Amazon Web Services Request Signatures
locate_credentials()
call from internal signature_v4()
function. (#33)signature_v4_auth()
and signature_v2_auth()
gain a force_credentials
argument. If force_credentials = TRUE
, user-supplied values are used and no call to locate_credentials()
is made. (#33)AWS_SHARED_CREDENTIALS_FILE
and AWS_PROFILE
into code as appropriate and tweaked locate_credentials()
accordingly.signature_v4_auth()
and signature_v2_auth()
now returns all inputs to facilitate using the return value in constructing an HTTP request.datetime
argument in several functions. (#28, h/t @yansonz)This is a minor release that includes some important changes to the behavior of locate_credentials()
and also includes the default use of an AWS credentials file if present, making the behavior of this (and all other cloudyr packages) more consistent with clients for other languages and the AWS CLI.
use_credentials()
(with defaults) to that behavior is more similar to other AWS client libraries. (https://github.com/cloudyr/aws.s3/pull/184, h/t Dan Tenenbaum)profile
argument of use_credentials()
now defaults to Sys.getenv("AWS_PROFILE", "default")
for consistency with other AWS client libraries.locate_credentials()
returns region = default_region
even when no other credentials are found.locate_credentials()
now attempts to look in instance metadata for a region, when called from an EC2 instance. Updated documentation to describe the need for aws.ec2metadata on EC2 instances. (see https://github.com/cloudyr/aws.s3/issues/151)region
have been standardized and documented for locate_credentials()
.read_credentials()
now trims excess whitespace from profile names. (#22, h/t Paul Ingles)This release includes a number of bug fixes and improvements to the behavior of locate_credentials()
(added in v0.3.2), including better checks on EC2 instances.
This is a patch release with a few bug fixes:
read_credentials()
to allow key-value pairs of any form: KEY=VALUE
, KEY = VALUE
, KEY= VALUE
, KEY =VALUE
. (#15, h/t David Severski)signature_v2_auth()
.read_credentials()
now looks for the credentials file in a more reasonable location on Windows (#12/#13, h/t user:kadrach)This is a patch release that provides provisional support for temporary security tokens ("session tokens"), thus broadening support for IAM and STS credentials. Existing code will continue to work, but support for session tokens will be cascaded through other cloudyr API clients accordingly (meaning it is not widely supported yet).
There are also some minor changes to some default arguments to correct unintended behavior. These should not affect any previously correct signing code.