func sign(auth aws.Auth, method, path string, params map[string]string, host string) { params["AWSAccessKeyId"] = auth.AccessKey params["SignatureVersion"] = "2" params["SignatureMethod"] = "HmacSHA256" if auth.Token() != "" { params["SecurityToken"] = auth.Token() } // AWS specifies that the parameters in a signed request must // be provided in the natural order of the keys. This is distinct // from the natural order of the encoded value of key=value. // Percent and gocheck.Equals affect the sorting order. var keys, sarray []string for k, _ := range params { keys = append(keys, k) } sort.Strings(keys) for _, k := range keys { sarray = append(sarray, aws.Encode(k)+"="+aws.Encode(params[k])) } // Check whether path has any length and if not set it to / if len(path) == 0 { path = "/" } joined := strings.Join(sarray, "&") payload := method + "\n" + host + "\n" + path + "\n" + joined hash := hmac.New(sha256.New, []byte(auth.SecretKey)) hash.Write([]byte(payload)) signature := make([]byte, b64.EncodedLen(hash.Size())) b64.Encode(signature, hash.Sum(nil)) params["Signature"] = string(signature) }
func sign(auth aws.Auth, method, path string, params map[string]string, host string) { params["AWSAccessKeyId"] = auth.AccessKey params["SignatureVersion"] = "2" params["SignatureMethod"] = "HmacSHA256" if auth.Token() != "" { params["SecurityToken"] = auth.Token() } var sarray []string for k, v := range params { sarray = append(sarray, aws.Encode(k)+"="+aws.Encode(v)) } sort.StringSlice(sarray).Sort() joined := strings.Join(sarray, "&") payload := method + "\n" + host + "\n" + path + "\n" + joined hash := hmac.New(sha256.New, []byte(auth.SecretKey)) hash.Write([]byte(payload)) signature := make([]byte, b64.EncodedLen(hash.Size())) b64.Encode(signature, hash.Sum(nil)) params["Signature"] = string(signature) }
func loadAWSConfigFile(fileName string, profileName string) (aws.Auth, aws.Region, error) { var auth aws.Auth var region aws.Region conf, err := ini.LoadFile(fileName) if err != nil { return auth, region, err } log.Printf("Loading file %s [%s]", fileName, profileName) for key, value := range conf[profileName] { switch key { case "aws_access_key_id": auth.AccessKey = value case "aws_secret_access_key": auth.SecretKey = value case "region": region = aws.GetRegion(value) } } return auth, region, nil }
func sign(auth aws.Auth, method, path string, params url.Values, headers http.Header) { var host string for k, v := range headers { k = strings.ToLower(k) switch k { case "host": host = v[0] } } // set up some defaults used for signing the request if auth.Token() != "" { params["SecurityToken"] = []string{auth.Token()} } params["AWSAccessKeyId"] = []string{auth.AccessKey} params["SignatureVersion"] = []string{"2"} params["SignatureMethod"] = []string{"HmacSHA256"} // join up all the incoming params var sarray []string for k, v := range params { sarray = append(sarray, aws.Encode(k)+"="+aws.Encode(v[0])) } sort.StringSlice(sarray).Sort() joined := strings.Join(sarray, "&") // create the payload, sign it and create the signature payload := strings.Join([]string{method, host, "/", joined}, "\n") hash := hmac.New(sha256.New, []byte(auth.SecretKey)) hash.Write([]byte(payload)) signature := make([]byte, b64.EncodedLen(hash.Size())) b64.Encode(signature, hash.Sum(nil)) // add the signature to the outgoing params params["Signature"] = []string{string(signature)} }