https://discord.cloudflare.com logo
Join Discord
Powered by
# r2
  • l

    lmtr0

    04/30/2022, 1:23 AM
    I created a new token with read permissions
  • l

    lmtr0

    04/30/2022, 1:23 AM
    still the same thing
  • v

    Vitali

    04/30/2022, 1:23 AM
    Bash substitutes just fine as long as it's not in single quotes (& I think you mean
    ${}
    right? -
    $()
    is a subshell invocation)
  • i

    Isaac McFadyen | YYZ01

    04/30/2022, 1:23 AM
    Yeah, I do 🙂
  • i

    Isaac McFadyen | YYZ01

    04/30/2022, 1:24 AM
    Not my area of expertise haha
  • j

    john.spurlock

    04/30/2022, 1:24 AM
    if its a sig failure, try
    --debug
    , will dump the string to sign and canonical req
  • v

    Vitali

    04/30/2022, 1:24 AM
    @lmtr0 unfortunately I can't help you anymore. It's the weekend and I need to take a break & hit the gym. I hope the community manages to help you out. I think I've seen people get the aws command-line tool to work but I'm not sure what's different
  • v

    Vitali

    04/30/2022, 1:25 AM
    All I can give you really is the signature we computed for your request
  • v

    Vitali

    04/30/2022, 1:25 AM
    But to me one sha256 string being different from another isn't generally helpful
  • l

    lmtr0

    04/30/2022, 1:26 AM
    ok, thank you for your help, I have spent all day today trying to make this work. I need a break too. Maybe later the problem will solve itself lol
  • v

    Vitali

    04/30/2022, 1:26 AM
    What I really should do though is dump the canonical request in the logs modulo secrets - that might be a good debugging thing
  • l

    lmtr0

    04/30/2022, 1:26 AM
    have a great time at the gym :)
  • l

    lmtr0

    04/30/2022, 1:27 AM
    maybe another time :) we should take a break. I mean, I have already spent more than 5 hours on the same problem.....
  • c

    Chaika

    04/30/2022, 1:43 AM
    Not too helpful, but I would just try re-creating and double checking what you did. i.e make a new key, get sha256sum of it
    echo -n "$CLOUDFLARE_API_TOKEN" | sha256sum | cut -f 1 -d " "
    , and try again. Someone way earlier mentioned that one of their keys was just borke until it was remade. For me on windows at least, that command works fine without issue, so it shouldn't be something with R2 not supporting something thataws s3api is sending

    â–¾

  • l

    lmtr0

    04/30/2022, 1:45 AM
    I will try with a new bucket
  • l

    lmtr0

    04/30/2022, 1:47 AM
    same error
  • l

    lmtr0

    04/30/2022, 1:47 AM
    generate a new api key
  • l

    lmtr0

    04/30/2022, 1:48 AM
  • l

    lmtr0

    04/30/2022, 1:49 AM
    at least the sha256sum starts with 69
  • l

    lmtr0

    04/30/2022, 1:49 AM
    felling good now
  • l

    lmtr0

    04/30/2022, 1:50 AM
  • l

    lmtr0

    04/30/2022, 1:50 AM
    same error
  • l

    lmtr0

    04/30/2022, 1:50 AM
  • l

    lmtr0

    04/30/2022, 1:50 AM
    all the same error
  • l

    lmtr0

    04/30/2022, 1:51 AM
    hmmmmmm
  • l

    lmtr0

    04/30/2022, 1:54 AM
    s3 api is a pain.....
  • c

    Chaika

    04/30/2022, 1:57 AM
    Strange, I just generated a new key with the same permissions, grabbed the ID, sha256sum, ran aws configure and popped in the new values, and ran it no issues
  • l

    lmtr0

    04/30/2022, 2:00 AM
    hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
  • l

    lmtr0

    04/30/2022, 2:00 AM
    is the problem in my machine?
  • l

    lmtr0

    04/30/2022, 2:02 AM
    nop, same error in fly.io
1...848586...1050Latest