Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

s3 client region header getBucketLocation - not authorized in all regions #260

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dupontz
Copy link

@dupontz dupontz commented Jul 12, 2024

At the time of writing this, the getBucketLocation(bucket), when querying a bucket at the ap-southeast-1 with the default region (us-east-01) is failing with:

com.amazonaws.services.s3.model.AmazonS3Exception: The authorization header is malformed; the region 'us-east-1' is wrong; expecting 'ap-southeast-1' (Service: Amazon S3; Status Code: 400; Error Code: AuthorizationHeaderMalformed; Request ID: 7MS6DSEXVCGSDAMC; S3 Extended Request ID: W+TtTvGGr631WQusxuCjqbwNqVbMYxOroPzHKGXIMuJZe28Z4mGbWM5wCyr94U1q7kAUoT9ccHw=; Proxy: null), S3 Extended Request ID: W+TtTvGGr631WQusxuCjqbwNqVbMYxOroPzHKGXIMuJZe28Z4mGbWM5wCyr94U1q7kAUoT9ccHw=

I found a couple of reports in the past that this was a temporary issue, but it has lasted more than 48 hours.

This doesn't affect other regions. Tested sa-east-1, eu-central-1 and us-east-1.

I've also tried to play with different s3 URLs, by providing a specific region endpoint.

Not sure if this behavior is going to be rolled out to other regions or what. This fix isn't ideal if the stack is not in the same region as the bucket but I'm counting on the header will be accepted.

Feel free to tune in @tarunmenon95 and @jaredbrook

@dupontz dupontz changed the title set getBucketLocation s3 client region header as the cfstack region s3 client region header getBucketLocation - not authorized in all regions Jul 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant