Skip to content

Normalization of HTTP-X headers should be optional#498

Closed
roaldvanloon wants to merge 1 commit intoceph:masterfrom
roaldvanloon:wip-rgw-fix-x-meta
Closed

Normalization of HTTP-X headers should be optional#498
roaldvanloon wants to merge 1 commit intoceph:masterfrom
roaldvanloon:wip-rgw-fix-x-meta

Conversation

@roaldvanloon
Copy link
Copy Markdown
Contributor

I'm working on a Google Storage API, and while doing that I discovered that all HTTP_X_GOOG_* headers are normalized to x-amz-* entries in the x_meta_map. This breaks the signature checking when authorizing because GS always sends the X-Goog-Api-Version header, which gets normalized to x-amz-api-version and hence become wrongly part of the canonical headers in the authorization signature.

Adding a boolean to the init_meta_info allows to override this default behaviour. It normalizes HTTP_X_GOOG_* header to x-goog-* entries in the x_meta_map.

Signed-off-by: Roald J. van Loon roaldvanloon@gmail.com

Signed-off-by: Roald J. van Loon <roaldvanloon@gmail.com>
@liewegas
Copy link
Copy Markdown
Member

liewegas commented May 7, 2014

We should revisit this when looking at the google support.

@liewegas liewegas closed this May 7, 2014
mgfritch added a commit to mgfritch/ceph that referenced this pull request May 4, 2023
mgr/cephadm: fix backends service in haproxy config with multiple nfs of same rank

Reviewed-by: Tim Serong <tserong@suse.com>
tobias-urdin pushed a commit to tobias-urdin/ceph that referenced this pull request Aug 2, 2023
QoL: Fix tox.ini syntax and other minor things
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants