|
|
|
@ -215,14 +215,14 @@ func (iam *IdentityAccessManagement) verifyV4Signature(r *http.Request, shouldCh |
|
|
|
availableKeys = append(availableKeys, key) |
|
|
|
} |
|
|
|
iam.m.RUnlock() |
|
|
|
|
|
|
|
|
|
|
|
glog.Warningf("InvalidAccessKeyId: attempted key '%s' not found. Available keys: %d, Auth enabled: %v", |
|
|
|
authInfo.AccessKey, len(availableKeys), iam.isAuthEnabled) |
|
|
|
|
|
|
|
|
|
|
|
if glog.V(2) && len(availableKeys) > 0 { |
|
|
|
glog.V(2).Infof("Available access keys: %v", availableKeys) |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
return nil, nil, "", nil, s3err.ErrInvalidAccessKeyID |
|
|
|
} |
|
|
|
|
|
|
|
@ -563,10 +563,10 @@ func (iam *IdentityAccessManagement) doesPolicySignatureV4Match(formValues http. |
|
|
|
iam.m.RLock() |
|
|
|
availableKeyCount := len(iam.accessKeyIdent) |
|
|
|
iam.m.RUnlock() |
|
|
|
|
|
|
|
|
|
|
|
glog.Warningf("InvalidAccessKeyId (POST policy): attempted key '%s' not found. Available keys: %d, Auth enabled: %v", |
|
|
|
credHeader.accessKey, availableKeyCount, iam.isAuthEnabled) |
|
|
|
|
|
|
|
|
|
|
|
return s3err.ErrInvalidAccessKeyID |
|
|
|
} |
|
|
|
|
|
|
|
|