Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add user agent to default KMS clients #598

Merged
merged 3 commits into from
Jul 13, 2022
Merged

Conversation

alex-chew
Copy link
Contributor

Description of changes: Adds a AwsEncryptionSdkNet/x.y.z user agent to KMS clients vended by the default client supplier. Adding the user agent to other KMS calls (including in single-key keyrings) is left as later work.

This was tested by running the AWS KMS multi-keyring example and checking that the desired user agent appears in the CloudTrail logs for the corresponding KMS actions.

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

@alex-chew alex-chew requested a review from a team as a code owner July 12, 2022 21:13

[assembly: AssemblyTitle("AWS.EncryptionSDK")]

// This should be kept in sync with the version number in AWSEncryptionSDK.csproj
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Modern .NET versions allow to generate this assembly metadata automatically (e.g. derive AssemblyVersion from Version), so that we wouldn't need to manually keep these in sync. But so long as we support .NET Framework, AFAICT there isn't an automated mechanism to avoid this duplication.

@alex-chew alex-chew merged commit 398c7f6 into mainline Jul 13, 2022
@alex-chew alex-chew deleted the add-user-agent branch July 13, 2022 16:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants