Loading crates/s3s/src/ops/signature.rs +2 −1 Original line number Diff line number Diff line Loading @@ -158,7 +158,8 @@ impl SignatureContext<'_> { let secret_key = auth.get_secret_key(&access_key).await?; let string_to_sign = info.policy; let signature = sig_v4::calculate_signature(string_to_sign, &secret_key, &amz_date, credential.aws_region, credential.aws_service); let signature = sig_v4::calculate_signature(string_to_sign, &secret_key, &amz_date, credential.aws_region, credential.aws_service); let expected_signature = info.x_amz_signature; if signature != expected_signature { Loading crates/s3s/src/sig_v4/methods.rs +14 −2 Original line number Diff line number Diff line Loading @@ -263,7 +263,13 @@ pub fn create_chunk_string_to_sign( /// calculate signature #[must_use] pub fn calculate_signature(string_to_sign: &str, secret_key: &SecretKey, amz_date: &AmzDate, region: &str, service: &str) -> String { pub fn calculate_signature( string_to_sign: &str, secret_key: &SecretKey, amz_date: &AmzDate, region: &str, service: &str, ) -> String { let mut secret = { let secret_key = secret_key.expose(); let mut buf = <SmallVec<[u8; 128]>>::with_capacity(secret_key.len().saturating_add(4)); Loading Loading @@ -787,7 +793,13 @@ mod tests { ) ); let signature = calculate_signature(&string_to_sign, &secret_access_key, &info.amz_date, info.credential.aws_region, info.credential.aws_service); let signature = calculate_signature( &string_to_sign, &secret_access_key, &info.amz_date, info.credential.aws_region, info.credential.aws_service, ); assert_eq!(signature, "aeeed9bbccd4d02ee5c0109b86d86835f995330da4c265957d157751f604d404"); assert_eq!(signature, info.signature); } Loading Loading
crates/s3s/src/ops/signature.rs +2 −1 Original line number Diff line number Diff line Loading @@ -158,7 +158,8 @@ impl SignatureContext<'_> { let secret_key = auth.get_secret_key(&access_key).await?; let string_to_sign = info.policy; let signature = sig_v4::calculate_signature(string_to_sign, &secret_key, &amz_date, credential.aws_region, credential.aws_service); let signature = sig_v4::calculate_signature(string_to_sign, &secret_key, &amz_date, credential.aws_region, credential.aws_service); let expected_signature = info.x_amz_signature; if signature != expected_signature { Loading
crates/s3s/src/sig_v4/methods.rs +14 −2 Original line number Diff line number Diff line Loading @@ -263,7 +263,13 @@ pub fn create_chunk_string_to_sign( /// calculate signature #[must_use] pub fn calculate_signature(string_to_sign: &str, secret_key: &SecretKey, amz_date: &AmzDate, region: &str, service: &str) -> String { pub fn calculate_signature( string_to_sign: &str, secret_key: &SecretKey, amz_date: &AmzDate, region: &str, service: &str, ) -> String { let mut secret = { let secret_key = secret_key.expose(); let mut buf = <SmallVec<[u8; 128]>>::with_capacity(secret_key.len().saturating_add(4)); Loading Loading @@ -787,7 +793,13 @@ mod tests { ) ); let signature = calculate_signature(&string_to_sign, &secret_access_key, &info.amz_date, info.credential.aws_region, info.credential.aws_service); let signature = calculate_signature( &string_to_sign, &secret_access_key, &info.amz_date, info.credential.aws_region, info.credential.aws_service, ); assert_eq!(signature, "aeeed9bbccd4d02ee5c0109b86d86835f995330da4c265957d157751f604d404"); assert_eq!(signature, info.signature); } Loading