Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update s3 high level commands to honor "--no-verify-ssl" #698

Merged
merged 2 commits into from
Mar 10, 2014

Conversation

jamesls
Copy link
Member

@jamesls jamesls commented Mar 10, 2014

Fixes #696.

This fix is a little bit larger than probably expected because it solves the problem in the general case. The top level global args are now resolved/subjected to additional processing before calling any command/subcommands. This means that additional high level commands can just call get_endpoint with the parsed_args and they will get the verify ssl arg properly resolved already.

Also had to update the s3 commands to actually use the verify_ssl argument. Tests added, and also manually verified:

$ aws s3 ls 2>&1 --no-verify-ssl --debug | grep verify_ssl
2014-03-10 14:28:40,647 - botocore.endpoint - DEBUG - Making request for Operation:ListBuckets (verify_ssl=False) with params: {'headers': {}, 'uri_params': {}, 'payload': <botocore.payload.XMLPayload object at 0x10c057250>}

jamesls added 2 commits March 10, 2014 13:34
The two included are:

* parsing the jmespath --query arg
* resolving the verify ssl argument (including env var lookup)

This is code that otherwise every plugin would have to call, so it
makes sense to do this as part of the parsing process.  This is just
like argparse's "type" arg, except plugins can more easily hook into
this.
@toastdriven
Copy link
Contributor

LGTM. 🚢 it!

@jamesls jamesls merged commit d399303 into aws:develop Mar 10, 2014
@jamesls jamesls deleted the s3-ssl-verify branch June 23, 2014 18:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

aws s3 (as opposed to s3api) not honoring --no-verify-ssl
2 participants