2014-12-30 17:25:09 -05:00
module Fog
module Storage
2015-01-02 12:34:40 -05:00
class AWS < Fog :: Service
2014-12-30 17:25:09 -05:00
extend Fog :: AWS :: CredentialFetcher :: ServiceMethods
COMPLIANT_BUCKET_NAMES = / ^(?:[a-z]| \ d(?! \ d{0,2}(?: \ . \ d{1,3}){3}$))(?:[a-z0-9]| \ .(?![ \ . \ -])| \ -(?![ \ .])){1,61}[a-z0-9]$ /
DEFAULT_REGION = 'us-east-1'
DEFAULT_SCHEME = 'https'
DEFAULT_SCHEME_PORT = {
'http' = > 80 ,
'https' = > 443
}
VALID_QUERY_KEYS = %w[
acl
cors
delete
lifecycle
location
logging
notification
partNumber
policy
requestPayment
response - cache - control
response - content - disposition
response - content - encoding
response - content - language
response - content - type
response - expires
restore
tagging
torrent
uploadId
uploads
versionId
versioning
versions
website
]
requires :aws_access_key_id , :aws_secret_access_key
recognizes :endpoint , :region , :host , :port , :scheme , :persistent , :use_iam_profile , :aws_session_token , :aws_credentials_expire_at , :path_style , :instrumentor , :instrumentor_name , :aws_signature_version
secrets :aws_secret_access_key , :hmac
model_path 'fog/aws/models/storage'
collection :directories
model :directory
collection :files
model :file
request_path 'fog/aws/requests/storage'
request :abort_multipart_upload
request :complete_multipart_upload
request :copy_object
request :delete_bucket
request :delete_bucket_cors
request :delete_bucket_lifecycle
request :delete_bucket_policy
request :delete_bucket_website
request :delete_object
request :delete_multiple_objects
request :delete_bucket_tagging
request :get_bucket
request :get_bucket_acl
request :get_bucket_cors
request :get_bucket_lifecycle
request :get_bucket_location
request :get_bucket_logging
request :get_bucket_object_versions
request :get_bucket_policy
request :get_bucket_tagging
request :get_bucket_versioning
request :get_bucket_website
2015-01-06 12:32:01 -05:00
request :get_bucket_notification
2014-12-30 17:25:09 -05:00
request :get_object
request :get_object_acl
request :get_object_torrent
request :get_object_http_url
request :get_object_https_url
request :get_object_url
request :get_request_payment
request :get_service
request :head_bucket
request :head_object
2015-02-07 07:57:19 -05:00
request :head_object_url
2014-12-30 17:25:09 -05:00
request :initiate_multipart_upload
request :list_multipart_uploads
request :list_parts
request :post_object_hidden_fields
request :post_object_restore
request :put_bucket
request :put_bucket_acl
request :put_bucket_cors
request :put_bucket_lifecycle
request :put_bucket_logging
request :put_bucket_policy
request :put_bucket_tagging
request :put_bucket_versioning
request :put_bucket_website
2015-01-06 12:32:01 -05:00
request :put_bucket_notification
2014-12-30 17:25:09 -05:00
request :put_object
request :put_object_acl
request :put_object_url
request :put_request_payment
request :sync_clock
request :upload_part
module Utils
attr_accessor :region
def cdn
@cdn || = Fog :: AWS :: CDN . new (
:aws_access_key_id = > @aws_access_key_id ,
:aws_secret_access_key = > @aws_secret_access_key ,
:use_iam_profile = > @use_iam_profile
)
end
def http_url ( params , expires )
signed_url ( params . merge ( :scheme = > 'http' ) , expires )
end
def https_url ( params , expires )
signed_url ( params . merge ( :scheme = > 'https' ) , expires )
end
def url ( params , expires )
Fog :: Logger . deprecation ( " Fog::Storage::AWS => # url is deprecated, use # https_url instead [light_black]( #{ caller . first } )[/] " )
https_url ( params , expires )
end
def request_url ( params )
params = request_params ( params )
params_to_url ( params )
end
def signed_url ( params , expires )
2015-05-02 04:07:08 -04:00
refresh_credentials_if_expired
2014-12-30 17:25:09 -05:00
#convert expires from a point in time to a delta to now
2015-01-20 16:56:37 -05:00
expires = expires . to_i
if @signature_version == 4
params = v4_signed_params_for_url ( params , expires )
else
params = v2_signed_params_for_url ( params , expires )
end
params_to_url ( params )
end
private
def validate_signature_version!
unless @signature_version == 2 || @signature_version == 4
raise " Unknown signature version #{ @signature_version } ; valid versions are 2 or 4 "
end
end
def v4_signed_params_for_url ( params , expires )
2015-01-02 12:34:40 -05:00
now = Fog :: Time . now
2014-12-30 17:25:09 -05:00
2015-01-20 16:56:37 -05:00
expires = expires - now . to_i
2014-12-30 17:25:09 -05:00
params [ :headers ] || = { }
params [ :query ] || = { }
params [ :query ] [ 'X-Amz-Expires' ] = expires
params [ :query ] [ 'X-Amz-Date' ] = now . to_iso8601_basic
if @aws_session_token
params [ :query ] [ 'X-Amz-Security-Token' ] = @aws_session_token
end
params = request_params ( params )
params [ :headers ] [ :host ] = params [ :host ]
2015-01-20 16:56:37 -05:00
signature_query_params = @signer . signature_parameters ( params , now , " UNSIGNED-PAYLOAD " )
params [ :query ] = ( params [ :query ] || { } ) . merge ( signature_query_params )
params
end
def v2_signed_params_for_url ( params , expires )
if @aws_session_token
params [ :headers ] || = { }
params [ :headers ] [ 'x-amz-security-token' ] = @aws_session_token
end
signature = signature_v2 ( params , expires )
2014-12-30 17:25:09 -05:00
2015-01-20 16:56:37 -05:00
params = request_params ( params )
2014-12-30 17:25:09 -05:00
2015-01-20 16:56:37 -05:00
signature_query_params = {
'AWSAccessKeyId' = > @aws_access_key_id ,
'Signature' = > signature ,
'Expires' = > expires ,
}
params [ :query ] = ( params [ :query ] || { } ) . merge ( signature_query_params )
params [ :query ] [ 'x-amz-security-token' ] = @aws_session_token if @aws_session_token
params
2014-12-30 17:25:09 -05:00
end
def region_to_host ( region = nil )
case region . to_s
when DEFAULT_REGION , ''
's3.amazonaws.com'
2015-09-30 22:32:14 -04:00
when 'cn-north-1'
's3.cn-north-1.amazonaws.com.cn'
2014-12-30 17:25:09 -05:00
else
" s3- #{ region } .amazonaws.com "
end
end
def object_to_path ( object_name = nil )
'/' + escape ( object_name . to_s ) . gsub ( '%2F' , '/' )
end
def bucket_to_path ( bucket_name , path = nil )
" / #{ escape ( bucket_name . to_s ) } #{ path } "
end
# NOTE: differs from Fog::AWS.escape by NOT escaping `/`
def escape ( string )
string . gsub ( / ([^a-zA-Z0-9_. \ -~ \/ ]+) / ) {
" % " + $1 . unpack ( " H2 " * $1 . bytesize ) . join ( " % " ) . upcase
}
end
# Transforms things like bucket_name, object_name, region
#
# Should yield the same result when called f*f
def request_params ( params )
headers = params [ :headers ] || { }
if params [ :scheme ]
scheme = params [ :scheme ]
port = params [ :port ] || DEFAULT_SCHEME_PORT [ scheme ]
else
scheme = @scheme
port = @port
end
if DEFAULT_SCHEME_PORT [ scheme ] == port
port = nil
end
if params [ :region ]
region = params [ :region ]
host = params [ :host ] || region_to_host ( region )
else
region = @region || DEFAULT_REGION
host = params [ :host ] || @host || region_to_host ( region )
end
path = params [ :path ] || object_to_path ( params [ :object_name ] )
path = '/' + path if path [ 0 .. 0 ] != '/'
if params [ :bucket_name ]
bucket_name = params [ :bucket_name ]
2015-02-24 14:39:57 -05:00
if params [ :bucket_cname ]
host = bucket_name
else
path_style = params . fetch ( :path_style , @path_style )
if ! path_style
if COMPLIANT_BUCKET_NAMES !~ bucket_name
Fog :: Logger . warning ( " fog: the specified s3 bucket name( #{ bucket_name } ) is not a valid dns name, which will negatively impact performance. For details see: http://docs.amazonwebservices.com/AmazonS3/latest/dev/BucketRestrictions.html " )
path_style = true
elsif scheme == 'https' && ! path_style && bucket_name =~ / \ . /
Fog :: Logger . warning ( " fog: the specified s3 bucket name( #{ bucket_name } ) contains a '.' so is not accessible over https as a virtual hosted bucket, which will negatively impact performance. For details see: http://docs.amazonwebservices.com/AmazonS3/latest/dev/BucketRestrictions.html " )
path_style = true
end
2015-01-02 12:34:40 -05:00
end
2014-12-30 17:25:09 -05:00
2015-02-24 14:39:57 -05:00
if path_style
path = bucket_to_path bucket_name , path
else
host = [ bucket_name , host ] . join ( '.' )
end
2014-12-30 17:25:09 -05:00
end
end
ret = params . merge ( {
:scheme = > scheme ,
:host = > host ,
:port = > port ,
:path = > path ,
:headers = > headers
} )
#
ret . delete ( :path_style )
ret . delete ( :bucket_name )
ret . delete ( :object_name )
ret . delete ( :region )
ret
end
def params_to_url ( params )
query = params [ :query ] && params [ :query ] . map do | key , value |
if value
[ key , escape ( value . to_s ) ] . join ( '=' )
else
key
end
end . join ( '&' )
URI :: Generic . build ( {
:scheme = > params [ :scheme ] ,
:host = > params [ :host ] ,
:port = > params [ :port ] ,
:path = > params [ :path ] ,
:query = > query ,
} ) . to_s
end
end
class Mock
include Utils
2015-05-02 04:07:08 -04:00
include Fog :: AWS :: CredentialFetcher :: ConnectionMethods
2014-12-30 17:25:09 -05:00
def self . acls ( type )
case type
when 'private'
{
" AccessControlList " = > [
{
" Permission " = > " FULL_CONTROL " ,
" Grantee " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
}
] ,
" Owner " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
}
when 'public-read'
{
" AccessControlList " = > [
{
" Permission " = > " FULL_CONTROL " ,
" Grantee " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
} ,
{
" Permission " = > " READ " ,
" Grantee " = > { " URI " = > " http://acs.amazonaws.com/groups/global/AllUsers " }
}
] ,
" Owner " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
}
when 'public-read-write'
{
" AccessControlList " = > [
{
" Permission " = > " FULL_CONTROL " ,
" Grantee " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
} ,
{
" Permission " = > " READ " ,
" Grantee " = > { " URI " = > " http://acs.amazonaws.com/groups/global/AllUsers " }
} ,
{
" Permission " = > " WRITE " ,
" Grantee " = > { " URI " = > " http://acs.amazonaws.com/groups/global/AllUsers " }
}
] ,
" Owner " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
}
when 'authenticated-read'
{
" AccessControlList " = > [
{
" Permission " = > " FULL_CONTROL " ,
" Grantee " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
} ,
{
" Permission " = > " READ " ,
" Grantee " = > { " URI " = > " http://acs.amazonaws.com/groups/global/AuthenticatedUsers " }
}
] ,
" Owner " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
}
end
end
def self . data
@data || = Hash . new do | hash , region |
hash [ region ] = Hash . new do | region_hash , key |
region_hash [ key ] = {
:acls = > {
:bucket = > { } ,
:object = > { }
} ,
:buckets = > { } ,
:cors = > {
:bucket = > { }
} ,
2015-01-06 12:32:01 -05:00
:bucket_notifications = > { } ,
2014-12-30 17:25:09 -05:00
:bucket_tagging = > { } ,
:multipart_uploads = > { }
}
end
end
end
def self . reset
@data = nil
end
def initialize ( options = { } )
@use_iam_profile = options [ :use_iam_profile ]
2015-01-20 15:04:34 -05:00
@region = options [ :region ] || DEFAULT_REGION
2014-12-30 17:25:09 -05:00
if @endpoint = options [ :endpoint ]
endpoint = URI . parse ( @endpoint )
@host = endpoint . host
@scheme = endpoint . scheme
@port = endpoint . port
else
@host = options [ :host ] || region_to_host ( @region )
@scheme = options [ :scheme ] || DEFAULT_SCHEME
@port = options [ :port ] || DEFAULT_SCHEME_PORT [ @scheme ]
end
2015-01-20 15:04:34 -05:00
2014-12-30 17:25:09 -05:00
@path_style = options [ :path_style ] || false
2015-01-20 16:56:37 -05:00
@signature_version = options . fetch ( :aws_signature_version , 4 )
validate_signature_version!
2014-12-30 17:25:09 -05:00
setup_credentials ( options )
end
def data
self . class . data [ @region ] [ @aws_access_key_id ]
end
def reset_data
self . class . data [ @region ] . delete ( @aws_access_key_id )
end
def setup_credentials ( options )
@aws_access_key_id = options [ :aws_access_key_id ]
@aws_secret_access_key = options [ :aws_secret_access_key ]
@aws_session_token = options [ :aws_session_token ]
@aws_credentials_expire_at = options [ :aws_credentials_expire_at ]
@signer = Fog :: AWS :: SignatureV4 . new ( @aws_access_key_id , @aws_secret_access_key , @region , 's3' )
end
2015-01-20 16:56:37 -05:00
def signature_v2 ( params , expires )
'foo'
end
2014-12-30 17:25:09 -05:00
end
class Real
include Utils
include Fog :: AWS :: CredentialFetcher :: ConnectionMethods
# Initialize connection to S3
#
# ==== Notes
# options parameter must include values for :aws_access_key_id and
# :aws_secret_access_key in order to create a connection
#
# ==== Examples
# s3 = Fog::Storage.new(
2015-01-02 12:34:40 -05:00
# :provider => "AWS",
2014-12-30 17:25:09 -05:00
# :aws_access_key_id => your_aws_access_key_id,
# :aws_secret_access_key => your_aws_secret_access_key
# )
#
# ==== Parameters
# * options<~Hash> - config arguments for connection. Defaults to {}.
#
# ==== Returns
# * S3 object with connection to aws.
def initialize ( options = { } )
@use_iam_profile = options [ :use_iam_profile ]
@instrumentor = options [ :instrumentor ]
@instrumentor_name = options [ :instrumentor_name ] || 'fog.aws.storage'
@connection_options = options [ :connection_options ] || { }
@persistent = options . fetch ( :persistent , false )
@signature_version = options . fetch ( :aws_signature_version , 4 )
validate_signature_version!
@path_style = options [ :path_style ] || false
2015-01-20 15:04:34 -05:00
@region = options [ :region ] || DEFAULT_REGION
2014-12-30 17:25:09 -05:00
if @endpoint = options [ :endpoint ]
endpoint = URI . parse ( @endpoint )
@host = endpoint . host
@scheme = endpoint . scheme
@port = endpoint . port
else
@host = options [ :host ] || region_to_host ( @region )
@scheme = options [ :scheme ] || DEFAULT_SCHEME
@port = options [ :port ] || DEFAULT_SCHEME_PORT [ @scheme ]
end
setup_credentials ( options )
end
def reload
@connection . reset if @connection
end
private
def setup_credentials ( options )
@aws_access_key_id = options [ :aws_access_key_id ]
@aws_secret_access_key = options [ :aws_secret_access_key ]
@aws_session_token = options [ :aws_session_token ]
@aws_credentials_expire_at = options [ :aws_credentials_expire_at ]
if @signature_version == 4
@signer = Fog :: AWS :: SignatureV4 . new ( @aws_access_key_id , @aws_secret_access_key , @region , 's3' )
elsif @signature_version == 2
@hmac = Fog :: HMAC . new ( 'sha1' , @aws_secret_access_key )
end
end
def connection ( scheme , host , port )
uri = " #{ scheme } :// #{ host } : #{ port } "
if @persistent
unless uri == @connection_uri
@connection_uri = uri
reload
@connection = nil
end
else
@connection = nil
end
@connection || = Fog :: XML :: Connection . new ( uri , @persistent , @connection_options )
end
def request ( params , & block )
refresh_credentials_if_expired
date = Fog :: Time . now
params = params . dup
2015-03-13 12:35:14 -04:00
stringify_query_keys ( params )
2014-12-30 17:25:09 -05:00
params [ :headers ] = ( params [ :headers ] || { } ) . dup
params [ :headers ] [ 'x-amz-security-token' ] = @aws_session_token if @aws_session_token
if @signature_version == 2
expires = date . to_date_header
params [ :headers ] [ 'Date' ] = expires
2015-01-02 12:34:40 -05:00
params [ :headers ] [ 'Authorization' ] = " AWS #{ @aws_access_key_id } : #{ signature_v2 ( params , expires ) } "
2014-12-30 17:25:09 -05:00
end
params = request_params ( params )
scheme = params . delete ( :scheme )
host = params . delete ( :host )
port = params . delete ( :port ) || DEFAULT_SCHEME_PORT [ scheme ]
params [ :headers ] [ 'Host' ] = host
if @signature_version == 4
params [ :headers ] [ 'x-amz-date' ] = date . to_iso8601_basic
if params [ :body ] . respond_to? ( :read )
# See http://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-streaming.html
2015-07-08 04:41:35 -04:00
# We ignore the bit about setting the content-encoding to aws-chunked because
# this can cause s3 to serve files with a blank content encoding which causes problems with some CDNs
# AWS have confirmed that s3 can infer that the content-encoding is aws-chunked from the x-amz-content-sha256 header
#
2015-01-02 12:34:40 -05:00
params [ :headers ] [ 'x-amz-content-sha256' ] = 'STREAMING-AWS4-HMAC-SHA256-PAYLOAD'
2014-12-30 17:25:09 -05:00
params [ :headers ] [ 'x-amz-decoded-content-length' ] = params [ :headers ] . delete 'Content-Length'
else
params [ :headers ] [ 'x-amz-content-sha256' ] || = Digest :: SHA256 . hexdigest ( params [ :body ] || '' )
end
signature_components = @signer . signature_components ( params , date , params [ :headers ] [ 'x-amz-content-sha256' ] )
params [ :headers ] [ 'Authorization' ] = @signer . components_to_header ( signature_components )
2015-01-02 12:34:40 -05:00
2014-12-30 17:25:09 -05:00
if params [ :body ] . respond_to? ( :read )
body = params . delete :body
params [ :request_block ] = S3Streamer . new ( body , signature_components [ 'X-Amz-Signature' ] , @signer , date )
end
end
# FIXME: ToHashParser should make this not needed
original_params = params . dup
if @instrumentor
@instrumentor . instrument ( " #{ @instrumentor_name } .request " , params ) do
_request ( scheme , host , port , params , original_params , & block )
end
else
_request ( scheme , host , port , params , original_params , & block )
end
end
def _request ( scheme , host , port , params , original_params , & block )
connection ( scheme , host , port ) . request ( params , & block )
rescue Excon :: Errors :: MovedPermanently , Excon :: Errors :: TemporaryRedirect = > error
headers = ( error . response . is_a? ( Hash ) ? error . response [ :headers ] : error . response . headers )
new_params = { }
if headers . has_key? ( 'Location' )
new_params [ :host ] = URI . parse ( headers [ 'Location' ] ) . host
else
body = error . response . is_a? ( Hash ) ? error . response [ :body ] : error . response . body
2015-01-09 17:42:07 -05:00
# some errors provide info indirectly
2014-12-30 17:25:09 -05:00
new_params [ :bucket_name ] = %r{ <Bucket>([^<]*)</Bucket> } . match ( body ) . captures . first
new_params [ :host ] = %r{ <Endpoint>([^<]*)</Endpoint> } . match ( body ) . captures . first
2015-01-09 17:42:07 -05:00
# some errors provide it directly
2015-01-24 06:46:17 -05:00
@new_region = %r{ <Region>([^<]*)</Region> } . match ( body ) ? Regexp . last_match . captures . first : nil
2014-12-30 17:25:09 -05:00
end
Fog :: Logger . warning ( " fog: followed redirect to #{ host } , connecting to the matching region will be more performant " )
original_region , original_signer = @region , @signer
2015-01-09 17:42:07 -05:00
@region = @new_region || case new_params [ :host ]
2015-07-30 20:11:19 -04:00
when / s3.amazonaws.com / , / s3-external-1.amazonaws.com /
2014-12-30 17:25:09 -05:00
DEFAULT_REGION
else
%r{ s3[ \ . \ -]([^ \ .]*).amazonaws.com } . match ( new_params [ :host ] ) . captures . first
end
if @signature_version == 4
@signer = Fog :: AWS :: SignatureV4 . new ( @aws_access_key_id , @aws_secret_access_key , @region , 's3' )
original_params [ :headers ] . delete ( 'Authorization' )
end
response = request ( original_params . merge ( new_params ) , & block )
@region , @signer = original_region , original_signer
response
end
# See http://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-streaming.html
class S3Streamer
attr_accessor :body , :signature , :signer , :finished , :date , :initial_signature
def initialize ( body , signature , signer , date )
self . body = body
self . date = date
self . signature = signature
self . initial_signature = signature
self . signer = signer
if body . respond_to? ( :binmode )
body . binmode
end
2015-01-02 12:34:40 -05:00
2014-12-30 17:25:09 -05:00
if body . respond_to? ( :pos = )
body . pos = 0
end
end
#called if excon wants to retry the request. As well as rewinding the body
#we must also reset the signature
def rewind
self . signature = initial_signature
2015-11-30 14:43:53 -05:00
self . finished = false
2014-12-30 17:25:09 -05:00
body . rewind
end
def call
if finished
''
else
next_chunk
end
end
def next_chunk
data = body . read ( 0x10000 )
if data . nil?
self . finished = true
data = ''
end
self . signature = sign_chunk ( data , signature )
" #{ data . length . to_s ( 16 ) } ;chunk-signature= #{ signature } \r \n #{ data } \r \n "
end
def sign_chunk ( data , previous_signature )
string_to_sign = <<-DATA
2015-01-02 12:34:40 -05:00
AWS4 - HMAC - SHA256 - PAYLOAD
2014-12-30 17:25:09 -05:00
#{date.to_iso8601_basic}
#{signer.credential_scope(date)}
#{previous_signature}
#{Digest::SHA256.hexdigest('')}
#{Digest::SHA256.hexdigest(data)}
DATA
hmac = signer . derived_hmac ( date )
hmac . sign ( string_to_sign . strip ) . unpack ( 'H*' ) . first
end
end
def signature_v2 ( params , expires )
headers = params [ :headers ] || { }
string_to_sign =
<<-DATA
#{params[:method].to_s.upcase}
#{headers['Content-MD5']}
#{headers['Content-Type']}
#{expires}
DATA
amz_headers , canonical_amz_headers = { } , ''
for key , value in headers
if key [ 0 .. 5 ] == 'x-amz-'
amz_headers [ key ] = value
end
end
amz_headers = amz_headers . sort { | x , y | x [ 0 ] < = > y [ 0 ] }
for key , value in amz_headers
canonical_amz_headers << " #{ key } : #{ value } \n "
end
string_to_sign << canonical_amz_headers
query_string = ''
if params [ :query ]
query_args = [ ]
for key in params [ :query ] . keys . sort
if VALID_QUERY_KEYS . include? ( key )
value = params [ :query ] [ key ]
if value
query_args << " #{ key } = #{ value } "
else
query_args << key
end
end
end
if query_args . any?
query_string = '?' + query_args . join ( '&' )
end
end
canonical_path = ( params [ :path ] || object_to_path ( params [ :object_name ] ) ) . to_s
canonical_path = '/' + canonical_path if canonical_path [ 0 .. 0 ] != '/'
if params [ :bucket_name ]
canonical_resource = " / #{ params [ :bucket_name ] } #{ canonical_path } "
else
canonical_resource = canonical_path
end
canonical_resource << query_string
string_to_sign << canonical_resource
signed_string = @hmac . sign ( string_to_sign )
Base64 . encode64 ( signed_string ) . chomp!
end
2015-03-07 21:29:42 -05:00
def stringify_query_keys ( params )
2015-03-13 12:35:14 -04:00
params [ :query ] = Hash [ params [ :query ] . map { | k , v | [ k . to_s , v ] } ] if params [ :query ]
2015-03-07 21:29:42 -05:00
end
2014-12-30 17:25:09 -05:00
end
end
end
end