-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bizarre signed header issue #2
Comments
Hi! Thanks for digging useful information around the bug. Now I realize that this module never got published to CPAN (got so close, but so forgotten...). To try to get this fixed: When the signature fails, what headers are being signed? What are their values? What type of HTTP request are you sending to the ES? |
It is in fact on CPAN: https://metacpan.org/pod/release/JLMARTIN/Search-ElasticSearch-AmazonES-0.02/lib/Search/Elasticsearch/Cxn/AmazonES.pm For some reason, Google isn't indexing it This works, when forced to host only:
This does not work, when it gets to choose its headers:
|
FWIW, it seems like any second header to sign causes an issue here -- if I change my above code to include
|
@pjlsergeant : Can you try to adapt the code to using: https://github.com/pplu/AWSv4Signer. I haven't packaged it yet tu upload to CPAN, but it's close, and I think it will let you control exactly what headers you want or not |
I really have no idea what's causing this, but, Amazon is rejecting the signatures produced by
Net::Amazon::Signature::V4
for my requests using this module. I'm not sure where the fault lies -- is it with how this is producing header values, or a problem with the parent module?Anyway, with the local sub-override this works, without it, I get
"The request signature we calculated does not match the signature you provided. Check your AWS Secret Access Key and signing method. Consult the service documentation for details."
which is just odd.The text was updated successfully, but these errors were encountered: