Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
Newer
Older
100644 66 lines (40 sloc) 3.409 kB
2674cf0 @skyzyx 1.5.4 release. http://aws.amazon.com/releasenotes/1700816143828387
skyzyx authored
1 # Known Issues
2
3 ## 2GB limit for 32-bit stacks; all Windows stacks.
4
5 Because PHP's integer type is signed and many platforms use 32-bit integers, the AWS SDK for PHP does not correctly
6 handle files larger than 2GB on a 32-bit stack (where "stack" includes CPU, OS, web server, and PHP binary). This is a
7 [well-known PHP issue]. In the case of Microsoft® Windows®, there are no official builds of PHP that support 64-bit
8 integers.
9
10 The recommended solution is to use a 64-bit Linux stack, such as the [64-bit Amazon Linux AMI] with the latest version of
11 PHP installed.
12
13 For more information, please see: [PHP filesize: Return values]. A workaround is suggested in
14 `AmazonS3::create_mpu_object()` [with files bigger than 2GB].
15
16 [well-known PHP issue]: http://www.google.com/search?q=php+2gb+32-bit
17 [64-bit Amazon Linux AMI]: http://aws.amazon.com/amazon-linux-ami/
18 [PHP filesize: Return values]: http://docs.php.net/manual/en/function.filesize.php#refsect1-function.filesize-returnvalues
19 [with files bigger than 2GB]: https://forums.aws.amazon.com/thread.jspa?messageID=215487#215487
20
21
22 ## Amazon S3 Buckets containing periods
23
24 Amazon S3's SSL certificate covers domains that match `*.s3.amazonaws.com`. When buckets (e.g., `my-bucket`) are accessed
25 using DNS-style addressing (e.g., `my-bucket.s3.amazonaws.com`), those SSL/HTTPS connections are covered by the certificate.
26
27 However, when a bucket name contains one or more periods (e.g., `s3.my-domain.com`) and is accessed using DNS-style
28 addressing (e.g., `s3.my-domain.com.s3.amazonaws.com`), that SSL/HTTPS connection will fail because the certificate
29 doesn't match.
30
31 The most secure workaround is to change the bucket name to one that does not contain periods. Less secure workarounds
32 are to use `disable_ssl()` or `disable_ssl_verification()`. Because of the security implications, calling either of
33 these methods will throw a warning. You can avoid the warning by adjusting your `error_reporting()` settings.
34
35
36 ## Expiring request signatures
37
38 When leveraging `AmazonS3::create_mpu_object()`, it's possible that later parts of the multipart upload will fail if
39 the upload takes more than 15 minutes.
40
41
42 ## Too many open file connections
43
44 When leveraging `AmazonS3::create_mpu_object()`, it's possible that the SDK will attempt to open too many file resources
45 at once. Because the file connection limit is not available to the PHP environment, the SDK is unable to automatically
46 adjust the number of connections it attempts to open.
47
48 A workaround is to increase the part size so that fewer file connections are opened.
49
50
51 ## Exceptionally large batch requests
52
53 When leveraging the batch request feature to execute multiple requests in parallel, it's possible that the SDK will
54 throw a fatal exception if a particular batch pool is exceptionally large and a service gets overloaded with requests.
55
56 This seems to be most common when attempting to send a large number of emails with the SES service.
57
58
59 ## Long-running processes using SSL leak memory
60
61 When making requests with the SDK over SSL during long-running processes, there will be a gradual memory leak that can
62 eventually cause a crash. The leak occurs within the PHP bindings for cURL when attempting to verify the peer during an
63 SSL handshake. See <https://bugs.php.net/61030> for details about the bug.
64
65 A workaround is to disable SSL for requests executed in long-running processes.
Something went wrong with that request. Please try again.