From: Robin H. Johnson Date: Sun, 19 Jan 2014 02:01:20 +0000 (-0800) Subject: rgw: Use correct secret key for POST authn X-Git-Tag: v0.77~17^2 X-Git-Url: http://git-server-git.apps.pok.os.sepia.ceph.com/?a=commitdiff_plain;h=refs%2Fpull%2F1114%2Fhead;p=ceph.git rgw: Use correct secret key for POST authn The POST authentication by signature validation looked up a user based on the access key, then used the first secret key for the user. If the access key used was not the first access key, then the expected signature would be wrong, and the POST would be rejected. Signed-off-by: Robin H. Johnson --- diff --git a/src/rgw/rgw_rest_s3.cc b/src/rgw/rgw_rest_s3.cc index de56e24842c..68dba64375e 100644 --- a/src/rgw/rgw_rest_s3.cc +++ b/src/rgw/rgw_rest_s3.cc @@ -964,7 +964,14 @@ int RGWPostObj_ObjStore_S3::get_policy() map access_keys = user_info.access_keys; - map::const_iterator iter = access_keys.begin(); + map::const_iterator iter = access_keys.find(s3_access_key); + // We know the key must exist, since the user was returned by + // rgw_get_user_info_by_access_key, but it doesn't hurt to check! + if (iter == access_keys.end()) { + ldout(s->cct, 0) << "Secret key lookup failed!" << dendl; + err_msg = "No secret key for matching access key"; + return -EACCES; + } string s3_secret_key = (iter->second).key; char expected_signature_char[CEPH_CRYPTO_HMACSHA1_DIGESTSIZE];