From f0cc130849461fa17595eeb926a48845e34a1616 Mon Sep 17 00:00:00 2001 From: Chris Lu Date: Mon, 23 Aug 2021 03:09:41 -0700 Subject: [PATCH] do not force path style for better compatibility --- weed/remote_storage/s3/s3_storage_client.go | 1 - weed/replication/sink/s3sink/s3_sink.go | 1 - weed/storage/backend/s3_backend/s3_sessions.go | 1 - 3 files changed, 3 deletions(-) diff --git a/weed/remote_storage/s3/s3_storage_client.go b/weed/remote_storage/s3/s3_storage_client.go index 472fd8f12..defe2aee8 100644 --- a/weed/remote_storage/s3/s3_storage_client.go +++ b/weed/remote_storage/s3/s3_storage_client.go @@ -29,7 +29,6 @@ func (s s3RemoteStorageMaker) Make(conf *filer_pb.RemoteConf) (remote_storage.Re config := &aws.Config{ Region: aws.String(conf.S3Region), Endpoint: aws.String(conf.S3Endpoint), - S3ForcePathStyle: aws.Bool(true), } if conf.S3AccessKey != "" && conf.S3SecretKey != "" { config.Credentials = credentials.NewStaticCredentials(conf.S3AccessKey, conf.S3SecretKey, "") diff --git a/weed/replication/sink/s3sink/s3_sink.go b/weed/replication/sink/s3sink/s3_sink.go index 6fbef31e9..bf1fc3af6 100644 --- a/weed/replication/sink/s3sink/s3_sink.go +++ b/weed/replication/sink/s3sink/s3_sink.go @@ -76,7 +76,6 @@ func (s3sink *S3Sink) initialize(awsAccessKeyId, awsSecretAccessKey, region, buc config := &aws.Config{ Region: aws.String(s3sink.region), Endpoint: aws.String(s3sink.endpoint), - S3ForcePathStyle: aws.Bool(true), } if awsAccessKeyId != "" && awsSecretAccessKey != "" { config.Credentials = credentials.NewStaticCredentials(awsAccessKeyId, awsSecretAccessKey, "") diff --git a/weed/storage/backend/s3_backend/s3_sessions.go b/weed/storage/backend/s3_backend/s3_sessions.go index b8378c379..db4714efe 100644 --- a/weed/storage/backend/s3_backend/s3_sessions.go +++ b/weed/storage/backend/s3_backend/s3_sessions.go @@ -36,7 +36,6 @@ func createSession(awsAccessKeyId, awsSecretAccessKey, region, endpoint string) config := &aws.Config{ Region: aws.String(region), Endpoint: aws.String(endpoint), - S3ForcePathStyle: aws.Bool(true), } if awsAccessKeyId != "" && awsSecretAccessKey != "" { config.Credentials = credentials.NewStaticCredentials(awsAccessKeyId, awsSecretAccessKey, "")