// Assume role uses the current server role to call STS and assume a different role if permitted // Params: // roleArn - the requested role ARN (example: arn:aws:iam::11111111111:role/myrole ) // sessionName - a name to associate with the current session. Use the service name + // unique idenfitifier preferebly. // duration - the duration of the session in seconds. Must be between 900 and 3600 // Returns aws.Auth object that can be used with any of the existing goamz APIs // // Check http://goo.gl/M6uCu5 for more information // func AssumeRole(roleArn string, sessionName string, duration int) (*aws.Auth, error) { if duration < 900 || duration > 3600 { return nil, fmt.Errorf("Duration out of bounds") } //Try to get our local auth localAuth, err := aws.GetAuth("", "", "", time.Time{}) if err != nil { return nil, err } stsClient := sts.New(localAuth, aws.Regions[util.GetAwsRegionName()]) stsOptions := &sts.AssumeRoleParams{ DurationSeconds: int(duration), RoleArn: roleArn, RoleSessionName: sessionName, } //Try to assume role roleAuth, err := stsClient.AssumeRole(stsOptions) if err != nil { return nil, err } //Marshal the response into an aws.Auth object auth := aws.NewAuth(roleAuth.Credentials.AccessKeyId, roleAuth.Credentials.SecretAccessKey, roleAuth.Credentials.SessionToken, roleAuth.Credentials.Expiration) return auth, nil }
// NewFrom Create A new SQS Client given an access and secret Key // region must be one of "us.east, us.west, eu.west" func NewFrom(accessKey, secretKey, region string) (*SQS, error) { auth := aws.NewAuth(accessKey, secretKey, "", time.Time{}) aws_region := aws.USEast switch region { case "us.east", "us.east.1": aws_region = aws.USEast case "us.west", "us.west.1": aws_region = aws.USWest case "us.west.2": aws_region = aws.USWest2 case "eu.west": aws_region = aws.EUWest case "ap.southeast", "ap.southeast.1": aws_region = aws.APSoutheast case "ap.southeast.2": aws_region = aws.APSoutheast2 case "ap.northeast", "ap.northeast.1": aws_region = aws.APNortheast case "sa.east", "sa.east.1": aws_region = aws.SAEast case "cn.north", "cn.north.1": aws_region = aws.CNNorth default: return nil, errors.New(fmt.Sprintf("Unknown/Unsupported region %s", region)) } aws_sqs := New(auth, aws_region) return aws_sqs, nil }
func TestBasicGroupRequest(t *testing.T) { var as *AutoScaling awsAuth, err := aws.EnvAuth() if err != nil { mockTest = true t.Log("Running mock tests as AWS environment variables are not set") awsAuth := aws.NewAuth("abc", "123", "", time.Time{}) as = New(awsAuth, aws.Region{AutoScalingEndpoint: testServer.URL}) testServer.Start() go testServer.WaitRequest() testServer.Response(200, nil, BasicGroupResponse) } else { as = New(awsAuth, aws.USWest2) } groupResp, err := as.DescribeAutoScalingGroups(nil, 10, "") if err != nil { t.Fatal(err) } if len(groupResp.AutoScalingGroups) > 0 { firstGroup := groupResp.AutoScalingGroups[0] if len(firstGroup.AutoScalingGroupName) > 0 { t.Logf("Found AutoScaling group %s\n", firstGroup.AutoScalingGroupName) } } testServer.Flush() }
func (s *S) SetUpSuite(c *C) { var err error testServer.Start() auth := aws.NewAuth("abc", "123", "", time.Time{}) s.rds, err = rds.New(auth, aws.Region{RDSEndpoint: aws.ServiceInfo{testServer.URL, aws.V2Signature}}) c.Assert(err, IsNil) }
func s3Client() *s3.S3 { r := aws.Region{ Name: "jp-east", S3Endpoint: "https://ds.jp-east.idcfcloud.com", } auth := aws.NewAuth(os.Getenv("IDCF_ACCESS_KEY"), os.Getenv("IDCF_ACCESS_SECRET"), "", time.Now()) return s3.New(*auth, r) }
func (s *LocalServer) SetUp(c *C) { srv, err := elbtest.NewServer() c.Assert(err, IsNil) c.Assert(srv, NotNil) s.srv = srv s.region = aws.Region{ELBEndpoint: srv.URL()} s.auth = aws.NewAuth("", "", "", time.Time{}) }
func (s *S) TestGetAuthEnv(c *C) { os.Clearenv() os.Setenv("AWS_SECRET_ACCESS_KEY", "secret") os.Setenv("AWS_ACCESS_KEY_ID", "access") auth, err := aws.GetAuth("", "", "", time.Time{}) c.Assert(err, IsNil) c.Assert(*auth, Equals, *aws.NewAuth("access", "secret", "", time.Time{})) }
func (s *S) SetUpSuite(c *C) { testServer.Start() auth := aws.NewAuth("abc", "123", "", time.Time{}) s.ec2 = ec2.NewWithClient( auth, aws.Region{EC2Endpoint: testServer.URL}, testutil.DefaultClient, ) }
func (s *S) TestSignatureExample1(c *C) { params := map[string]string{ "Timestamp": "2009-02-01T12:53:20+00:00", "Version": "2007-11-07", "Action": "ListDomains", } elb.Sign(aws.NewAuth("access", "secret", "", time.Time{}), "GET", "/", params, "sdb.amazonaws.com") expected := "okj96/5ucWBSc1uR2zXVfm6mDHtgfNv657rRtt/aunQ=" c.Assert(params["Signature"], Equals, expected) }
func (s *S) SetUpSuite(c *C) { testServer.Start() auth := aws.NewAuth("abc", "123", "", time.Time{}) u, err := url.Parse(testServer.URL) if err != nil { panic(err.Error()) } s.mturk = &mturk.MTurk{ Auth: auth, URL: u, } }
func (s *LocalServer) SetUp(c *C) { srv, err := s3test.NewServer(s.config) c.Assert(err, IsNil) c.Assert(srv, NotNil) s.srv = srv s.region = aws.Region{ Name: "faux-region-1", S3Endpoint: srv.URL(), S3LocationConstraint: true, // s3test server requires a LocationConstraint } s.auth = aws.NewAuth("", "", "", time.Time{}) }
func (s *S) TestSharedAuthDefaultCredentials(c *C) { os.Clearenv() d, err := ioutil.TempDir("", "") if err != nil { panic(err) } defer os.RemoveAll(d) err = os.Mkdir(d+"/.aws", 0755) if err != nil { panic(err) } ioutil.WriteFile(d+"/.aws/credentials", []byte("[default]\naws_access_key_id = access\naws_secret_access_key = secret\n"), 0644) os.Setenv("HOME", d) auth, err := aws.SharedAuth() c.Assert(err, IsNil) c.Assert(*auth, Equals, *aws.NewAuth("access", "secret", "", time.Time{})) }
func setUpAuth(c *C) { if !*amazon && !*local { c.Skip("Neither test against local nor amazon is enabled.") } if *local { c.Log("Using local server") dynamodb_region = aws.Region{ DynamoDBEndpoint: "http://127.0.0.1:8000", DynamoDBStreamsEndpoint: "http://127.0.0.1:8000", } dynamodb_auth = aws.NewAuth("DUMMY_KEY", "DUMMY_SECRET", "", time.Time{}) } else { c.Log("Using REAL AMAZON SERVER") dynamodb_region = aws.USEast auth, err := aws.EnvAuth() if err != nil { c.Fatal(err) } dynamodb_auth = auth } }
func (s *S) SetUpSuite(c *C) { testServer.Start() auth := aws.NewAuth("abc", "123", "", time.Time{}) s.sts = sts.New(auth, aws.Region{STSEndpoint: testServer.URL}) }
func (s *S) SetUpSuite(c *C) { testServer.Start() auth := aws.NewAuth("abc", "123", "", time.Time{}) s.cf = cf.New(auth, aws.Region{CloudFormationEndpoint: testServer.URL}) }
func (s *S) SetUpSuite(c *C) { s.HTTPSuite.SetUpSuite(c) auth := aws.NewAuth("abc", "123", "", time.Time{}) s.elb = elb.New(auth, aws.Region{ELBEndpoint: testServer.URL}) }
package elb_test import ( "time" "github.com/goamz/goamz/aws" "github.com/goamz/goamz/elb" . "gopkg.in/check.v1" ) var testAuth = aws.NewAuth("user", "secret", "", time.Time{}) func (s *S) TestBasicSignature(c *C) { params := map[string]string{} elb.Sign(testAuth, "GET", "/path", params, "localhost") c.Assert(params["SignatureVersion"], Equals, "2") c.Assert(params["SignatureMethod"], Equals, "HmacSHA256") expected := "6lSe5QyXum0jMVc7cOUz32/52ZnL7N5RyKRk/09yiK4=" c.Assert(params["Signature"], Equals, expected) } func (s *S) TestParamSignature(c *C) { params := map[string]string{ "param1": "value1", "param2": "value2", "param3": "value3", } elb.Sign(testAuth, "GET", "/path", params, "localhost") expected := "XWOR4+0lmK8bD8CGDGZ4kfuSPbb2JibLJiCl/OPu1oU=" c.Assert(params["Signature"], Equals, expected) }
package sdb_test import ( "time" "github.com/goamz/goamz/aws" "github.com/goamz/goamz/exp/sdb" . "gopkg.in/check.v1" ) // SimpleDB ReST authentication docs: http://goo.gl/CaY81 var testAuth = aws.NewAuth("access-key-id-s8eBOWuU", "secret-access-key-UkQjTLd9", "", time.Time{}) func (s *S) TestSignExampleDomainCreate(c *C) { method := "GET" params := map[string][]string{ "Action": {"CreateDomain"}, "DomainName": {"MyDomain"}, "Timestamp": {"2011-08-20T07:23:57+12:00"}, "Version": {"2009-04-15"}, } headers := map[string][]string{ "Host": {"sdb.amazonaws.com"}, } sdb.Sign(testAuth, method, "", params, headers) expected := "ot2JaeeqMRJqgAqW67hkzUlffgxdOz4RykbrECB+tDU=" c.Assert(params["Signature"], DeepEquals, []string{expected}) } // Do a few test methods which takes combinations of params
func (s *S) SetUpSuite(c *C) { testServer.Start() auth := aws.NewAuth("abc", "123", "", time.Time{}) s.ses = ses.NewSES(auth, aws.Region{Name: "faux-region-1", S3Endpoint: testServer.URL}) }
func TestAutoScalingGroup(t *testing.T) { var as *AutoScaling // Launch configuration test config lc := new(LaunchConfiguration) lc.LaunchConfigurationName = "LConf1" lc.ImageId = "ami-03e47533" // Octave debian ami lc.KernelId = "aki-98e26fa8" lc.KeyName = "testAWS" // Replace with valid key for your account lc.InstanceType = "m1.small" // CreateAutoScalingGroup params test config asgReq := new(CreateAutoScalingGroupParams) asgReq.AutoScalingGroupName = "ASGTest1" asgReq.LaunchConfigurationName = lc.LaunchConfigurationName asgReq.DefaultCooldown = 300 asgReq.HealthCheckGracePeriod = 300 asgReq.DesiredCapacity = 1 asgReq.MinSize = 1 asgReq.MaxSize = 5 asgReq.AvailabilityZones = []string{"us-west-2a"} asg := new(AutoScalingGroup) asg.AutoScalingGroupName = "ASGTest1" asg.LaunchConfigurationName = lc.LaunchConfigurationName asg.DefaultCooldown = 300 asg.HealthCheckGracePeriod = 300 asg.DesiredCapacity = 1 asg.MinSize = 1 asg.MaxSize = 5 asg.AvailabilityZones = []string{"us-west-2a"} awsAuth, err := aws.EnvAuth() if err != nil { mockTest = true t.Log("Running mock tests as AWS environment variables are not set") awsAuth := aws.NewAuth("abc", "123", "", time.Time{}) as = New(awsAuth, aws.Region{AutoScalingEndpoint: testServer.URL}) } else { as = New(awsAuth, aws.USWest2) } // Create the launch configuration if mockTest { testServer.Response(200, nil, CreateLaunchConfigurationResponse) } _, err = as.CreateLaunchConfiguration(lc) if err != nil { t.Fatal(err) } // Check that we can get the launch configuration details if mockTest { testServer.Response(200, nil, DescribeLaunchConfigurationsResponse) } _, err = as.DescribeLaunchConfigurations([]string{lc.LaunchConfigurationName}, 10, "") if err != nil { t.Fatal(err) } // Create the AutoScalingGroup if mockTest { testServer.Response(200, nil, CreateAutoScalingGroupResponse) } _, err = as.CreateAutoScalingGroup(asgReq) if err != nil { t.Fatal(err) } // Check that we can get the autoscaling group details if mockTest { testServer.Response(200, nil, DescribeAutoScalingGroupsResponse) } _, err = as.DescribeAutoScalingGroups(nil, 10, "") if err != nil { t.Fatal(err) } // Suspend the scaling processes for the test AutoScalingGroup if mockTest { testServer.Response(200, nil, SuspendProcessesResponse) } _, err = as.SuspendProcesses(asg.AutoScalingGroupName, nil) if err != nil { t.Fatal(err) } // Resume scaling processes for the test AutoScalingGroup if mockTest { testServer.Response(200, nil, ResumeProcessesResponse) } _, err = as.ResumeProcesses(asg.AutoScalingGroupName, nil) if err != nil { t.Fatal(err) } // Change the desired capacity from 1 to 2. This will launch a second instance if mockTest { testServer.Response(200, nil, SetDesiredCapacityResponse) } _, err = as.SetDesiredCapacity(asg.AutoScalingGroupName, 2, false) if err != nil { t.Fatal(err) } // Change the desired capacity from 2 to 1. This will terminate one of the instances if mockTest { testServer.Response(200, nil, SetDesiredCapacityResponse) } _, err = as.SetDesiredCapacity(asg.AutoScalingGroupName, 1, false) if err != nil { t.Fatal(err) } // Update the max capacity for the scaling group if mockTest { testServer.Response(200, nil, UpdateAutoScalingGroupResponse) } asg.MinSize = 1 asg.MaxSize = 6 asg.DesiredCapacity = 1 _, err = as.UpdateAutoScalingGroup(asg) if err != nil { t.Fatal(err) } // Add a scheduled action to the group psar := new(PutScheduledUpdateGroupActionParams) psar.AutoScalingGroupName = asg.AutoScalingGroupName psar.MaxSize = 4 psar.ScheduledActionName = "SATest1" psar.Recurrence = "30 0 1 1,6,12 *" if mockTest { testServer.Response(200, nil, PutScheduledUpdateGroupActionResponse) } _, err = as.PutScheduledUpdateGroupAction(psar) if err != nil { t.Fatal(err) } // List the scheduled actions for the group sar := new(DescribeScheduledActionsParams) sar.AutoScalingGroupName = asg.AutoScalingGroupName if mockTest { testServer.Response(200, nil, DescribeScheduledActionsResponse) } _, err = as.DescribeScheduledActions(sar) if err != nil { t.Fatal(err) } // Delete the test scheduled action from the group if mockTest { testServer.Response(200, nil, DeleteScheduledActionResponse) } _, err = as.DeleteScheduledAction(asg.AutoScalingGroupName, psar.ScheduledActionName) if err != nil { t.Fatal(err) } testServer.Flush() }
package s3_test import ( "time" "github.com/goamz/goamz/aws" "github.com/goamz/goamz/s3" . "gopkg.in/check.v1" ) // S3 ReST authentication docs: http://goo.gl/G1LrK var testAuth = aws.NewAuth("0PN5J17HBGZHT7JJ3X82", "uV3F3YluFJax1cknvbcGwgjvx4QpvB+leU8dUj2o", "", time.Time{}) func (s *S) TestSignExampleObjectGet(c *C) { method := "GET" path := "/johnsmith/photos/puppy.jpg" headers := map[string][]string{ "Host": {"johnsmith.s3.amazonaws.com"}, "Date": {"Tue, 27 Mar 2007 19:36:42 +0000"}, } s3.Sign(testAuth, method, path, nil, headers) expected := "AWS 0PN5J17HBGZHT7JJ3X82:xXjDGYUmKxnwqr5KXNPGldn5LbA=" c.Assert(headers["Authorization"], DeepEquals, []string{expected}) } func (s *S) TestSignExampleObjectPut(c *C) { method := "PUT" path := "/johnsmith/photos/puppy.jpg" headers := map[string][]string{ "Host": {"johnsmith.s3.amazonaws.com"},
func (s *S) SetUpSuite(c *C) { testServer.Start() auth := aws.NewAuth("abc", "123", "", time.Time{}) s.as = New(auth, aws.Region{AutoScalingEndpoint: testServer.URL}) }
func main() { flag.StringVar(&ak, "key", "", "Access Key") flag.StringVar(&sk, "secret", "", "Secret Access Key") flag.StringVar(®ion, "region", "us-east-1", "Region") flag.StringVar(&bucket, "bucket", "", "Bucket") flag.BoolVar(&reduced, "reduced", true, "Use reduced redundancy storage") flag.Parse() if ak == "" || sk == "" || region == "" || bucket == "" { flag.PrintDefaults() os.Exit(1) } auth := aws.NewAuth(ak, sk, "", time.Now().AddDate(0, 0, 15)) s := s3.New(*auth, aws.Regions[region]) b := s.Bucket(bucket) //b.Put(path, data, contType, s3.PublicRead, opt) npaths := flag.NArg() for i := 0; i < npaths; i++ { p0 := flag.Arg(i) fi, err := os.Stat(p0) if err != nil { errori("Error: " + p0 + " " + err.Error() + "\n") continue } if !fi.IsDir() { // upload right away ff, err := os.Open(p0) if err != nil { errori("Error (os.Open): " + p0 + " " + err.Error() + "\n") continue } err = b.PutReaderHeader(filepath.Join("/", p0), ff, fi.Size(), headers(guessMIME(p0)), s3.PublicRead) ff.Close() if err != nil { errori("Error (S3 PUT): " + p0 + " " + err.Error() + "\n") } } else { // clever way to put dir filepath.Walk(p0, func(pa string, info os.FileInfo, err error) error { print(pa + "\n") if err != nil { errori("Error: " + err.Error() + "\n") return nil } if info.IsDir() { return nil } // ff, err := os.Open(pa) if err != nil { errori("Error (os.Open): " + pa + " " + err.Error() + "\n") return nil } for t := 0; t < 5; t++ { err = b.PutReaderHeader(filepath.Join("/", pa), ff, info.Size(), headers(guessMIME(pa)), s3.PublicRead) if err == nil { break } time.Sleep(time.Millisecond * 100) } ff.Close() if err != nil { errori("Error (S3 PUT): " + pa + " " + err.Error() + "\n") } // return nil }) } } if len(lerrors) > 0 { print("Errors (" + strconv.Itoa(len(lerrors)) + "):\n") for _, v := range lerrors { print(v) } } else { print("No errors.\n") } }
func (s *V4SignerSuite) SetUpSuite(c *C) { s.auth = aws.NewAuth("AKIDEXAMPLE", "wJalrXUtnFEMI/K7MDENG+bPxRfiCYEXAMPLEKEY", "", time.Time{}) s.region = aws.USEast // Test cases from the Signature Version 4 Test Suite (http://goo.gl/nguvs0) s.cases = append(s.cases, // get-header-key-duplicate V4SignerSuiteCase{ label: "get-header-key-duplicate", request: V4SignerSuiteCaseRequest{ method: "POST", host: "host.foo.com", url: "/", headers: []string{"DATE:Mon, 09 Sep 2011 23:36:00 GMT", "ZOO:zoobar", "zoo:foobar", "zoo:zoobar"}, }, canonicalRequest: "POST\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\nzoo:foobar,zoobar,zoobar\n\ndate;host;zoo\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n3c52f0eaae2b61329c0a332e3fa15842a37bc5812cf4d80eb64784308850e313", signature: "54afcaaf45b331f81cd2edb974f7b824ff4dd594cbbaa945ed636b48477368ed", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host;zoo, Signature=54afcaaf45b331f81cd2edb974f7b824ff4dd594cbbaa945ed636b48477368ed", }, // get-header-value-order V4SignerSuiteCase{ label: "get-header-value-order", request: V4SignerSuiteCaseRequest{ method: "POST", host: "host.foo.com", url: "/", headers: []string{"DATE:Mon, 09 Sep 2011 23:36:00 GMT", "p:z", "p:a", "p:p", "p:a"}, }, canonicalRequest: "POST\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\np:a,a,p,z\n\ndate;host;p\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n94c0389fefe0988cbbedc8606f0ca0b485b48da010d09fc844b45b697c8924fe", signature: "d2973954263943b11624a11d1c963ca81fb274169c7868b2858c04f083199e3d", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host;p, Signature=d2973954263943b11624a11d1c963ca81fb274169c7868b2858c04f083199e3d", }, // get-header-value-trim V4SignerSuiteCase{ label: "get-header-value-trim", request: V4SignerSuiteCaseRequest{ method: "POST", host: "host.foo.com", url: "/", headers: []string{"DATE:Mon, 09 Sep 2011 23:36:00 GMT", "p: phfft "}, }, canonicalRequest: "POST\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\np:phfft\n\ndate;host;p\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\ndddd1902add08da1ac94782b05f9278c08dc7468db178a84f8950d93b30b1f35", signature: "debf546796015d6f6ded8626f5ce98597c33b47b9164cf6b17b4642036fcb592", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host;p, Signature=debf546796015d6f6ded8626f5ce98597c33b47b9164cf6b17b4642036fcb592", }, // get-relative-relative V4SignerSuiteCase{ label: "get-relative-relative", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/foo/bar/../..", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n366b91fb121d72a00f46bbe8d395f53a102b06dfb7e79636515208ed3fa606b1", signature: "b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", }, // get-relative V4SignerSuiteCase{ label: "get-relative", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/foo/..", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n366b91fb121d72a00f46bbe8d395f53a102b06dfb7e79636515208ed3fa606b1", signature: "b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", }, // get-slash-dot-slash V4SignerSuiteCase{ label: "get-slash-dot-slash", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/./", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n366b91fb121d72a00f46bbe8d395f53a102b06dfb7e79636515208ed3fa606b1", signature: "b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", }, // get-slash-pointless-dot V4SignerSuiteCase{ label: "get-slash-pointless-dot", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/./foo", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/foo\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n8021a97572ee460f87ca67f4e8c0db763216d84715f5424a843a5312a3321e2d", signature: "910e4d6c9abafaf87898e1eb4c929135782ea25bb0279703146455745391e63a", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=910e4d6c9abafaf87898e1eb4c929135782ea25bb0279703146455745391e63a", }, // get-slash V4SignerSuiteCase{ label: "get-slash", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "//", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n366b91fb121d72a00f46bbe8d395f53a102b06dfb7e79636515208ed3fa606b1", signature: "b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", }, // get-slashes V4SignerSuiteCase{ label: "get-slashes", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "//foo//", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/foo/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n6bb4476ee8745730c9cb79f33a0c70baa6d8af29c0077fa12e4e8f1dd17e7098", signature: "b00392262853cfe3201e47ccf945601079e9b8a7f51ee4c3d9ee4f187aa9bf19", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=b00392262853cfe3201e47ccf945601079e9b8a7f51ee4c3d9ee4f187aa9bf19", }, // get-space V4SignerSuiteCase{ label: "get-space", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/%20/foo", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/%20/foo\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n69c45fb9fe3fd76442b5086e50b2e9fec8298358da957b293ef26e506fdfb54b", signature: "f309cfbd10197a230c42dd17dbf5cca8a0722564cb40a872d25623cfa758e374", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=f309cfbd10197a230c42dd17dbf5cca8a0722564cb40a872d25623cfa758e374", }, // get-unreserved V4SignerSuiteCase{ label: "get-unreserved", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/-._~0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/-._~0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\ndf63ee3247c0356c696a3b21f8d8490b01fa9cd5bc6550ef5ef5f4636b7b8901", signature: "830cc36d03f0f84e6ee4953fbe701c1c8b71a0372c63af9255aa364dd183281e", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=830cc36d03f0f84e6ee4953fbe701c1c8b71a0372c63af9255aa364dd183281e", }, // get-utf8 V4SignerSuiteCase{ label: "get-utf8", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/%E1%88%B4", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/%E1%88%B4\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n27ba31df5dbc6e063d8f87d62eb07143f7f271c5330a917840586ac1c85b6f6b", signature: "8d6634c189aa8c75c2e51e106b6b5121bed103fdb351f7d7d4381c738823af74", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=8d6634c189aa8c75c2e51e106b6b5121bed103fdb351f7d7d4381c738823af74", }, // get-vanilla-empty-query-key V4SignerSuiteCase{ label: "get-vanilla-empty-query-key", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/?foo=bar", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\nfoo=bar\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n0846c2945b0832deb7a463c66af5c4f8bd54ec28c438e67a214445b157c9ddf8", signature: "56c054473fd260c13e4e7393eb203662195f5d4a1fada5314b8b52b23f985e9f", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=56c054473fd260c13e4e7393eb203662195f5d4a1fada5314b8b52b23f985e9f", }, // get-vanilla-query-order-key-case V4SignerSuiteCase{ label: "get-vanilla-query-order-key-case", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/?foo=Zoo&foo=aha", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\nfoo=Zoo&foo=aha\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\ne25f777ba161a0f1baf778a87faf057187cf5987f17953320e3ca399feb5f00d", signature: "be7148d34ebccdc6423b19085378aa0bee970bdc61d144bd1a8c48c33079ab09", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=be7148d34ebccdc6423b19085378aa0bee970bdc61d144bd1a8c48c33079ab09", }, // get-vanilla-query-order-key V4SignerSuiteCase{ label: "get-vanilla-query-order-key", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/?a=foo&b=foo", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\na=foo&b=foo\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n2f23d14fe13caebf6dfda346285c6d9c14f49eaca8f5ec55c627dd7404f7a727", signature: "0dc122f3b28b831ab48ba65cb47300de53fbe91b577fe113edac383730254a3b", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=0dc122f3b28b831ab48ba65cb47300de53fbe91b577fe113edac383730254a3b", }, // get-vanilla-query-order-value V4SignerSuiteCase{ label: "get-vanilla-query-order-value", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/?foo=b&foo=a", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\nfoo=a&foo=b\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n33dffc220e89131f8f6157a35c40903daa658608d9129ff9489e5cf5bbd9b11b", signature: "feb926e49e382bec75c9d7dcb2a1b6dc8aa50ca43c25d2bc51143768c0875acc", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=feb926e49e382bec75c9d7dcb2a1b6dc8aa50ca43c25d2bc51143768c0875acc", }, // get-vanilla-query-unreserved V4SignerSuiteCase{ label: "get-vanilla-query-unreserved", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/?-._~0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz=-._~0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\n-._~0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz=-._~0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\nd2578f3156d4c9d180713d1ff20601d8a3eed0dd35447d24603d7d67414bd6b5", signature: "f1498ddb4d6dae767d97c466fb92f1b59a2c71ca29ac954692663f9db03426fb", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=f1498ddb4d6dae767d97c466fb92f1b59a2c71ca29ac954692663f9db03426fb", }, // get-vanilla-query V4SignerSuiteCase{ label: "get-vanilla-query", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n366b91fb121d72a00f46bbe8d395f53a102b06dfb7e79636515208ed3fa606b1", signature: "b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", }, // get-vanilla-ut8-query V4SignerSuiteCase{ label: "get-vanilla-ut8-query", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/?ሴ=bar", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\n%E1%88%B4=bar\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\nde5065ff39c131e6c2e2bd19cd9345a794bf3b561eab20b8d97b2093fc2a979e", signature: "6fb359e9a05394cc7074e0feb42573a2601abc0c869a953e8c5c12e4e01f1a8c", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=6fb359e9a05394cc7074e0feb42573a2601abc0c869a953e8c5c12e4e01f1a8c", }, // get-vanilla V4SignerSuiteCase{ label: "get-vanilla", request: V4SignerSuiteCaseRequest{ method: "GET", host: "host.foo.com", url: "/", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "GET\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n366b91fb121d72a00f46bbe8d395f53a102b06dfb7e79636515208ed3fa606b1", signature: "b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=b27ccfbfa7df52a200ff74193ca6e32d4b48b8856fab7ebf1c595d0670a7e470", }, // post-header-key-case V4SignerSuiteCase{ label: "post-header-key-case", request: V4SignerSuiteCaseRequest{ method: "POST", host: "host.foo.com", url: "/", headers: []string{"DATE:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "POST\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n05da62cee468d24ae84faff3c39f1b85540de60243c1bcaace39c0a2acc7b2c4", signature: "22902d79e148b64e7571c3565769328423fe276eae4b26f83afceda9e767f726", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=22902d79e148b64e7571c3565769328423fe276eae4b26f83afceda9e767f726", }, // post-header-key-sort V4SignerSuiteCase{ label: "post-header-key-sort", request: V4SignerSuiteCaseRequest{ method: "POST", host: "host.foo.com", url: "/", headers: []string{"DATE:Mon, 09 Sep 2011 23:36:00 GMT", "ZOO:zoobar"}, }, canonicalRequest: "POST\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\nzoo:zoobar\n\ndate;host;zoo\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n34e1bddeb99e76ee01d63b5e28656111e210529efeec6cdfd46a48e4c734545d", signature: "b7a95a52518abbca0964a999a880429ab734f35ebbf1235bd79a5de87756dc4a", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host;zoo, Signature=b7a95a52518abbca0964a999a880429ab734f35ebbf1235bd79a5de87756dc4a", }, // post-header-value-case V4SignerSuiteCase{ label: "post-header-value-case", request: V4SignerSuiteCaseRequest{ method: "POST", host: "host.foo.com", url: "/", headers: []string{"DATE:Mon, 09 Sep 2011 23:36:00 GMT", "zoo:ZOOBAR"}, }, canonicalRequest: "POST\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\nzoo:ZOOBAR\n\ndate;host;zoo\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n3aae6d8274b8c03e2cc96fc7d6bda4b9bd7a0a184309344470b2c96953e124aa", signature: "273313af9d0c265c531e11db70bbd653f3ba074c1009239e8559d3987039cad7", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host;zoo, Signature=273313af9d0c265c531e11db70bbd653f3ba074c1009239e8559d3987039cad7", }, // post-vanilla-empty-query-value V4SignerSuiteCase{ label: "post-vanilla-empty-query-value", request: V4SignerSuiteCaseRequest{ method: "POST", host: "host.foo.com", url: "/?foo=bar", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "POST\n/\nfoo=bar\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\ncd4f39132d8e60bb388831d734230460872b564871c47f5de62e62d1a68dbe1e", signature: "b6e3b79003ce0743a491606ba1035a804593b0efb1e20a11cba83f8c25a57a92", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=b6e3b79003ce0743a491606ba1035a804593b0efb1e20a11cba83f8c25a57a92", }, // post-vanilla-query V4SignerSuiteCase{ label: "post-vanilla-query", request: V4SignerSuiteCaseRequest{ method: "POST", host: "host.foo.com", url: "/?foo=bar", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "POST\n/\nfoo=bar\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\ncd4f39132d8e60bb388831d734230460872b564871c47f5de62e62d1a68dbe1e", signature: "b6e3b79003ce0743a491606ba1035a804593b0efb1e20a11cba83f8c25a57a92", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=b6e3b79003ce0743a491606ba1035a804593b0efb1e20a11cba83f8c25a57a92", }, // post-vanilla V4SignerSuiteCase{ label: "post-vanilla", request: V4SignerSuiteCaseRequest{ method: "POST", host: "host.foo.com", url: "/", headers: []string{"Date:Mon, 09 Sep 2011 23:36:00 GMT"}, }, canonicalRequest: "POST\n/\n\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ndate;host\ne3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n05da62cee468d24ae84faff3c39f1b85540de60243c1bcaace39c0a2acc7b2c4", signature: "22902d79e148b64e7571c3565769328423fe276eae4b26f83afceda9e767f726", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=date;host, Signature=22902d79e148b64e7571c3565769328423fe276eae4b26f83afceda9e767f726", }, // post-x-www-form-urlencoded-parameters V4SignerSuiteCase{ label: "post-x-www-form-urlencoded-parameters", request: V4SignerSuiteCaseRequest{ method: "POST", host: "host.foo.com", url: "/", headers: []string{"Content-Type:application/x-www-form-urlencoded; charset=utf8", "Date:Mon, 09 Sep 2011 23:36:00 GMT"}, body: "foo=bar", }, canonicalRequest: "POST\n/\n\ncontent-type:application/x-www-form-urlencoded; charset=utf8\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ncontent-type;date;host\n3ba8907e7a252327488df390ed517c45b96dead033600219bdca7107d1d3f88a", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\nc4115f9e54b5cecf192b1eaa23b8e88ed8dc5391bd4fde7b3fff3d9c9fe0af1f", signature: "b105eb10c6d318d2294de9d49dd8b031b55e3c3fe139f2e637da70511e9e7b71", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=content-type;date;host, Signature=b105eb10c6d318d2294de9d49dd8b031b55e3c3fe139f2e637da70511e9e7b71", }, // post-x-www-form-urlencoded V4SignerSuiteCase{ label: "post-x-www-form-urlencoded", request: V4SignerSuiteCaseRequest{ method: "POST", host: "host.foo.com", url: "/", headers: []string{"Content-Type:application/x-www-form-urlencoded", "Date:Mon, 09 Sep 2011 23:36:00 GMT"}, body: "foo=bar", }, canonicalRequest: "POST\n/\n\ncontent-type:application/x-www-form-urlencoded\ndate:Mon, 09 Sep 2011 23:36:00 GMT\nhost:host.foo.com\n\ncontent-type;date;host\n3ba8907e7a252327488df390ed517c45b96dead033600219bdca7107d1d3f88a", stringToSign: "AWS4-HMAC-SHA256\n20110909T233600Z\n20110909/us-east-1/host/aws4_request\n4c5c6e4b52fb5fb947a8733982a8a5a61b14f04345cbfe6e739236c76dd48f74", signature: "5a15b22cf462f047318703b92e6f4f38884e4a7ab7b1d6426ca46a8bd1c26cbc", authorization: "AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/20110909/us-east-1/host/aws4_request, SignedHeaders=content-type;date;host, Signature=5a15b22cf462f047318703b92e6f4f38884e4a7ab7b1d6426ca46a8bd1c26cbc", }, ) }
func (s *S) SetUpSuite(c *C) { testServer.Start() auth := aws.NewAuth("abc", "123", "", time.Time{}) s.cw, _ = cloudwatch.NewCloudWatch(auth, aws.ServiceInfo{testServer.URL, aws.V2Signature}) }
func ExampleNew() { // These are your AWS tokens. Note that Turk do not support IAM. // So you'll have to use your main profile's tokens. auth := aws.NewAuth("<ACCESS_KEY>", "<SECRET_KEY>", "", time.Time{}) turk = mturk.New(auth, true) // true to use sandbox mode }