X-Amz-SignedHeader:
Lists the headers that you used to calculate the signature. The following headers are required in the signature calculations:
The HTTP host header.
Any x-amz-* headers that you plan to add to the request.
I really don't know how this is working with AWS S3.
@Mo33n, can you disable ACL support in mod_http_upload ?
https://github.com/esl/MongooseIM/blob/master/doc/modules/mod_http_upload.md
Set add_acl to false. I expect this will resolve your problem though this is just a workaround.
<BucketName/>
<Resource>
/waafi/22c2e898a5c6eb0004fc68ca9a095ac42db4dee44c0eb2e9db30d64c3abc2f86/1508415843822.jpg
</Resource>
<RequestId>3L137</RequestId>
<HostId>3L137</HostId>
</Error>
Dear @vadmeste
[root@ivr /]# ./mc policy download ~/Photos/waafi/
Access permission for /root/Photos/waafi/ is set to download
Still the problem is same.
@Mo33n, you should set the policy of a bucket belonging to a S3 server and not to a path in your machine.
For that, you need to configure an alias first in mc. The alias should point to your server.
https://docs.minio.io/docs/minio-client-quickstart-guide
e.g.:
mc config host add myminio http://192.168.1.51 BKIKJAA5BMMU2RHO6IBB V7f1CwQqAcwo80UEIJEjc5gVQUSSx5ohQ9GSrr12 S3v4
then:
mc policy download myminio/waafi
Its working fine with by disabling the acl support. and setting the buckets policy as download. this seems a work around.
I believe this ticket is still valid.
Please close it if i am wrong.
Its working fine with by disabling the acl support. and setting the buckets policy as download. this seems a work around.
The bug is in the client @Mo33n this is the reason we asked you to disable ACL to avoid the x-amz-acl signature issue. Also enabling ACL doesn't make sense with Minio since we do not support ACL anyways.
FWIW we cannot fix this aws-sdk-go works properly as indicated by @vadmeste with similar headers and requirements. What needs to be fixed here is mongooseIM which is incorrectly generating a presigned URL. If the workaround by disabling ACL works then that would be a resolution for the time being but ideally mongooseIM should be fixed .
Okay, i understand the point, But my concern is that, Why mongooseIm presigned URL work fine with the Amazone s3 cloud, But not with minio.
as both storage are s3 compliant.
Okay, i understand the point, But my concern i that, What mongooseIm presigned URL work fine with the Amazone s3 cloud, But not with minio.
as both storage are s3 compliant.
In our experience AWS S3 is inconsistent at times with the signature spec implementation and varies based on the region of the bucket. It is not conclusive and sporadically changes in nature.
changed the title
Minio show the signature mismatch problem , While amazone s3 storate works fine.
[resolved] Minio show the signature mismatch problem , While amazone s3 storate works fine.
Apr 10, 2020