Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for unsignedPayloadTrailer (1.05 sec)

  1. cmd/streaming-v4-unsigned.go

    func newUnsignedV4ChunkedReader(req *http.Request, trailer bool, signature bool) (io.ReadCloser, APIErrorCode) {
    	if signature {
    		if errCode := doesSignatureMatch(unsignedPayloadTrailer, req, globalSite.Region(), serviceS3); errCode != ErrNone {
    			return nil, errCode
    		}
    	}
    	if trailer {
    		// Discard anything unsigned.
    		req.Trailer = make(http.Header)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Apr 03 14:55:52 UTC 2025
    - 6.3K bytes
    - Viewed (0)
  2. cmd/signature-v4-utils.go

    const unsignedPayload = "UNSIGNED-PAYLOAD"
    
    // http Header "x-amz-content-sha256" == "STREAMING-UNSIGNED-PAYLOAD-TRAILER" indicates that the
    // client did not calculate sha256 of the payload and there is a trailer.
    const unsignedPayloadTrailer = "STREAMING-UNSIGNED-PAYLOAD-TRAILER"
    
    // skipContentSha256Cksum returns true if caller needs to skip
    // payload checksum, false if not.
    func skipContentSha256Cksum(r *http.Request) bool {
    	var (
    		v  []string
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon Nov 25 17:10:22 UTC 2024
    - 9.1K bytes
    - Viewed (0)
  3. cmd/auth-handler.go

    }
    
    // Verify if the request has AWS Streaming Signature Version '4', with unsigned content and trailer.
    func isRequestUnsignedTrailerV4(r *http.Request) bool {
    	return r.Header.Get(xhttp.AmzContentSha256) == unsignedPayloadTrailer &&
    		r.Method == http.MethodPut
    }
    
    // Authorization type.
    //
    //go:generate stringer -type=authType -trimprefix=authType $GOFILE
    type authType int
    
    // List of all supported auth types.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 25.4K bytes
    - Viewed (0)
  4. cmd/server_test.go

    		"X-Amz-Decoded-Content-Length": []string{"8"},
    		"Content-Encoding":             []string{"aws-chunked"},
    		"X-Amz-Trailer":                []string{"x-amz-checksum-crc32"},
    		"x-amz-content-sha256":         []string{unsignedPayloadTrailer},
    	}
    
    	for k, v := range maliciousHeaders {
    		req.Header.Set(k, v[0])
    	}
    
    	// execute the request.
    	response, err = s.client.Do(req)
    	c.Assert(err, nil)
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 118.1K bytes
    - Viewed (0)
Back to top