|
| 1 | +from __future__ import annotations |
| 2 | + |
| 3 | +from typing import TYPE_CHECKING |
| 4 | + |
| 5 | +import httpx |
| 6 | + |
| 7 | +from ..._utils import lru_cache |
| 8 | + |
| 9 | +if TYPE_CHECKING: |
| 10 | + import boto3 |
| 11 | + |
| 12 | + |
| 13 | +@lru_cache(maxsize=512) |
| 14 | +def _get_session( |
| 15 | + *, |
| 16 | + aws_access_key: str | None, |
| 17 | + aws_secret_key: str | None, |
| 18 | + aws_session_token: str | None, |
| 19 | + region: str | None, |
| 20 | + profile: str | None, |
| 21 | +) -> boto3.Session: |
| 22 | + import boto3 |
| 23 | + |
| 24 | + return boto3.Session( |
| 25 | + profile_name=profile, |
| 26 | + region_name=region, |
| 27 | + aws_access_key_id=aws_access_key, |
| 28 | + aws_secret_access_key=aws_secret_key, |
| 29 | + aws_session_token=aws_session_token, |
| 30 | + ) |
| 31 | + |
| 32 | + |
| 33 | +def get_auth_headers( |
| 34 | + *, |
| 35 | + method: str, |
| 36 | + url: str, |
| 37 | + headers: httpx.Headers, |
| 38 | + aws_access_key: str | None, |
| 39 | + aws_secret_key: str | None, |
| 40 | + aws_session_token: str | None, |
| 41 | + region: str | None, |
| 42 | + profile: str | None, |
| 43 | + data: str | None, |
| 44 | + service_name: str, |
| 45 | +) -> dict[str, str]: |
| 46 | + from botocore.auth import SigV4Auth |
| 47 | + from botocore.awsrequest import AWSRequest |
| 48 | + |
| 49 | + session = _get_session( |
| 50 | + profile=profile, |
| 51 | + region=region, |
| 52 | + aws_access_key=aws_access_key, |
| 53 | + aws_secret_key=aws_secret_key, |
| 54 | + aws_session_token=aws_session_token, |
| 55 | + ) |
| 56 | + |
| 57 | + # The connection header may be stripped by a proxy somewhere, so the receiver |
| 58 | + # of this message may not see this header, so we remove it from the set of headers |
| 59 | + # that are signed. |
| 60 | + new_headers = {k: v for k, v in dict(headers).items() if k.lower() != "connection"} |
| 61 | + |
| 62 | + request = AWSRequest(method=method.upper(), url=url, headers=new_headers, data=data) |
| 63 | + credentials = session.get_credentials() |
| 64 | + if not credentials: |
| 65 | + raise RuntimeError("Could not resolve AWS credentials from session") |
| 66 | + |
| 67 | + signer = SigV4Auth(credentials, service_name, session.region_name) |
| 68 | + signer.add_auth(request) |
| 69 | + |
| 70 | + prepped = request.prepare() |
| 71 | + |
| 72 | + return {key: value for key, value in dict(prepped.headers).items() if value is not None} |
0 commit comments