|
1 | 1 | use {
|
2 | 2 | crate::{
|
3 | 3 | service_for_signing_key_fn, sigv4_validate_request, CanonicalRequest, GetSigningKeyRequest,
|
4 |
| - GetSigningKeyResponse, KSecretKey, SignatureOptions, SignedHeaderRequirements, |
| 4 | + GetSigningKeyResponse, KSecretKey, SignatureOptions, NO_ADDITIONAL_SIGNED_HEADERS, |
5 | 5 | },
|
6 | 6 | bytes::{Bytes, BytesMut},
|
7 | 7 | chrono::{DateTime, NaiveDate, NaiveDateTime, NaiveTime, Utc},
|
@@ -226,8 +226,8 @@ async fn run(basename: &str) {
|
226 | 226 | expected_canonical_request.retain(|c| *c != b'\r'); // Remove carriage returns (not newlines)
|
227 | 227 |
|
228 | 228 | // Check the canonical request.
|
229 |
| - let req = SignedHeaderRequirements::default(); |
230 |
| - let auth_params = canonical.get_auth_parameters(&req).expect("Failed to get auth parameters"); |
| 229 | + let auth_params = |
| 230 | + canonical.get_auth_parameters(&NO_ADDITIONAL_SIGNED_HEADERS).expect("Failed to get auth parameters"); |
231 | 231 | let canonical_request = canonical.canonical_request(&auth_params.signed_headers);
|
232 | 232 | assert_eq!(
|
233 | 233 | String::from_utf8_lossy(canonical_request.as_slice()),
|
@@ -273,14 +273,13 @@ async fn run(basename: &str) {
|
273 | 273 | // Create a GetSigningKeyRequest from our existing request.
|
274 | 274 | debug!("body: {:?}", body);
|
275 | 275 | let request = Request::from_parts(parts, body);
|
276 |
| - let required_headers = SignedHeaderRequirements::default(); |
277 | 276 | sigv4_validate_request(
|
278 | 277 | request,
|
279 | 278 | TEST_REGION,
|
280 | 279 | TEST_SERVICE,
|
281 | 280 | &mut signing_key_svc,
|
282 | 281 | test_time,
|
283 |
| - &required_headers, |
| 282 | + &NO_ADDITIONAL_SIGNED_HEADERS, |
284 | 283 | SignatureOptions::url_encode_form(),
|
285 | 284 | )
|
286 | 285 | .await
|
|
0 commit comments