Struct aws_sigv4::http_request::SigningSettings
source · #[non_exhaustive]pub struct SigningSettings {
pub percent_encoding_mode: PercentEncodingMode,
pub payload_checksum_kind: PayloadChecksumKind,
pub signature_location: SignatureLocation,
pub expires_in: Option<Duration>,
pub excluded_headers: Option<Vec<Cow<'static, str>>>,
pub uri_path_normalization_mode: UriPathNormalizationMode,
pub session_token_mode: SessionTokenMode,
pub session_token_name_override: Option<&'static str>,
}
Expand description
HTTP-specific signing settings
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.percent_encoding_mode: PercentEncodingMode
Specifies how to encode the request URL when signing. Some services do not decode the path prior to checking the signature, requiring clients to actually double-encode the URI in creating the canonical request in order to pass a signature check.
payload_checksum_kind: PayloadChecksumKind
Add an additional checksum header
signature_location: SignatureLocation
Where to put the signature
expires_in: Option<Duration>
For presigned requests, how long the presigned request is valid for
excluded_headers: Option<Vec<Cow<'static, str>>>
Headers that should be excluded from the signing process
uri_path_normalization_mode: UriPathNormalizationMode
Specifies whether the absolute path component of the URI should be normalized during signing.
session_token_mode: SessionTokenMode
Some services require X-Amz-Security-Token to be included in the canonical request. Other services require only it to be added after calculating the signature.
session_token_name_override: Option<&'static str>
Some services require an alternative session token header or query param instead of
x-amz-security-token
or X-Amz-Security-Token
.