Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Do not Escape HTML when encoding the policy #1374

Merged
merged 1 commit into from
Aug 11, 2021
Merged

Do not Escape HTML when encoding the policy #1374

merged 1 commit into from
Aug 11, 2021

Conversation

joshwoodkx
Copy link
Contributor

Fixes #1373

This code was taken from a related PR on the V1 SDK: aws/aws-sdk-go#2164.

Since the V2 SDK only supports go1.15 and above, we can just use the encoder.SetEscapeHTML(false) that the go json encoder provides (the PR for V1 had to also support v1.7, so that PR also had to implement a solution without using this)

@skmcgrail
Copy link
Member

Thank you @joshwoodkx for bringing this to our attention, and putting together a PR to address this issue. This seems to have been an oversight when porting over the code from V1. It appears that the logic was not copied from https://github.com/aws/aws-sdk-go/blob/e2d6cb448883e4f4fcc5246650f89bde349041ec/service/cloudfront/sign/policy_json_1_7.go as expected. We will get this merged in for our next release.

@skmcgrail skmcgrail self-requested a review August 11, 2021 16:56
@skmcgrail skmcgrail merged commit f5c57ae into aws:main Aug 11, 2021
jrichard8 pushed a commit to jrichard8/aws-sdk-go-v2 that referenced this pull request Feb 14, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

CloudFront Sign creates invalid signature if URL contains &
2 participants