Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support custom headers in aws_sigv4_url/1 #443

Merged
merged 2 commits into from
Jan 2, 2025

Conversation

benjreinhart
Copy link
Contributor

@benjreinhart benjreinhart commented Jan 2, 2025

S3-compatible APIs support additional headers for certain behaviors. For example, my team wants to create presigned urls for uploading files from the client. To ensure integrity of uploads and keep track of storage consumption by our end users, we want to enforce the uploaded file is the size reported by the client. This can be accomplished using the content-length header.

S3 supports content-length-range which I see is used by req_s3 presign_form/1. However, we're using Cloudflare R2 via their S3-compatible API and it appears that value is not supported but the content-length header is. Additionally, we want the exact size to be enforced, not a range or max.

This PR supports arbitrary headers passed to Req.Utils.aws_sigv4_url/1. I wasn't entirely sure where this belongs as there is S3-signing-related logic in a few places (this module and req_s3). From what I could tell, signature logic should be added here. Happy to adjust if needed.

{"X-Amz-Expires", expires},
{"X-Amz-SignedHeaders", signed_headers}
],
# Ensure spaces are encoded as %20 not +
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

While this should not be a problem with the existing implementation (because arbitrary query params are not supported), this felt like a potential bug waiting to happen, so I updated to use the correct whitespace encoding.

@wojtekmach wojtekmach merged commit dbf3602 into wojtekmach:main Jan 2, 2025
2 checks passed
@wojtekmach
Copy link
Owner

Thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants