Announcement: S3 default integrity change #6808
Replies: 1 comment 1 reply
-
Since #6810 was locked for no valid reason by @trivikr, let me point out 2 scenarios where this change negatively affects AWS customers:
As such, this should have been a major release. So you can hide behind your ridiculous "we only support AWS services" argument all you want, this release was completely botched, doesn't respect semantic versioning (semver) and goes against basic open source library principles. You can pretend you support open source in your marketing and announcements but your actions here shows otherwise. |
Beta Was this translation helpful? Give feedback.
-
In AWS SDK for JavaScript v3.729.0, we released changes to the S3 client that adopts new default integrity protections. For more information on default integrity behavior, please refer to the official SDK documentation. In SDK releases from this version on, clients default to enabling an additional checksum on all Put calls and enabling validation on Get calls.
You can disable default integrity protections for S3. We do not recommend this because checksums are important to S3 integrity posture. Integrity protections can be disabled by setting the config flag to
WHEN_REQUIRED
, or by using the related AWS shared config file settings or environment variables.Disclaimer: the AWS SDKs and CLI are designed for usage with official AWS services. We may introduce and enable new features by default, such as these new default integrity protections, prior to them being supported or otherwise handled by third-party service implementations. You can disable the new behavior with the
WHEN_REQUIRED
value for therequest_checksum_calculation
andresponse_checksum_validation
configuration options covered in Data Integrity Protections for Amazon S3.Beta Was this translation helpful? Give feedback.
All reactions