text
stringlengths 0
828
|
---|
@type argd: dict
|
@type _amazon_secret_access_key: string
|
@type _timestamp: string
|
@return signed URL of the request (string)
|
""""""
|
# First define a few util functions
|
def get_AWS_signature(argd, _amazon_secret_access_key,
|
method=""GET"", request_host=""webservices.amazon.com"",
|
request_uri=""/onca/xml"",
|
_timestamp=None):
|
""""""
|
Returns the signature of an Amazon request, based on the
|
arguments of the request.
|
@param argd: dictionary of arguments defining the query
|
@param _amazon_secret_access_key: your Amazon secret key
|
@param method: method of the request POST or GET
|
@param request_host: host contacted for the query. To embed in the signature.
|
@param request_uri: uri contacted at 'request_host'. To embed in the signature.
|
@param _timestamp: for testing purpose only (default: current timestamp)
|
@type argd: dict
|
@type _amazon_secret_access_key: string
|
@type method: string
|
@type host_header: string
|
@type http_request_uri: string
|
@type _timestamp: string
|
@return signature of the request (string)
|
""""""
|
# Add timestamp
|
if not _timestamp:
|
argd[""Timestamp""] = time.strftime(""%Y-%m-%dT%H:%M:%SZ"",
|
time.gmtime())
|
else:
|
argd[""Timestamp""] = _timestamp
|
# Order parameter keys by byte value
|
parameter_keys = sorted(argd.keys())
|
# Encode arguments, according to RFC 3986. Make sure we
|
# generate a list which is ordered by byte value of the keys
|
arguments = [quote(str(key), safe=""~/"") + ""="" +
|
quote(str(argd[key]), safe=""~/"")
|
for key in parameter_keys]
|
# Join
|
parameters_string = ""&"".join(arguments)
|
# Prefix
|
parameters_string = method.upper() + ""\n"" + \
|
request_host.lower() + ""\n"" + \
|
(request_uri or ""/"") + ""\n"" + \
|
parameters_string
|
# Sign and return
|
return calculate_RFC2104_HMAC(parameters_string,
|
_amazon_secret_access_key)
|
def calculate_RFC2104_HMAC(data, _amazon_secret_access_key):
|
""""""
|
Computes a RFC 2104 compliant HMAC Signature and then Base64
|
encodes it.
|
Module hashlib must be installed if Python < 2.5
|
<http://pypi.python.org/pypi/hashlib/20081119>
|
@param data: data to sign
|
@param _amazon_secret_access_key: your Amazon secret key
|
@type data: string
|
@type _amazon_secret_access_key: string. Empty if hashlib module not installed
|
""""""
|
if not HASHLIB_IMPORTED:
|
current_app.logger.warning(
|
""Module hashlib not installed. Please install it.""
|
)
|
return """"
|
else:
|
if sys.version_info < (2, 5):
|
# compatibility mode for Python < 2.5 and hashlib
|
my_digest_algo = _MySHA256(sha256())
|
else:
|
my_digest_algo = sha256
|
return base64.encodestring(
|
hmac.new(
|
_amazon_secret_access_key,
|
data,
|
my_digest_algo).digest()).strip()
|
# End util functions
|
parsed_url = urlparse(base_url)
|
signature = get_AWS_signature(argd, _amazon_secret_access_key,
|
request_host=parsed_url[1],
|
request_uri=parsed_url[2],
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.