Commit Graph

6 Commits

Author SHA1 Message Date
Fabrice Reix
b1e2e1624c
Split test aws_sig test into ok/failed 2023-09-02 10:44:37 +02:00
apparentorder
bbb8b48af0
check only for correct header format instead of exact signature value 2023-08-25 14:52:28 +02:00
apparentorder
dcbcab1a0b
explicitly set user-agent, as it may be part of the signature 2023-08-25 07:50:38 +02:00
apparentorder
a1d7b5ef94
re-enable 'set -Ee' and temp. disable it to capture error code 2023-08-24 16:05:01 +02:00
apparentorder
5eae6edba3
adjust the aws-sigv4 test to fake correct output on machines with too old libcurl 2023-08-24 15:18:54 +02:00
apparentorder
56d4fa4485
Add the aws-sigv4 option to generate AWS SigV4 signed requests
AWS SigV4 support is available in curl since 7.75.0 (December 2020).

Add the necessary bits for Hurl to understand this option and pass
it on to libcurl, both as a command line option `--aws-sigv4` and
as a per-request option `aws-sigv4` in Hurlfiles.

Do not emit `Authorization: Basic` when aws-sigv4 is used, as this
would take priority over the `Authorization` header generated by libcurl.
Instead, explicitly set `username` and `password` options.

Suppress removal of the `Expect:` header when using aws-sigv4, as a
workaround for curl/curl#11664.

Add a corresponding integration test.
2023-08-24 15:18:53 +02:00