|
22 | 22 | from unittest import mock |
23 | 23 |
|
24 | 24 | import pytest |
| 25 | +from requests import Request |
| 26 | +from requests.adapters import HTTPAdapter |
25 | 27 | from requests.exceptions import HTTPError |
26 | 28 | from requests_mock import Mocker |
27 | 29 |
|
28 | 30 | import pyiceberg |
29 | 31 | from pyiceberg.catalog import PropertiesUpdateSummary, load_catalog |
30 | | -from pyiceberg.catalog.rest import DEFAULT_ENDPOINTS, OAUTH2_SERVER_URI, SNAPSHOT_LOADING_MODE, Capability, RestCatalog |
| 32 | +from pyiceberg.catalog.rest import ( |
| 33 | + DEFAULT_ENDPOINTS, |
| 34 | + EMPTY_BODY_SHA256, |
| 35 | + OAUTH2_SERVER_URI, |
| 36 | + SNAPSHOT_LOADING_MODE, |
| 37 | + Capability, |
| 38 | + RestCatalog, |
| 39 | +) |
31 | 40 | from pyiceberg.exceptions import ( |
32 | 41 | AuthorizationExpiredError, |
33 | 42 | NamespaceAlreadyExistsError, |
@@ -451,6 +460,62 @@ def test_list_tables_200_sigv4(rest_mock: Mocker) -> None: |
451 | 460 | assert rest_mock.called |
452 | 461 |
|
453 | 462 |
|
| 463 | +def test_sigv4_sign_request_without_body(rest_mock: Mocker) -> None: |
| 464 | + existing_token = "existing_token" |
| 465 | + |
| 466 | + catalog = RestCatalog( |
| 467 | + "rest", |
| 468 | + **{ |
| 469 | + "uri": TEST_URI, |
| 470 | + "token": existing_token, |
| 471 | + "rest.sigv4-enabled": "true", |
| 472 | + "rest.signing-region": "us-west-2", |
| 473 | + "client.access-key-id": "id", |
| 474 | + "client.secret-access-key": "secret", |
| 475 | + }, |
| 476 | + ) |
| 477 | + |
| 478 | + prepared = catalog._session.prepare_request(Request("GET", f"{TEST_URI}v1/config")) |
| 479 | + adapter = catalog._session.adapters[catalog.uri] |
| 480 | + assert isinstance(adapter, HTTPAdapter) |
| 481 | + adapter.add_headers(prepared) |
| 482 | + |
| 483 | + assert prepared.headers["Authorization"].startswith("AWS4-HMAC-SHA256") |
| 484 | + assert prepared.headers["Original-Authorization"] == f"Bearer {existing_token}" |
| 485 | + assert prepared.headers["x-amz-content-sha256"] == EMPTY_BODY_SHA256 |
| 486 | + |
| 487 | + |
| 488 | +def test_sigv4_sign_request_with_body(rest_mock: Mocker) -> None: |
| 489 | + existing_token = "existing_token" |
| 490 | + |
| 491 | + catalog = RestCatalog( |
| 492 | + "rest", |
| 493 | + **{ |
| 494 | + "uri": TEST_URI, |
| 495 | + "token": existing_token, |
| 496 | + "rest.sigv4-enabled": "true", |
| 497 | + "rest.signing-region": "us-west-2", |
| 498 | + "client.access-key-id": "id", |
| 499 | + "client.secret-access-key": "secret", |
| 500 | + }, |
| 501 | + ) |
| 502 | + |
| 503 | + prepared = catalog._session.prepare_request( |
| 504 | + Request( |
| 505 | + "POST", |
| 506 | + f"{TEST_URI}v1/namespaces", |
| 507 | + data={"namespace": "asdfasd"}, |
| 508 | + ) |
| 509 | + ) |
| 510 | + adapter = catalog._session.adapters[catalog.uri] |
| 511 | + assert isinstance(adapter, HTTPAdapter) |
| 512 | + adapter.add_headers(prepared) |
| 513 | + |
| 514 | + assert prepared.headers["Authorization"].startswith("AWS4-HMAC-SHA256") |
| 515 | + assert prepared.headers["Original-Authorization"] == f"Bearer {existing_token}" |
| 516 | + assert prepared.headers.get("x-amz-content-sha256") != EMPTY_BODY_SHA256 |
| 517 | + |
| 518 | + |
454 | 519 | def test_list_tables_404(rest_mock: Mocker) -> None: |
455 | 520 | namespace = "examples" |
456 | 521 | rest_mock.get( |
|
0 commit comments