHeaders(h map[string]string) Option { return withRequestHeader(h).SetRequestHeaders } type withRequestHeader map[string]string func (h withRequestHeader) SetRequestHeaders(r *Request) { for k, v := range h { r.HTTPRequest.Header[k] = []string{v} } }
344
session-manager-plugin
aws
Go
package request_test import ( "reflect" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/awstesting/unit" "github.com/aws/aws-sdk-go/service/s3" ) func TestHandlerList(t *testing.T) { s := "" r := &request.Request{} l := request.HandlerList{} l.PushBack(func(r *request.Request) { s += "a" r.Data = s }) l.Run(r) if e, a := "a", s; e != a { t.Errorf("expect %q update got %q", e, a) } if e, a := "a", r.Data.(string); e != a { t.Errorf("expect %q data update got %q", e, a) } } func TestMultipleHandlers(t *testing.T) { r := &request.Request{} l := request.HandlerList{} l.PushBack(func(r *request.Request) { r.Data = nil }) l.PushFront(func(r *request.Request) { r.Data = aws.Bool(true) }) l.Run(r) if r.Data != nil { t.Error("Expected handler to execute") } } func TestNamedHandlers(t *testing.T) { l := request.HandlerList{} named := request.NamedHandler{Name: "Name", Fn: func(r *request.Request) {}} named2 := request.NamedHandler{Name: "NotName", Fn: func(r *request.Request) {}} l.PushBackNamed(named) l.PushBackNamed(named) l.PushBackNamed(named2) l.PushBack(func(r *request.Request) {}) if e, a := 4, l.Len(); e != a { t.Errorf("expect %d list length, got %d", e, a) } l.Remove(named) if e, a := 2, l.Len(); e != a { t.Errorf("expect %d list length, got %d", e, a) } } func TestSwapHandlers(t *testing.T) { firstHandlerCalled := 0 swappedOutHandlerCalled := 0 swappedInHandlerCalled := 0 l := request.HandlerList{} named := request.NamedHandler{Name: "Name", Fn: func(r *request.Request) { firstHandlerCalled++ }} named2 := request.NamedHandler{Name: "SwapOutName", Fn: func(r *request.Request) { swappedOutHandlerCalled++ }} l.PushBackNamed(named) l.PushBackNamed(named2) l.PushBackNamed(named) l.SwapNamed(request.NamedHandler{Name: "SwapOutName", Fn: func(r *request.Request) { swappedInHandlerCalled++ }}) l.Run(&request.Request{}) if e, a := 2, firstHandlerCalled; e != a { t.Errorf("expect first handler to be called %d, was called %d times", e, a) } if n := swappedOutHandlerCalled; n != 0 { t.Errorf("expect swapped out handler to not be called, was called %d times", n) } if e, a := 1, swappedInHandlerCalled; e != a { t.Errorf("expect swapped in handler to be called %d, was called %d times", e, a) } } func TestSetBackNamed_Exists(t *testing.T) { firstHandlerCalled := 0 swappedOutHandlerCalled := 0 swappedInHandlerCalled := 0 l := request.HandlerList{} named := request.NamedHandler{Name: "Name", Fn: func(r *request.Request) { firstHandlerCalled++ }} named2 := request.NamedHandler{Name: "SwapOutName", Fn: func(r *request.Request) { swappedOutHandlerCalled++ }} l.PushBackNamed(named) l.PushBackNamed(named2) l.SetBackNamed(request.NamedHandler{Name: "SwapOutName", Fn: func(r *request.Request) { swappedInHandlerCalled++ }}) l.Run(&request.Request{}) if e, a := 1, firstHandlerCalled; e != a { t.Errorf("expect first handler to be called %d, was called %d times", e, a) } if n := swappedOutHandlerCalled; n != 0 { t.Errorf("expect swapped out handler to not be called, was called %d times", n) } if e, a := 1, swappedInHandlerCalled; e != a { t.Errorf("expect swapped in handler to be called %d, was called %d times", e, a) } } func TestSetBackNamed_NotExists(t *testing.T) { firstHandlerCalled := 0 secondHandlerCalled := 0 swappedInHandlerCalled := 0 l := request.HandlerList{} named := request.NamedHandler{Name: "Name", Fn: func(r *request.Request) { firstHandlerCalled++ }} named2 := request.NamedHandler{Name: "OtherName", Fn: func(r *request.Request) { secondHandlerCalled++ }} l.PushBackNamed(named) l.PushBackNamed(named2) l.SetBackNamed(request.NamedHandler{Name: "SwapOutName", Fn: func(r *request.Request) { swappedInHandlerCalled++ }}) l.Run(&request.Request{}) if e, a := 1, firstHandlerCalled; e != a { t.Errorf("expect first handler to be called %d, was called %d times", e, a) } if e, a := 1, secondHandlerCalled; e != a { t.Errorf("expect second handler to be called %d, was called %d times", e, a) } if e, a := 1, swappedInHandlerCalled; e != a { t.Errorf("expect swapped in handler to be called %d, was called %d times", e, a) } } func TestLoggedHandlers(t *testing.T) { expectedHandlers := []string{"name1", "name2"} l := request.HandlerList{} loggedHandlers := []string{} l.AfterEachFn = request.HandlerListLogItem cfg := aws.Config{Logger: aws.LoggerFunc(func(args ...interface{}) { loggedHandlers = append(loggedHandlers, args[2].(string)) })} named1 := request.NamedHandler{Name: "name1", Fn: func(r *request.Request) {}} named2 := request.NamedHandler{Name: "name2", Fn: func(r *request.Request) {}} l.PushBackNamed(named1) l.PushBackNamed(named2) l.Run(&request.Request{Config: cfg}) if !reflect.DeepEqual(expectedHandlers, loggedHandlers) { t.Errorf("expect handlers executed %v to match logged handlers, %v", expectedHandlers, loggedHandlers) } } func TestStopHandlers(t *testing.T) { l := request.HandlerList{} stopAt := 1 l.AfterEachFn = func(item request.HandlerListRunItem) bool { return item.Index != stopAt } called := 0 l.PushBackNamed(request.NamedHandler{Name: "name1", Fn: func(r *request.Request) { called++ }}) l.PushBackNamed(request.NamedHandler{Name: "name2", Fn: func(r *request.Request) { called++ }}) l.PushBackNamed(request.NamedHandler{Name: "name3", Fn: func(r *request.Request) { t.Fatalf("third handler should not be called") }}) l.Run(&request.Request{}) if e, a := 2, called; e != a { t.Errorf("expect %d handlers called, got %d", e, a) } } func BenchmarkNewRequest(b *testing.B) { svc := s3.New(unit.Session) for i := 0; i < b.N; i++ { r, _ := svc.GetObjectRequest(nil) if r == nil { b.Fatal("r should not be nil") } } } func BenchmarkHandlersCopy(b *testing.B) { handlers := request.Handlers{} handlers.Validate.PushBack(func(r *request.Request) {}) handlers.Validate.PushBack(func(r *request.Request) {}) handlers.Build.PushBack(func(r *request.Request) {}) handlers.Build.PushBack(func(r *request.Request) {}) handlers.Send.PushBack(func(r *request.Request) {}) handlers.Send.PushBack(func(r *request.Request) {}) handlers.Unmarshal.PushBack(func(r *request.Request) {}) handlers.Unmarshal.PushBack(func(r *request.Request) {}) for i := 0; i < b.N; i++ { h := handlers.Copy() if e, a := handlers.Validate.Len(), h.Validate.Len(); e != a { b.Fatalf("expected %d handlers got %d", e, a) } } } func BenchmarkHandlersPushBack(b *testing.B) { handlers := request.Handlers{} for i := 0; i < b.N; i++ { h := handlers.Copy() h.Validate.PushBack(func(r *request.Request) {}) h.Validate.PushBack(func(r *request.Request) {}) h.Validate.PushBack(func(r *request.Request) {}) h.Validate.PushBack(func(r *request.Request) {}) } } func BenchmarkHandlersPushFront(b *testing.B) { handlers := request.Handlers{} for i := 0; i < b.N; i++ { h := handlers.Copy() h.Validate.PushFront(func(r *request.Request) {}) h.Validate.PushFront(func(r *request.Request) {}) h.Validate.PushFront(func(r *request.Request) {}) h.Validate.PushFront(func(r *request.Request) {}) } } func BenchmarkHandlersClear(b *testing.B) { handlers := request.Handlers{} for i := 0; i < b.N; i++ { h := handlers.Copy() h.Validate.PushFront(func(r *request.Request) {}) h.Validate.PushFront(func(r *request.Request) {}) h.Validate.PushFront(func(r *request.Request) {}) h.Validate.PushFront(func(r *request.Request) {}) h.Clear() } }
267
session-manager-plugin
aws
Go
package request import ( "io" "net/http" "net/url" ) func copyHTTPRequest(r *http.Request, body io.ReadCloser) *http.Request { req := new(http.Request) *req = *r req.URL = &url.URL{} *req.URL = *r.URL req.Body = body req.Header = http.Header{} for k, v := range r.Header { for _, vv := range v { req.Header.Add(k, vv) } } return req }
25
session-manager-plugin
aws
Go
package request import ( "bytes" "io/ioutil" "net/http" "net/url" "sync" "testing" ) func TestRequestCopyRace(t *testing.T) { origReq := &http.Request{URL: &url.URL{}, Header: http.Header{}} origReq.Header.Set("Header", "OrigValue") var wg sync.WaitGroup for i := 0; i < 100; i++ { wg.Add(1) go func() { req := copyHTTPRequest(origReq, ioutil.NopCloser(&bytes.Buffer{})) req.Header.Set("Header", "Value") go func() { req2 := copyHTTPRequest(req, ioutil.NopCloser(&bytes.Buffer{})) req2.Header.Add("Header", "Value2") }() _ = req.Header.Get("Header") wg.Done() }() _ = origReq.Header.Get("Header") } origReq.Header.Get("Header") wg.Wait() }
35
session-manager-plugin
aws
Go
package request_test import ( "strings" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/awstesting/mock" ) func TestRequestCancelRetry(t *testing.T) { c := make(chan struct{}) reqNum := 0 s := mock.NewMockClient(&aws.Config{ MaxRetries: aws.Int(1), }) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.Clear() s.Handlers.UnmarshalMeta.Clear() s.Handlers.UnmarshalError.Clear() s.Handlers.Send.PushFront(func(r *request.Request) { reqNum++ }) out := &testData{} r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, out) r.HTTPRequest.Cancel = c close(c) err := r.Send() if !strings.Contains(err.Error(), "canceled") { t.Errorf("expect canceled in error, %v", err) } if e, a := 1, reqNum; e != a { t.Errorf("expect %v, got %v", e, a) } }
38
session-manager-plugin
aws
Go
package request import ( "io" "sync" "github.com/aws/aws-sdk-go/internal/sdkio" ) // offsetReader is a thread-safe io.ReadCloser to prevent racing // with retrying requests type offsetReader struct { buf io.ReadSeeker lock sync.Mutex closed bool } func newOffsetReader(buf io.ReadSeeker, offset int64) (*offsetReader, error) { reader := &offsetReader{} _, err := buf.Seek(offset, sdkio.SeekStart) if err != nil { return nil, err } reader.buf = buf return reader, nil } // Close will close the instance of the offset reader's access to // the underlying io.ReadSeeker. func (o *offsetReader) Close() error { o.lock.Lock() defer o.lock.Unlock() o.closed = true return nil } // Read is a thread-safe read of the underlying io.ReadSeeker func (o *offsetReader) Read(p []byte) (int, error) { o.lock.Lock() defer o.lock.Unlock() if o.closed { return 0, io.EOF } return o.buf.Read(p) } // Seek is a thread-safe seeking operation. func (o *offsetReader) Seek(offset int64, whence int) (int64, error) { o.lock.Lock() defer o.lock.Unlock() return o.buf.Seek(offset, whence) } // CloseAndCopy will return a new offsetReader with a copy of the old buffer // and close the old buffer. func (o *offsetReader) CloseAndCopy(offset int64) (*offsetReader, error) { if err := o.Close(); err != nil { return nil, err } return newOffsetReader(o.buf, offset) }
66
session-manager-plugin
aws
Go
package request import ( "bytes" "io" "math/rand" "sync" "testing" "time" "github.com/aws/aws-sdk-go/internal/sdkio" ) func TestOffsetReaderRead(t *testing.T) { buf := []byte("testData") reader := &offsetReader{buf: bytes.NewReader(buf)} tempBuf := make([]byte, len(buf)) n, err := reader.Read(tempBuf) if e, a := n, len(buf); e != a { t.Errorf("expect %v, got %v", e, a) } if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := buf, tempBuf; !bytes.Equal(e, a) { t.Errorf("expect %v, got %v", e, a) } } func TestOffsetReaderSeek(t *testing.T) { buf := []byte("testData") reader, err := newOffsetReader(bytes.NewReader(buf), 0) if err != nil { t.Fatalf("expect no error, got %v", err) } orig, err := reader.Seek(0, sdkio.SeekCurrent) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := int64(0), orig; e != a { t.Errorf("expect %v, got %v", e, a) } n, err := reader.Seek(0, sdkio.SeekEnd) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := int64(len(buf)), n; e != a { t.Errorf("expect %v, got %v", e, a) } n, err = reader.Seek(orig, sdkio.SeekStart) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := int64(0), n; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestOffsetReaderClose(t *testing.T) { buf := []byte("testData") reader := &offsetReader{buf: bytes.NewReader(buf)} err := reader.Close() if err != nil { t.Fatalf("expect no error, got %v", err) } tempBuf := make([]byte, len(buf)) n, err := reader.Read(tempBuf) if e, a := n, 0; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := err, io.EOF; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestOffsetReaderCloseAndCopy(t *testing.T) { buf := []byte("testData") tempBuf := make([]byte, len(buf)) reader := &offsetReader{buf: bytes.NewReader(buf)} newReader, err := reader.CloseAndCopy(0) if err != nil { t.Fatalf("expect no error, got %v", err) } n, err := reader.Read(tempBuf) if e, a := n, 0; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := err, io.EOF; e != a { t.Errorf("expect %v, got %v", e, a) } n, err = newReader.Read(tempBuf) if e, a := n, len(buf); e != a { t.Errorf("expect %v, got %v", e, a) } if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := buf, tempBuf; !bytes.Equal(e, a) { t.Errorf("expect %v, got %v", e, a) } } func TestOffsetReaderCloseAndCopyOffset(t *testing.T) { buf := []byte("testData") tempBuf := make([]byte, len(buf)) reader := &offsetReader{buf: bytes.NewReader(buf)} newReader, err := reader.CloseAndCopy(4) if err != nil { t.Fatalf("expect no error, got %v", err) } n, err := newReader.Read(tempBuf) if e, a := n, len(buf)-4; e != a { t.Errorf("expect %v, got %v", e, a) } if err != nil { t.Fatalf("expect no error, got %v", err) } expected := []byte{'D', 'a', 't', 'a', 0, 0, 0, 0} if e, a := expected, tempBuf; !bytes.Equal(e, a) { t.Errorf("expect %v, got %v", e, a) } } func TestOffsetReaderRace(t *testing.T) { wg := sync.WaitGroup{} f := func(reader *offsetReader) { defer wg.Done() var err error buf := make([]byte, 1) _, err = reader.Read(buf) for err != io.EOF { _, err = reader.Read(buf) } } closeFn := func(reader *offsetReader) { defer wg.Done() time.Sleep(time.Duration(rand.Intn(20)+1) * time.Millisecond) reader.Close() } for i := 0; i < 50; i++ { reader := &offsetReader{buf: bytes.NewReader(make([]byte, 1024*1024))} wg.Add(1) go f(reader) wg.Add(1) go closeFn(reader) } wg.Wait() } func BenchmarkOffsetReader(b *testing.B) { bufSize := 1024 * 1024 * 100 buf := make([]byte, bufSize) reader := &offsetReader{buf: bytes.NewReader(buf)} tempBuf := make([]byte, 1024) for i := 0; i < b.N; i++ { reader.Read(tempBuf) } } func BenchmarkBytesReader(b *testing.B) { bufSize := 1024 * 1024 * 100 buf := make([]byte, bufSize) reader := bytes.NewReader(buf) tempBuf := make([]byte, 1024) for i := 0; i < b.N; i++ { reader.Read(tempBuf) } }
190
session-manager-plugin
aws
Go
package request import ( "bytes" "fmt" "io" "net/http" "net/url" "reflect" "strings" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client/metadata" "github.com/aws/aws-sdk-go/internal/sdkio" ) const ( // ErrCodeSerialization is the serialization error code that is received // during protocol unmarshaling. ErrCodeSerialization = "SerializationError" // ErrCodeRead is an error that is returned during HTTP reads. ErrCodeRead = "ReadError" // ErrCodeResponseTimeout is the connection timeout error that is received // during body reads. ErrCodeResponseTimeout = "ResponseTimeout" // ErrCodeInvalidPresignExpire is returned when the expire time provided to // presign is invalid ErrCodeInvalidPresignExpire = "InvalidPresignExpireError" // CanceledErrorCode is the error code that will be returned by an // API request that was canceled. Requests given a aws.Context may // return this error when canceled. CanceledErrorCode = "RequestCanceled" // ErrCodeRequestError is an error preventing the SDK from continuing to // process the request. ErrCodeRequestError = "RequestError" ) // A Request is the service request to be made. type Request struct { Config aws.Config ClientInfo metadata.ClientInfo Handlers Handlers Retryer AttemptTime time.Time Time time.Time Operation *Operation HTTPRequest *http.Request HTTPResponse *http.Response Body io.ReadSeeker streamingBody io.ReadCloser BodyStart int64 // offset from beginning of Body that the request body starts Params interface{} Error error Data interface{} RequestID string RetryCount int Retryable *bool RetryDelay time.Duration NotHoist bool SignedHeaderVals http.Header LastSignedAt time.Time DisableFollowRedirects bool // Additional API error codes that should be retried. IsErrorRetryable // will consider these codes in addition to its built in cases. RetryErrorCodes []string // Additional API error codes that should be retried with throttle backoff // delay. IsErrorThrottle will consider these codes in addition to its // built in cases. ThrottleErrorCodes []string // A value greater than 0 instructs the request to be signed as Presigned URL // You should not set this field directly. Instead use Request's // Presign or PresignRequest methods. ExpireTime time.Duration context aws.Context built bool // Need to persist an intermediate body between the input Body and HTTP // request body because the HTTP Client's transport can maintain a reference // to the HTTP request's body after the client has returned. This value is // safe to use concurrently and wrap the input Body for each HTTP request. safeBody *offsetReader } // An Operation is the service API operation to be made. type Operation struct { Name string HTTPMethod string HTTPPath string *Paginator BeforePresignFn func(r *Request) error } // New returns a new Request pointer for the service API operation and // parameters. // // A Retryer should be provided to direct how the request is retried. If // Retryer is nil, a default no retry value will be used. You can use // NoOpRetryer in the Client package to disable retry behavior directly. // // Params is any value of input parameters to be the request payload. // Data is pointer value to an object which the request's response // payload will be deserialized to. func New(cfg aws.Config, clientInfo metadata.ClientInfo, handlers Handlers, retryer Retryer, operation *Operation, params interface{}, data interface{}) *Request { if retryer == nil { retryer = noOpRetryer{} } method := operation.HTTPMethod if method == "" { method = "POST" } httpReq, _ := http.NewRequest(method, "", nil) var err error httpReq.URL, err = url.Parse(clientInfo.Endpoint) if err != nil { httpReq.URL = &url.URL{} err = awserr.New("InvalidEndpointURL", "invalid endpoint uri", err) } if len(operation.HTTPPath) != 0 { opHTTPPath := operation.HTTPPath var opQueryString string if idx := strings.Index(opHTTPPath, "?"); idx >= 0 { opQueryString = opHTTPPath[idx+1:] opHTTPPath = opHTTPPath[:idx] } if strings.HasSuffix(httpReq.URL.Path, "/") && strings.HasPrefix(opHTTPPath, "/") { opHTTPPath = opHTTPPath[1:] } httpReq.URL.Path += opHTTPPath httpReq.URL.RawQuery = opQueryString } r := &Request{ Config: cfg, ClientInfo: clientInfo, Handlers: handlers.Copy(), Retryer: retryer, Time: time.Now(), ExpireTime: 0, Operation: operation, HTTPRequest: httpReq, Body: nil, Params: params, Error: err, Data: data, } r.SetBufferBody([]byte{}) return r } // A Option is a functional option that can augment or modify a request when // using a WithContext API operation method. type Option func(*Request) // WithGetResponseHeader builds a request Option which will retrieve a single // header value from the HTTP Response. If there are multiple values for the // header key use WithGetResponseHeaders instead to access the http.Header // map directly. The passed in val pointer must be non-nil. // // This Option can be used multiple times with a single API operation. // // var id2, versionID string // svc.PutObjectWithContext(ctx, params, // request.WithGetResponseHeader("x-amz-id-2", &id2), // request.WithGetResponseHeader("x-amz-version-id", &versionID), // ) func WithGetResponseHeader(key string, val *string) Option { return func(r *Request) { r.Handlers.Complete.PushBack(func(req *Request) { *val = req.HTTPResponse.Header.Get(key) }) } } // WithGetResponseHeaders builds a request Option which will retrieve the // headers from the HTTP response and assign them to the passed in headers // variable. The passed in headers pointer must be non-nil. // // var headers http.Header // svc.PutObjectWithContext(ctx, params, request.WithGetResponseHeaders(&headers)) func WithGetResponseHeaders(headers *http.Header) Option { return func(r *Request) { r.Handlers.Complete.PushBack(func(req *Request) { *headers = req.HTTPResponse.Header }) } } // WithLogLevel is a request option that will set the request to use a specific // log level when the request is made. // // svc.PutObjectWithContext(ctx, params, request.WithLogLevel(aws.LogDebugWithHTTPBody) func WithLogLevel(l aws.LogLevelType) Option { return func(r *Request) { r.Config.LogLevel = aws.LogLevel(l) } } // ApplyOptions will apply each option to the request calling them in the order // the were provided. func (r *Request) ApplyOptions(opts ...Option) { for _, opt := range opts { opt(r) } } // Context will always returns a non-nil context. If Request does not have a // context aws.BackgroundContext will be returned. func (r *Request) Context() aws.Context { if r.context != nil { return r.context } return aws.BackgroundContext() } // SetContext adds a Context to the current request that can be used to cancel // a in-flight request. The Context value must not be nil, or this method will // panic. // // Unlike http.Request.WithContext, SetContext does not return a copy of the // Request. It is not safe to use use a single Request value for multiple // requests. A new Request should be created for each API operation request. // // Go 1.6 and below: // The http.Request's Cancel field will be set to the Done() value of // the context. This will overwrite the Cancel field's value. // // Go 1.7 and above: // The http.Request.WithContext will be used to set the context on the underlying // http.Request. This will create a shallow copy of the http.Request. The SDK // may create sub contexts in the future for nested requests such as retries. func (r *Request) SetContext(ctx aws.Context) { if ctx == nil { panic("context cannot be nil") } setRequestContext(r, ctx) } // WillRetry returns if the request's can be retried. func (r *Request) WillRetry() bool { if !aws.IsReaderSeekable(r.Body) && r.HTTPRequest.Body != NoBody { return false } return r.Error != nil && aws.BoolValue(r.Retryable) && r.RetryCount < r.MaxRetries() } func fmtAttemptCount(retryCount, maxRetries int) string { return fmt.Sprintf("attempt %v/%v", retryCount, maxRetries) } // ParamsFilled returns if the request's parameters have been populated // and the parameters are valid. False is returned if no parameters are // provided or invalid. func (r *Request) ParamsFilled() bool { return r.Params != nil && reflect.ValueOf(r.Params).Elem().IsValid() } // DataFilled returns true if the request's data for response deserialization // target has been set and is a valid. False is returned if data is not // set, or is invalid. func (r *Request) DataFilled() bool { return r.Data != nil && reflect.ValueOf(r.Data).Elem().IsValid() } // SetBufferBody will set the request's body bytes that will be sent to // the service API. func (r *Request) SetBufferBody(buf []byte) { r.SetReaderBody(bytes.NewReader(buf)) } // SetStringBody sets the body of the request to be backed by a string. func (r *Request) SetStringBody(s string) { r.SetReaderBody(strings.NewReader(s)) } // SetReaderBody will set the request's body reader. func (r *Request) SetReaderBody(reader io.ReadSeeker) { r.Body = reader if aws.IsReaderSeekable(reader) { var err error // Get the Bodies current offset so retries will start from the same // initial position. r.BodyStart, err = reader.Seek(0, sdkio.SeekCurrent) if err != nil { r.Error = awserr.New(ErrCodeSerialization, "failed to determine start of request body", err) return } } r.ResetBody() } // SetStreamingBody set the reader to be used for the request that will stream // bytes to the server. Request's Body must not be set to any reader. func (r *Request) SetStreamingBody(reader io.ReadCloser) { r.streamingBody = reader r.SetReaderBody(aws.ReadSeekCloser(reader)) } // Presign returns the request's signed URL. Error will be returned // if the signing fails. The expire parameter is only used for presigned Amazon // S3 API requests. All other AWS services will use a fixed expiration // time of 15 minutes. // // It is invalid to create a presigned URL with a expire duration 0 or less. An // error is returned if expire duration is 0 or less. func (r *Request) Presign(expire time.Duration) (string, error) { r = r.copy() // Presign requires all headers be hoisted. There is no way to retrieve // the signed headers not hoisted without this. Making the presigned URL // useless. r.NotHoist = false u, _, err := getPresignedURL(r, expire) return u, err } // PresignRequest behaves just like presign, with the addition of returning a // set of headers that were signed. The expire parameter is only used for // presigned Amazon S3 API requests. All other AWS services will use a fixed // expiration time of 15 minutes. // // It is invalid to create a presigned URL with a expire duration 0 or less. An // error is returned if expire duration is 0 or less. // // Returns the URL string for the API operation with signature in the query string, // and the HTTP headers that were included in the signature. These headers must // be included in any HTTP request made with the presigned URL. // // To prevent hoisting any headers to the query string set NotHoist to true on // this Request value prior to calling PresignRequest. func (r *Request) PresignRequest(expire time.Duration) (string, http.Header, error) { r = r.copy() return getPresignedURL(r, expire) } // IsPresigned returns true if the request represents a presigned API url. func (r *Request) IsPresigned() bool { return r.ExpireTime != 0 } func getPresignedURL(r *Request, expire time.Duration) (string, http.Header, error) { if expire <= 0 { return "", nil, awserr.New( ErrCodeInvalidPresignExpire, "presigned URL requires an expire duration greater than 0", nil, ) } r.ExpireTime = expire if r.Operation.BeforePresignFn != nil { if err := r.Operation.BeforePresignFn(r); err != nil { return "", nil, err } } if err := r.Sign(); err != nil { return "", nil, err } return r.HTTPRequest.URL.String(), r.SignedHeaderVals, nil } const ( notRetrying = "not retrying" ) func debugLogReqError(r *Request, stage, retryStr string, err error) { if !r.Config.LogLevel.Matches(aws.LogDebugWithRequestErrors) { return } r.Config.Logger.Log(fmt.Sprintf("DEBUG: %s %s/%s failed, %s, error %v", stage, r.ClientInfo.ServiceName, r.Operation.Name, retryStr, err)) } // Build will build the request's object so it can be signed and sent // to the service. Build will also validate all the request's parameters. // Any additional build Handlers set on this request will be run // in the order they were set. // // The request will only be built once. Multiple calls to build will have // no effect. // // If any Validate or Build errors occur the build will stop and the error // which occurred will be returned. func (r *Request) Build() error { if !r.built { r.Handlers.Validate.Run(r) if r.Error != nil { debugLogReqError(r, "Validate Request", notRetrying, r.Error) return r.Error } r.Handlers.Build.Run(r) if r.Error != nil { debugLogReqError(r, "Build Request", notRetrying, r.Error) return r.Error } r.built = true } return r.Error } // Sign will sign the request, returning error if errors are encountered. // // Sign will build the request prior to signing. All Sign Handlers will // be executed in the order they were set. func (r *Request) Sign() error { r.Build() if r.Error != nil { debugLogReqError(r, "Build Request", notRetrying, r.Error) return r.Error } SanitizeHostForHeader(r.HTTPRequest) r.Handlers.Sign.Run(r) return r.Error } func (r *Request) getNextRequestBody() (body io.ReadCloser, err error) { if r.streamingBody != nil { return r.streamingBody, nil } if r.safeBody != nil { r.safeBody.Close() } r.safeBody, err = newOffsetReader(r.Body, r.BodyStart) if err != nil { return nil, awserr.New(ErrCodeSerialization, "failed to get next request body reader", err) } // Go 1.8 tightened and clarified the rules code needs to use when building // requests with the http package. Go 1.8 removed the automatic detection // of if the Request.Body was empty, or actually had bytes in it. The SDK // always sets the Request.Body even if it is empty and should not actually // be sent. This is incorrect. // // Go 1.8 did add a http.NoBody value that the SDK can use to tell the http // client that the request really should be sent without a body. The // Request.Body cannot be set to nil, which is preferable, because the // field is exported and could introduce nil pointer dereferences for users // of the SDK if they used that field. // // Related golang/go#18257 l, err := aws.SeekerLen(r.Body) if err != nil { return nil, awserr.New(ErrCodeSerialization, "failed to compute request body size", err) } if l == 0 { body = NoBody } else if l > 0 { body = r.safeBody } else { // Hack to prevent sending bodies for methods where the body // should be ignored by the server. Sending bodies on these // methods without an associated ContentLength will cause the // request to socket timeout because the server does not handle // Transfer-Encoding: chunked bodies for these methods. // // This would only happen if a aws.ReaderSeekerCloser was used with // a io.Reader that was not also an io.Seeker, or did not implement // Len() method. switch r.Operation.HTTPMethod { case "GET", "HEAD", "DELETE": body = NoBody default: body = r.safeBody } } return body, nil } // GetBody will return an io.ReadSeeker of the Request's underlying // input body with a concurrency safe wrapper. func (r *Request) GetBody() io.ReadSeeker { return r.safeBody } // Send will send the request, returning error if errors are encountered. // // Send will sign the request prior to sending. All Send Handlers will // be executed in the order they were set. // // Canceling a request is non-deterministic. If a request has been canceled, // then the transport will choose, randomly, one of the state channels during // reads or getting the connection. // // readLoop() and getConn(req *Request, cm connectMethod) // https://github.com/golang/go/blob/master/src/net/http/transport.go // // Send will not close the request.Request's body. func (r *Request) Send() error { defer func() { // Regardless of success or failure of the request trigger the Complete // request handlers. r.Handlers.Complete.Run(r) }() if err := r.Error; err != nil { return err } for { r.Error = nil r.AttemptTime = time.Now() if err := r.Sign(); err != nil { debugLogReqError(r, "Sign Request", notRetrying, err) return err } if err := r.sendRequest(); err == nil { return nil } r.Handlers.Retry.Run(r) r.Handlers.AfterRetry.Run(r) if r.Error != nil || !aws.BoolValue(r.Retryable) { return r.Error } if err := r.prepareRetry(); err != nil { r.Error = err return err } } } func (r *Request) prepareRetry() error { if r.Config.LogLevel.Matches(aws.LogDebugWithRequestRetries) { r.Config.Logger.Log(fmt.Sprintf("DEBUG: Retrying Request %s/%s, attempt %d", r.ClientInfo.ServiceName, r.Operation.Name, r.RetryCount)) } // The previous http.Request will have a reference to the r.Body // and the HTTP Client's Transport may still be reading from // the request's body even though the Client's Do returned. r.HTTPRequest = copyHTTPRequest(r.HTTPRequest, nil) r.ResetBody() if err := r.Error; err != nil { return awserr.New(ErrCodeSerialization, "failed to prepare body for retry", err) } // Closing response body to ensure that no response body is leaked // between retry attempts. if r.HTTPResponse != nil && r.HTTPResponse.Body != nil { r.HTTPResponse.Body.Close() } return nil } func (r *Request) sendRequest() (sendErr error) { defer r.Handlers.CompleteAttempt.Run(r) r.Retryable = nil r.Handlers.Send.Run(r) if r.Error != nil { debugLogReqError(r, "Send Request", fmtAttemptCount(r.RetryCount, r.MaxRetries()), r.Error) return r.Error } r.Handlers.UnmarshalMeta.Run(r) r.Handlers.ValidateResponse.Run(r) if r.Error != nil { r.Handlers.UnmarshalError.Run(r) debugLogReqError(r, "Validate Response", fmtAttemptCount(r.RetryCount, r.MaxRetries()), r.Error) return r.Error } r.Handlers.Unmarshal.Run(r) if r.Error != nil { debugLogReqError(r, "Unmarshal Response", fmtAttemptCount(r.RetryCount, r.MaxRetries()), r.Error) return r.Error } return nil } // copy will copy a request which will allow for local manipulation of the // request. func (r *Request) copy() *Request { req := &Request{} *req = *r req.Handlers = r.Handlers.Copy() op := *r.Operation req.Operation = &op return req } // AddToUserAgent adds the string to the end of the request's current user agent. func AddToUserAgent(r *Request, s string) { curUA := r.HTTPRequest.Header.Get("User-Agent") if len(curUA) > 0 { s = curUA + " " + s } r.HTTPRequest.Header.Set("User-Agent", s) } // SanitizeHostForHeader removes default port from host and updates request.Host func SanitizeHostForHeader(r *http.Request) { host := getHost(r) port := portOnly(host) if port != "" && isDefaultPort(r.URL.Scheme, port) { r.Host = stripPort(host) } } // Returns host from request func getHost(r *http.Request) string { if r.Host != "" { return r.Host } if r.URL == nil { return "" } return r.URL.Host } // Hostname returns u.Host, without any port number. // // If Host is an IPv6 literal with a port number, Hostname returns the // IPv6 literal without the square brackets. IPv6 literals may include // a zone identifier. // // Copied from the Go 1.8 standard library (net/url) func stripPort(hostport string) string { colon := strings.IndexByte(hostport, ':') if colon == -1 { return hostport } if i := strings.IndexByte(hostport, ']'); i != -1 { return strings.TrimPrefix(hostport[:i], "[") } return hostport[:colon] } // Port returns the port part of u.Host, without the leading colon. // If u.Host doesn't contain a port, Port returns an empty string. // // Copied from the Go 1.8 standard library (net/url) func portOnly(hostport string) string { colon := strings.IndexByte(hostport, ':') if colon == -1 { return "" } if i := strings.Index(hostport, "]:"); i != -1 { return hostport[i+len("]:"):] } if strings.Contains(hostport, "]") { return "" } return hostport[colon+len(":"):] } // Returns true if the specified URI is using the standard port // (i.e. port 80 for HTTP URIs or 443 for HTTPS URIs) func isDefaultPort(scheme, port string) bool { if port == "" { return true } lowerCaseScheme := strings.ToLower(scheme) if (lowerCaseScheme == "http" && port == "80") || (lowerCaseScheme == "https" && port == "443") { return true } return false }
714
session-manager-plugin
aws
Go
// +build !go1.6 package request_test import ( "errors" "github.com/aws/aws-sdk-go/aws/awserr" ) var errTimeout = awserr.New("foo", "bar", errors.New("net/http: request canceled Timeout"))
12
session-manager-plugin
aws
Go
// +build go1.6 package request_test import ( "errors" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/client/metadata" "github.com/aws/aws-sdk-go/aws/defaults" "github.com/aws/aws-sdk-go/aws/request" ) // go version 1.4 and 1.5 do not return an error. Version 1.5 will url encode // the uri while 1.4 will not func TestRequestInvalidEndpoint(t *testing.T) { endpoint := "http://localhost:90 " r := request.New( aws.Config{}, metadata.ClientInfo{Endpoint: endpoint}, defaults.Handlers(), client.DefaultRetryer{}, &request.Operation{}, nil, nil, ) if r.Error == nil { t.Errorf("expect error") } } type timeoutErr struct { error } var errTimeout = awserr.New("foo", "bar", &timeoutErr{ errors.New("net/http: request canceled"), }) func (e *timeoutErr) Timeout() bool { return true } func (e *timeoutErr) Temporary() bool { return true }
52
session-manager-plugin
aws
Go
// +build !go1.8 package request import "io" // NoBody is an io.ReadCloser with no bytes. Read always returns EOF // and Close always returns nil. It can be used in an outgoing client // request to explicitly signal that a request has zero bytes. // An alternative, however, is to simply set Request.Body to nil. // // Copy of Go 1.8 NoBody type from net/http/http.go type noBody struct{} func (noBody) Read([]byte) (int, error) { return 0, io.EOF } func (noBody) Close() error { return nil } func (noBody) WriteTo(io.Writer) (int64, error) { return 0, nil } // NoBody is an empty reader that will trigger the Go HTTP client to not include // and body in the HTTP request. var NoBody = noBody{} // ResetBody rewinds the request body back to its starting position, and // sets the HTTP Request body reference. When the body is read prior // to being sent in the HTTP request it will need to be rewound. // // ResetBody will automatically be called by the SDK's build handler, but if // the request is being used directly ResetBody must be called before the request // is Sent. SetStringBody, SetBufferBody, and SetReaderBody will automatically // call ResetBody. func (r *Request) ResetBody() { body, err := r.getNextRequestBody() if err != nil { r.Error = err return } r.HTTPRequest.Body = body }
40
session-manager-plugin
aws
Go
// +build !go1.8 package request import ( "net/http" "strings" "testing" ) func TestResetBody_WithEmptyBody(t *testing.T) { r := Request{ HTTPRequest: &http.Request{}, } reader := strings.NewReader("") r.Body = reader r.ResetBody() if a, e := r.HTTPRequest.Body, (noBody{}); a != e { t.Errorf("expected request body to be set to reader, got %#v", r.HTTPRequest.Body) } }
25
session-manager-plugin
aws
Go
// +build go1.8 package request import ( "net/http" "github.com/aws/aws-sdk-go/aws/awserr" ) // NoBody is a http.NoBody reader instructing Go HTTP client to not include // and body in the HTTP request. var NoBody = http.NoBody // ResetBody rewinds the request body back to its starting position, and // sets the HTTP Request body reference. When the body is read prior // to being sent in the HTTP request it will need to be rewound. // // ResetBody will automatically be called by the SDK's build handler, but if // the request is being used directly ResetBody must be called before the request // is Sent. SetStringBody, SetBufferBody, and SetReaderBody will automatically // call ResetBody. // // Will also set the Go 1.8's http.Request.GetBody member to allow retrying // PUT/POST redirects. func (r *Request) ResetBody() { body, err := r.getNextRequestBody() if err != nil { r.Error = awserr.New(ErrCodeSerialization, "failed to reset request body", err) return } r.HTTPRequest.Body = body r.HTTPRequest.GetBody = r.getNextRequestBody }
37
session-manager-plugin
aws
Go
// +build go1.8 package request_test import ( "bytes" "io" "net/http" "net/http/httptest" "strings" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/awstesting" "github.com/aws/aws-sdk-go/awstesting/unit" ) func TestResetBody_WithEmptyBody(t *testing.T) { r := request.Request{ HTTPRequest: &http.Request{}, } reader := strings.NewReader("") r.Body = reader r.ResetBody() if a, e := r.HTTPRequest.Body, http.NoBody; a != e { t.Errorf("expected request body to be set to reader, got %#v", r.HTTPRequest.Body) } } func TestRequest_FollowPUTRedirects(t *testing.T) { const bodySize = 1024 redirectHit := 0 endpointHit := 0 server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { switch r.URL.Path { case "/redirect-me": u := *r.URL u.Path = "/endpoint" w.Header().Set("Location", u.String()) w.WriteHeader(307) redirectHit++ case "/endpoint": b := bytes.Buffer{} io.Copy(&b, r.Body) r.Body.Close() if e, a := bodySize, b.Len(); e != a { t.Fatalf("expect %d body size, got %d", e, a) } endpointHit++ default: t.Fatalf("unexpected endpoint used, %q", r.URL.String()) } })) defer server.Close() svc := awstesting.NewClient(&aws.Config{ Region: unit.Session.Config.Region, DisableSSL: aws.Bool(true), Endpoint: aws.String(server.URL), }) req := svc.NewRequest(&request.Operation{ Name: "Operation", HTTPMethod: "PUT", HTTPPath: "/redirect-me", }, &struct{}{}, &struct{}{}) req.SetReaderBody(bytes.NewReader(make([]byte, bodySize))) err := req.Send() if err != nil { t.Errorf("expect no error, got %v", err) } if e, a := 1, redirectHit; e != a { t.Errorf("expect %d redirect hits, got %d", e, a) } if e, a := 1, endpointHit; e != a { t.Errorf("expect %d endpoint hits, got %d", e, a) } } func TestNewRequest_JoinEndpointWithOperationPathQuery(t *testing.T) { cases := map[string]struct { HTTPPath string Endpoint *string ExpectQuery string ExpectPath string }{ "no op HTTP Path": { HTTPPath: "", Endpoint: aws.String("https://foo.bar.aws/foo?bar=Baz"), ExpectPath: "/foo", ExpectQuery: "bar=Baz", }, "no trailing slash": { HTTPPath: "/", Endpoint: aws.String("https://foo.bar.aws"), ExpectPath: "/", ExpectQuery: "", }, "set query": { HTTPPath: "/?Foo=bar", Endpoint: aws.String("https://foo.bar.aws"), ExpectPath: "/", ExpectQuery: "Foo=bar", }, "squash query": { HTTPPath: "/?Foo=bar", Endpoint: aws.String("https://foo.bar.aws/?bar=Foo"), ExpectPath: "/", ExpectQuery: "Foo=bar", }, "trailing slash": { HTTPPath: "/", Endpoint: aws.String("https://foo.bar.aws/"), ExpectPath: "/", ExpectQuery: "", }, "trailing slash set query": { HTTPPath: "/?Foo=bar", Endpoint: aws.String("https://foo.bar.aws/"), ExpectPath: "/", ExpectQuery: "Foo=bar", }, } for name, c := range cases { t.Run(name, func(t *testing.T) { client := awstesting.NewClient(&aws.Config{ Endpoint: c.Endpoint, }) client.Handlers.Clear() r := client.NewRequest(&request.Operation{ Name: "FooBar", HTTPMethod: "GET", HTTPPath: c.HTTPPath, }, nil, nil) if e, a := c.ExpectPath, r.HTTPRequest.URL.Path; e != a { t.Errorf("expect %v path, got %v", e, a) } if e, a := c.ExpectQuery, r.HTTPRequest.URL.RawQuery; e != a { t.Errorf("expect %v query, got %v", e, a) } }) } }
155
session-manager-plugin
aws
Go
// +build go1.7 package request import "github.com/aws/aws-sdk-go/aws" // setContext updates the Request to use the passed in context for cancellation. // Context will also be used for request retry delay. // // Creates shallow copy of the http.Request with the WithContext method. func setRequestContext(r *Request, ctx aws.Context) { r.context = ctx r.HTTPRequest = r.HTTPRequest.WithContext(ctx) }
15
session-manager-plugin
aws
Go
// +build !go1.7 package request import "github.com/aws/aws-sdk-go/aws" // setContext updates the Request to use the passed in context for cancellation. // Context will also be used for request retry delay. // // Creates shallow copy of the http.Request with the WithContext method. func setRequestContext(r *Request, ctx aws.Context) { r.context = ctx r.HTTPRequest.Cancel = ctx.Done() }
15
session-manager-plugin
aws
Go
package request_test import ( "fmt" "strings" "testing" "github.com/aws/aws-sdk-go/aws/corehandlers" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/awstesting" ) func TestRequest_SetContext(t *testing.T) { svc := awstesting.NewClient() svc.Handlers.Clear() svc.Handlers.Send.PushBackNamed(corehandlers.SendHandler) r := svc.NewRequest(&request.Operation{Name: "Operation"}, nil, nil) ctx := &awstesting.FakeContext{DoneCh: make(chan struct{})} r.SetContext(ctx) ctx.Error = fmt.Errorf("context canceled") close(ctx.DoneCh) err := r.Send() if err == nil { t.Fatalf("expected error, got none") } // Only check against canceled because go 1.6 will not use the context's // Err(). if e, a := "canceled", err.Error(); !strings.Contains(a, e) { t.Errorf("expect %q to be in %q, but was not", e, a) } } func TestRequest_SetContextPanic(t *testing.T) { defer func() { if r := recover(); r == nil { t.Fatalf("expect SetContext to panic, did not") } }() r := &request.Request{} r.SetContext(nil) }
47
session-manager-plugin
aws
Go
package request import ( "testing" ) func TestCopy(t *testing.T) { handlers := Handlers{} op := &Operation{} op.HTTPMethod = "Foo" req := &Request{} req.Operation = op req.Handlers = handlers r := req.copy() if r == req { t.Fatal("expect request pointer copy to be different") } if r.Operation == req.Operation { t.Errorf("expect request operation pointer to be different") } if e, a := req.Operation.HTTPMethod, r.Operation.HTTPMethod; e != a { t.Errorf("expect %q http method, got %q", e, a) } }
28
session-manager-plugin
aws
Go
package request import ( "reflect" "sync/atomic" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awsutil" ) // A Pagination provides paginating of SDK API operations which are paginatable. // Generally you should not use this type directly, but use the "Pages" API // operations method to automatically perform pagination for you. Such as, // "S3.ListObjectsPages", and "S3.ListObjectsPagesWithContext" methods. // // Pagination differs from a Paginator type in that pagination is the type that // does the pagination between API operations, and Paginator defines the // configuration that will be used per page request. // // for p.Next() { // data := p.Page().(*s3.ListObjectsOutput) // // process the page's data // // ... // // break out of loop to stop fetching additional pages // } // // return p.Err() // // See service client API operation Pages methods for examples how the SDK will // use the Pagination type. type Pagination struct { // Function to return a Request value for each pagination request. // Any configuration or handlers that need to be applied to the request // prior to getting the next page should be done here before the request // returned. // // NewRequest should always be built from the same API operations. It is // undefined if different API operations are returned on subsequent calls. NewRequest func() (*Request, error) // EndPageOnSameToken, when enabled, will allow the paginator to stop on // token that are the same as its previous tokens. EndPageOnSameToken bool started bool prevTokens []interface{} nextTokens []interface{} err error curPage interface{} } // HasNextPage will return true if Pagination is able to determine that the API // operation has additional pages. False will be returned if there are no more // pages remaining. // // Will always return true if Next has not been called yet. func (p *Pagination) HasNextPage() bool { if !p.started { return true } hasNextPage := len(p.nextTokens) != 0 if p.EndPageOnSameToken { return hasNextPage && !awsutil.DeepEqual(p.nextTokens, p.prevTokens) } return hasNextPage } // Err returns the error Pagination encountered when retrieving the next page. func (p *Pagination) Err() error { return p.err } // Page returns the current page. Page should only be called after a successful // call to Next. It is undefined what Page will return if Page is called after // Next returns false. func (p *Pagination) Page() interface{} { return p.curPage } // Next will attempt to retrieve the next page for the API operation. When a page // is retrieved true will be returned. If the page cannot be retrieved, or there // are no more pages false will be returned. // // Use the Page method to retrieve the current page data. The data will need // to be cast to the API operation's output type. // // Use the Err method to determine if an error occurred if Page returns false. func (p *Pagination) Next() bool { if !p.HasNextPage() { return false } req, err := p.NewRequest() if err != nil { p.err = err return false } if p.started { for i, intok := range req.Operation.InputTokens { awsutil.SetValueAtPath(req.Params, intok, p.nextTokens[i]) } } p.started = true err = req.Send() if err != nil { p.err = err return false } p.prevTokens = p.nextTokens p.nextTokens = req.nextPageTokens() p.curPage = req.Data return true } // A Paginator is the configuration data that defines how an API operation // should be paginated. This type is used by the API service models to define // the generated pagination config for service APIs. // // The Pagination type is what provides iterating between pages of an API. It // is only used to store the token metadata the SDK should use for performing // pagination. type Paginator struct { InputTokens []string OutputTokens []string LimitToken string TruncationToken string } // nextPageTokens returns the tokens to use when asking for the next page of data. func (r *Request) nextPageTokens() []interface{} { if r.Operation.Paginator == nil { return nil } if r.Operation.TruncationToken != "" { tr, _ := awsutil.ValuesAtPath(r.Data, r.Operation.TruncationToken) if len(tr) == 0 { return nil } switch v := tr[0].(type) { case *bool: if !aws.BoolValue(v) { return nil } case bool: if !v { return nil } } } tokens := []interface{}{} tokenAdded := false for _, outToken := range r.Operation.OutputTokens { vs, _ := awsutil.ValuesAtPath(r.Data, outToken) if len(vs) == 0 { tokens = append(tokens, nil) continue } v := vs[0] switch tv := v.(type) { case *string: if len(aws.StringValue(tv)) == 0 { tokens = append(tokens, nil) continue } case string: if len(tv) == 0 { tokens = append(tokens, nil) continue } } tokenAdded = true tokens = append(tokens, v) } if !tokenAdded { return nil } return tokens } // Ensure a deprecated item is only logged once instead of each time its used. func logDeprecatedf(logger aws.Logger, flag *int32, msg string) { if logger == nil { return } if atomic.CompareAndSwapInt32(flag, 0, 1) { logger.Log(msg) } } var ( logDeprecatedHasNextPage int32 logDeprecatedNextPage int32 logDeprecatedEachPage int32 ) // HasNextPage returns true if this request has more pages of data available. // // Deprecated Use Pagination type for configurable pagination of API operations func (r *Request) HasNextPage() bool { logDeprecatedf(r.Config.Logger, &logDeprecatedHasNextPage, "Request.HasNextPage deprecated. Use Pagination type for configurable pagination of API operations") return len(r.nextPageTokens()) > 0 } // NextPage returns a new Request that can be executed to return the next // page of result data. Call .Send() on this request to execute it. // // Deprecated Use Pagination type for configurable pagination of API operations func (r *Request) NextPage() *Request { logDeprecatedf(r.Config.Logger, &logDeprecatedNextPage, "Request.NextPage deprecated. Use Pagination type for configurable pagination of API operations") tokens := r.nextPageTokens() if len(tokens) == 0 { return nil } data := reflect.New(reflect.TypeOf(r.Data).Elem()).Interface() nr := New(r.Config, r.ClientInfo, r.Handlers, r.Retryer, r.Operation, awsutil.CopyOf(r.Params), data) for i, intok := range nr.Operation.InputTokens { awsutil.SetValueAtPath(nr.Params, intok, tokens[i]) } return nr } // EachPage iterates over each page of a paginated request object. The fn // parameter should be a function with the following sample signature: // // func(page *T, lastPage bool) bool { // return true // return false to stop iterating // } // // Where "T" is the structure type matching the output structure of the given // operation. For example, a request object generated by // DynamoDB.ListTablesRequest() would expect to see dynamodb.ListTablesOutput // as the structure "T". The lastPage value represents whether the page is // the last page of data or not. The return value of this function should // return true to keep iterating or false to stop. // // Deprecated Use Pagination type for configurable pagination of API operations func (r *Request) EachPage(fn func(data interface{}, isLastPage bool) (shouldContinue bool)) error { logDeprecatedf(r.Config.Logger, &logDeprecatedEachPage, "Request.EachPage deprecated. Use Pagination type for configurable pagination of API operations") for page := r; page != nil; page = page.NextPage() { if err := page.Send(); err != nil { return err } if getNextPage := fn(page.Data, !page.HasNextPage()); !getNextPage { return page.Error } } return nil }
267
session-manager-plugin
aws
Go
package request_test import ( "reflect" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/awstesting" "github.com/aws/aws-sdk-go/awstesting/unit" "github.com/aws/aws-sdk-go/service/dynamodb" "github.com/aws/aws-sdk-go/service/route53" "github.com/aws/aws-sdk-go/service/s3" ) // Use DynamoDB methods for simplicity func TestPaginationQueryPage(t *testing.T) { db := dynamodb.New(unit.Session) tokens, pages, numPages, gotToEnd := []map[string]*dynamodb.AttributeValue{}, []map[string]*dynamodb.AttributeValue{}, 0, false reqNum := 0 resps := []*dynamodb.QueryOutput{ { LastEvaluatedKey: map[string]*dynamodb.AttributeValue{"key": {S: aws.String("key1")}}, Count: aws.Int64(1), Items: []map[string]*dynamodb.AttributeValue{ { "key": {S: aws.String("key1")}, }, }, }, { LastEvaluatedKey: map[string]*dynamodb.AttributeValue{"key": {S: aws.String("key2")}}, Count: aws.Int64(1), Items: []map[string]*dynamodb.AttributeValue{ { "key": {S: aws.String("key2")}, }, }, }, { LastEvaluatedKey: map[string]*dynamodb.AttributeValue{}, Count: aws.Int64(1), Items: []map[string]*dynamodb.AttributeValue{ { "key": {S: aws.String("key3")}, }, }, }, } db.Handlers.Send.Clear() // mock sending db.Handlers.Unmarshal.Clear() db.Handlers.UnmarshalMeta.Clear() db.Handlers.ValidateResponse.Clear() db.Handlers.Build.PushBack(func(r *request.Request) { in := r.Params.(*dynamodb.QueryInput) if in == nil { tokens = append(tokens, nil) } else if len(in.ExclusiveStartKey) != 0 { tokens = append(tokens, in.ExclusiveStartKey) } }) db.Handlers.Unmarshal.PushBack(func(r *request.Request) { r.Data = resps[reqNum] reqNum++ }) params := &dynamodb.QueryInput{ Limit: aws.Int64(2), TableName: aws.String("tablename"), } err := db.QueryPages(params, func(p *dynamodb.QueryOutput, last bool) bool { numPages++ pages = append(pages, p.Items...) if last { if gotToEnd { t.Errorf("last=true happened twice") } gotToEnd = true } return true }) if err != nil { t.Errorf("expect nil, %v", err) } if e, a := []map[string]*dynamodb.AttributeValue{ {"key": {S: aws.String("key1")}}, {"key": {S: aws.String("key2")}}, }, tokens; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if e, a := []map[string]*dynamodb.AttributeValue{ {"key": {S: aws.String("key1")}}, {"key": {S: aws.String("key2")}}, {"key": {S: aws.String("key3")}}, }, pages; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if e, a := 3, numPages; e != a { t.Errorf("expect %v, got %v", e, a) } if !gotToEnd { t.Errorf("expect true") } if params.ExclusiveStartKey != nil { t.Errorf("expect nil, %v", err) } } // Use DynamoDB methods for simplicity func TestPagination(t *testing.T) { db := dynamodb.New(unit.Session) tokens, pages, numPages, gotToEnd := []string{}, []string{}, 0, false reqNum := 0 resps := []*dynamodb.ListTablesOutput{ {TableNames: []*string{aws.String("Table1"), aws.String("Table2")}, LastEvaluatedTableName: aws.String("Table2")}, {TableNames: []*string{aws.String("Table3"), aws.String("Table4")}, LastEvaluatedTableName: aws.String("Table4")}, {TableNames: []*string{aws.String("Table5")}}, } db.Handlers.Send.Clear() // mock sending db.Handlers.Unmarshal.Clear() db.Handlers.UnmarshalMeta.Clear() db.Handlers.ValidateResponse.Clear() db.Handlers.Build.PushBack(func(r *request.Request) { in := r.Params.(*dynamodb.ListTablesInput) if in == nil { tokens = append(tokens, "") } else if in.ExclusiveStartTableName != nil { tokens = append(tokens, *in.ExclusiveStartTableName) } }) db.Handlers.Unmarshal.PushBack(func(r *request.Request) { r.Data = resps[reqNum] reqNum++ }) params := &dynamodb.ListTablesInput{Limit: aws.Int64(2)} err := db.ListTablesPages(params, func(p *dynamodb.ListTablesOutput, last bool) bool { numPages++ for _, t := range p.TableNames { pages = append(pages, *t) } if last { if gotToEnd { t.Errorf("last=true happened twice") } gotToEnd = true } return true }) if e, a := []string{"Table2", "Table4"}, tokens; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if e, a := []string{"Table1", "Table2", "Table3", "Table4", "Table5"}, pages; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if e, a := 3, numPages; e != a { t.Errorf("expect %v, got %v", e, a) } if !gotToEnd { t.Errorf("expect true") } if err != nil { t.Errorf("expect nil, %v", err) } if params.ExclusiveStartTableName != nil { t.Errorf("expect nil, %v", err) } } // Use DynamoDB methods for simplicity func TestPaginationEachPage(t *testing.T) { db := dynamodb.New(unit.Session) tokens, pages, numPages, gotToEnd := []string{}, []string{}, 0, false reqNum := 0 resps := []*dynamodb.ListTablesOutput{ {TableNames: []*string{aws.String("Table1"), aws.String("Table2")}, LastEvaluatedTableName: aws.String("Table2")}, {TableNames: []*string{aws.String("Table3"), aws.String("Table4")}, LastEvaluatedTableName: aws.String("Table4")}, {TableNames: []*string{aws.String("Table5")}}, } db.Handlers.Send.Clear() // mock sending db.Handlers.Unmarshal.Clear() db.Handlers.UnmarshalMeta.Clear() db.Handlers.ValidateResponse.Clear() db.Handlers.Build.PushBack(func(r *request.Request) { in := r.Params.(*dynamodb.ListTablesInput) if in == nil { tokens = append(tokens, "") } else if in.ExclusiveStartTableName != nil { tokens = append(tokens, *in.ExclusiveStartTableName) } }) db.Handlers.Unmarshal.PushBack(func(r *request.Request) { r.Data = resps[reqNum] reqNum++ }) params := &dynamodb.ListTablesInput{Limit: aws.Int64(2)} req, _ := db.ListTablesRequest(params) err := req.EachPage(func(p interface{}, last bool) bool { numPages++ for _, t := range p.(*dynamodb.ListTablesOutput).TableNames { pages = append(pages, *t) } if last { if gotToEnd { t.Errorf("last=true happened twice") } gotToEnd = true } return true }) if e, a := []string{"Table2", "Table4"}, tokens; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if e, a := []string{"Table1", "Table2", "Table3", "Table4", "Table5"}, pages; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if e, a := 3, numPages; e != a { t.Errorf("expect %v, got %v", e, a) } if !gotToEnd { t.Errorf("expect true") } if err != nil { t.Errorf("expect nil, %v", err) } } // Use DynamoDB methods for simplicity func TestPaginationEarlyExit(t *testing.T) { db := dynamodb.New(unit.Session) numPages, gotToEnd := 0, false reqNum := 0 resps := []*dynamodb.ListTablesOutput{ {TableNames: []*string{aws.String("Table1"), aws.String("Table2")}, LastEvaluatedTableName: aws.String("Table2")}, {TableNames: []*string{aws.String("Table3"), aws.String("Table4")}, LastEvaluatedTableName: aws.String("Table4")}, {TableNames: []*string{aws.String("Table5")}}, } db.Handlers.Send.Clear() // mock sending db.Handlers.Unmarshal.Clear() db.Handlers.UnmarshalMeta.Clear() db.Handlers.ValidateResponse.Clear() db.Handlers.Unmarshal.PushBack(func(r *request.Request) { r.Data = resps[reqNum] reqNum++ }) params := &dynamodb.ListTablesInput{Limit: aws.Int64(2)} err := db.ListTablesPages(params, func(p *dynamodb.ListTablesOutput, last bool) bool { numPages++ if numPages == 2 { return false } if last { if gotToEnd { t.Errorf("last=true happened twice") } gotToEnd = true } return true }) if e, a := 2, numPages; e != a { t.Errorf("expect %v, got %v", e, a) } if gotToEnd { t.Errorf("expect false") } if err != nil { t.Errorf("expect nil, %v", err) } } func TestSkipPagination(t *testing.T) { client := s3.New(unit.Session) client.Handlers.Send.Clear() // mock sending client.Handlers.Unmarshal.Clear() client.Handlers.UnmarshalMeta.Clear() client.Handlers.ValidateResponse.Clear() client.Handlers.Unmarshal.PushBack(func(r *request.Request) { r.Data = &s3.HeadBucketOutput{} }) req, _ := client.HeadBucketRequest(&s3.HeadBucketInput{Bucket: aws.String("bucket")}) numPages, gotToEnd := 0, false req.EachPage(func(p interface{}, last bool) bool { numPages++ if last { gotToEnd = true } return true }) if e, a := 1, numPages; e != a { t.Errorf("expect %v, got %v", e, a) } if !gotToEnd { t.Errorf("expect true") } } // Use S3 for simplicity func TestPaginationTruncation(t *testing.T) { client := s3.New(unit.Session) reqNum := 0 resps := []*s3.ListObjectsOutput{ {IsTruncated: aws.Bool(true), Contents: []*s3.Object{{Key: aws.String("Key1")}}}, {IsTruncated: aws.Bool(true), Contents: []*s3.Object{{Key: aws.String("Key2")}}}, {IsTruncated: aws.Bool(false), Contents: []*s3.Object{{Key: aws.String("Key3")}}}, {IsTruncated: aws.Bool(true), Contents: []*s3.Object{{Key: aws.String("Key4")}}}, } client.Handlers.Send.Clear() // mock sending client.Handlers.Unmarshal.Clear() client.Handlers.UnmarshalMeta.Clear() client.Handlers.ValidateResponse.Clear() client.Handlers.Unmarshal.PushBack(func(r *request.Request) { r.Data = resps[reqNum] reqNum++ }) params := &s3.ListObjectsInput{Bucket: aws.String("bucket")} results := []string{} err := client.ListObjectsPages(params, func(p *s3.ListObjectsOutput, last bool) bool { results = append(results, *p.Contents[0].Key) return true }) if e, a := []string{"Key1", "Key2", "Key3"}, results; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if err != nil { t.Errorf("expect nil, %v", err) } // Try again without truncation token at all reqNum = 0 resps[1].IsTruncated = nil resps[2].IsTruncated = aws.Bool(true) results = []string{} err = client.ListObjectsPages(params, func(p *s3.ListObjectsOutput, last bool) bool { results = append(results, *p.Contents[0].Key) return true }) if e, a := []string{"Key1", "Key2"}, results; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if err != nil { t.Errorf("expect nil, %v", err) } } func TestPaginationNilToken(t *testing.T) { client := route53.New(unit.Session) reqNum := 0 resps := []*route53.ListResourceRecordSetsOutput{ { ResourceRecordSets: []*route53.ResourceRecordSet{ {Name: aws.String("first.example.com.")}, }, IsTruncated: aws.Bool(true), NextRecordName: aws.String("second.example.com."), NextRecordType: aws.String("MX"), NextRecordIdentifier: aws.String("second"), MaxItems: aws.String("1"), }, { ResourceRecordSets: []*route53.ResourceRecordSet{ {Name: aws.String("second.example.com.")}, }, IsTruncated: aws.Bool(true), NextRecordName: aws.String("third.example.com."), NextRecordType: aws.String("MX"), MaxItems: aws.String("1"), }, { ResourceRecordSets: []*route53.ResourceRecordSet{ {Name: aws.String("third.example.com.")}, }, IsTruncated: aws.Bool(false), MaxItems: aws.String("1"), }, } client.Handlers.Send.Clear() // mock sending client.Handlers.Unmarshal.Clear() client.Handlers.UnmarshalMeta.Clear() client.Handlers.ValidateResponse.Clear() idents := []string{} client.Handlers.Build.PushBack(func(r *request.Request) { p := r.Params.(*route53.ListResourceRecordSetsInput) idents = append(idents, aws.StringValue(p.StartRecordIdentifier)) }) client.Handlers.Unmarshal.PushBack(func(r *request.Request) { r.Data = resps[reqNum] reqNum++ }) params := &route53.ListResourceRecordSetsInput{ HostedZoneId: aws.String("id-zone"), } results := []string{} err := client.ListResourceRecordSetsPages(params, func(p *route53.ListResourceRecordSetsOutput, last bool) bool { results = append(results, *p.ResourceRecordSets[0].Name) return true }) if err != nil { t.Errorf("expect nil, %v", err) } if e, a := []string{"", "second", ""}, idents; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } if e, a := []string{"first.example.com.", "second.example.com.", "third.example.com."}, results; !reflect.DeepEqual(e, a) { t.Errorf("expect %v, got %v", e, a) } } func TestPaginationNilInput(t *testing.T) { // Code generation doesn't have a great way to verify the code is correct // other than being run via unit tests in the SDK. This should be fixed // So code generation can be validated independently. client := s3.New(unit.Session) client.Handlers.Validate.Clear() client.Handlers.Send.Clear() // mock sending client.Handlers.Unmarshal.Clear() client.Handlers.UnmarshalMeta.Clear() client.Handlers.ValidateResponse.Clear() client.Handlers.Unmarshal.PushBack(func(r *request.Request) { r.Data = &s3.ListObjectsOutput{} }) gotToEnd := false numPages := 0 err := client.ListObjectsPages(nil, func(p *s3.ListObjectsOutput, last bool) bool { numPages++ if last { gotToEnd = true } return true }) if err != nil { t.Fatalf("expect no error, but got %v", err) } if e, a := 1, numPages; e != a { t.Errorf("expect %d number pages but got %d", e, a) } if !gotToEnd { t.Errorf("expect to of gotten to end, did not") } } func TestPaginationWithContextNilInput(t *testing.T) { // Code generation doesn't have a great way to verify the code is correct // other than being run via unit tests in the SDK. This should be fixed // So code generation can be validated independently. client := s3.New(unit.Session) client.Handlers.Validate.Clear() client.Handlers.Send.Clear() // mock sending client.Handlers.Unmarshal.Clear() client.Handlers.UnmarshalMeta.Clear() client.Handlers.ValidateResponse.Clear() client.Handlers.Unmarshal.PushBack(func(r *request.Request) { r.Data = &s3.ListObjectsOutput{} }) gotToEnd := false numPages := 0 ctx := &awstesting.FakeContext{DoneCh: make(chan struct{})} err := client.ListObjectsPagesWithContext(ctx, nil, func(p *s3.ListObjectsOutput, last bool) bool { numPages++ if last { gotToEnd = true } return true }) if err != nil { t.Fatalf("expect no error, but got %v", err) } if e, a := 1, numPages; e != a { t.Errorf("expect %d number pages but got %d", e, a) } if !gotToEnd { t.Errorf("expect to of gotten to end, did not") } } func TestPagination_Standalone(t *testing.T) { type testPageInput struct { NextToken *string } type testPageOutput struct { Value *string NextToken *string } type testCase struct { Value, PrevToken, NextToken *string } type testCaseList struct { StopOnSameToken bool Cases []testCase } cases := []testCaseList{ { Cases: []testCase{ {aws.String("FirstValue"), aws.String("InitalToken"), aws.String("FirstToken")}, {aws.String("SecondValue"), aws.String("FirstToken"), aws.String("SecondToken")}, {aws.String("ThirdValue"), aws.String("SecondToken"), nil}, }, StopOnSameToken: false, }, { Cases: []testCase{ {aws.String("FirstValue"), aws.String("InitalToken"), aws.String("FirstToken")}, {aws.String("SecondValue"), aws.String("FirstToken"), aws.String("SecondToken")}, {aws.String("ThirdValue"), aws.String("SecondToken"), aws.String("")}, }, StopOnSameToken: false, }, { Cases: []testCase{ {aws.String("FirstValue"), aws.String("InitalToken"), aws.String("FirstToken")}, {aws.String("SecondValue"), aws.String("FirstToken"), aws.String("SecondToken")}, {nil, aws.String("SecondToken"), aws.String("SecondToken")}, }, StopOnSameToken: true, }, { Cases: []testCase{ {aws.String("FirstValue"), aws.String("InitalToken"), aws.String("FirstToken")}, {aws.String("SecondValue"), aws.String("FirstToken"), aws.String("SecondToken")}, {aws.String("SecondValue"), aws.String("SecondToken"), aws.String("SecondToken")}, }, StopOnSameToken: true, }, } for _, testcase := range cases { c := testcase.Cases input := testPageInput{ NextToken: c[0].PrevToken, } svc := awstesting.NewClient() i := 0 p := request.Pagination{ EndPageOnSameToken: testcase.StopOnSameToken, NewRequest: func() (*request.Request, error) { r := svc.NewRequest( &request.Operation{ Name: "Operation", Paginator: &request.Paginator{ InputTokens: []string{"NextToken"}, OutputTokens: []string{"NextToken"}, }, }, &input, &testPageOutput{}, ) // Setup handlers for testing r.Handlers.Clear() r.Handlers.Build.PushBack(func(req *request.Request) { if e, a := len(c), i+1; a > e { t.Fatalf("expect no more than %d requests, got %d", e, a) } in := req.Params.(*testPageInput) if e, a := aws.StringValue(c[i].PrevToken), aws.StringValue(in.NextToken); e != a { t.Errorf("%d, expect NextToken input %q, got %q", i, e, a) } }) r.Handlers.Unmarshal.PushBack(func(req *request.Request) { out := &testPageOutput{ Value: c[i].Value, } if c[i].NextToken != nil { next := *c[i].NextToken out.NextToken = aws.String(next) } req.Data = out }) return r, nil }, } for p.Next() { data := p.Page().(*testPageOutput) if e, a := aws.StringValue(c[i].Value), aws.StringValue(data.Value); e != a { t.Errorf("%d, expect Value to be %q, got %q", i, e, a) } if e, a := aws.StringValue(c[i].NextToken), aws.StringValue(data.NextToken); e != a { t.Errorf("%d, expect NextToken to be %q, got %q", i, e, a) } i++ } if e, a := len(c), i; e != a { t.Errorf("expected to process %d pages, did %d", e, a) } if err := p.Err(); err != nil { t.Fatalf("%d, expected no error, got %v", i, err) } } } // Benchmarks var benchResps = []*dynamodb.ListTablesOutput{ {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE"), aws.String("NXT")}, LastEvaluatedTableName: aws.String("NXT")}, {TableNames: []*string{aws.String("TABLE")}}, } var benchDb = func() *dynamodb.DynamoDB { db := dynamodb.New(unit.Session) db.Handlers.Send.Clear() // mock sending db.Handlers.Unmarshal.Clear() db.Handlers.UnmarshalMeta.Clear() db.Handlers.ValidateResponse.Clear() return db } func BenchmarkCodegenIterator(b *testing.B) { reqNum := 0 db := benchDb() db.Handlers.Unmarshal.PushBack(func(r *request.Request) { r.Data = benchResps[reqNum] reqNum++ }) input := &dynamodb.ListTablesInput{Limit: aws.Int64(2)} iter := func(fn func(*dynamodb.ListTablesOutput, bool) bool) error { page, _ := db.ListTablesRequest(input) for ; page != nil; page = page.NextPage() { page.Send() out := page.Data.(*dynamodb.ListTablesOutput) if result := fn(out, !page.HasNextPage()); page.Error != nil || !result { return page.Error } } return nil } for i := 0; i < b.N; i++ { reqNum = 0 iter(func(p *dynamodb.ListTablesOutput, last bool) bool { return true }) } } func BenchmarkEachPageIterator(b *testing.B) { reqNum := 0 db := benchDb() db.Handlers.Unmarshal.PushBack(func(r *request.Request) { r.Data = benchResps[reqNum] reqNum++ }) input := &dynamodb.ListTablesInput{Limit: aws.Int64(2)} for i := 0; i < b.N; i++ { reqNum = 0 req, _ := db.ListTablesRequest(input) req.EachPage(func(p interface{}, last bool) bool { return true }) } }
704
session-manager-plugin
aws
Go
package request import ( "bytes" "io" "net/http" "strings" "testing" "github.com/aws/aws-sdk-go/aws" ) func TestResetBody_WithBodyContents(t *testing.T) { r := Request{ HTTPRequest: &http.Request{}, } reader := strings.NewReader("abc") r.Body = reader r.ResetBody() if v, ok := r.HTTPRequest.Body.(*offsetReader); !ok || v == nil { t.Errorf("expected request body to be set to reader, got %#v", r.HTTPRequest.Body) } } type mockReader struct{} func (mockReader) Read([]byte) (int, error) { return 0, io.EOF } func TestResetBody_ExcludeEmptyUnseekableBodyByMethod(t *testing.T) { cases := []struct { Method string Body io.ReadSeeker IsNoBody bool }{ { Method: "GET", IsNoBody: true, Body: aws.ReadSeekCloser(mockReader{}), }, { Method: "HEAD", IsNoBody: true, Body: aws.ReadSeekCloser(mockReader{}), }, { Method: "DELETE", IsNoBody: true, Body: aws.ReadSeekCloser(mockReader{}), }, { Method: "PUT", IsNoBody: false, Body: aws.ReadSeekCloser(mockReader{}), }, { Method: "PATCH", IsNoBody: false, Body: aws.ReadSeekCloser(mockReader{}), }, { Method: "POST", IsNoBody: false, Body: aws.ReadSeekCloser(mockReader{}), }, { Method: "GET", IsNoBody: false, Body: aws.ReadSeekCloser(bytes.NewBuffer([]byte("abc"))), }, { Method: "GET", IsNoBody: true, Body: aws.ReadSeekCloser(bytes.NewBuffer(nil)), }, { Method: "POST", IsNoBody: false, Body: aws.ReadSeekCloser(bytes.NewBuffer([]byte("abc"))), }, { Method: "POST", IsNoBody: true, Body: aws.ReadSeekCloser(bytes.NewBuffer(nil)), }, } for i, c := range cases { r := Request{ HTTPRequest: &http.Request{}, Operation: &Operation{ HTTPMethod: c.Method, }, } r.SetReaderBody(c.Body) if a, e := r.HTTPRequest.Body == NoBody, c.IsNoBody; a != e { t.Errorf("%d, expect body to be set to noBody(%t), but was %t", i, e, a) } } }
108
session-manager-plugin
aws
Go
package request import ( "fmt" "net" "net/http" "net/http/httptest" "net/url" "os" "testing" "time" "github.com/aws/aws-sdk-go/aws/awserr" ) func newRequest(t *testing.T, url string) *http.Request { r, err := http.NewRequest("GET", url, nil) if err != nil { t.Fatalf("can't forge request: %v", err) } return r } func TestShouldRetryError_nil(t *testing.T) { if shouldRetryError(nil) != true { t.Error("shouldRetryError(nil) should return true") } } func TestShouldRetryError_timeout(t *testing.T) { tr := &http.Transport{} defer tr.CloseIdleConnections() client := http.Client{ Timeout: time.Nanosecond, Transport: tr, } resp, err := client.Do(newRequest(t, "https://179.179.179.179/no/such/host")) if resp != nil { resp.Body.Close() } if err == nil { t.Fatal("This should have failed.") } debugerr(t, err) if shouldRetryError(err) == false { t.Errorf("this request timed out and should be retried") } } func TestShouldRetryError_cancelled(t *testing.T) { tr := &http.Transport{} defer tr.CloseIdleConnections() client := http.Client{ Transport: tr, } cancelWait := make(chan bool) srvrWait := make(chan bool) srvr := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) { close(cancelWait) // Trigger the request cancel. time.Sleep(100 * time.Millisecond) fmt.Fprintf(w, "Hello") w.(http.Flusher).Flush() // send headers and some body <-srvrWait // block forever })) defer srvr.Close() defer close(srvrWait) r := newRequest(t, srvr.URL) ch := make(chan struct{}) r.Cancel = ch // Ensure the request has started, and client has started to receive bytes. // This ensures the test is stable and does not run into timing with the // request being canceled, before or after the http request is made. go func() { <-cancelWait close(ch) // request is cancelled before anything }() resp, err := client.Do(r) if resp != nil { resp.Body.Close() } if err == nil { t.Fatal("This should have failed.") } debugerr(t, err) if shouldRetryError(err) == true { t.Errorf("this request was cancelled and should not be retried") } } func TestShouldRetry(t *testing.T) { syscallError := os.SyscallError{ Err: ErrInvalidParams{}, Syscall: "open", } opError := net.OpError{ Op: "dial", Net: "tcp", Source: net.Addr(nil), Err: &syscallError, } urlError := url.Error{ Op: "Post", URL: "https://localhost:52398", Err: &opError, } origError := awserr.New("ErrorTestShouldRetry", "Test should retry when error received", &urlError).OrigErr() if e, a := true, shouldRetryError(origError); e != a { t.Errorf("Expected to return %v to retry when error occurred, got %v instead", e, a) } } func debugerr(t *testing.T, err error) { t.Logf("Error, %v", err) switch err := err.(type) { case temporary: t.Logf("%s is a temporary error: %t", err, err.Temporary()) return case *url.Error: t.Logf("err: %s, nested err: %#v", err, err.Err) if operr, ok := err.Err.(*net.OpError); ok { t.Logf("operr: %#v", operr) } debugerr(t, err.Err) return default: return } } func TestRequest_retryCustomCodes(t *testing.T) { cases := map[string]struct { Code string RetryErrorCodes []string ThrottleErrorCodes []string Retryable bool Throttle bool }{ "retry code": { Code: "RetryMePlease", RetryErrorCodes: []string{ "RetryMePlease", "SomeOtherError", }, Retryable: true, }, "throttle code": { Code: "AThrottleableError", RetryErrorCodes: []string{ "RetryMePlease", "SomeOtherError", }, ThrottleErrorCodes: []string{ "AThrottleableError", "SomeOtherError", }, Throttle: true, }, "unknown code": { Code: "UnknownCode", RetryErrorCodes: []string{ "RetryMePlease", "SomeOtherError", }, Retryable: false, }, } for name, c := range cases { req := Request{ HTTPRequest: &http.Request{}, HTTPResponse: &http.Response{}, Error: awserr.New(c.Code, "some error", nil), RetryErrorCodes: c.RetryErrorCodes, ThrottleErrorCodes: c.ThrottleErrorCodes, } retryable := req.IsErrorRetryable() if e, a := c.Retryable, retryable; e != a { t.Errorf("%s, expect %v retryable, got %v", name, e, a) } throttle := req.IsErrorThrottle() if e, a := c.Throttle, throttle; e != a { t.Errorf("%s, expect %v throttle, got %v", name, e, a) } } }
203
session-manager-plugin
aws
Go
package request_test import ( "bytes" "encoding/json" "errors" "fmt" "io" "io/ioutil" "net" "net/http" "net/http/httptest" "net/url" "reflect" "runtime" "strconv" "strings" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/corehandlers" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/awstesting" "github.com/aws/aws-sdk-go/awstesting/unit" "github.com/aws/aws-sdk-go/private/protocol/rest" ) type tempNetworkError struct { op string msg string isTemp bool } func (e *tempNetworkError) Temporary() bool { return e.isTemp } func (e *tempNetworkError) Error() string { return fmt.Sprintf("%s: %s", e.op, e.msg) } var ( // net.OpError accept, are always temporary errAcceptConnectionResetStub = &tempNetworkError{ isTemp: true, op: "accept", msg: "connection reset", } // net.OpError read for ECONNRESET is not temporary. errReadConnectionResetStub = &tempNetworkError{ isTemp: false, op: "read", msg: "connection reset", } // net.OpError write for ECONNRESET may not be temporary, but is treaded as // temporary by the SDK. errWriteConnectionResetStub = &tempNetworkError{ isTemp: false, op: "write", msg: "connection reset", } // net.OpError write for broken pipe may not be temporary, but is treaded as // temporary by the SDK. errWriteBrokenPipeStub = &tempNetworkError{ isTemp: false, op: "write", msg: "broken pipe", } // Generic connection reset error errConnectionResetStub = errors.New("connection reset") // use of closed network connection error errUseOfClosedConnectionStub = errors.New("use of closed network connection") ) type testData struct { Data string } func body(str string) io.ReadCloser { return ioutil.NopCloser(bytes.NewReader([]byte(str))) } func unmarshal(req *request.Request) { defer req.HTTPResponse.Body.Close() if req.Data != nil { json.NewDecoder(req.HTTPResponse.Body).Decode(req.Data) } } func unmarshalError(req *request.Request) { bodyBytes, err := ioutil.ReadAll(req.HTTPResponse.Body) if err != nil { req.Error = awserr.New("UnmarshaleError", req.HTTPResponse.Status, err) return } if len(bodyBytes) == 0 { req.Error = awserr.NewRequestFailure( awserr.New("UnmarshaleError", req.HTTPResponse.Status, fmt.Errorf("empty body")), req.HTTPResponse.StatusCode, "", ) return } var jsonErr jsonErrorResponse if err := json.Unmarshal(bodyBytes, &jsonErr); err != nil { req.Error = awserr.New("UnmarshaleError", "JSON unmarshal", err) return } req.Error = awserr.NewRequestFailure( awserr.New(jsonErr.Code, jsonErr.Message, nil), req.HTTPResponse.StatusCode, "", ) } type jsonErrorResponse struct { Code string `json:"__type"` Message string `json:"message"` } // test that retries occur for 5xx status codes func TestRequestRecoverRetry5xx(t *testing.T) { reqNum := 0 reqs := []http.Response{ {StatusCode: 500, Body: body(`{"__type":"UnknownError","message":"An error occurred."}`)}, {StatusCode: 502, Body: body(`{"__type":"UnknownError","message":"An error occurred."}`)}, {StatusCode: 200, Body: body(`{"data":"valid"}`)}, } s := awstesting.NewClient(&aws.Config{ MaxRetries: aws.Int(10), SleepDelay: func(time.Duration) {}, }) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) s.Handlers.Send.Clear() // mock sending s.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &reqs[reqNum] reqNum++ }) out := &testData{} r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, out) err := r.Send() if err != nil { t.Fatalf("expect no error, but got %v", err) } if e, a := 2, r.RetryCount; e != a { t.Errorf("expect %d retry count, got %d", e, a) } if e, a := "valid", out.Data; e != a { t.Errorf("expect %q output got %q", e, a) } } // test that retries occur for 4xx status codes with a response type that can be retried - see `shouldRetry` func TestRequestRecoverRetry4xxRetryable(t *testing.T) { reqNum := 0 reqs := []http.Response{ {StatusCode: 400, Body: body(`{"__type":"Throttling","message":"Rate exceeded."}`)}, {StatusCode: 400, Body: body(`{"__type":"ProvisionedThroughputExceededException","message":"Rate exceeded."}`)}, {StatusCode: 429, Body: body(`{"__type":"FooException","message":"Rate exceeded."}`)}, {StatusCode: 200, Body: body(`{"data":"valid"}`)}, } s := awstesting.NewClient(&aws.Config{ MaxRetries: aws.Int(10), SleepDelay: func(time.Duration) {}, }) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) s.Handlers.Send.Clear() // mock sending s.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &reqs[reqNum] reqNum++ }) out := &testData{} r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, out) err := r.Send() if err != nil { t.Fatalf("expect no error, but got %v", err) } if e, a := 3, r.RetryCount; e != a { t.Errorf("expect %d retry count, got %d", e, a) } if e, a := "valid", out.Data; e != a { t.Errorf("expect %q output got %q", e, a) } } // test that retries don't occur for 4xx status codes with a response type that can't be retried func TestRequest4xxUnretryable(t *testing.T) { s := awstesting.NewClient(&aws.Config{ MaxRetries: aws.Int(1), SleepDelay: func(time.Duration) {}, }) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) s.Handlers.Send.Clear() // mock sending s.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &http.Response{ StatusCode: 401, Body: body(`{"__type":"SignatureDoesNotMatch","message":"Signature does not match."}`), } }) out := &testData{} r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, out) err := r.Send() if err == nil { t.Fatalf("expect error, but did not get one") } aerr := err.(awserr.RequestFailure) if e, a := 401, aerr.StatusCode(); e != a { t.Errorf("expect %d status code, got %d", e, a) } if e, a := "SignatureDoesNotMatch", aerr.Code(); e != a { t.Errorf("expect %q error code, got %q", e, a) } if e, a := "Signature does not match.", aerr.Message(); e != a { t.Errorf("expect %q error message, got %q", e, a) } if e, a := 0, r.RetryCount; e != a { t.Errorf("expect %d retry count, got %d", e, a) } } func TestRequestExhaustRetries(t *testing.T) { delays := []time.Duration{} sleepDelay := func(delay time.Duration) { delays = append(delays, delay) } reqNum := 0 reqs := []http.Response{ {StatusCode: 500, Body: body(`{"__type":"UnknownError","message":"An error occurred."}`)}, {StatusCode: 500, Body: body(`{"__type":"UnknownError","message":"An error occurred."}`)}, {StatusCode: 500, Body: body(`{"__type":"UnknownError","message":"An error occurred."}`)}, {StatusCode: 500, Body: body(`{"__type":"UnknownError","message":"An error occurred."}`)}, } s := awstesting.NewClient(&aws.Config{ SleepDelay: sleepDelay, }) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) s.Handlers.Send.Clear() // mock sending s.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &reqs[reqNum] reqNum++ }) r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, nil) err := r.Send() if err == nil { t.Fatalf("expect error, but did not get one") } aerr := err.(awserr.RequestFailure) if e, a := 500, aerr.StatusCode(); e != a { t.Errorf("expect %d status code, got %d", e, a) } if e, a := "UnknownError", aerr.Code(); e != a { t.Errorf("expect %q error code, got %q", e, a) } if e, a := "An error occurred.", aerr.Message(); e != a { t.Errorf("expect %q error message, got %q", e, a) } if e, a := 3, r.RetryCount; e != a { t.Errorf("expect %d retry count, got %d", e, a) } expectDelays := []struct{ min, max time.Duration }{{30, 60}, {60, 120}, {120, 240}} for i, v := range delays { min := expectDelays[i].min * time.Millisecond max := expectDelays[i].max * time.Millisecond if !(min <= v && v <= max) { t.Errorf("Expect delay to be within range, i:%d, v:%s, min:%s, max:%s", i, v, min, max) } } } // test that the request is retried after the credentials are expired. func TestRequestRecoverExpiredCreds(t *testing.T) { reqNum := 0 reqs := []http.Response{ {StatusCode: 400, Body: body(`{"__type":"ExpiredTokenException","message":"expired token"}`)}, {StatusCode: 200, Body: body(`{"data":"valid"}`)}, } s := awstesting.NewClient(&aws.Config{ MaxRetries: aws.Int(10), Credentials: credentials.NewStaticCredentials("AKID", "SECRET", ""), SleepDelay: func(time.Duration) {}, }) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) credExpiredBeforeRetry := false credExpiredAfterRetry := false s.Handlers.AfterRetry.PushBack(func(r *request.Request) { credExpiredAfterRetry = r.Config.Credentials.IsExpired() }) s.Handlers.Sign.Clear() s.Handlers.Sign.PushBack(func(r *request.Request) { r.Config.Credentials.Get() }) s.Handlers.Send.Clear() // mock sending s.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &reqs[reqNum] reqNum++ }) out := &testData{} r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, out) err := r.Send() if err != nil { t.Fatalf("expect no error, got %v", err) } if credExpiredBeforeRetry { t.Errorf("Expect valid creds before retry check") } if !credExpiredAfterRetry { t.Errorf("Expect expired creds after retry check") } if s.Config.Credentials.IsExpired() { t.Errorf("Expect valid creds after cred expired recovery") } if e, a := 1, r.RetryCount; e != a { t.Errorf("expect %d retry count, got %d", e, a) } if e, a := "valid", out.Data; e != a { t.Errorf("expect %q output got %q", e, a) } } func TestMakeAddtoUserAgentHandler(t *testing.T) { fn := request.MakeAddToUserAgentHandler("name", "version", "extra1", "extra2") r := &request.Request{HTTPRequest: &http.Request{Header: http.Header{}}} r.HTTPRequest.Header.Set("User-Agent", "foo/bar") fn(r) if e, a := "foo/bar name/version (extra1; extra2)", r.HTTPRequest.Header.Get("User-Agent"); !strings.HasPrefix(a, e) { t.Errorf("expect %q user agent, got %q", e, a) } } func TestMakeAddtoUserAgentFreeFormHandler(t *testing.T) { fn := request.MakeAddToUserAgentFreeFormHandler("name/version (extra1; extra2)") r := &request.Request{HTTPRequest: &http.Request{Header: http.Header{}}} r.HTTPRequest.Header.Set("User-Agent", "foo/bar") fn(r) if e, a := "foo/bar name/version (extra1; extra2)", r.HTTPRequest.Header.Get("User-Agent"); !strings.HasPrefix(a, e) { t.Errorf("expect %q user agent, got %q", e, a) } } func TestRequestUserAgent(t *testing.T) { s := awstesting.NewClient(&aws.Config{ Region: aws.String("us-east-1"), }) req := s.NewRequest(&request.Operation{Name: "Operation"}, nil, &testData{}) req.HTTPRequest.Header.Set("User-Agent", "foo/bar") if err := req.Build(); err != nil { t.Fatalf("expect no error, got %v", err) } expectUA := fmt.Sprintf("foo/bar %s/%s (%s; %s; %s)", aws.SDKName, aws.SDKVersion, runtime.Version(), runtime.GOOS, runtime.GOARCH) if e, a := expectUA, req.HTTPRequest.Header.Get("User-Agent"); !strings.HasPrefix(a, e) { t.Errorf("expect %q user agent, got %q", e, a) } } func TestRequestThrottleRetries(t *testing.T) { var delays []time.Duration sleepDelay := func(delay time.Duration) { delays = append(delays, delay) } reqNum := 0 reqs := []http.Response{ {StatusCode: 500, Body: body(`{"__type":"Throttling","message":"An error occurred."}`)}, {StatusCode: 500, Body: body(`{"__type":"Throttling","message":"An error occurred."}`)}, {StatusCode: 500, Body: body(`{"__type":"Throttling","message":"An error occurred."}`)}, {StatusCode: 500, Body: body(`{"__type":"Throttling","message":"An error occurred."}`)}, } s := awstesting.NewClient(&aws.Config{ SleepDelay: sleepDelay, }) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) s.Handlers.Send.Clear() // mock sending s.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &reqs[reqNum] reqNum++ }) r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, nil) err := r.Send() if err == nil { t.Fatalf("expect error, but did not get one") } aerr := err.(awserr.RequestFailure) if e, a := 500, aerr.StatusCode(); e != a { t.Errorf("expect %d status code, got %d", e, a) } if e, a := "Throttling", aerr.Code(); e != a { t.Errorf("expect %q error code, got %q", e, a) } if e, a := "An error occurred.", aerr.Message(); e != a { t.Errorf("expect %q error message, got %q", e, a) } if e, a := 3, r.RetryCount; e != a { t.Errorf("expect %d retry count, got %d", e, a) } expectDelays := []struct{ min, max time.Duration }{{500, 1000}, {1000, 2000}, {2000, 4000}} for i, v := range delays { min := expectDelays[i].min * time.Millisecond max := expectDelays[i].max * time.Millisecond if !(min <= v && v <= max) { t.Errorf("Expect delay to be within range, i:%d, v:%s, min:%s, max:%s", i, v, min, max) } } } // test that retries occur for request timeouts when response.Body can be nil func TestRequestRecoverTimeoutWithNilBody(t *testing.T) { reqNum := 0 reqs := []*http.Response{ {StatusCode: 0, Body: nil}, // body can be nil when requests time out {StatusCode: 200, Body: body(`{"data":"valid"}`)}, } errors := []error{ errTimeout, nil, } s := awstesting.NewClient(aws.NewConfig().WithMaxRetries(10)) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) s.Handlers.AfterRetry.Clear() // force retry on all errors s.Handlers.AfterRetry.PushBack(func(r *request.Request) { if r.Error != nil { r.Error = nil r.Retryable = aws.Bool(true) r.RetryCount++ } }) s.Handlers.Send.Clear() // mock sending s.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = reqs[reqNum] r.Error = errors[reqNum] reqNum++ }) out := &testData{} r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, out) err := r.Send() if err != nil { t.Fatalf("expect no error, but got %v", err) } if e, a := 1, r.RetryCount; e != a { t.Errorf("expect %d retry count, got %d", e, a) } if e, a := "valid", out.Data; e != a { t.Errorf("expect %q output got %q", e, a) } } func TestRequestRecoverTimeoutWithNilResponse(t *testing.T) { reqNum := 0 reqs := []*http.Response{ nil, {StatusCode: 200, Body: body(`{"data":"valid"}`)}, } errors := []error{ errTimeout, nil, } s := awstesting.NewClient(aws.NewConfig().WithMaxRetries(10)) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) s.Handlers.AfterRetry.Clear() // force retry on all errors s.Handlers.AfterRetry.PushBack(func(r *request.Request) { if r.Error != nil { r.Error = nil r.Retryable = aws.Bool(true) r.RetryCount++ } }) s.Handlers.Send.Clear() // mock sending s.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = reqs[reqNum] r.Error = errors[reqNum] reqNum++ }) out := &testData{} r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, out) err := r.Send() if err != nil { t.Fatalf("expect no error, but got %v", err) } if e, a := 1, r.RetryCount; e != a { t.Errorf("expect %d retry count, got %d", e, a) } if e, a := "valid", out.Data; e != a { t.Errorf("expect %q output got %q", e, a) } } func TestRequest_NoBody(t *testing.T) { cases := []string{ "GET", "HEAD", "DELETE", "PUT", "POST", "PATCH", } for i, c := range cases { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { if v := r.TransferEncoding; len(v) > 0 { t.Errorf("%d, expect no body sent with Transfer-Encoding, %v", i, v) } outMsg := []byte(`{"Value": "abc"}`) if b, err := ioutil.ReadAll(r.Body); err != nil { t.Fatalf("%d, expect no error reading request body, got %v", i, err) } else if n := len(b); n > 0 { t.Errorf("%d, expect no request body, got %d bytes", i, n) } w.Header().Set("Content-Length", strconv.Itoa(len(outMsg))) if _, err := w.Write(outMsg); err != nil { t.Fatalf("%d, expect no error writing server response, got %v", i, err) } })) s := awstesting.NewClient(&aws.Config{ Region: aws.String("mock-region"), MaxRetries: aws.Int(0), Endpoint: aws.String(server.URL), DisableSSL: aws.Bool(true), }) s.Handlers.Build.PushBack(rest.Build) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) in := struct { Bucket *string `location:"uri" locationName:"bucket"` Key *string `location:"uri" locationName:"key"` }{ Bucket: aws.String("mybucket"), Key: aws.String("myKey"), } out := struct { Value *string }{} r := s.NewRequest(&request.Operation{ Name: "OpName", HTTPMethod: c, HTTPPath: "/{bucket}/{key+}", }, &in, &out) err := r.Send() server.Close() if err != nil { t.Fatalf("%d, expect no error sending request, got %v", i, err) } } } func TestIsSerializationErrorRetryable(t *testing.T) { testCases := []struct { err error expected bool }{ { err: awserr.New(request.ErrCodeSerialization, "foo error", nil), expected: false, }, { err: awserr.New("ErrFoo", "foo error", nil), expected: false, }, { err: nil, expected: false, }, { err: awserr.New(request.ErrCodeSerialization, "foo error", errAcceptConnectionResetStub), expected: true, }, } for i, c := range testCases { r := &request.Request{ Error: c.err, } if r.IsErrorRetryable() != c.expected { t.Errorf("Case %d: Expected %v, but received %v", i, c.expected, !c.expected) } } } func TestWithLogLevel(t *testing.T) { r := &request.Request{} opt := request.WithLogLevel(aws.LogDebugWithHTTPBody) r.ApplyOptions(opt) if !r.Config.LogLevel.Matches(aws.LogDebugWithHTTPBody) { t.Errorf("expect log level to be set, but was not, %v", r.Config.LogLevel.Value()) } } func TestWithGetResponseHeader(t *testing.T) { r := &request.Request{} var val, val2 string r.ApplyOptions( request.WithGetResponseHeader("x-a-header", &val), request.WithGetResponseHeader("x-second-header", &val2), ) r.HTTPResponse = &http.Response{ Header: func() http.Header { h := http.Header{} h.Set("x-a-header", "first") h.Set("x-second-header", "second") return h }(), } r.Handlers.Complete.Run(r) if e, a := "first", val; e != a { t.Errorf("expect %q header value got %q", e, a) } if e, a := "second", val2; e != a { t.Errorf("expect %q header value got %q", e, a) } } func TestWithGetResponseHeaders(t *testing.T) { r := &request.Request{} var headers http.Header opt := request.WithGetResponseHeaders(&headers) r.ApplyOptions(opt) r.HTTPResponse = &http.Response{ Header: func() http.Header { h := http.Header{} h.Set("x-a-header", "headerValue") return h }(), } r.Handlers.Complete.Run(r) if e, a := "headerValue", headers.Get("x-a-header"); e != a { t.Errorf("expect %q header value got %q", e, a) } } type testRetryer struct { shouldRetry bool maxRetries int } func (d *testRetryer) MaxRetries() int { return d.maxRetries } // RetryRules returns the delay duration before retrying this request again func (d *testRetryer) RetryRules(r *request.Request) time.Duration { return 0 } func (d *testRetryer) ShouldRetry(r *request.Request) bool { return d.shouldRetry } func TestEnforceShouldRetryCheck(t *testing.T) { retryer := &testRetryer{ shouldRetry: true, maxRetries: 3, } s := awstesting.NewClient(&aws.Config{ Region: aws.String("mock-region"), MaxRetries: aws.Int(0), Retryer: retryer, EnforceShouldRetryCheck: aws.Bool(true), SleepDelay: func(time.Duration) {}, }) s.Handlers.Validate.Clear() s.Handlers.Send.Swap(corehandlers.SendHandler.Name, request.NamedHandler{ Name: "TestEnforceShouldRetryCheck", Fn: func(r *request.Request) { r.HTTPResponse = &http.Response{ Header: http.Header{}, Body: ioutil.NopCloser(bytes.NewBuffer(nil)), } r.Retryable = aws.Bool(false) }, }) s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) out := &testData{} r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, out) err := r.Send() if err == nil { t.Fatalf("expect error, but got nil") } if e, a := 3, r.RetryCount; e != a { t.Errorf("expect %d retry count, got %d", e, a) } if !retryer.shouldRetry { t.Errorf("expect 'true' for ShouldRetry, but got %v", retryer.shouldRetry) } } type errReader struct { err error } func (reader *errReader) Read(b []byte) (int, error) { return 0, reader.err } func (reader *errReader) Close() error { return nil } func TestIsNoBodyReader(t *testing.T) { cases := []struct { reader io.ReadCloser expect bool }{ {ioutil.NopCloser(bytes.NewReader([]byte("abc"))), false}, {ioutil.NopCloser(bytes.NewReader(nil)), false}, {nil, false}, {request.NoBody, true}, } for i, c := range cases { if e, a := c.expect, request.NoBody == c.reader; e != a { t.Errorf("%d, expect %t match, but was %t", i, e, a) } } } func TestRequest_TemporaryRetry(t *testing.T) { done := make(chan struct{}) server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.Header().Set("Content-Length", "1024") w.WriteHeader(http.StatusOK) w.Write(make([]byte, 100)) f := w.(http.Flusher) f.Flush() <-done })) defer server.Close() client := &http.Client{ Timeout: 100 * time.Millisecond, } svc := awstesting.NewClient(&aws.Config{ Region: unit.Session.Config.Region, MaxRetries: aws.Int(1), HTTPClient: client, DisableSSL: aws.Bool(true), Endpoint: aws.String(server.URL), }) req := svc.NewRequest(&request.Operation{ Name: "name", HTTPMethod: "GET", HTTPPath: "/path", }, &struct{}{}, &struct{}{}) req.Handlers.Unmarshal.PushBack(func(r *request.Request) { defer req.HTTPResponse.Body.Close() _, err := io.Copy(ioutil.Discard, req.HTTPResponse.Body) r.Error = awserr.New(request.ErrCodeSerialization, "error", err) }) err := req.Send() if err == nil { t.Errorf("expect error, got none") } close(done) aerr := err.(awserr.Error) if e, a := request.ErrCodeSerialization, aerr.Code(); e != a { t.Errorf("expect %q error code, got %q", e, a) } if e, a := 1, req.RetryCount; e != a { t.Errorf("expect %d retries, got %d", e, a) } type temporary interface { Temporary() bool } terr := aerr.OrigErr().(temporary) if !terr.Temporary() { t.Errorf("expect temporary error, was not") } } func TestRequest_Presign(t *testing.T) { presign := func(r *request.Request, expire time.Duration) (string, http.Header, error) { u, err := r.Presign(expire) return u, nil, err } presignRequest := func(r *request.Request, expire time.Duration) (string, http.Header, error) { return r.PresignRequest(expire) } mustParseURL := func(v string) *url.URL { u, err := url.Parse(v) if err != nil { panic(err) } return u } cases := []struct { Expire time.Duration PresignFn func(*request.Request, time.Duration) (string, http.Header, error) SignerFn func(*request.Request) URL string Header http.Header Err string }{ { PresignFn: presign, Err: request.ErrCodeInvalidPresignExpire, }, { PresignFn: presignRequest, Err: request.ErrCodeInvalidPresignExpire, }, { Expire: -1, PresignFn: presign, Err: request.ErrCodeInvalidPresignExpire, }, { // Presign clear NotHoist Expire: 1 * time.Minute, PresignFn: func(r *request.Request, dur time.Duration) (string, http.Header, error) { r.NotHoist = true return presign(r, dur) }, SignerFn: func(r *request.Request) { r.HTTPRequest.URL = mustParseURL("https://endpoint/presignedURL") if r.NotHoist { r.Error = fmt.Errorf("expect NotHoist to be cleared") } }, URL: "https://endpoint/presignedURL", }, { // PresignRequest does not clear NotHoist Expire: 1 * time.Minute, PresignFn: func(r *request.Request, dur time.Duration) (string, http.Header, error) { r.NotHoist = true return presignRequest(r, dur) }, SignerFn: func(r *request.Request) { r.HTTPRequest.URL = mustParseURL("https://endpoint/presignedURL") if !r.NotHoist { r.Error = fmt.Errorf("expect NotHoist not to be cleared") } }, URL: "https://endpoint/presignedURL", }, { // PresignRequest returns signed headers Expire: 1 * time.Minute, PresignFn: presignRequest, SignerFn: func(r *request.Request) { r.HTTPRequest.URL = mustParseURL("https://endpoint/presignedURL") r.HTTPRequest.Header.Set("UnsigndHeader", "abc") r.SignedHeaderVals = http.Header{ "X-Amzn-Header": []string{"abc", "123"}, "X-Amzn-Header2": []string{"efg", "456"}, } }, URL: "https://endpoint/presignedURL", Header: http.Header{ "X-Amzn-Header": []string{"abc", "123"}, "X-Amzn-Header2": []string{"efg", "456"}, }, }, } svc := awstesting.NewClient() svc.Handlers.Clear() for i, c := range cases { req := svc.NewRequest(&request.Operation{ Name: "name", HTTPMethod: "GET", HTTPPath: "/path", }, &struct{}{}, &struct{}{}) req.Handlers.Sign.PushBack(c.SignerFn) u, h, err := c.PresignFn(req, c.Expire) if len(c.Err) != 0 { if e, a := c.Err, err.Error(); !strings.Contains(a, e) { t.Errorf("%d, expect %v to be in %v", i, e, a) } continue } else if err != nil { t.Errorf("%d, expect no error, got %v", i, err) continue } if e, a := c.URL, u; e != a { t.Errorf("%d, expect %v URL, got %v", i, e, a) } if e, a := c.Header, h; !reflect.DeepEqual(e, a) { t.Errorf("%d, expect %v header got %v", i, e, a) } } } func TestSanitizeHostForHeader(t *testing.T) { cases := []struct { url string expectedRequestHost string }{ {"https://estest.us-east-1.es.amazonaws.com:443", "estest.us-east-1.es.amazonaws.com"}, {"https://estest.us-east-1.es.amazonaws.com", "estest.us-east-1.es.amazonaws.com"}, {"https://localhost:9200", "localhost:9200"}, {"http://localhost:80", "localhost"}, {"http://localhost:8080", "localhost:8080"}, } for _, c := range cases { r, _ := http.NewRequest("GET", c.url, nil) request.SanitizeHostForHeader(r) if h := r.Host; h != c.expectedRequestHost { t.Errorf("expect %v host, got %q", c.expectedRequestHost, h) } } } func TestRequestWillRetry_ByBody(t *testing.T) { svc := awstesting.NewClient() cases := []struct { WillRetry bool HTTPMethod string Body io.ReadSeeker IsReqNoBody bool }{ { WillRetry: true, HTTPMethod: "GET", Body: bytes.NewReader([]byte{}), IsReqNoBody: true, }, { WillRetry: true, HTTPMethod: "GET", Body: bytes.NewReader(nil), IsReqNoBody: true, }, { WillRetry: true, HTTPMethod: "POST", Body: bytes.NewReader([]byte("abc123")), }, { WillRetry: true, HTTPMethod: "POST", Body: aws.ReadSeekCloser(bytes.NewReader([]byte("abc123"))), }, { WillRetry: true, HTTPMethod: "GET", Body: aws.ReadSeekCloser(bytes.NewBuffer(nil)), IsReqNoBody: true, }, { WillRetry: true, HTTPMethod: "POST", Body: aws.ReadSeekCloser(bytes.NewBuffer(nil)), IsReqNoBody: true, }, { WillRetry: false, HTTPMethod: "POST", Body: aws.ReadSeekCloser(bytes.NewBuffer([]byte("abc123"))), }, } for i, c := range cases { req := svc.NewRequest(&request.Operation{ Name: "Operation", HTTPMethod: c.HTTPMethod, HTTPPath: "/", }, nil, nil) req.SetReaderBody(c.Body) req.Build() req.Error = fmt.Errorf("some error") req.Retryable = aws.Bool(true) req.HTTPResponse = &http.Response{ StatusCode: 500, } if e, a := c.IsReqNoBody, request.NoBody == req.HTTPRequest.Body; e != a { t.Errorf("%d, expect request to be no body, %t, got %t, %T", i, e, a, req.HTTPRequest.Body) } if e, a := c.WillRetry, req.WillRetry(); e != a { t.Errorf("%d, expect %t willRetry, got %t", i, e, a) } if req.Error == nil { t.Fatalf("%d, expect error, got none", i) } if e, a := "some error", req.Error.Error(); !strings.Contains(a, e) { t.Errorf("%d, expect %q error in %q", i, e, a) } if e, a := 0, req.RetryCount; e != a { t.Errorf("%d, expect retry count to be %d, got %d", i, e, a) } } } func Test501NotRetrying(t *testing.T) { reqNum := 0 reqs := []http.Response{ {StatusCode: 500, Body: body(`{"__type":"UnknownError","message":"An error occurred."}`)}, {StatusCode: 501, Body: body(`{"__type":"NotImplemented","message":"An error occurred."}`)}, {StatusCode: 200, Body: body(`{"data":"valid"}`)}, } s := awstesting.NewClient(aws.NewConfig().WithMaxRetries(10)) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) s.Handlers.Send.Clear() // mock sending s.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &reqs[reqNum] reqNum++ }) out := &testData{} r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, out) err := r.Send() if err == nil { t.Fatal("expect error, but got none") } aerr := err.(awserr.Error) if e, a := "NotImplemented", aerr.Code(); e != a { t.Errorf("expected error code %q, but received %q", e, a) } if e, a := 1, r.RetryCount; e != a { t.Errorf("expect %d retry count, got %d", e, a) } } func TestRequestNoConnection(t *testing.T) { port, err := getFreePort() if err != nil { t.Fatalf("failed to get free port for test") } s := awstesting.NewClient(aws.NewConfig(). WithMaxRetries(10). WithEndpoint("https://localhost:" + strconv.Itoa(port)). WithSleepDelay(func(time.Duration) {}), ) s.Handlers.Validate.Clear() s.Handlers.Unmarshal.PushBack(unmarshal) s.Handlers.UnmarshalError.PushBack(unmarshalError) out := &testData{} r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, out) if err = r.Send(); err == nil { t.Fatal("expect error, but got none") } t.Logf("Error, %v", err) awsError := err.(awserr.Error) origError := awsError.OrigErr() t.Logf("Orig Error: %#v of type %T", origError, origError) if e, a := 10, r.RetryCount; e != a { t.Errorf("expect %v retry count, got %v", e, a) } } func TestRequestBodySeekFails(t *testing.T) { s := awstesting.NewClient() s.Handlers.Validate.Clear() s.Handlers.Build.Clear() out := &testData{} r := s.NewRequest(&request.Operation{Name: "Operation"}, nil, out) r.SetReaderBody(&stubSeekFail{ Err: fmt.Errorf("failed to seek reader"), }) err := r.Send() if err == nil { t.Fatal("expect error, but got none") } aerr := err.(awserr.Error) if e, a := request.ErrCodeSerialization, aerr.Code(); e != a { t.Errorf("expect %v error code, got %v", e, a) } } func TestRequestEndpointWithDefaultPort(t *testing.T) { s := awstesting.NewClient(&aws.Config{ Endpoint: aws.String("https://example.test:443"), }) r := s.NewRequest(&request.Operation{ Name: "FooBar", HTTPMethod: "GET", HTTPPath: "/", }, nil, nil) r.Handlers.Validate.Clear() r.Handlers.ValidateResponse.Clear() r.Handlers.Send.Clear() r.Handlers.Send.PushFront(func(r *request.Request) { req := r.HTTPRequest if e, a := "example.test", req.Host; e != a { t.Errorf("expected %v, got %v", e, a) } if e, a := "https://example.test:443/", req.URL.String(); e != a { t.Errorf("expected %v, got %v", e, a) } }) err := r.Send() if err != nil { t.Fatalf("expected no error, got %v", err) } } func TestRequestEndpointWithNonDefaultPort(t *testing.T) { s := awstesting.NewClient(&aws.Config{ Endpoint: aws.String("https://example.test:8443"), }) r := s.NewRequest(&request.Operation{ Name: "FooBar", HTTPMethod: "GET", HTTPPath: "/", }, nil, nil) r.Handlers.Validate.Clear() r.Handlers.ValidateResponse.Clear() r.Handlers.Send.Clear() r.Handlers.Send.PushFront(func(r *request.Request) { req := r.HTTPRequest // http.Request.Host should not be set for non-default ports if e, a := "", req.Host; e != a { t.Errorf("expected %v, got %v", e, a) } if e, a := "https://example.test:8443/", req.URL.String(); e != a { t.Errorf("expected %v, got %v", e, a) } }) err := r.Send() if err != nil { t.Fatalf("expected no error, got %v", err) } } func TestRequestMarshaledEndpointWithDefaultPort(t *testing.T) { s := awstesting.NewClient(&aws.Config{ Endpoint: aws.String("https://example.test:443"), }) r := s.NewRequest(&request.Operation{ Name: "FooBar", HTTPMethod: "GET", HTTPPath: "/", }, nil, nil) r.Handlers.Validate.Clear() r.Handlers.ValidateResponse.Clear() r.Handlers.Build.PushBack(func(r *request.Request) { req := r.HTTPRequest req.URL.Host = "foo." + req.URL.Host }) r.Handlers.Send.Clear() r.Handlers.Send.PushFront(func(r *request.Request) { req := r.HTTPRequest if e, a := "foo.example.test", req.Host; e != a { t.Errorf("expected %v, got %v", e, a) } if e, a := "https://foo.example.test:443/", req.URL.String(); e != a { t.Errorf("expected %v, got %v", e, a) } }) err := r.Send() if err != nil { t.Fatalf("expected no error, got %v", err) } } func TestRequestMarshaledEndpointWithNonDefaultPort(t *testing.T) { s := awstesting.NewClient(&aws.Config{ Endpoint: aws.String("https://example.test:8443"), }) r := s.NewRequest(&request.Operation{ Name: "FooBar", HTTPMethod: "GET", HTTPPath: "/", }, nil, nil) r.Handlers.Validate.Clear() r.Handlers.ValidateResponse.Clear() r.Handlers.Build.PushBack(func(r *request.Request) { req := r.HTTPRequest req.URL.Host = "foo." + req.URL.Host }) r.Handlers.Send.Clear() r.Handlers.Send.PushFront(func(r *request.Request) { req := r.HTTPRequest // http.Request.Host should not be set for non-default ports if e, a := "", req.Host; e != a { t.Errorf("expected %v, got %v", e, a) } if e, a := "https://foo.example.test:8443/", req.URL.String(); e != a { t.Errorf("expected %v, got %v", e, a) } }) err := r.Send() if err != nil { t.Fatalf("expected no error, got %v", err) } } type stubSeekFail struct { Err error } func (f *stubSeekFail) Read(b []byte) (int, error) { return len(b), nil } func (f *stubSeekFail) ReadAt(b []byte, offset int64) (int, error) { return len(b), nil } func (f *stubSeekFail) Seek(offset int64, mode int) (int64, error) { return 0, f.Err } func getFreePort() (int, error) { l, err := net.Listen("tcp", ":0") if err != nil { return 0, err } defer l.Close() strAddr := l.Addr().String() parts := strings.Split(strAddr, ":") strPort := parts[len(parts)-1] port, err := strconv.ParseInt(strPort, 10, 32) if err != nil { return 0, err } return int(port), nil }
1,290
session-manager-plugin
aws
Go
package request import ( "net" "net/url" "strings" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" ) // Retryer provides the interface drive the SDK's request retry behavior. The // Retryer implementation is responsible for implementing exponential backoff, // and determine if a request API error should be retried. // // client.DefaultRetryer is the SDK's default implementation of the Retryer. It // uses the which uses the Request.IsErrorRetryable and Request.IsErrorThrottle // methods to determine if the request is retried. type Retryer interface { // RetryRules return the retry delay that should be used by the SDK before // making another request attempt for the failed request. RetryRules(*Request) time.Duration // ShouldRetry returns if the failed request is retryable. // // Implementations may consider request attempt count when determining if a // request is retryable, but the SDK will use MaxRetries to limit the // number of attempts a request are made. ShouldRetry(*Request) bool // MaxRetries is the number of times a request may be retried before // failing. MaxRetries() int } // WithRetryer sets a Retryer value to the given Config returning the Config // value for chaining. The value must not be nil. func WithRetryer(cfg *aws.Config, retryer Retryer) *aws.Config { if retryer == nil { if cfg.Logger != nil { cfg.Logger.Log("ERROR: Request.WithRetryer called with nil retryer. Replacing with retry disabled Retryer.") } retryer = noOpRetryer{} } cfg.Retryer = retryer return cfg } // noOpRetryer is a internal no op retryer used when a request is created // without a retryer. // // Provides a retryer that performs no retries. // It should be used when we do not want retries to be performed. type noOpRetryer struct{} // MaxRetries returns the number of maximum returns the service will use to make // an individual API; For NoOpRetryer the MaxRetries will always be zero. func (d noOpRetryer) MaxRetries() int { return 0 } // ShouldRetry will always return false for NoOpRetryer, as it should never retry. func (d noOpRetryer) ShouldRetry(_ *Request) bool { return false } // RetryRules returns the delay duration before retrying this request again; // since NoOpRetryer does not retry, RetryRules always returns 0. func (d noOpRetryer) RetryRules(_ *Request) time.Duration { return 0 } // retryableCodes is a collection of service response codes which are retry-able // without any further action. var retryableCodes = map[string]struct{}{ ErrCodeRequestError: {}, "RequestTimeout": {}, ErrCodeResponseTimeout: {}, "RequestTimeoutException": {}, // Glacier's flavor of RequestTimeout } var throttleCodes = map[string]struct{}{ "ProvisionedThroughputExceededException": {}, "ThrottledException": {}, // SNS, XRay, ResourceGroupsTagging API "Throttling": {}, "ThrottlingException": {}, "RequestLimitExceeded": {}, "RequestThrottled": {}, "RequestThrottledException": {}, "TooManyRequestsException": {}, // Lambda functions "PriorRequestNotComplete": {}, // Route53 "TransactionInProgressException": {}, "EC2ThrottledException": {}, // EC2 } // credsExpiredCodes is a collection of error codes which signify the credentials // need to be refreshed. Expired tokens require refreshing of credentials, and // resigning before the request can be retried. var credsExpiredCodes = map[string]struct{}{ "ExpiredToken": {}, "ExpiredTokenException": {}, "RequestExpired": {}, // EC2 Only } func isCodeThrottle(code string) bool { _, ok := throttleCodes[code] return ok } func isCodeRetryable(code string) bool { if _, ok := retryableCodes[code]; ok { return true } return isCodeExpiredCreds(code) } func isCodeExpiredCreds(code string) bool { _, ok := credsExpiredCodes[code] return ok } var validParentCodes = map[string]struct{}{ ErrCodeSerialization: {}, ErrCodeRead: {}, } func isNestedErrorRetryable(parentErr awserr.Error) bool { if parentErr == nil { return false } if _, ok := validParentCodes[parentErr.Code()]; !ok { return false } err := parentErr.OrigErr() if err == nil { return false } if aerr, ok := err.(awserr.Error); ok { return isCodeRetryable(aerr.Code()) } if t, ok := err.(temporary); ok { return t.Temporary() || isErrConnectionReset(err) } return isErrConnectionReset(err) } // IsErrorRetryable returns whether the error is retryable, based on its Code. // Returns false if error is nil. func IsErrorRetryable(err error) bool { if err == nil { return false } return shouldRetryError(err) } type temporary interface { Temporary() bool } func shouldRetryError(origErr error) bool { switch err := origErr.(type) { case awserr.Error: if err.Code() == CanceledErrorCode { return false } if isNestedErrorRetryable(err) { return true } origErr := err.OrigErr() var shouldRetry bool if origErr != nil { shouldRetry = shouldRetryError(origErr) if err.Code() == ErrCodeRequestError && !shouldRetry { return false } } if isCodeRetryable(err.Code()) { return true } return shouldRetry case *url.Error: if strings.Contains(err.Error(), "connection refused") { // Refused connections should be retried as the service may not yet // be running on the port. Go TCP dial considers refused // connections as not temporary. return true } // *url.Error only implements Temporary after golang 1.6 but since // url.Error only wraps the error: return shouldRetryError(err.Err) case temporary: if netErr, ok := err.(*net.OpError); ok && netErr.Op == "dial" { return true } // If the error is temporary, we want to allow continuation of the // retry process return err.Temporary() || isErrConnectionReset(origErr) case nil: // `awserr.Error.OrigErr()` can be nil, meaning there was an error but // because we don't know the cause, it is marked as retryable. See // TestRequest4xxUnretryable for an example. return true default: switch err.Error() { case "net/http: request canceled", "net/http: request canceled while waiting for connection": // known 1.5 error case when an http request is cancelled return false } // here we don't know the error; so we allow a retry. return true } } // IsErrorThrottle returns whether the error is to be throttled based on its code. // Returns false if error is nil. func IsErrorThrottle(err error) bool { if aerr, ok := err.(awserr.Error); ok && aerr != nil { return isCodeThrottle(aerr.Code()) } return false } // IsErrorExpiredCreds returns whether the error code is a credential expiry // error. Returns false if error is nil. func IsErrorExpiredCreds(err error) bool { if aerr, ok := err.(awserr.Error); ok && aerr != nil { return isCodeExpiredCreds(aerr.Code()) } return false } // IsErrorRetryable returns whether the error is retryable, based on its Code. // Returns false if the request has no Error set. // // Alias for the utility function IsErrorRetryable func (r *Request) IsErrorRetryable() bool { if isErrCode(r.Error, r.RetryErrorCodes) { return true } // HTTP response status code 501 should not be retried. // 501 represents Not Implemented which means the request method is not // supported by the server and cannot be handled. if r.HTTPResponse != nil { // HTTP response status code 500 represents internal server error and // should be retried without any throttle. if r.HTTPResponse.StatusCode == 500 { return true } } return IsErrorRetryable(r.Error) } // IsErrorThrottle returns whether the error is to be throttled based on its // code. Returns false if the request has no Error set. // // Alias for the utility function IsErrorThrottle func (r *Request) IsErrorThrottle() bool { if isErrCode(r.Error, r.ThrottleErrorCodes) { return true } if r.HTTPResponse != nil { switch r.HTTPResponse.StatusCode { case 429, // error caused due to too many requests 502, // Bad Gateway error should be throttled 503, // caused when service is unavailable 504: // error occurred due to gateway timeout return true } } return IsErrorThrottle(r.Error) } func isErrCode(err error, codes []string) bool { if aerr, ok := err.(awserr.Error); ok && aerr != nil { for _, code := range codes { if code == aerr.Code() { return true } } } return false } // IsErrorExpired returns whether the error code is a credential expiry error. // Returns false if the request has no Error set. // // Alias for the utility function IsErrorExpiredCreds func (r *Request) IsErrorExpired() bool { return IsErrorExpiredCreds(r.Error) }
310
session-manager-plugin
aws
Go
package request import ( "errors" "fmt" "net/http" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client/metadata" ) func TestRequestIsErrorThrottle(t *testing.T) { cases := []struct { Err error Throttle bool Req Request }{ { Err: awserr.New("ProvisionedThroughputExceededException", "", nil), Throttle: true, }, { Err: awserr.New("ThrottledException", "", nil), Throttle: true, }, { Err: awserr.New("Throttling", "", nil), Throttle: true, }, { Err: awserr.New("ThrottlingException", "", nil), Throttle: true, }, { Err: awserr.New("RequestLimitExceeded", "", nil), Throttle: true, }, { Err: awserr.New("RequestThrottled", "", nil), Throttle: true, }, { Err: awserr.New("TooManyRequestsException", "", nil), Throttle: true, }, { Err: awserr.New("PriorRequestNotComplete", "", nil), Throttle: true, }, { Err: awserr.New("TransactionInProgressException", "", nil), Throttle: true, }, { Err: awserr.New("EC2ThrottledException", "", nil), Throttle: true, }, { Err: awserr.NewRequestFailure( awserr.New(ErrCodeSerialization, "some error", awserr.NewUnmarshalError(nil, "blah", []byte{}), ), 503, "request-id", ), Req: Request{ HTTPResponse: &http.Response{ StatusCode: 503, Header: http.Header{}, }, }, Throttle: true, }, { Err: awserr.NewRequestFailure( awserr.New(ErrCodeSerialization, "some error", awserr.NewUnmarshalError(nil, "blah", []byte{}), ), 400, "request-id", ), Req: Request{ HTTPResponse: &http.Response{ StatusCode: 400, Header: http.Header{}, }, }, Throttle: false, }, } for i, c := range cases { req := c.Req req.Error = c.Err if e, a := c.Throttle, req.IsErrorThrottle(); e != a { t.Errorf("%d, expect %v to be throttled, was %t", i, c.Err, a) } } } type mockTempError bool func (e mockTempError) Error() string { return fmt.Sprintf("mock temporary error: %t", e.Temporary()) } func (e mockTempError) Temporary() bool { return bool(e) } func TestRequestIsErrorRetryable(t *testing.T) { cases := []struct { Err error Req Request Retryable bool }{ { Err: awserr.New(ErrCodeSerialization, "temporary error", mockTempError(true)), Retryable: true, }, { Err: awserr.New(ErrCodeSerialization, "temporary error", mockTempError(false)), Retryable: false, }, { Err: awserr.New(ErrCodeSerialization, "some error", errors.New("blah")), Retryable: true, }, { Err: awserr.NewRequestFailure( awserr.New(ErrCodeSerialization, "some error", awserr.NewUnmarshalError(nil, "blah", []byte{}), ), 503, "request-id", ), Req: Request{ HTTPResponse: &http.Response{ StatusCode: 503, Header: http.Header{}, }, }, Retryable: false, // classified as throttled not retryable }, { Err: awserr.NewRequestFailure( awserr.New(ErrCodeSerialization, "some error", awserr.NewUnmarshalError(nil, "blah", []byte{}), ), 400, "request-id", ), Req: Request{ HTTPResponse: &http.Response{ StatusCode: 400, Header: http.Header{}, }, }, Retryable: false, }, { Err: awserr.New("SomeError", "some error", nil), Retryable: false, }, { Err: awserr.New(ErrCodeRequestError, "some error", nil), Retryable: true, }, { Err: nil, Retryable: false, }, } for i, c := range cases { req := c.Req req.Error = c.Err if e, a := c.Retryable, req.IsErrorRetryable(); e != a { t.Errorf("%d, expect %v to be retryable, was %t", i, c.Err, a) } } } func TestRequest_NilRetyer(t *testing.T) { clientInfo := metadata.ClientInfo{Endpoint: "https://mock.region.amazonaws.com"} req := New(aws.Config{}, clientInfo, Handlers{}, nil, &Operation{}, nil, nil) if req.Retryer == nil { t.Fatalf("expect retryer to be set") } if e, a := 0, req.MaxRetries(); e != a { t.Errorf("expect no retries, got %v", a) } }
198
session-manager-plugin
aws
Go
package request import ( "io" "time" "github.com/aws/aws-sdk-go/aws/awserr" ) var timeoutErr = awserr.New( ErrCodeResponseTimeout, "read on body has reached the timeout limit", nil, ) type readResult struct { n int err error } // timeoutReadCloser will handle body reads that take too long. // We will return a ErrReadTimeout error if a timeout occurs. type timeoutReadCloser struct { reader io.ReadCloser duration time.Duration } // Read will spin off a goroutine to call the reader's Read method. We will // select on the timer's channel or the read's channel. Whoever completes first // will be returned. func (r *timeoutReadCloser) Read(b []byte) (int, error) { timer := time.NewTimer(r.duration) c := make(chan readResult, 1) go func() { n, err := r.reader.Read(b) timer.Stop() c <- readResult{n: n, err: err} }() select { case data := <-c: return data.n, data.err case <-timer.C: return 0, timeoutErr } } func (r *timeoutReadCloser) Close() error { return r.reader.Close() } const ( // HandlerResponseTimeout is what we use to signify the name of the // response timeout handler. HandlerResponseTimeout = "ResponseTimeoutHandler" ) // adaptToResponseTimeoutError is a handler that will replace any top level error // to a ErrCodeResponseTimeout, if its child is that. func adaptToResponseTimeoutError(req *Request) { if err, ok := req.Error.(awserr.Error); ok { aerr, ok := err.OrigErr().(awserr.Error) if ok && aerr.Code() == ErrCodeResponseTimeout { req.Error = aerr } } } // WithResponseReadTimeout is a request option that will wrap the body in a timeout read closer. // This will allow for per read timeouts. If a timeout occurred, we will return the // ErrCodeResponseTimeout. // // svc.PutObjectWithContext(ctx, params, request.WithTimeoutReadCloser(30 * time.Second) func WithResponseReadTimeout(duration time.Duration) Option { return func(r *Request) { var timeoutHandler = NamedHandler{ HandlerResponseTimeout, func(req *Request) { req.HTTPResponse.Body = &timeoutReadCloser{ reader: req.HTTPResponse.Body, duration: duration, } }} // remove the handler so we are not stomping over any new durations. r.Handlers.Send.RemoveByName(HandlerResponseTimeout) r.Handlers.Send.PushBackNamed(timeoutHandler) r.Handlers.Unmarshal.PushBack(adaptToResponseTimeoutError) r.Handlers.UnmarshalError.PushBack(adaptToResponseTimeoutError) } }
95
session-manager-plugin
aws
Go
package request_test import ( "bytes" "io/ioutil" "net/http" "testing" "time" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/client/metadata" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/aws/signer/v4" "github.com/aws/aws-sdk-go/awstesting/unit" "github.com/aws/aws-sdk-go/private/protocol/jsonrpc" ) func BenchmarkTimeoutReadCloser(b *testing.B) { resp := ` { "Bar": "qux" } ` handlers := request.Handlers{} handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &http.Response{ StatusCode: http.StatusOK, Body: ioutil.NopCloser(bytes.NewBuffer([]byte(resp))), } }) handlers.Sign.PushBackNamed(v4.SignRequestHandler) handlers.Build.PushBackNamed(jsonrpc.BuildHandler) handlers.Unmarshal.PushBackNamed(jsonrpc.UnmarshalHandler) handlers.UnmarshalMeta.PushBackNamed(jsonrpc.UnmarshalMetaHandler) handlers.UnmarshalError.PushBackNamed(jsonrpc.UnmarshalErrorHandler) op := &request.Operation{ Name: "op", HTTPMethod: "POST", HTTPPath: "/", } meta := metadata.ClientInfo{ ServiceName: "fooService", SigningName: "foo", SigningRegion: "foo", Endpoint: "localhost", APIVersion: "2001-01-01", JSONVersion: "1.1", TargetPrefix: "Foo", } req := request.New( *unit.Session.Config, meta, handlers, client.DefaultRetryer{NumMaxRetries: 5}, op, &struct { Foo *string }{}, &struct { Bar *string }{}, ) req.ApplyOptions(request.WithResponseReadTimeout(15 * time.Second)) for i := 0; i < b.N; i++ { err := req.Send() if err != nil { b.Errorf("Expected no error, but received %v", err) } } }
77
session-manager-plugin
aws
Go
package request import ( "bytes" "io" "io/ioutil" "net/http" "net/url" "testing" "time" "github.com/aws/aws-sdk-go/aws/awserr" ) type testReader struct { duration time.Duration count int } func (r *testReader) Read(b []byte) (int, error) { if r.count > 0 { r.count-- return len(b), nil } time.Sleep(r.duration) return 0, io.EOF } func (r *testReader) Close() error { return nil } func TestTimeoutReadCloser(t *testing.T) { reader := timeoutReadCloser{ reader: &testReader{ duration: time.Second, count: 5, }, duration: time.Millisecond, } b := make([]byte, 100) _, err := reader.Read(b) if err != nil { t.Log(err) } } func TestTimeoutReadCloserSameDuration(t *testing.T) { reader := timeoutReadCloser{ reader: &testReader{ duration: time.Millisecond, count: 5, }, duration: time.Millisecond, } b := make([]byte, 100) _, err := reader.Read(b) if err != nil { t.Log(err) } } func TestWithResponseReadTimeout(t *testing.T) { r := Request{ HTTPRequest: &http.Request{ URL: &url.URL{}, }, HTTPResponse: &http.Response{ Body: ioutil.NopCloser(bytes.NewReader(nil)), }, } r.ApplyOptions(WithResponseReadTimeout(time.Second)) err := r.Send() if err != nil { t.Error(err) } v, ok := r.HTTPResponse.Body.(*timeoutReadCloser) if !ok { t.Error("Expected the body to be a timeoutReadCloser") } if v.duration != time.Second { t.Errorf("Expected %v, but receive %v\n", time.Second, v.duration) } } func TestAdaptToResponseTimeout(t *testing.T) { testCases := []struct { childErr error r Request expectedRootCode string }{ { childErr: awserr.New(ErrCodeResponseTimeout, "timeout!", nil), r: Request{ Error: awserr.New("ErrTest", "FooBar", awserr.New(ErrCodeResponseTimeout, "timeout!", nil)), }, expectedRootCode: ErrCodeResponseTimeout, }, { childErr: awserr.New(ErrCodeResponseTimeout+"1", "timeout!", nil), r: Request{ Error: awserr.New("ErrTest", "FooBar", awserr.New(ErrCodeResponseTimeout+"1", "timeout!", nil)), }, expectedRootCode: "ErrTest", }, { r: Request{ Error: awserr.New("ErrTest", "FooBar", nil), }, expectedRootCode: "ErrTest", }, } for i, c := range testCases { adaptToResponseTimeoutError(&c.r) if aerr, ok := c.r.Error.(awserr.Error); !ok { t.Errorf("Case %d: Expected 'awserr', but received %v", i+1, c.r.Error) } else if aerr.Code() != c.expectedRootCode { t.Errorf("Case %d: Expected %q, but received %s", i+1, c.expectedRootCode, aerr.Code()) } } }
123
session-manager-plugin
aws
Go
package request import ( "bytes" "fmt" "github.com/aws/aws-sdk-go/aws/awserr" ) const ( // InvalidParameterErrCode is the error code for invalid parameters errors InvalidParameterErrCode = "InvalidParameter" // ParamRequiredErrCode is the error code for required parameter errors ParamRequiredErrCode = "ParamRequiredError" // ParamMinValueErrCode is the error code for fields with too low of a // number value. ParamMinValueErrCode = "ParamMinValueError" // ParamMinLenErrCode is the error code for fields without enough elements. ParamMinLenErrCode = "ParamMinLenError" // ParamMaxLenErrCode is the error code for value being too long. ParamMaxLenErrCode = "ParamMaxLenError" // ParamFormatErrCode is the error code for a field with invalid // format or characters. ParamFormatErrCode = "ParamFormatInvalidError" ) // Validator provides a way for types to perform validation logic on their // input values that external code can use to determine if a type's values // are valid. type Validator interface { Validate() error } // An ErrInvalidParams provides wrapping of invalid parameter errors found when // validating API operation input parameters. type ErrInvalidParams struct { // Context is the base context of the invalid parameter group. Context string errs []ErrInvalidParam } // Add adds a new invalid parameter error to the collection of invalid // parameters. The context of the invalid parameter will be updated to reflect // this collection. func (e *ErrInvalidParams) Add(err ErrInvalidParam) { err.SetContext(e.Context) e.errs = append(e.errs, err) } // AddNested adds the invalid parameter errors from another ErrInvalidParams // value into this collection. The nested errors will have their nested context // updated and base context to reflect the merging. // // Use for nested validations errors. func (e *ErrInvalidParams) AddNested(nestedCtx string, nested ErrInvalidParams) { for _, err := range nested.errs { err.SetContext(e.Context) err.AddNestedContext(nestedCtx) e.errs = append(e.errs, err) } } // Len returns the number of invalid parameter errors func (e ErrInvalidParams) Len() int { return len(e.errs) } // Code returns the code of the error func (e ErrInvalidParams) Code() string { return InvalidParameterErrCode } // Message returns the message of the error func (e ErrInvalidParams) Message() string { return fmt.Sprintf("%d validation error(s) found.", len(e.errs)) } // Error returns the string formatted form of the invalid parameters. func (e ErrInvalidParams) Error() string { w := &bytes.Buffer{} fmt.Fprintf(w, "%s: %s\n", e.Code(), e.Message()) for _, err := range e.errs { fmt.Fprintf(w, "- %s\n", err.Message()) } return w.String() } // OrigErr returns the invalid parameters as a awserr.BatchedErrors value func (e ErrInvalidParams) OrigErr() error { return awserr.NewBatchError( InvalidParameterErrCode, e.Message(), e.OrigErrs()) } // OrigErrs returns a slice of the invalid parameters func (e ErrInvalidParams) OrigErrs() []error { errs := make([]error, len(e.errs)) for i := 0; i < len(errs); i++ { errs[i] = e.errs[i] } return errs } // An ErrInvalidParam represents an invalid parameter error type. type ErrInvalidParam interface { awserr.Error // Field name the error occurred on. Field() string // SetContext updates the context of the error. SetContext(string) // AddNestedContext updates the error's context to include a nested level. AddNestedContext(string) } type errInvalidParam struct { context string nestedContext string field string code string msg string } // Code returns the error code for the type of invalid parameter. func (e *errInvalidParam) Code() string { return e.code } // Message returns the reason the parameter was invalid, and its context. func (e *errInvalidParam) Message() string { return fmt.Sprintf("%s, %s.", e.msg, e.Field()) } // Error returns the string version of the invalid parameter error. func (e *errInvalidParam) Error() string { return fmt.Sprintf("%s: %s", e.code, e.Message()) } // OrigErr returns nil, Implemented for awserr.Error interface. func (e *errInvalidParam) OrigErr() error { return nil } // Field Returns the field and context the error occurred. func (e *errInvalidParam) Field() string { field := e.context if len(field) > 0 { field += "." } if len(e.nestedContext) > 0 { field += fmt.Sprintf("%s.", e.nestedContext) } field += e.field return field } // SetContext updates the base context of the error. func (e *errInvalidParam) SetContext(ctx string) { e.context = ctx } // AddNestedContext prepends a context to the field's path. func (e *errInvalidParam) AddNestedContext(ctx string) { if len(e.nestedContext) == 0 { e.nestedContext = ctx } else { e.nestedContext = fmt.Sprintf("%s.%s", ctx, e.nestedContext) } } // An ErrParamRequired represents an required parameter error. type ErrParamRequired struct { errInvalidParam } // NewErrParamRequired creates a new required parameter error. func NewErrParamRequired(field string) *ErrParamRequired { return &ErrParamRequired{ errInvalidParam{ code: ParamRequiredErrCode, field: field, msg: fmt.Sprintf("missing required field"), }, } } // An ErrParamMinValue represents a minimum value parameter error. type ErrParamMinValue struct { errInvalidParam min float64 } // NewErrParamMinValue creates a new minimum value parameter error. func NewErrParamMinValue(field string, min float64) *ErrParamMinValue { return &ErrParamMinValue{ errInvalidParam: errInvalidParam{ code: ParamMinValueErrCode, field: field, msg: fmt.Sprintf("minimum field value of %v", min), }, min: min, } } // MinValue returns the field's require minimum value. // // float64 is returned for both int and float min values. func (e *ErrParamMinValue) MinValue() float64 { return e.min } // An ErrParamMinLen represents a minimum length parameter error. type ErrParamMinLen struct { errInvalidParam min int } // NewErrParamMinLen creates a new minimum length parameter error. func NewErrParamMinLen(field string, min int) *ErrParamMinLen { return &ErrParamMinLen{ errInvalidParam: errInvalidParam{ code: ParamMinLenErrCode, field: field, msg: fmt.Sprintf("minimum field size of %v", min), }, min: min, } } // MinLen returns the field's required minimum length. func (e *ErrParamMinLen) MinLen() int { return e.min } // An ErrParamMaxLen represents a maximum length parameter error. type ErrParamMaxLen struct { errInvalidParam max int } // NewErrParamMaxLen creates a new maximum length parameter error. func NewErrParamMaxLen(field string, max int, value string) *ErrParamMaxLen { return &ErrParamMaxLen{ errInvalidParam: errInvalidParam{ code: ParamMaxLenErrCode, field: field, msg: fmt.Sprintf("maximum size of %v, %v", max, value), }, max: max, } } // MaxLen returns the field's required minimum length. func (e *ErrParamMaxLen) MaxLen() int { return e.max } // An ErrParamFormat represents a invalid format parameter error. type ErrParamFormat struct { errInvalidParam format string } // NewErrParamFormat creates a new invalid format parameter error. func NewErrParamFormat(field string, format, value string) *ErrParamFormat { return &ErrParamFormat{ errInvalidParam: errInvalidParam{ code: ParamFormatErrCode, field: field, msg: fmt.Sprintf("format %v, %v", format, value), }, format: format, } } // Format returns the field's required format. func (e *ErrParamFormat) Format() string { return e.format }
287
session-manager-plugin
aws
Go
package request import ( "fmt" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/awsutil" ) // WaiterResourceNotReadyErrorCode is the error code returned by a waiter when // the waiter's max attempts have been exhausted. const WaiterResourceNotReadyErrorCode = "ResourceNotReady" // A WaiterOption is a function that will update the Waiter value's fields to // configure the waiter. type WaiterOption func(*Waiter) // WithWaiterMaxAttempts returns the maximum number of times the waiter should // attempt to check the resource for the target state. func WithWaiterMaxAttempts(max int) WaiterOption { return func(w *Waiter) { w.MaxAttempts = max } } // WaiterDelay will return a delay the waiter should pause between attempts to // check the resource state. The passed in attempt is the number of times the // Waiter has checked the resource state. // // Attempt is the number of attempts the Waiter has made checking the resource // state. type WaiterDelay func(attempt int) time.Duration // ConstantWaiterDelay returns a WaiterDelay that will always return a constant // delay the waiter should use between attempts. It ignores the number of // attempts made. func ConstantWaiterDelay(delay time.Duration) WaiterDelay { return func(attempt int) time.Duration { return delay } } // WithWaiterDelay will set the Waiter to use the WaiterDelay passed in. func WithWaiterDelay(delayer WaiterDelay) WaiterOption { return func(w *Waiter) { w.Delay = delayer } } // WithWaiterLogger returns a waiter option to set the logger a waiter // should use to log warnings and errors to. func WithWaiterLogger(logger aws.Logger) WaiterOption { return func(w *Waiter) { w.Logger = logger } } // WithWaiterRequestOptions returns a waiter option setting the request // options for each request the waiter makes. Appends to waiter's request // options already set. func WithWaiterRequestOptions(opts ...Option) WaiterOption { return func(w *Waiter) { w.RequestOptions = append(w.RequestOptions, opts...) } } // A Waiter provides the functionality to perform a blocking call which will // wait for a resource state to be satisfied by a service. // // This type should not be used directly. The API operations provided in the // service packages prefixed with "WaitUntil" should be used instead. type Waiter struct { Name string Acceptors []WaiterAcceptor Logger aws.Logger MaxAttempts int Delay WaiterDelay RequestOptions []Option NewRequest func([]Option) (*Request, error) SleepWithContext func(aws.Context, time.Duration) error } // ApplyOptions updates the waiter with the list of waiter options provided. func (w *Waiter) ApplyOptions(opts ...WaiterOption) { for _, fn := range opts { fn(w) } } // WaiterState are states the waiter uses based on WaiterAcceptor definitions // to identify if the resource state the waiter is waiting on has occurred. type WaiterState int // String returns the string representation of the waiter state. func (s WaiterState) String() string { switch s { case SuccessWaiterState: return "success" case FailureWaiterState: return "failure" case RetryWaiterState: return "retry" default: return "unknown waiter state" } } // States the waiter acceptors will use to identify target resource states. const ( SuccessWaiterState WaiterState = iota // waiter successful FailureWaiterState // waiter failed RetryWaiterState // waiter needs to be retried ) // WaiterMatchMode is the mode that the waiter will use to match the WaiterAcceptor // definition's Expected attribute. type WaiterMatchMode int // Modes the waiter will use when inspecting API response to identify target // resource states. const ( PathAllWaiterMatch WaiterMatchMode = iota // match on all paths PathWaiterMatch // match on specific path PathAnyWaiterMatch // match on any path PathListWaiterMatch // match on list of paths StatusWaiterMatch // match on status code ErrorWaiterMatch // match on error ) // String returns the string representation of the waiter match mode. func (m WaiterMatchMode) String() string { switch m { case PathAllWaiterMatch: return "pathAll" case PathWaiterMatch: return "path" case PathAnyWaiterMatch: return "pathAny" case PathListWaiterMatch: return "pathList" case StatusWaiterMatch: return "status" case ErrorWaiterMatch: return "error" default: return "unknown waiter match mode" } } // WaitWithContext will make requests for the API operation using NewRequest to // build API requests. The request's response will be compared against the // Waiter's Acceptors to determine the successful state of the resource the // waiter is inspecting. // // The passed in context must not be nil. If it is nil a panic will occur. The // Context will be used to cancel the waiter's pending requests and retry delays. // Use aws.BackgroundContext if no context is available. // // The waiter will continue until the target state defined by the Acceptors, // or the max attempts expires. // // Will return the WaiterResourceNotReadyErrorCode error code if the waiter's // retryer ShouldRetry returns false. This normally will happen when the max // wait attempts expires. func (w Waiter) WaitWithContext(ctx aws.Context) error { for attempt := 1; ; attempt++ { req, err := w.NewRequest(w.RequestOptions) if err != nil { waiterLogf(w.Logger, "unable to create request %v", err) return err } req.Handlers.Build.PushBack(MakeAddToUserAgentFreeFormHandler("Waiter")) err = req.Send() // See if any of the acceptors match the request's response, or error for _, a := range w.Acceptors { if matched, matchErr := a.match(w.Name, w.Logger, req, err); matched { return matchErr } } // The Waiter should only check the resource state MaxAttempts times // This is here instead of in the for loop above to prevent delaying // unnecessary when the waiter will not retry. if attempt == w.MaxAttempts { break } // Delay to wait before inspecting the resource again delay := w.Delay(attempt) if sleepFn := req.Config.SleepDelay; sleepFn != nil { // Support SleepDelay for backwards compatibility and testing sleepFn(delay) } else { sleepCtxFn := w.SleepWithContext if sleepCtxFn == nil { sleepCtxFn = aws.SleepWithContext } if err := sleepCtxFn(ctx, delay); err != nil { return awserr.New(CanceledErrorCode, "waiter context canceled", err) } } } return awserr.New(WaiterResourceNotReadyErrorCode, "exceeded wait attempts", nil) } // A WaiterAcceptor provides the information needed to wait for an API operation // to complete. type WaiterAcceptor struct { State WaiterState Matcher WaiterMatchMode Argument string Expected interface{} } // match returns if the acceptor found a match with the passed in request // or error. True is returned if the acceptor made a match, error is returned // if there was an error attempting to perform the match. func (a *WaiterAcceptor) match(name string, l aws.Logger, req *Request, err error) (bool, error) { result := false var vals []interface{} switch a.Matcher { case PathAllWaiterMatch, PathWaiterMatch: // Require all matches to be equal for result to match vals, _ = awsutil.ValuesAtPath(req.Data, a.Argument) if len(vals) == 0 { break } result = true for _, val := range vals { if !awsutil.DeepEqual(val, a.Expected) { result = false break } } case PathAnyWaiterMatch: // Only a single match needs to equal for the result to match vals, _ = awsutil.ValuesAtPath(req.Data, a.Argument) for _, val := range vals { if awsutil.DeepEqual(val, a.Expected) { result = true break } } case PathListWaiterMatch: // ignored matcher case StatusWaiterMatch: s := a.Expected.(int) result = s == req.HTTPResponse.StatusCode case ErrorWaiterMatch: if aerr, ok := err.(awserr.Error); ok { result = aerr.Code() == a.Expected.(string) } default: waiterLogf(l, "WARNING: Waiter %s encountered unexpected matcher: %s", name, a.Matcher) } if !result { // If there was no matching result found there is nothing more to do // for this response, retry the request. return false, nil } switch a.State { case SuccessWaiterState: // waiter completed return true, nil case FailureWaiterState: // Waiter failure state triggered return true, awserr.New(WaiterResourceNotReadyErrorCode, "failed waiting for successful resource state", err) case RetryWaiterState: // clear the error and retry the operation return false, nil default: waiterLogf(l, "WARNING: Waiter %s encountered unexpected state: %s", name, a.State) return false, nil } } func waiterLogf(logger aws.Logger, msg string, args ...interface{}) { if logger != nil { logger.Log(fmt.Sprintf(msg, args...)) } }
296
session-manager-plugin
aws
Go
package request_test import ( "bytes" "fmt" "io/ioutil" "net/http" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/client" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/awstesting" "github.com/aws/aws-sdk-go/awstesting/unit" "github.com/aws/aws-sdk-go/service/s3" ) type mockClient struct { *client.Client } type MockInput struct{} type MockOutput struct { States []*MockState } type MockState struct { State *string } func (c *mockClient) MockRequest(input *MockInput) (*request.Request, *MockOutput) { op := &request.Operation{ Name: "Mock", HTTPMethod: "POST", HTTPPath: "/", } if input == nil { input = &MockInput{} } output := &MockOutput{} req := c.NewRequest(op, input, output) req.Data = output return req, output } func BuildNewMockRequest(c *mockClient, in *MockInput) func([]request.Option) (*request.Request, error) { return func(opts []request.Option) (*request.Request, error) { req, _ := c.MockRequest(in) req.ApplyOptions(opts...) return req, nil } } func TestWaiterPathAll(t *testing.T) { svc := &mockClient{Client: awstesting.NewClient(&aws.Config{ Region: aws.String("mock-region"), })} svc.Handlers.Send.Clear() // mock sending svc.Handlers.Unmarshal.Clear() svc.Handlers.UnmarshalMeta.Clear() svc.Handlers.ValidateResponse.Clear() reqNum := 0 resps := []*MockOutput{ { // Request 1 States: []*MockState{ {State: aws.String("pending")}, {State: aws.String("pending")}, }, }, { // Request 2 States: []*MockState{ {State: aws.String("running")}, {State: aws.String("pending")}, }, }, { // Request 3 States: []*MockState{ {State: aws.String("running")}, {State: aws.String("running")}, }, }, } numBuiltReq := 0 svc.Handlers.Build.PushBack(func(r *request.Request) { numBuiltReq++ }) svc.Handlers.Unmarshal.PushBack(func(r *request.Request) { if reqNum >= len(resps) { t.Errorf("too many polling requests made") return } r.Data = resps[reqNum] reqNum++ }) w := request.Waiter{ MaxAttempts: 10, Delay: request.ConstantWaiterDelay(0), SleepWithContext: aws.SleepWithContext, Acceptors: []request.WaiterAcceptor{ { State: request.SuccessWaiterState, Matcher: request.PathAllWaiterMatch, Argument: "States[].State", Expected: "running", }, }, NewRequest: BuildNewMockRequest(svc, &MockInput{}), } err := w.WaitWithContext(aws.BackgroundContext()) if err != nil { t.Errorf("expect nil, %v", err) } if e, a := 3, numBuiltReq; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := 3, reqNum; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestWaiterPath(t *testing.T) { svc := &mockClient{Client: awstesting.NewClient(&aws.Config{ Region: aws.String("mock-region"), })} svc.Handlers.Send.Clear() // mock sending svc.Handlers.Unmarshal.Clear() svc.Handlers.UnmarshalMeta.Clear() svc.Handlers.ValidateResponse.Clear() reqNum := 0 resps := []*MockOutput{ { // Request 1 States: []*MockState{ {State: aws.String("pending")}, {State: aws.String("pending")}, }, }, { // Request 2 States: []*MockState{ {State: aws.String("running")}, {State: aws.String("pending")}, }, }, { // Request 3 States: []*MockState{ {State: aws.String("running")}, {State: aws.String("running")}, }, }, } numBuiltReq := 0 svc.Handlers.Build.PushBack(func(r *request.Request) { numBuiltReq++ }) svc.Handlers.Unmarshal.PushBack(func(r *request.Request) { if reqNum >= len(resps) { t.Errorf("too many polling requests made") return } r.Data = resps[reqNum] reqNum++ }) w := request.Waiter{ MaxAttempts: 10, Delay: request.ConstantWaiterDelay(0), SleepWithContext: aws.SleepWithContext, Acceptors: []request.WaiterAcceptor{ { State: request.SuccessWaiterState, Matcher: request.PathWaiterMatch, Argument: "States[].State", Expected: "running", }, }, NewRequest: BuildNewMockRequest(svc, &MockInput{}), } err := w.WaitWithContext(aws.BackgroundContext()) if err != nil { t.Errorf("expect nil, %v", err) } if e, a := 3, numBuiltReq; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := 3, reqNum; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestWaiterFailure(t *testing.T) { svc := &mockClient{Client: awstesting.NewClient(&aws.Config{ Region: aws.String("mock-region"), })} svc.Handlers.Send.Clear() // mock sending svc.Handlers.Unmarshal.Clear() svc.Handlers.UnmarshalMeta.Clear() svc.Handlers.ValidateResponse.Clear() reqNum := 0 resps := []*MockOutput{ { // Request 1 States: []*MockState{ {State: aws.String("pending")}, {State: aws.String("pending")}, }, }, { // Request 2 States: []*MockState{ {State: aws.String("running")}, {State: aws.String("pending")}, }, }, { // Request 3 States: []*MockState{ {State: aws.String("running")}, {State: aws.String("stopping")}, }, }, } numBuiltReq := 0 svc.Handlers.Build.PushBack(func(r *request.Request) { numBuiltReq++ }) svc.Handlers.Unmarshal.PushBack(func(r *request.Request) { if reqNum >= len(resps) { t.Errorf("too many polling requests made") return } r.Data = resps[reqNum] reqNum++ }) w := request.Waiter{ MaxAttempts: 10, Delay: request.ConstantWaiterDelay(0), SleepWithContext: aws.SleepWithContext, Acceptors: []request.WaiterAcceptor{ { State: request.SuccessWaiterState, Matcher: request.PathAllWaiterMatch, Argument: "States[].State", Expected: "running", }, { State: request.FailureWaiterState, Matcher: request.PathAnyWaiterMatch, Argument: "States[].State", Expected: "stopping", }, }, NewRequest: BuildNewMockRequest(svc, &MockInput{}), } err := w.WaitWithContext(aws.BackgroundContext()).(awserr.Error) if err == nil { t.Errorf("expect error") } if e, a := request.WaiterResourceNotReadyErrorCode, err.Code(); e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := "failed waiting for successful resource state", err.Message(); e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := 3, numBuiltReq; e != a { t.Errorf("expect %v, got %v", e, a) } if e, a := 3, reqNum; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestWaiterError(t *testing.T) { svc := &mockClient{Client: awstesting.NewClient(&aws.Config{ Region: aws.String("mock-region"), })} svc.Handlers.Send.Clear() // mock sending svc.Handlers.Unmarshal.Clear() svc.Handlers.UnmarshalMeta.Clear() svc.Handlers.UnmarshalError.Clear() svc.Handlers.ValidateResponse.Clear() reqNum := 0 resps := []*MockOutput{ { // Request 1 States: []*MockState{ {State: aws.String("pending")}, {State: aws.String("pending")}, }, }, { // Request 1, error case retry }, { // Request 2, error case failure }, { // Request 3 States: []*MockState{ {State: aws.String("running")}, {State: aws.String("running")}, }, }, } reqErrs := make([]error, len(resps)) reqErrs[1] = awserr.New("MockException", "mock exception message", nil) reqErrs[2] = awserr.New("FailureException", "mock failure exception message", nil) numBuiltReq := 0 svc.Handlers.Build.PushBack(func(r *request.Request) { numBuiltReq++ }) svc.Handlers.Send.PushBack(func(r *request.Request) { code := 200 if reqNum == 1 { code = 400 } r.HTTPResponse = &http.Response{ StatusCode: code, Status: http.StatusText(code), Body: ioutil.NopCloser(bytes.NewReader([]byte{})), } }) svc.Handlers.Unmarshal.PushBack(func(r *request.Request) { if reqNum >= len(resps) { t.Errorf("too many polling requests made") return } r.Data = resps[reqNum] reqNum++ }) svc.Handlers.UnmarshalMeta.PushBack(func(r *request.Request) { // If there was an error unmarshal error will be called instead of unmarshal // need to increment count here also if err := reqErrs[reqNum]; err != nil { r.Error = err reqNum++ } }) w := request.Waiter{ MaxAttempts: 10, Delay: request.ConstantWaiterDelay(0), SleepWithContext: aws.SleepWithContext, Acceptors: []request.WaiterAcceptor{ { State: request.SuccessWaiterState, Matcher: request.PathAllWaiterMatch, Argument: "States[].State", Expected: "running", }, { State: request.RetryWaiterState, Matcher: request.ErrorWaiterMatch, Argument: "", Expected: "MockException", }, { State: request.FailureWaiterState, Matcher: request.ErrorWaiterMatch, Argument: "", Expected: "FailureException", }, }, NewRequest: BuildNewMockRequest(svc, &MockInput{}), } err := w.WaitWithContext(aws.BackgroundContext()) if err == nil { t.Fatalf("expected error, but did not get one") } aerr := err.(awserr.Error) if e, a := request.WaiterResourceNotReadyErrorCode, aerr.Code(); e != a { t.Errorf("expect %q error code, got %q", e, a) } if e, a := 3, numBuiltReq; e != a { t.Errorf("expect %d built requests got %d", e, a) } if e, a := 3, reqNum; e != a { t.Errorf("expect %d reqNum got %d", e, a) } } func TestWaiterStatus(t *testing.T) { svc := &mockClient{Client: awstesting.NewClient(&aws.Config{ Region: aws.String("mock-region"), })} svc.Handlers.Send.Clear() // mock sending svc.Handlers.Unmarshal.Clear() svc.Handlers.UnmarshalMeta.Clear() svc.Handlers.ValidateResponse.Clear() reqNum := 0 svc.Handlers.Build.PushBack(func(r *request.Request) { reqNum++ }) svc.Handlers.Send.PushBack(func(r *request.Request) { code := 200 if reqNum == 3 { code = 404 r.Error = awserr.New("NotFound", "Not Found", nil) } r.HTTPResponse = &http.Response{ StatusCode: code, Status: http.StatusText(code), Body: ioutil.NopCloser(bytes.NewReader([]byte{})), } }) w := request.Waiter{ MaxAttempts: 10, Delay: request.ConstantWaiterDelay(0), SleepWithContext: aws.SleepWithContext, Acceptors: []request.WaiterAcceptor{ { State: request.SuccessWaiterState, Matcher: request.StatusWaiterMatch, Argument: "", Expected: 404, }, }, NewRequest: BuildNewMockRequest(svc, &MockInput{}), } err := w.WaitWithContext(aws.BackgroundContext()) if err != nil { t.Errorf("expect nil, %v", err) } if e, a := 3, reqNum; e != a { t.Errorf("expect %v, got %v", e, a) } } func TestWaiter_ApplyOptions(t *testing.T) { w := request.Waiter{} logger := aws.NewDefaultLogger() w.ApplyOptions( request.WithWaiterLogger(logger), request.WithWaiterRequestOptions(request.WithLogLevel(aws.LogDebug)), request.WithWaiterMaxAttempts(2), request.WithWaiterDelay(request.ConstantWaiterDelay(5*time.Second)), ) if e, a := logger, w.Logger; e != a { t.Errorf("expect logger to be set, and match, was not, %v, %v", e, a) } if len(w.RequestOptions) != 1 { t.Fatalf("expect request options to be set to only a single option, %v", w.RequestOptions) } r := request.Request{} r.ApplyOptions(w.RequestOptions...) if e, a := aws.LogDebug, r.Config.LogLevel.Value(); e != a { t.Errorf("expect %v loglevel got %v", e, a) } if e, a := 2, w.MaxAttempts; e != a { t.Errorf("expect %d retryer max attempts, got %d", e, a) } if e, a := 5*time.Second, w.Delay(0); e != a { t.Errorf("expect %d retryer delay, got %d", e, a) } } func TestWaiter_WithContextCanceled(t *testing.T) { c := awstesting.NewClient() ctx := &awstesting.FakeContext{DoneCh: make(chan struct{})} reqCount := 0 w := request.Waiter{ Name: "TestWaiter", MaxAttempts: 10, Delay: request.ConstantWaiterDelay(1 * time.Millisecond), SleepWithContext: aws.SleepWithContext, Acceptors: []request.WaiterAcceptor{ { State: request.SuccessWaiterState, Matcher: request.StatusWaiterMatch, Expected: 200, }, }, Logger: aws.NewDefaultLogger(), NewRequest: func(opts []request.Option) (*request.Request, error) { req := c.NewRequest(&request.Operation{Name: "Operation"}, nil, nil) req.HTTPResponse = &http.Response{StatusCode: http.StatusNotFound} req.Handlers.Clear() req.Data = struct{}{} req.Handlers.Send.PushBack(func(r *request.Request) { if reqCount == 1 { ctx.Error = fmt.Errorf("context canceled") close(ctx.DoneCh) } reqCount++ }) return req, nil }, } w.SleepWithContext = func(c aws.Context, delay time.Duration) error { context := c.(*awstesting.FakeContext) select { case <-context.DoneCh: return context.Err() default: return nil } } err := w.WaitWithContext(ctx) if err == nil { t.Fatalf("expect waiter to be canceled.") } aerr := err.(awserr.Error) if e, a := request.CanceledErrorCode, aerr.Code(); e != a { t.Errorf("expect %q error code, got %q", e, a) } if e, a := 2, reqCount; e != a { t.Errorf("expect %d requests, got %d", e, a) } } func TestWaiter_WithContext(t *testing.T) { c := awstesting.NewClient() ctx := &awstesting.FakeContext{DoneCh: make(chan struct{})} reqCount := 0 statuses := []int{http.StatusNotFound, http.StatusOK} w := request.Waiter{ Name: "TestWaiter", MaxAttempts: 10, Delay: request.ConstantWaiterDelay(1 * time.Millisecond), SleepWithContext: aws.SleepWithContext, Acceptors: []request.WaiterAcceptor{ { State: request.SuccessWaiterState, Matcher: request.StatusWaiterMatch, Expected: 200, }, }, Logger: aws.NewDefaultLogger(), NewRequest: func(opts []request.Option) (*request.Request, error) { req := c.NewRequest(&request.Operation{Name: "Operation"}, nil, nil) req.HTTPResponse = &http.Response{StatusCode: statuses[reqCount]} req.Handlers.Clear() req.Data = struct{}{} req.Handlers.Send.PushBack(func(r *request.Request) { if reqCount == 1 { ctx.Error = fmt.Errorf("context canceled") close(ctx.DoneCh) } reqCount++ }) return req, nil }, } err := w.WaitWithContext(ctx) if err != nil { t.Fatalf("expect no error, got %v", err) } if e, a := 2, reqCount; e != a { t.Errorf("expect %d requests, got %d", e, a) } } func TestWaiter_AttemptsExpires(t *testing.T) { c := awstesting.NewClient() ctx := &awstesting.FakeContext{DoneCh: make(chan struct{})} reqCount := 0 w := request.Waiter{ Name: "TestWaiter", MaxAttempts: 2, Delay: request.ConstantWaiterDelay(1 * time.Millisecond), SleepWithContext: aws.SleepWithContext, Acceptors: []request.WaiterAcceptor{ { State: request.SuccessWaiterState, Matcher: request.StatusWaiterMatch, Expected: 200, }, }, Logger: aws.NewDefaultLogger(), NewRequest: func(opts []request.Option) (*request.Request, error) { req := c.NewRequest(&request.Operation{Name: "Operation"}, nil, nil) req.HTTPResponse = &http.Response{StatusCode: http.StatusNotFound} req.Handlers.Clear() req.Data = struct{}{} req.Handlers.Send.PushBack(func(r *request.Request) { reqCount++ }) return req, nil }, } err := w.WaitWithContext(ctx) if err == nil { t.Fatalf("expect error did not get one") } aerr := err.(awserr.Error) if e, a := request.WaiterResourceNotReadyErrorCode, aerr.Code(); e != a { t.Errorf("expect %q error code, got %q", e, a) } if e, a := 2, reqCount; e != a { t.Errorf("expect %d requests, got %d", e, a) } } func TestWaiterNilInput(t *testing.T) { // Code generation doesn't have a great way to verify the code is correct // other than being run via unit tests in the SDK. This should be fixed // So code generation can be validated independently. client := s3.New(unit.Session) client.Handlers.Validate.Clear() client.Handlers.Send.Clear() // mock sending client.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &http.Response{ StatusCode: http.StatusOK, } }) client.Handlers.Unmarshal.Clear() client.Handlers.UnmarshalMeta.Clear() client.Handlers.ValidateResponse.Clear() client.Config.SleepDelay = func(dur time.Duration) {} // Ensure waiters do not panic on nil input. It doesn't make sense to // call a waiter without an input, Validation will err := client.WaitUntilBucketExists(nil) if err != nil { t.Fatalf("expect no error, but got %v", err) } } func TestWaiterWithContextNilInput(t *testing.T) { // Code generation doesn't have a great way to verify the code is correct // other than being run via unit tests in the SDK. This should be fixed // So code generation can be validated independently. client := s3.New(unit.Session) client.Handlers.Validate.Clear() client.Handlers.Send.Clear() // mock sending client.Handlers.Send.PushBack(func(r *request.Request) { r.HTTPResponse = &http.Response{ StatusCode: http.StatusOK, } }) client.Handlers.Unmarshal.Clear() client.Handlers.UnmarshalMeta.Clear() client.Handlers.ValidateResponse.Clear() // Ensure waiters do not panic on nil input ctx := &awstesting.FakeContext{DoneCh: make(chan struct{})} err := client.WaitUntilBucketExistsWithContext(ctx, nil, request.WithWaiterDelay(request.ConstantWaiterDelay(0)), request.WithWaiterMaxAttempts(1), ) if err != nil { t.Fatalf("expect no error, but got %v", err) } }
679
session-manager-plugin
aws
Go
// +build go1.7 package session import ( "net" "net/http" "time" ) // Transport that should be used when a custom CA bundle is specified with the // SDK. func getCABundleTransport() *http.Transport { return &http.Transport{ Proxy: http.ProxyFromEnvironment, DialContext: (&net.Dialer{ Timeout: 30 * time.Second, KeepAlive: 30 * time.Second, DualStack: true, }).DialContext, MaxIdleConns: 100, IdleConnTimeout: 90 * time.Second, TLSHandshakeTimeout: 10 * time.Second, ExpectContinueTimeout: 1 * time.Second, } }
27
session-manager-plugin
aws
Go
// +build !go1.6,go1.5 package session import ( "net" "net/http" "time" ) // Transport that should be used when a custom CA bundle is specified with the // SDK. func getCABundleTransport() *http.Transport { return &http.Transport{ Proxy: http.ProxyFromEnvironment, Dial: (&net.Dialer{ Timeout: 30 * time.Second, KeepAlive: 30 * time.Second, }).Dial, TLSHandshakeTimeout: 10 * time.Second, } }
23
session-manager-plugin
aws
Go
// +build !go1.7,go1.6 package session import ( "net" "net/http" "time" ) // Transport that should be used when a custom CA bundle is specified with the // SDK. func getCABundleTransport() *http.Transport { return &http.Transport{ Proxy: http.ProxyFromEnvironment, Dial: (&net.Dialer{ Timeout: 30 * time.Second, KeepAlive: 30 * time.Second, }).Dial, TLSHandshakeTimeout: 10 * time.Second, ExpectContinueTimeout: 1 * time.Second, } }
24
session-manager-plugin
aws
Go
// +build go1.9 package session import ( "crypto/x509" "io" "net/http" "os" "strings" "testing" "time" "github.com/aws/aws-sdk-go/awstesting" ) func TestNewSession_WithClientTLSCert(t *testing.T) { type testCase struct { // Params setup func(certFilename, keyFilename string) (Options, func(), error) ExpectErr string } cases := map[string]testCase{ "env": { setup: func(certFilename, keyFilename string) (Options, func(), error) { os.Setenv(useClientTLSCert[0], certFilename) os.Setenv(useClientTLSKey[0], keyFilename) return Options{}, func() {}, nil }, }, "env file not found": { setup: func(certFilename, keyFilename string) (Options, func(), error) { os.Setenv(useClientTLSCert[0], "some-cert-file-not-exists") os.Setenv(useClientTLSKey[0], "some-key-file-not-exists") return Options{}, func() {}, nil }, ExpectErr: "LoadClientTLSCertError", }, "env cert file only": { setup: func(certFilename, keyFilename string) (Options, func(), error) { os.Setenv(useClientTLSCert[0], certFilename) return Options{}, func() {}, nil }, ExpectErr: "must both be provided", }, "env key file only": { setup: func(certFilename, keyFilename string) (Options, func(), error) { os.Setenv(useClientTLSKey[0], keyFilename) return Options{}, func() {}, nil }, ExpectErr: "must both be provided", }, "session options": { setup: func(certFilename, keyFilename string) (Options, func(), error) { certFile, err := os.Open(certFilename) if err != nil { return Options{}, nil, err } keyFile, err := os.Open(keyFilename) if err != nil { return Options{}, nil, err } return Options{ ClientTLSCert: certFile, ClientTLSKey: keyFile, }, func() { certFile.Close() keyFile.Close() }, nil }, }, "session cert load error": { setup: func(certFilename, keyFilename string) (Options, func(), error) { certFile, err := os.Open(certFilename) if err != nil { return Options{}, nil, err } keyFile, err := os.Open(keyFilename) if err != nil { return Options{}, nil, err } stat, _ := certFile.Stat() return Options{ ClientTLSCert: io.LimitReader(certFile, stat.Size()/2), ClientTLSKey: keyFile, }, func() { certFile.Close() keyFile.Close() }, nil }, ExpectErr: "unable to load x509 key pair", }, "session key load error": { setup: func(certFilename, keyFilename string) (Options, func(), error) { certFile, err := os.Open(certFilename) if err != nil { return Options{}, nil, err } keyFile, err := os.Open(keyFilename) if err != nil { return Options{}, nil, err } stat, _ := keyFile.Stat() return Options{ ClientTLSCert: certFile, ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), }, func() { certFile.Close() keyFile.Close() }, nil }, ExpectErr: "unable to load x509 key pair", }, } for name, c := range cases { t.Run(name, func(t *testing.T) { // Asserts restoreEnvFn := initSessionTestEnv() defer restoreEnvFn() certFilename, keyFilename, err := awstesting.CreateClientTLSCertFiles() if err != nil { t.Fatalf("failed to create client certificate files, %v", err) } defer func() { if err := awstesting.CleanupTLSBundleFiles(certFilename, keyFilename); err != nil { t.Errorf("failed to cleanup client TLS cert files, %v", err) } }() opts, cleanup, err := c.setup(certFilename, keyFilename) if err != nil { t.Fatalf("test case failed setup, %v", err) } if cleanup != nil { defer cleanup() } server, err := awstesting.NewTLSClientCertServer(http.HandlerFunc( func(w http.ResponseWriter, r *http.Request) { w.WriteHeader(200) })) if err != nil { t.Fatalf("failed to load session, %v", err) } server.StartTLS() defer server.Close() // Give server change to start time.Sleep(time.Second) // Load SDK session with options configured. sess, err := NewSessionWithOptions(opts) if len(c.ExpectErr) != 0 { if err == nil { t.Fatalf("expect error, got none") } if e, a := c.ExpectErr, err.Error(); !strings.Contains(a, e) { t.Fatalf("expect error to contain %v, got %v", e, a) } return } if err != nil { t.Fatalf("expect no error, got %v", err) } // Clients need to add ca bundle for test service. p := x509.NewCertPool() p.AddCert(server.Certificate()) client := sess.Config.HTTPClient client.Transport.(*http.Transport).TLSClientConfig.RootCAs = p // Send request req, _ := http.NewRequest("GET", server.URL, nil) resp, err := client.Do(req) if err != nil { t.Fatalf("failed to send request, %v", err) } if e, a := 200, resp.StatusCode; e != a { t.Errorf("expect %v status code, got %v", e, a) } }) } }
192
session-manager-plugin
aws
Go
package session import ( "fmt" "os" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/credentials/processcreds" "github.com/aws/aws-sdk-go/aws/credentials/ssocreds" "github.com/aws/aws-sdk-go/aws/credentials/stscreds" "github.com/aws/aws-sdk-go/aws/defaults" "github.com/aws/aws-sdk-go/aws/request" "github.com/aws/aws-sdk-go/internal/shareddefaults" ) func resolveCredentials(cfg *aws.Config, envCfg envConfig, sharedCfg sharedConfig, handlers request.Handlers, sessOpts Options, ) (*credentials.Credentials, error) { switch { case len(sessOpts.Profile) != 0: // User explicitly provided an Profile in the session's configuration // so load that profile from shared config first. // Github(aws/aws-sdk-go#2727) return resolveCredsFromProfile(cfg, envCfg, sharedCfg, handlers, sessOpts) case envCfg.Creds.HasKeys(): // Environment credentials return credentials.NewStaticCredentialsFromCreds(envCfg.Creds), nil case len(envCfg.WebIdentityTokenFilePath) != 0: // Web identity token from environment, RoleARN required to also be // set. return assumeWebIdentity(cfg, handlers, envCfg.WebIdentityTokenFilePath, envCfg.RoleARN, envCfg.RoleSessionName, ) default: // Fallback to the "default" credential resolution chain. return resolveCredsFromProfile(cfg, envCfg, sharedCfg, handlers, sessOpts) } } // WebIdentityEmptyRoleARNErr will occur if 'AWS_WEB_IDENTITY_TOKEN_FILE' was set but // 'AWS_ROLE_ARN' was not set. var WebIdentityEmptyRoleARNErr = awserr.New(stscreds.ErrCodeWebIdentity, "role ARN is not set", nil) // WebIdentityEmptyTokenFilePathErr will occur if 'AWS_ROLE_ARN' was set but // 'AWS_WEB_IDENTITY_TOKEN_FILE' was not set. var WebIdentityEmptyTokenFilePathErr = awserr.New(stscreds.ErrCodeWebIdentity, "token file path is not set", nil) func assumeWebIdentity(cfg *aws.Config, handlers request.Handlers, filepath string, roleARN, sessionName string, ) (*credentials.Credentials, error) { if len(filepath) == 0 { return nil, WebIdentityEmptyTokenFilePathErr } if len(roleARN) == 0 { return nil, WebIdentityEmptyRoleARNErr } creds := stscreds.NewWebIdentityCredentials( &Session{ Config: cfg, Handlers: handlers.Copy(), }, roleARN, sessionName, filepath, ) return creds, nil } func resolveCredsFromProfile(cfg *aws.Config, envCfg envConfig, sharedCfg sharedConfig, handlers request.Handlers, sessOpts Options, ) (creds *credentials.Credentials, err error) { switch { case sharedCfg.SourceProfile != nil: // Assume IAM role with credentials source from a different profile. creds, err = resolveCredsFromProfile(cfg, envCfg, *sharedCfg.SourceProfile, handlers, sessOpts, ) case sharedCfg.Creds.HasKeys(): // Static Credentials from Shared Config/Credentials file. creds = credentials.NewStaticCredentialsFromCreds( sharedCfg.Creds, ) case len(sharedCfg.CredentialSource) != 0: creds, err = resolveCredsFromSource(cfg, envCfg, sharedCfg, handlers, sessOpts, ) case len(sharedCfg.WebIdentityTokenFile) != 0: // Credentials from Assume Web Identity token require an IAM Role, and // that roll will be assumed. May be wrapped with another assume role // via SourceProfile. return assumeWebIdentity(cfg, handlers, sharedCfg.WebIdentityTokenFile, sharedCfg.RoleARN, sharedCfg.RoleSessionName, ) case sharedCfg.hasSSOConfiguration(): creds, err = resolveSSOCredentials(cfg, sharedCfg, handlers) case len(sharedCfg.CredentialProcess) != 0: // Get credentials from CredentialProcess creds = processcreds.NewCredentials(sharedCfg.CredentialProcess) default: // Fallback to default credentials provider, include mock errors for // the credential chain so user can identify why credentials failed to // be retrieved. creds = credentials.NewCredentials(&credentials.ChainProvider{ VerboseErrors: aws.BoolValue(cfg.CredentialsChainVerboseErrors), Providers: []credentials.Provider{ &credProviderError{ Err: awserr.New("EnvAccessKeyNotFound", "failed to find credentials in the environment.", nil), }, &credProviderError{ Err: awserr.New("SharedCredsLoad", fmt.Sprintf("failed to load profile, %s.", envCfg.Profile), nil), }, defaults.RemoteCredProvider(*cfg, handlers), }, }) } if err != nil { return nil, err } if len(sharedCfg.RoleARN) > 0 { cfgCp := *cfg cfgCp.Credentials = creds return credsFromAssumeRole(cfgCp, handlers, sharedCfg, sessOpts) } return creds, nil } func resolveSSOCredentials(cfg *aws.Config, sharedCfg sharedConfig, handlers request.Handlers) (*credentials.Credentials, error) { if err := sharedCfg.validateSSOConfiguration(); err != nil { return nil, err } cfgCopy := cfg.Copy() cfgCopy.Region = &sharedCfg.SSORegion return ssocreds.NewCredentials( &Session{ Config: cfgCopy, Handlers: handlers.Copy(), }, sharedCfg.SSOAccountID, sharedCfg.SSORoleName, sharedCfg.SSOStartURL, ), nil } // valid credential source values const ( credSourceEc2Metadata = "Ec2InstanceMetadata" credSourceEnvironment = "Environment" credSourceECSContainer = "EcsContainer" ) func resolveCredsFromSource(cfg *aws.Config, envCfg envConfig, sharedCfg sharedConfig, handlers request.Handlers, sessOpts Options, ) (creds *credentials.Credentials, err error) { switch sharedCfg.CredentialSource { case credSourceEc2Metadata: p := defaults.RemoteCredProvider(*cfg, handlers) creds = credentials.NewCredentials(p) case credSourceEnvironment: creds = credentials.NewStaticCredentialsFromCreds(envCfg.Creds) case credSourceECSContainer: if len(os.Getenv(shareddefaults.ECSCredsProviderEnvVar)) == 0 { return nil, ErrSharedConfigECSContainerEnvVarEmpty } p := defaults.RemoteCredProvider(*cfg, handlers) creds = credentials.NewCredentials(p) default: return nil, ErrSharedConfigInvalidCredSource } return creds, nil } func credsFromAssumeRole(cfg aws.Config, handlers request.Handlers, sharedCfg sharedConfig, sessOpts Options, ) (*credentials.Credentials, error) { if len(sharedCfg.MFASerial) != 0 && sessOpts.AssumeRoleTokenProvider == nil { // AssumeRole Token provider is required if doing Assume Role // with MFA. return nil, AssumeRoleTokenProviderNotSetError{} } return stscreds.NewCredentials( &Session{ Config: &cfg, Handlers: handlers.Copy(), }, sharedCfg.RoleARN, func(opt *stscreds.AssumeRoleProvider) { opt.RoleSessionName = sharedCfg.RoleSessionName if sessOpts.AssumeRoleDuration == 0 && sharedCfg.AssumeRoleDuration != nil && *sharedCfg.AssumeRoleDuration/time.Minute > 15 { opt.Duration = *sharedCfg.AssumeRoleDuration } else if sessOpts.AssumeRoleDuration != 0 { opt.Duration = sessOpts.AssumeRoleDuration } // Assume role with external ID if len(sharedCfg.ExternalID) > 0 { opt.ExternalID = aws.String(sharedCfg.ExternalID) } // Assume role with MFA if len(sharedCfg.MFASerial) > 0 { opt.SerialNumber = aws.String(sharedCfg.MFASerial) opt.TokenProvider = sessOpts.AssumeRoleTokenProvider } }, ), nil } // AssumeRoleTokenProviderNotSetError is an error returned when creating a // session when the MFAToken option is not set when shared config is configured // load assume a role with an MFA token. type AssumeRoleTokenProviderNotSetError struct{} // Code is the short id of the error. func (e AssumeRoleTokenProviderNotSetError) Code() string { return "AssumeRoleTokenProviderNotSetError" } // Message is the description of the error func (e AssumeRoleTokenProviderNotSetError) Message() string { return fmt.Sprintf("assume role with MFA enabled, but AssumeRoleTokenProvider session option not set.") } // OrigErr is the underlying error that caused the failure. func (e AssumeRoleTokenProviderNotSetError) OrigErr() error { return nil } // Error satisfies the error interface. func (e AssumeRoleTokenProviderNotSetError) Error() string { return awserr.SprintError(e.Code(), e.Message(), "", nil) } type credProviderError struct { Err error } func (c credProviderError) Retrieve() (credentials.Value, error) { return credentials.Value{}, c.Err } func (c credProviderError) IsExpired() bool { return true }
291