You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The purpose of the HTTP abstractions in smithy runtime is to serve as a suitable default that should work well for most use cases out of the box. It is not meant to handle every possible use case or customization.
I have use cases that need a specific crypto provider for compliance
One of the issues we have with this is how to expose it in a backwards compatible way. We can't really without exposing unstable 3P crates. We also aren't sure we want to given the point above. You're likely better off just wrapping your own HTTP client (which is what we will be recommending going forward for use cases that go beyond the level of customization/configuration that most users require).
I have use cases where I know I will never do TLS and want to ensure that is the case.
The client can still be used with HTTP endpoints (that's how IMDS and ECS credential providers work today). We are not inclined to add less secure defaults.
aajtodd
added
response-requested
Waiting on additional info and feedback. Will move to 'closing-soon' in 7 days.
p3
This is a minor priority issue
and removed
needs-triage
This issue or PR still needs to be triaged.
labels
Dec 20, 2024
You're likely better off just wrapping your own HTTP client
This would be an option but the interface required to implement this is massive -- the hyper 1.0 implementation in-tree is >1000 LOC. At that point we might as well just implement our own library entirely and drop aws-sdk-rust (which we are considering anyways due to binary size issues).
We are not inclined to add less secure defaults.
I am not looking for a default or something less secure -- only the ability to not depend on ring or aws_lc. its fine if it panics or otherwise restricts access to TLS endpoints.
Describe the feature
aws_smithy_experimental
currently requires you to specify a CryptoMode - Ring, AwsLc, or AwsLcFips.Internally this gets translated into an
The following are needed:
Use Case
Proposed Solution
CryptoMode::Custom
CryptoMode::None
Other Information
No response
Acknowledgements
A note for the community
Community Note
The text was updated successfully, but these errors were encountered: