Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[ignore] Testing branch with useSraAuth=true #4535

Conversation

gosar
Copy link
Contributor

@gosar gosar commented Oct 4, 2023

Motivation and Context

PR to kick off integ tests against the feature/master/sra-identity-auth-testing branch which has useSraAuth=true.

Modifications

Testing

Screenshots (if appropriate)

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)

Checklist

  • I have read the CONTRIBUTING document
  • Local run of mvn install succeeds
  • My code follows the code style of this project
  • My change requires a change to the Javadoc documentation
  • I have updated the Javadoc documentation accordingly
  • I have added tests to cover my changes
  • All new and existing tests passed
  • I have added a changelog entry. Adding a new entry must be accomplished by running the scripts/new-change script and following the instructions. Commit the new file created by the script in .changes/next-release with your changes.
  • My change is to implement 1.11 parity feature and I have updated LaunchChangelog

License

  • I confirm that this pull request can be released under the Apache 2 license

zoewangg and others added 30 commits September 26, 2023 13:45
…' into feature/master/sra-identity-auth-testing
…' into feature/master/sra-identity-auth-testing
…' into feature/master/sra-identity-auth-testing
…' into feature/master/sra-identity-auth-testing
…' into feature/master/sra-identity-auth-testing
…' into feature/master/sra-identity-auth-testing
…' into feature/master/sra-identity-auth-testing
* Update NoneAuthTypeRequestTest for SRA clients

* Update ClientBuilderTest for SRA clients
In commit d269d6b where code was
uncommented, missed removing the @disabled on one test.
Co-authored-by: Debora N. Ito <476307+debora-ito@users.noreply.github.com>
…existing ProxyConfig (#4467)

* Proxy Environment Variable support for SDK HTTP config settings

* Added configs for Proxy settings

* Added generic test cases to test combination of settings

* Updated after self review

* Addressed spot bugs

* Junit build check failures

* fixed junit test cases

* fix japi cmp issue

* fix checkstyle issue

* fixed junit

* Handle PR comments

* Handle checkstyle failure
Fix an issue where we were previously enforcing the requirement for
mappedTableResource to be present before it was actually required. Now, we defer
the validation utnil we actually need to access it.
Release SRA Identity & Auth core changes
AWS and others added 24 commits October 12, 2023 18:13
…tation to clarify that the PCoIP protocol is only available for Windows bundles.
…low visible ascii characters. Add paginators to DescribeInstanceRefreshes, DescribeLoadBalancers, and DescribeLoadBalancerTargetGroups
…awsAccounts parameter. When you create or update an assessment, there is now a limit of 200 AWS accounts that can be specified in the assessment scope.
…adapter version management, 3 new APIs for tagging, and updates AnalyzeDocument and StartDocumentAnalysis API parameters for using adapters.
…tack subnets over IPv6, via an opt-in flag in CreateFunction and UpdateFunctionConfiguration APIs
…with Availability Zone affinity for Network Load Balancers.
…for adding a dedicated log volume to open-source RDS instances.
…ous shapes in Customer Profiles Calculated Attribute API model.
…Custom Moderation. This allows the enhancement of accuracy for detect moderation labels operations by creating custom adapters tuned on customer data.
…ettings and DirectDeploySettings support for CanvasAppSettings
…a supported platform for On-Demand Capacity Reservations and adds support for setting an Amazon Machine Image (AMI) to disabled state. Disabling the AMI makes it private if it was previously shared, and prevents new EC2 instance launches from it.
…9e9f46e1e

Pull request: release <- staging/1aa9ea38-9161-4d55-b739-f469e9f46e1e
@gosar gosar changed the title [ignore] Feature/master/sra identity auth testing [ignore] Testing feature branch with useSraAuth=true Oct 12, 2023
@gosar gosar changed the title [ignore] Testing feature branch with useSraAuth=true [ignore] Testing branch with useSraAuth=true Oct 12, 2023
@gosar
Copy link
Contributor Author

gosar commented Oct 13, 2023

Now that feature/master/sra-identity-auth (the base branch of this PR) has been merged to master, closing this in favor of #4478 which is for this same feature/master/sra-identity-auth-testing branch against master base branch.

@gosar gosar closed this Oct 13, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants