Skip to content

Strip reverse proxy headers in SigV4 processor to fix SignatureDoesNo…#42

Open
mjbraun wants to merge 1 commit intomainfrom
fix-sigv4-proxy-headers
Open

Strip reverse proxy headers in SigV4 processor to fix SignatureDoesNo…#42
mjbraun wants to merge 1 commit intomainfrom
fix-sigv4-proxy-headers

Conversation

@mjbraun
Copy link
Contributor

@mjbraun mjbraun commented Mar 3, 2026

When tokenizer runs behind a reverse proxy (e.g., fly-proxy), standard proxy headers like X-Forwarded-For, Via, etc. get injected into requests. These headers were being signed by the SigV4 processor, but could then be modified by outbound proxies, causing AWS signature verification to fail.

Also adds a FIXME noting that region/service parsing from the credential scope appears to be swapped (left unchanged to avoid breaking existing clients).

…tMatch

When tokenizer runs behind a reverse proxy (e.g., fly-proxy), standard
proxy headers like X-Forwarded-For, Via, etc. get injected into requests.
These headers were being signed by the SigV4 processor, but could then be
modified by outbound proxies, causing AWS signature verification to fail.

Also adds a FIXME noting that region/service parsing from the credential
scope appears to be swapped (left unchanged to avoid breaking existing clients).
@mjbraun mjbraun requested a review from timflyio March 3, 2026 17:28
Copy link
Contributor

@timflyio timflyio left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

wish we could just tell v4 signer api to ignore some headers.. other than that itch, lgtm.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants