Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package aws-c-auth for openSUSE:Factory 
checked in at 2025-03-26 21:22:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/aws-c-auth (Old)
 and      /work/SRC/openSUSE:Factory/.aws-c-auth.new.2696 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "aws-c-auth"

Wed Mar 26 21:22:58 2025 rev:18 rq:1256215 version:0.8.7

Changes:
--------
--- /work/SRC/openSUSE:Factory/aws-c-auth/aws-c-auth.changes    2025-03-13 
15:07:11.884718256 +0100
+++ /work/SRC/openSUSE:Factory/.aws-c-auth.new.2696/aws-c-auth.changes  
2025-03-26 21:25:16.259114142 +0100
@@ -1,0 +2,7 @@
+Tue Mar 18 08:28:45 UTC 2025 - John Paul Adrian Glaubitz 
<adrian.glaub...@suse.com>
+
+- Update to version 0.8.7
+  * Only forbid `X-Amz-S3session-Token` when signing with s3 express
+    by @TingDaoK in (#268)
+
+-------------------------------------------------------------------

Old:
----
  v0.8.6.tar.gz

New:
----
  v0.8.7.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ aws-c-auth.spec ++++++
--- /var/tmp/diff_new_pack.BZjj36/_old  2025-03-26 21:25:16.943142264 +0100
+++ /var/tmp/diff_new_pack.BZjj36/_new  2025-03-26 21:25:16.943142264 +0100
@@ -20,7 +20,7 @@
 %define library_pkg 1_0_0
 %define library_soversion 1
 Name:           aws-c-auth
-Version:        0.8.6
+Version:        0.8.7
 Release:        0
 Summary:        AWS C99 library implementation of AWS client-side 
authentication
 License:        Apache-2.0

++++++ v0.8.6.tar.gz -> v0.8.7.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/aws-c-auth-0.8.6/source/aws_signing.c 
new/aws-c-auth-0.8.7/source/aws_signing.c
--- old/aws-c-auth-0.8.6/source/aws_signing.c   2025-03-04 22:34:11.000000000 
+0100
+++ new/aws-c-auth-0.8.7/source/aws_signing.c   2025-03-17 21:41:36.000000000 
+0100
@@ -199,10 +199,8 @@
         return AWS_OP_ERR;
     }
 
+    // Only forbit this header if the signing algorithm is 
AWS_SIGNING_ALGORITHM_V4_S3EXPRESS
     s_amz_s3session_token_header_name = 
aws_byte_cursor_from_string(g_aws_signing_s3session_token_name);
-    if (aws_hash_table_put(&s_forbidden_headers, 
&s_amz_s3session_token_header_name, NULL, NULL)) {
-        return AWS_OP_ERR;
-    }
 
     if (aws_hash_table_init(
             &s_forbidden_params,
@@ -1378,7 +1376,7 @@
     return AWS_OP_SUCCESS;
 }
 
-static int s_validate_signable_header_list(struct aws_array_list *header_list) 
{
+static int s_validate_signable_header_list(struct aws_array_list *header_list, 
enum aws_signing_algorithm algo) {
     const size_t header_count = aws_array_list_length(header_list);
     for (size_t i = 0; i < header_count; ++i) {
         struct aws_signable_property_list_pair header;
@@ -1396,6 +1394,15 @@
                 AWS_BYTE_CURSOR_PRI(header.name));
             return aws_raise_error(AWS_AUTH_SIGNING_ILLEGAL_REQUEST_HEADER);
         }
+        if (algo == AWS_SIGNING_ALGORITHM_V4_S3EXPRESS) {
+            if (aws_byte_cursor_eq_ignore_case(&header.name, 
&s_amz_s3session_token_header_name)) {
+                AWS_LOGF_ERROR(
+                    AWS_LS_AUTH_SIGNING,
+                    "AWS authorization header \"" PRInSTR "\" for S3Express 
found in request while signing",
+                    AWS_BYTE_CURSOR_PRI(header.name));
+                return 
aws_raise_error(AWS_AUTH_SIGNING_ILLEGAL_REQUEST_HEADER);
+            }
+        }
     }
 
     return AWS_OP_SUCCESS;
@@ -1415,7 +1422,7 @@
         return AWS_OP_ERR;
     }
 
-    if (s_validate_signable_header_list(signable_header_list)) {
+    if (s_validate_signable_header_list(signable_header_list, 
state->config.algorithm)) {
         return AWS_OP_ERR;
     }
 

Reply via email to