Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix Sign to not sign sigv2 cases #2804

Merged
merged 1 commit into from
Dec 8, 2022
Merged

Fix Sign to not sign sigv2 cases #2804

merged 1 commit into from
Dec 8, 2022

Conversation

mullermp
Copy link
Contributor

@mullermp mullermp commented Dec 8, 2022

Fixes issue in #2802

Custom endpoints will still flow through endpoint resolution, but for S3, it also returns Sigv4 signing. That endpoint is merged with service defaults (also Sigv4) and then eventually signed by the generic signer. Legacy sigv2 signing, when enabled, would sign on top of generic signing, which overrode Authorization. This worked for S3 but not for 3rd party solutions coincidentally because of Date Time parsing. This change fixes the behavior so that they are mutually exclusive.

@mullermp mullermp merged commit 88121bd into version-3 Dec 8, 2022
@mullermp mullermp deleted the fix-sigv2 branch December 8, 2022 18:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants