Configuration for use in AWS-related signing. AwsSigningConfig is immutable. It is good practice to use a new config for each signature, or the date might get too old.
Which signing process to invoke
Date and time to use during the signing process. If not provided then the current time in UTC is used. Naive dates (lacking timezone info) are assumed to be in local time
Query param signing only: how long the pre-signed URL is valid for
Headers to skip when signing.
Skipping auth-required headers will result in an unusable signature. Headers injected by the signing process are not skippable. This function does not override the internal check function (x-amzn-trace-id, user-agent), but rather supplements it. In particular, a header will get signed if and only if it returns true to both the internal check (skips x-amzn-trace-id, user-agent) and is found in this list (if defined)
Should the session token be omitted from the signing process? This should only be true when making a websocket handshake with IoT Core.
Credentials provider to fetch signing credentials with
The region to sign against
Name of service to sign a request for
Whether the resource paths are normalized when building the canonical request.
What kind of signature to compute
Controls what header, if any, should be added to the request, containing the body value
Value to use as the canonical request's body value.
Typically, this is the SHA-256 of the payload, written as lowercase hex. If this has been precalculated, it can be set here. Special values used by certain services can also be set (see AwsSignedBodyValue). If undefined (the default), the typical value will be calculated from the payload during signing.
Set true to double-encode the resource path when constructing the canonical request. By default, all services except S3 use double encoding.
Generated using TypeDoc