Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

removes x-amz-security-token from urls by setting security_token as empty string #30

Merged
merged 1 commit into from
Aug 29, 2016

Conversation

Moraga
Copy link
Contributor

@Moraga Moraga commented Aug 23, 2016

No description provided.

@etianen
Copy link
Owner

etianen commented Aug 24, 2016

Thanks for this!

Can you explain a little more the problem that this is trying to solve?

@Moraga
Copy link
Contributor Author

Moraga commented Aug 25, 2016

Hi!

Even setting AWS_S3_BUCKET_AUTH = False and a longer cache a query
parameter x-amz-security-token is present in the URLs causing bad request
to S3.
This appends when are Roles in IAM. It seems a problem in the Boto lib.
Setting Connection.provider.security_token = "" fix it.

Thanks!

On Wed, Aug 24, 2016 at 6:59 AM, Dave Hall notifications@github.com wrote:

Thanks for this!

Can you explain a little more the problem that this is trying to solve?


You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
#30 (comment),
or mute the thread
https://github.com/notifications/unsubscribe-auth/AAn6PXV0kdOfCLEfJQEG4hleivqV0hgGks5qjBYPgaJpZM4JrLrS
.

@etianen etianen merged commit 9501ca7 into etianen:master Aug 29, 2016
@etianen
Copy link
Owner

etianen commented Aug 29, 2016

Gotcha: boto/boto#1477

I think it's time to move django-s3-storage to boto3. :)

This was referenced Aug 29, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants