line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package AWS::Signature4; |
2
|
|
|
|
|
|
|
|
3
|
1
|
|
|
1
|
|
554
|
use strict; |
|
1
|
|
|
|
|
1
|
|
|
1
|
|
|
|
|
35
|
|
4
|
1
|
|
|
1
|
|
480
|
use POSIX 'strftime'; |
|
1
|
|
|
|
|
4667
|
|
|
1
|
|
|
|
|
5
|
|
5
|
1
|
|
|
1
|
|
1394
|
use URI; |
|
1
|
|
|
|
|
3362
|
|
|
1
|
|
|
|
|
34
|
|
6
|
1
|
|
|
1
|
|
494
|
use URI::QueryParam; |
|
1
|
|
|
|
|
499
|
|
|
1
|
|
|
|
|
23
|
|
7
|
1
|
|
|
1
|
|
5
|
use URI::Escape; |
|
1
|
|
|
|
|
1
|
|
|
1
|
|
|
|
|
65
|
|
8
|
1
|
|
|
1
|
|
523
|
use Digest::SHA 'sha256_hex','hmac_sha256','hmac_sha256_hex'; |
|
1
|
|
|
|
|
2824
|
|
|
1
|
|
|
|
|
72
|
|
9
|
1
|
|
|
1
|
|
533
|
use Date::Parse; |
|
1
|
|
|
|
|
5297
|
|
|
1
|
|
|
|
|
113
|
|
10
|
1
|
|
|
1
|
|
5
|
use Carp 'croak'; |
|
1
|
|
|
|
|
1
|
|
|
1
|
|
|
|
|
2940
|
|
11
|
|
|
|
|
|
|
|
12
|
|
|
|
|
|
|
our $VERSION = '1.02'; |
13
|
|
|
|
|
|
|
|
14
|
|
|
|
|
|
|
=head1 NAME |
15
|
|
|
|
|
|
|
|
16
|
|
|
|
|
|
|
AWS::Signature4 - Create a version4 signature for Amazon Web Services |
17
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
=head1 SYNOPSIS |
19
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
use AWS::Signature4; |
21
|
|
|
|
|
|
|
use HTTP::Request::Common; |
22
|
|
|
|
|
|
|
use LWP; |
23
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
my $signer = AWS::Signature4->new(-access_key => 'AKIDEXAMPLE', |
25
|
|
|
|
|
|
|
-secret_key => 'wJalrXUtnFEMI/K7MDENG+bPxRfiCYEXAMPLEKEY'); |
26
|
|
|
|
|
|
|
my $ua = LWP::UserAgent->new(); |
27
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
# Example POST request |
29
|
|
|
|
|
|
|
my $request = POST('https://iam.amazonaws.com', |
30
|
|
|
|
|
|
|
[Action=>'ListUsers', |
31
|
|
|
|
|
|
|
Version=>'2010-05-08']); |
32
|
|
|
|
|
|
|
$signer->sign($request); |
33
|
|
|
|
|
|
|
my $response = $ua->request($request); |
34
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
# Example GET request |
36
|
|
|
|
|
|
|
my $uri = URI->new('https://iam.amazonaws.com'); |
37
|
|
|
|
|
|
|
$uri->query_form(Action=>'ListUsers', |
38
|
|
|
|
|
|
|
Version=>'2010-05-08'); |
39
|
|
|
|
|
|
|
|
40
|
|
|
|
|
|
|
my $url = $signer->signed_url($uri); # This gives a signed URL that can be fetched by a browser |
41
|
|
|
|
|
|
|
my $response = $ua->get($url); |
42
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
=head1 DESCRIPTION |
44
|
|
|
|
|
|
|
|
45
|
|
|
|
|
|
|
This module implement's Amazon Web Service's Signature version 4 |
46
|
|
|
|
|
|
|
(http://docs.aws.amazon.com/general/latest/gr/signature-version-4.html). |
47
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
=head1 METHODS |
49
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
=over 4 |
51
|
|
|
|
|
|
|
|
52
|
|
|
|
|
|
|
=item $signer = AWS::Signature4->new(-access_key => $account_id,-secret_key => $private_key); |
53
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
Create a signing object using your AWS account ID and secret key. You |
55
|
|
|
|
|
|
|
may also use the temporary security tokens received from Amazon's STS |
56
|
|
|
|
|
|
|
service, either by passing the access and secret keys derived from the |
57
|
|
|
|
|
|
|
token, or by passing a VM::EC2::Security::Token produced by the |
58
|
|
|
|
|
|
|
VM::EC2 module. |
59
|
|
|
|
|
|
|
|
60
|
|
|
|
|
|
|
Arguments: |
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
Argument name Argument Value |
63
|
|
|
|
|
|
|
------------- -------------- |
64
|
|
|
|
|
|
|
-access_key An AWS acccess key (account ID) |
65
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
-secret_key An AWS secret key |
67
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
-security_token A VM::EC2::Security::Token object |
69
|
|
|
|
|
|
|
|
70
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
If a security token is provided, it overrides any values given for |
72
|
|
|
|
|
|
|
-access_key or -secret_key. |
73
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
If the environment variables EC2_ACCESS_KEY and/or EC2_SECRET_KEY are |
75
|
|
|
|
|
|
|
set, their contents are used as defaults for -acccess_key and |
76
|
|
|
|
|
|
|
-secret_key. |
77
|
|
|
|
|
|
|
|
78
|
|
|
|
|
|
|
=cut |
79
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
sub new { |
81
|
1
|
|
|
1
|
1
|
14887
|
my $self = shift; |
82
|
1
|
|
|
|
|
4
|
my %args = @_; |
83
|
|
|
|
|
|
|
|
84
|
1
|
|
|
|
|
2
|
my ($id,$secret,$token); |
85
|
1
|
50
|
33
|
|
|
6
|
if (ref $args{-security_token} && $args{-security_token}->can('access_key_id')) { |
86
|
0
|
|
|
|
|
0
|
$id = $args{-security_token}->accessKeyId; |
87
|
0
|
|
|
|
|
0
|
$secret = $args{-security_token}->secretAccessKey; |
88
|
|
|
|
|
|
|
} |
89
|
|
|
|
|
|
|
|
90
|
1
|
50
|
33
|
|
|
11
|
$id ||= $args{-access_key} || $ENV{EC2_ACCESS_KEY} |
|
|
|
33
|
|
|
|
|
91
|
|
|
|
|
|
|
or croak "Please provide -access_key parameter or define environment variable EC2_ACCESS_KEY"; |
92
|
1
|
50
|
33
|
|
|
9
|
$secret ||= $args{-secret_key} || $ENV{EC2_SECRET_KEY} |
|
|
|
33
|
|
|
|
|
93
|
|
|
|
|
|
|
or croak "Please provide -secret_key or define environment variable EC2_SECRET_KEY"; |
94
|
|
|
|
|
|
|
|
95
|
1
|
50
|
33
|
|
|
12
|
return bless { |
96
|
|
|
|
|
|
|
access_key => $id, |
97
|
|
|
|
|
|
|
secret_key => $secret, |
98
|
|
|
|
|
|
|
(defined($args{-security_token}) ? (security_token => $args{-security_token}) : ()), |
99
|
|
|
|
|
|
|
},ref $self || $self; |
100
|
|
|
|
|
|
|
} |
101
|
|
|
|
|
|
|
|
102
|
7
|
|
|
7
|
0
|
15
|
sub access_key { shift->{access_key } } |
103
|
4
|
|
|
4
|
0
|
7
|
sub secret_key { shift->{secret_key } } |
104
|
|
|
|
|
|
|
|
105
|
|
|
|
|
|
|
=item $signer->sign($request [,$region] [,$payload_sha256_hex]) |
106
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
Given an HTTP::Request object, add the headers required by AWS and |
108
|
|
|
|
|
|
|
then sign it with a version 4 signature by adding an "Authorization" |
109
|
|
|
|
|
|
|
header. |
110
|
|
|
|
|
|
|
|
111
|
|
|
|
|
|
|
The request must include a URL from which the AWS endpoint and service |
112
|
|
|
|
|
|
|
can be derived, such as "ec2.us-east-1.amazonaws.com." In some cases |
113
|
|
|
|
|
|
|
(e.g. S3 bucket operations) the endpoint does not indicate the |
114
|
|
|
|
|
|
|
region. In this case, the region can be forced by passing a defined |
115
|
|
|
|
|
|
|
value for $region. The current date and time will be added to the |
116
|
|
|
|
|
|
|
request using an "X-Amz-Date header." To force the date and time to a |
117
|
|
|
|
|
|
|
fixed value, include the "Date" header in the request. |
118
|
|
|
|
|
|
|
|
119
|
|
|
|
|
|
|
The request content, or "payload" is retrieved from the HTTP::Request |
120
|
|
|
|
|
|
|
object by calling its content() method.. Under some circumstances the |
121
|
|
|
|
|
|
|
payload is not included directly in the request, but is in an external |
122
|
|
|
|
|
|
|
file that will be uploaded as the request is executed. In this case, |
123
|
|
|
|
|
|
|
you must pass a second argument containing the results of running |
124
|
|
|
|
|
|
|
sha256_hex() (from the Digest::SHA module) on the content. |
125
|
|
|
|
|
|
|
|
126
|
|
|
|
|
|
|
The method returns a true value if successful. On errors, it will |
127
|
|
|
|
|
|
|
throw an exception. |
128
|
|
|
|
|
|
|
|
129
|
|
|
|
|
|
|
=item $url = $signer->signed_url($request) |
130
|
|
|
|
|
|
|
|
131
|
|
|
|
|
|
|
This method will generate a signed GET URL for the request. The URL |
132
|
|
|
|
|
|
|
will include everything needed to perform the request. |
133
|
|
|
|
|
|
|
|
134
|
|
|
|
|
|
|
=back |
135
|
|
|
|
|
|
|
|
136
|
|
|
|
|
|
|
=cut |
137
|
|
|
|
|
|
|
|
138
|
|
|
|
|
|
|
sub sign { |
139
|
1
|
|
|
1
|
1
|
7547
|
my $self = shift; |
140
|
1
|
|
|
|
|
3
|
my ($request,$region,$payload_sha256_hex) = @_; |
141
|
1
|
|
|
|
|
15
|
$self->_add_date_header($request); |
142
|
1
|
|
|
|
|
41
|
$self->_sign($request,$region,$payload_sha256_hex); |
143
|
|
|
|
|
|
|
} |
144
|
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
=item my $url $signer->signed_url($request_or_uri [,$expires]) |
146
|
|
|
|
|
|
|
|
147
|
|
|
|
|
|
|
Pass an HTTP::Request, a URI object, or just a plain URL string |
148
|
|
|
|
|
|
|
containing the proper endpoint and parameters needed for an AWS REST |
149
|
|
|
|
|
|
|
API Call. This method will return an appropriately signed request as a |
150
|
|
|
|
|
|
|
URI object, which can be shared with non-AWS users for the purpose of, |
151
|
|
|
|
|
|
|
e.g., accessing an object in a private S3 bucket. |
152
|
|
|
|
|
|
|
|
153
|
|
|
|
|
|
|
Pass an optional $expires argument to indicate that the URL will only |
154
|
|
|
|
|
|
|
be valid for a finite period of time. The value of the argument is in |
155
|
|
|
|
|
|
|
seconds. |
156
|
|
|
|
|
|
|
|
157
|
|
|
|
|
|
|
=cut |
158
|
|
|
|
|
|
|
|
159
|
|
|
|
|
|
|
|
160
|
|
|
|
|
|
|
sub signed_url { |
161
|
3
|
|
|
3
|
1
|
1828
|
my $self = shift; |
162
|
3
|
|
|
|
|
4
|
my ($arg1,$expires) = @_; |
163
|
|
|
|
|
|
|
|
164
|
3
|
|
|
|
|
3
|
my ($request,$uri); |
165
|
|
|
|
|
|
|
|
166
|
3
|
100
|
66
|
|
|
15
|
if (ref $arg1 && UNIVERSAL::isa($arg1,'HTTP::Request')) { |
167
|
1
|
|
|
|
|
2
|
$request = $arg1; |
168
|
1
|
|
|
|
|
3
|
$uri = $request->uri; |
169
|
1
|
|
|
|
|
7
|
my $content = $request->content; |
170
|
1
|
50
|
|
|
|
12
|
$uri->query($content) if $content; |
171
|
1
|
50
|
33
|
|
|
5
|
if (my $date = $request->header('X-Amz-Date') || $request->header('Date')) { |
172
|
1
|
|
|
|
|
130
|
$uri->query_param('Date'=>$date); |
173
|
|
|
|
|
|
|
} |
174
|
|
|
|
|
|
|
} |
175
|
|
|
|
|
|
|
|
176
|
3
|
|
66
|
|
|
182
|
$uri ||= URI->new($arg1); |
177
|
3
|
|
33
|
|
|
125
|
my $date = $uri->query_param_delete('Date') || $uri->query_param_delete('X-Amz-Date'); |
178
|
3
|
|
|
|
|
358
|
$request = HTTP::Request->new(GET=>$uri); |
179
|
3
|
|
|
|
|
131
|
$request->header('Date'=> $date); |
180
|
3
|
|
|
|
|
103
|
$uri = $request->uri; # because HTTP::Request->new() copies the uri! |
181
|
|
|
|
|
|
|
|
182
|
3
|
50
|
|
|
|
17
|
return $uri if $uri->query_param('X-Amz-Signature'); |
183
|
|
|
|
|
|
|
|
184
|
|
|
|
|
|
|
|
185
|
3
|
|
|
|
|
139
|
my $scope = $self->_scope($request); |
186
|
|
|
|
|
|
|
|
187
|
3
|
|
|
|
|
8
|
$uri->query_param('X-Amz-Algorithm' => $self->_algorithm); |
188
|
3
|
|
|
|
|
362
|
$uri->query_param('X-Amz-Credential' => $self->access_key . '/' . $scope); |
189
|
3
|
|
|
|
|
446
|
$uri->query_param('X-Amz-Date' => $self->_datetime($request)); |
190
|
3
|
50
|
|
|
|
569
|
$uri->query_param('X-Amz-Expires' => $expires) if $expires; |
191
|
3
|
|
|
|
|
7
|
$uri->query_param('X-Amz-SignedHeaders' => 'host'); |
192
|
|
|
|
|
|
|
|
193
|
|
|
|
|
|
|
# If there was a security token passed, we need to supply it as part of the authorization |
194
|
|
|
|
|
|
|
# because AWS requires it to validate IAM Role temporary credentials. |
195
|
|
|
|
|
|
|
|
196
|
3
|
50
|
|
|
|
620
|
if (defined($self->{security_token})) { |
197
|
0
|
|
|
|
|
0
|
$uri->query_param('X-Amz-Security-Token' => $self->{security_token}); |
198
|
|
|
|
|
|
|
} |
199
|
|
|
|
|
|
|
|
200
|
|
|
|
|
|
|
# Since we're providing auth via query parameters, we need to include UNSIGNED-PAYLOAD |
201
|
|
|
|
|
|
|
# http://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-query-string-auth.html |
202
|
|
|
|
|
|
|
# it seems to only be needed for S3. |
203
|
|
|
|
|
|
|
|
204
|
3
|
50
|
|
|
|
8
|
if ($scope =~ /\/s3\/aws4_request$/) { |
205
|
0
|
|
|
|
|
0
|
$self->_sign($request, undef, 'UNSIGNED-PAYLOAD'); |
206
|
|
|
|
|
|
|
} else { |
207
|
3
|
|
|
|
|
6
|
$self->_sign($request); |
208
|
|
|
|
|
|
|
} |
209
|
|
|
|
|
|
|
|
210
|
3
|
|
|
|
|
103
|
my ($algorithm,$credential,$signedheaders,$signature) = |
211
|
|
|
|
|
|
|
$request->header('Authorization') =~ /^(\S+) Credential=(\S+), SignedHeaders=(\S+), Signature=(\S+)/; |
212
|
3
|
|
|
|
|
93
|
$uri->query_param_append('X-Amz-Signature' => $signature); |
213
|
3
|
|
|
|
|
626
|
return $uri; |
214
|
|
|
|
|
|
|
} |
215
|
|
|
|
|
|
|
|
216
|
|
|
|
|
|
|
|
217
|
|
|
|
|
|
|
sub _add_date_header { |
218
|
1
|
|
|
1
|
|
3
|
my $self = shift; |
219
|
1
|
|
|
|
|
2
|
my $request = shift; |
220
|
1
|
|
|
|
|
1
|
my $datetime; |
221
|
1
|
50
|
|
|
|
3
|
unless ($datetime = $request->header('x-amz-date')) { |
222
|
1
|
|
|
|
|
49
|
$datetime = $self->_zulu_time($request); |
223
|
1
|
|
|
|
|
4
|
$request->header('x-amz-date'=>$datetime); |
224
|
|
|
|
|
|
|
} |
225
|
|
|
|
|
|
|
} |
226
|
|
|
|
|
|
|
|
227
|
|
|
|
|
|
|
sub _scope { |
228
|
7
|
|
|
7
|
|
8
|
my $self = shift; |
229
|
7
|
|
|
|
|
8
|
my ($request,$region) = @_; |
230
|
7
|
|
|
|
|
13
|
my $host = $request->uri->host; |
231
|
7
|
|
|
|
|
130
|
my $datetime = $self->_datetime($request); |
232
|
7
|
|
|
|
|
61
|
my ($date) = $datetime =~ /^(\d+)T/; |
233
|
7
|
|
|
|
|
8
|
my $service; |
234
|
7
|
50
|
|
|
|
49
|
if ($host =~ /^([\w.-]+)\.s3\.amazonaws.com/) { # S3 bucket virtual host |
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
235
|
0
|
|
|
|
|
0
|
$service = 's3'; |
236
|
0
|
|
0
|
|
|
0
|
$region ||= 'us-east-1'; |
237
|
|
|
|
|
|
|
} elsif ($host =~ /^[\w-]+\.s3-([\w-]+)\.amazonaws\.com/) { |
238
|
0
|
|
|
|
|
0
|
$service = 's3'; |
239
|
0
|
|
0
|
|
|
0
|
$region ||= $2; |
240
|
|
|
|
|
|
|
} elsif ($host =~ /^(\w+)[-.]([\w-]+)\.amazonaws\.com/) { |
241
|
0
|
|
|
|
|
0
|
$service = $1; |
242
|
0
|
|
0
|
|
|
0
|
$region ||= $2; |
243
|
|
|
|
|
|
|
} elsif ($host =~ /^([\w-]+)\.amazonaws\.com/) { |
244
|
7
|
|
|
|
|
16
|
$service = $1; |
245
|
7
|
|
|
|
|
9
|
$region = 'us-east-1'; |
246
|
|
|
|
|
|
|
} |
247
|
7
|
|
50
|
|
|
10
|
$service ||= 's3'; |
248
|
7
|
|
50
|
|
|
9
|
$region ||= 'us-east-1'; # default |
249
|
7
|
|
|
|
|
38
|
return "$date/$region/$service/aws4_request"; |
250
|
|
|
|
|
|
|
} |
251
|
|
|
|
|
|
|
|
252
|
|
|
|
|
|
|
sub _parse_scope { |
253
|
4
|
|
|
4
|
|
5
|
my $self = shift; |
254
|
4
|
|
|
|
|
2
|
my $scope = shift; |
255
|
4
|
|
|
|
|
18
|
return split '/',$scope; |
256
|
|
|
|
|
|
|
} |
257
|
|
|
|
|
|
|
|
258
|
|
|
|
|
|
|
sub _datetime { |
259
|
14
|
|
|
14
|
|
14
|
my $self = shift; |
260
|
14
|
|
|
|
|
13
|
my $request = shift; |
261
|
14
|
|
66
|
|
|
29
|
return $request->header('x-amz-date') || $self->_zulu_time($request); |
262
|
|
|
|
|
|
|
} |
263
|
|
|
|
|
|
|
|
264
|
7
|
|
|
7
|
|
14
|
sub _algorithm { return 'AWS4-HMAC-SHA256' } |
265
|
|
|
|
|
|
|
|
266
|
|
|
|
|
|
|
sub _sign { |
267
|
4
|
|
|
4
|
|
4
|
my $self = shift; |
268
|
4
|
|
|
|
|
7
|
my ($request,$region,$payload_sha256_hex) = @_; |
269
|
4
|
50
|
|
|
|
9
|
return if $request->header('Authorization'); # don't overwrite |
270
|
|
|
|
|
|
|
|
271
|
4
|
|
|
|
|
118
|
my $datetime = $self->_datetime($request); |
272
|
|
|
|
|
|
|
|
273
|
4
|
50
|
|
|
|
34
|
unless ($request->header('host')) { |
274
|
4
|
|
|
|
|
114
|
my $host = $request->uri->host; |
275
|
4
|
|
|
|
|
251
|
$request->header(host=>$host); |
276
|
|
|
|
|
|
|
} |
277
|
|
|
|
|
|
|
|
278
|
4
|
|
|
|
|
125
|
my $scope = $self->_scope($request,$region); |
279
|
4
|
|
|
|
|
5
|
my ($date,$service); |
280
|
4
|
|
|
|
|
10
|
($date,$region,$service) = $self->_parse_scope($scope); |
281
|
|
|
|
|
|
|
|
282
|
4
|
|
|
|
|
11
|
my $secret_key = $self->secret_key; |
283
|
4
|
|
|
|
|
9
|
my $access_key = $self->access_key; |
284
|
4
|
|
|
|
|
8
|
my $algorithm = $self->_algorithm; |
285
|
|
|
|
|
|
|
|
286
|
4
|
|
|
|
|
8
|
my ($hashed_request,$signed_headers) = $self->_hash_canonical_request($request,$payload_sha256_hex); |
287
|
4
|
|
|
|
|
9
|
my $string_to_sign = $self->_string_to_sign($datetime,$scope,$hashed_request); |
288
|
4
|
|
|
|
|
16
|
my $signature = $self->_calculate_signature($secret_key,$service,$region,$date,$string_to_sign); |
289
|
4
|
|
|
|
|
18
|
$request->header(Authorization => "$algorithm Credential=$access_key/$scope, SignedHeaders=$signed_headers, Signature=$signature"); |
290
|
|
|
|
|
|
|
} |
291
|
|
|
|
|
|
|
|
292
|
|
|
|
|
|
|
sub _zulu_time { |
293
|
13
|
|
|
13
|
|
358
|
my $self = shift; |
294
|
13
|
|
|
|
|
9
|
my $request = shift; |
295
|
13
|
|
|
|
|
22
|
my $date = $request->header('Date'); |
296
|
13
|
50
|
|
|
|
303
|
my @datetime = $date ? gmtime(str2time($date)) : gmtime(); |
297
|
13
|
|
|
|
|
2534
|
return strftime('%Y%m%dT%H%M%SZ',@datetime); |
298
|
|
|
|
|
|
|
} |
299
|
|
|
|
|
|
|
|
300
|
|
|
|
|
|
|
sub _hash_canonical_request { |
301
|
4
|
|
|
4
|
|
5
|
my $self = shift; |
302
|
4
|
|
|
|
|
5
|
my ($request,$hashed_payload) = @_; # (HTTP::Request,sha256_hex($content)) |
303
|
4
|
|
|
|
|
11
|
my $method = $request->method; |
304
|
4
|
|
|
|
|
34
|
my $uri = $request->uri; |
305
|
4
|
|
50
|
|
|
27
|
my $path = $uri->path || '/'; |
306
|
4
|
|
|
|
|
54
|
my @params = $uri->query_form; |
307
|
4
|
|
|
|
|
266
|
my $headers = $request->headers; |
308
|
4
|
|
33
|
|
|
26
|
$hashed_payload ||= sha256_hex($request->content); |
309
|
|
|
|
|
|
|
|
310
|
|
|
|
|
|
|
# canonicalize query string |
311
|
4
|
|
|
|
|
78
|
my %canonical; |
312
|
4
|
|
|
|
|
12
|
while (my ($key,$value) = splice(@params,0,2)) { |
313
|
18
|
|
|
|
|
27
|
$key = uri_escape($key); |
314
|
18
|
|
|
|
|
130
|
$value = uri_escape($value); |
315
|
18
|
|
|
|
|
112
|
push @{$canonical{$key}},$value; |
|
18
|
|
|
|
|
58
|
|
316
|
|
|
|
|
|
|
} |
317
|
4
|
|
|
|
|
21
|
my $canonical_query_string = join '&',map {my $key = $_; map {"$key=$_"} sort @{$canonical{$key}}} sort keys %canonical; |
|
18
|
|
|
|
|
12
|
|
|
18
|
|
|
|
|
14
|
|
|
18
|
|
|
|
|
31
|
|
|
18
|
|
|
|
|
15
|
|
318
|
|
|
|
|
|
|
|
319
|
|
|
|
|
|
|
# canonicalize the request headers |
320
|
4
|
|
|
|
|
5
|
my (@canonical,%signed_fields); |
321
|
4
|
|
|
|
|
14
|
for my $header (sort map {lc} $headers->header_field_names) { |
|
11
|
|
|
|
|
102
|
|
322
|
11
|
100
|
|
|
|
28
|
next if $header =~ /^date$/i; |
323
|
7
|
|
|
|
|
13
|
my @values = $headers->header($header); |
324
|
|
|
|
|
|
|
# remove redundant whitespace |
325
|
7
|
|
|
|
|
137
|
foreach (@values ) { |
326
|
7
|
50
|
|
|
|
15
|
next if /^".+"$/; |
327
|
7
|
|
|
|
|
9
|
s/^\s+//; |
328
|
7
|
|
|
|
|
10
|
s/\s+$//; |
329
|
7
|
|
|
|
|
12
|
s/(\s)\s+/$1/g; |
330
|
|
|
|
|
|
|
} |
331
|
7
|
|
|
|
|
18
|
push @canonical,"$header:".join(',',@values); |
332
|
7
|
|
|
|
|
12
|
$signed_fields{$header}++; |
333
|
|
|
|
|
|
|
} |
334
|
4
|
|
|
|
|
11
|
my $canonical_headers = join "\n",@canonical; |
335
|
4
|
|
|
|
|
5
|
$canonical_headers .= "\n"; |
336
|
4
|
|
|
|
|
7
|
my $signed_headers = join ';',sort map {lc} keys %signed_fields; |
|
7
|
|
|
|
|
13
|
|
337
|
|
|
|
|
|
|
|
338
|
4
|
|
|
|
|
8
|
my $canonical_request = join("\n",$method,$path,$canonical_query_string, |
339
|
|
|
|
|
|
|
$canonical_headers,$signed_headers,$hashed_payload); |
340
|
4
|
|
|
|
|
28
|
my $request_digest = sha256_hex($canonical_request); |
341
|
|
|
|
|
|
|
|
342
|
4
|
|
|
|
|
19
|
return ($request_digest,$signed_headers); |
343
|
|
|
|
|
|
|
} |
344
|
|
|
|
|
|
|
|
345
|
|
|
|
|
|
|
sub _string_to_sign { |
346
|
4
|
|
|
4
|
|
5
|
my $self = shift; |
347
|
4
|
|
|
|
|
5
|
my ($datetime,$credential_scope,$hashed_request) = @_; |
348
|
4
|
|
|
|
|
8
|
return join("\n",'AWS4-HMAC-SHA256',$datetime,$credential_scope,$hashed_request); |
349
|
|
|
|
|
|
|
} |
350
|
|
|
|
|
|
|
|
351
|
|
|
|
|
|
|
|
352
|
|
|
|
|
|
|
=item $signing_key = AWS::Signature4->signing_key($secret_access_key,$service_name,$region,$date) |
353
|
|
|
|
|
|
|
|
354
|
|
|
|
|
|
|
Return just the signing key in the event you wish to roll your own signature. |
355
|
|
|
|
|
|
|
|
356
|
|
|
|
|
|
|
=cut |
357
|
|
|
|
|
|
|
|
358
|
|
|
|
|
|
|
sub signing_key { |
359
|
4
|
|
|
4
|
1
|
4
|
my $self = shift; |
360
|
4
|
|
|
|
|
4
|
my ($kSecret,$service,$region,$date) = @_; |
361
|
4
|
|
|
|
|
33
|
my $kDate = hmac_sha256($date,'AWS4'.$kSecret); |
362
|
4
|
|
|
|
|
25
|
my $kRegion = hmac_sha256($region,$kDate); |
363
|
4
|
|
|
|
|
24
|
my $kService = hmac_sha256($service,$kRegion); |
364
|
4
|
|
|
|
|
24
|
my $kSigning = hmac_sha256('aws4_request',$kService); |
365
|
4
|
|
|
|
|
5
|
return $kSigning; |
366
|
|
|
|
|
|
|
} |
367
|
|
|
|
|
|
|
|
368
|
|
|
|
|
|
|
sub _calculate_signature { |
369
|
4
|
|
|
4
|
|
3
|
my $self = shift; |
370
|
4
|
|
|
|
|
5
|
my ($kSecret,$service,$region,$date,$string_to_sign) = @_; |
371
|
4
|
|
|
|
|
8
|
my $kSigning = $self->signing_key($kSecret,$service,$region,$date); |
372
|
4
|
|
|
|
|
31
|
return hmac_sha256_hex($string_to_sign,$kSigning); |
373
|
|
|
|
|
|
|
} |
374
|
|
|
|
|
|
|
|
375
|
|
|
|
|
|
|
1; |
376
|
|
|
|
|
|
|
|
377
|
|
|
|
|
|
|
=head1 SEE ALSO |
378
|
|
|
|
|
|
|
|
379
|
|
|
|
|
|
|
L |
380
|
|
|
|
|
|
|
|
381
|
|
|
|
|
|
|
=head1 AUTHOR |
382
|
|
|
|
|
|
|
|
383
|
|
|
|
|
|
|
Lincoln Stein Elincoln.stein@gmail.comE. |
384
|
|
|
|
|
|
|
|
385
|
|
|
|
|
|
|
Copyright (c) 2014 Ontario Institute for Cancer Research |
386
|
|
|
|
|
|
|
|
387
|
|
|
|
|
|
|
This package and its accompanying libraries is free software; you can |
388
|
|
|
|
|
|
|
redistribute it and/or modify it under the terms of the GPL (either |
389
|
|
|
|
|
|
|
version 1, or at your option, any later version) or the Artistic |
390
|
|
|
|
|
|
|
License 2.0. Refer to LICENSE for the full license text. In addition, |
391
|
|
|
|
|
|
|
please see DISCLAIMER.txt for disclaimers of warranty. |
392
|
|
|
|
|
|
|
|
393
|
|
|
|
|
|
|
=cut |
394
|
|
|
|
|
|
|
|
395
|
|
|
|
|
|
|
|