|
|
|
@@ -102,7 +102,7 @@ func (a *AWSAuth) Auth(c *gin.Context) { |
|
|
|
|
|
|
|
verifySig := getSignatureFromAWSHeader(verifyReq) |
|
|
|
if !strings.EqualFold(verifySig, reqSig) { |
|
|
|
logger.Warnf("signature mismatch, expect(%d): %s, actual(%d): %s", len(reqSig), reqSig, len(verifySig), verifySig) |
|
|
|
logger.Warnf("signature mismatch, input header: %s, verify: %s", authorizationHeader, verifySig) |
|
|
|
c.AbortWithStatusJSON(http.StatusOK, Failed(errorcode.Unauthorized, "signature mismatch")) |
|
|
|
return |
|
|
|
} |
|
|
|
@@ -158,7 +158,7 @@ func (a *AWSAuth) AuthWithoutBody(c *gin.Context) { |
|
|
|
|
|
|
|
verifySig := getSignatureFromAWSHeader(verifyReq) |
|
|
|
if !strings.EqualFold(verifySig, reqSig) { |
|
|
|
logger.Warnf("signature mismatch, expect(%d): %s, actual(%d): %s", len(reqSig), reqSig, len(verifySig), verifySig) |
|
|
|
logger.Warnf("signature mismatch, input header: %s, verify: %s", authorizationHeader, verifySig) |
|
|
|
c.AbortWithStatusJSON(http.StatusOK, Failed(errorcode.Unauthorized, "signature mismatch")) |
|
|
|
return |
|
|
|
} |
|
|
|
@@ -221,6 +221,7 @@ func (a *AWSAuth) PresignedAuth(c *gin.Context) { |
|
|
|
|
|
|
|
verifySig := getSignatureFromAWSQuery(uri) |
|
|
|
if !strings.EqualFold(verifySig, signature) { |
|
|
|
logger.Warnf("signature mismatch, input: %s, verify: %s", signature, verifySig) |
|
|
|
c.AbortWithStatusJSON(http.StatusOK, Failed(errorcode.Unauthorized, "signature mismatch")) |
|
|
|
return |
|
|
|
} |
|
|
|
|