You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It is expected to return error (400 Bad Request) in this case, but s3 gw returns an object without any problems. Seems like this headers are not parsed at all.
Same for test_sse_kms_not_declared where this invalid tag doesn't cause errors:
x-amz-server-side-encryption
The server-side encryption algorithm that was used when you store this object in Amazon S3 (for example, AES256, aws:kms, aws:kms:dsse).
we can try to add AES256 algo with x-amz-server-side-encryption as a similar implementation.
In AWS KMS, a symmetric encryption KMS key represents a 256-bit AES-GCM encryption key
we theoretically can try to add this implementation also, but we have to implement KMS service on our side.
It is required, because "x-amz-server-side-encryption-aws-kms-key-id" shows which key we should use for the encryption. Thus we have to manage them somehow
test_sse_kms_read_declare
invalid headers:
It is expected to return error (400 Bad Request) in this case, but s3 gw returns an object without any problems. Seems like this headers are not parsed at all.
Same for test_sse_kms_not_declared where this invalid tag doesn't cause errors:
The text was updated successfully, but these errors were encountered: