Bug 2260356
Summary: | [rgw] uploads with java and golang SDKs can fail when checksum is requested | ||
---|---|---|---|
Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Matt Benjamin (redhat) <mbenjamin> |
Component: | RGW | Assignee: | Matt Benjamin (redhat) <mbenjamin> |
Status: | CLOSED ERRATA | QA Contact: | Tejas <tchandra> |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.1 | CC: | asriram, bkunal, ceph-eng-bugs, cephqe-warriors, dwalveka, mkasturi, rpollack, tchandra, tserlin, vereddy |
Target Milestone: | --- | ||
Target Release: | 5.3z7 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | ceph-16.2.10-263.el8cp | Doc Type: | Bug Fix |
Doc Text: |
Previously, Ceph Object gateway would not recognize `STREAMING-AWS4-HMAC-SHA256-PAYLOAD` and `STREAMING-UNSIGNED-PAYLOAD-TRAILER` encoding forms resulting in request failures.
With this fix, the logic to recognize, parse, and wherever applicable, verify new trailing request signatures provided for the new encoding forms is implemented. The Ceph Object gateway now passes requests with well-formed payloads of the new stream encoding forms.
|
Story Points: | --- |
Clone Of: | 2256969 | Environment: | |
Last Closed: | 2024-06-26 10:01:53 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2256967, 2256969, 2260354 | ||
Bug Blocks: |
Description
Matt Benjamin (redhat)
2024-01-25 15:29:04 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: Red Hat Ceph Storage 5.3 security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2024:4118 |