Aws-requests-auth

Latest version: v0.4.3

Safety actively analyzes 629994 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 3

0.3.1

------------------
- Patch encoding error on python 3.6
- See https://github.com/DavidMuller/aws-requests-auth/pull/21

0.3.0

------------------
- Add python3 support -- thanks to jlaine, and anantasty
- See https://github.com/DavidMuller/aws-requests-auth/pull/16

0.2.5

------------------
- Stop urlencoding query params in get_canonical_querystring(). The urlencoding in get_canonical_querystring() was causing "double encoding issues" because elasticsearch-py already apperas to urlencode query params
- If you are using a client other than elasticsearch-py, you will need to be sure that your client urlecondes your query params before they are passed to the `AWSRequests` auth class
- See https://github.com/DavidMuller/aws-requests-auth/pull/13 for more details

0.2.4

------------------
- Add support for [AWS STS](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html) using the `aws_token` keyword argument to `AWSRequestsAuth`
- See [issue 9](https://github.com/DavidMuller/aws-requests-auth/issues/9) and [PR 11](https://github.com/DavidMuller/aws-requests-auth/pull/11 for) for additional details

0.2.3

------------------
- Fix handling of multiple query parameters
- For example, the two `pretty=True` query paramaters in the following url
`http://search-service-foobar.us-east-1.es.amazonaws.com?pretty=True&pretty=True`
are now handled properly
- see https://github.com/DavidMuller/aws-requests-auth/pull/7

0.2.2

------------------
- Update url quoting for canonical uri and canonical query string

Page 2 of 3

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.