+57
−6
+44
−18
Loading
* Fix unbounded memory allocation in http::body and signature verification - Treat missing x-amz-content-sha256 header as unsigned payload to avoid loading full body for signature verification - Add store_all_limited() method with configurable size limit to Body - Use bounded body collection (20MB limit) for XML payload operations - Add tests for the new bounded body collection function - Mark hex_sha256_string as test-only since it's no longer used in production code Co-authored-by:Nugine <30099658+Nugine@users.noreply.github.com> * Add comment explaining Bytes::clone is O(1) due to reference counting Co-authored-by:
Nugine <30099658+Nugine@users.noreply.github.com> * Reject requests with missing x-amz-content-sha256 header per S3 protocol Instead of treating missing x-amz-content-sha256 header as unsigned payload, reject the request per AWS S3 protocol which requires this header for all requests authenticated with Signature V4. Co-authored-by:
Nugine <30099658+Nugine@users.noreply.github.com> * fix * fix * Add tests for x-amz-content-sha256 header validation Add unit tests to verify that: - extract_amz_content_sha256 returns None when header is missing - extract_amz_content_sha256 returns proper value when header is present - extract_amz_content_sha256 returns error for invalid header values Co-authored-by:
Nugine <30099658+Nugine@users.noreply.github.com> * fix * fix --------- Co-authored-by:
copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> Co-authored-by:
Nugine <30099658+Nugine@users.noreply.github.com> Co-authored-by:
Nugine <nugine@foxmail.com>