mirror of
https://github.com/OpenXE-org/OpenXE.git
synced 2025-02-21 00:39:24 +01:00
74 lines
1.9 KiB
PHP
74 lines
1.9 KiB
PHP
<?php
|
|
namespace Aws\Signature;
|
|
|
|
use Aws\Credentials\CredentialsInterface;
|
|
use Psr\Http\Message\RequestInterface;
|
|
|
|
/**
|
|
* Amazon S3 signature version 4 support.
|
|
*/
|
|
class S3SignatureV4 extends SignatureV4
|
|
{
|
|
/**
|
|
* S3-specific signing logic
|
|
*
|
|
* {@inheritdoc}
|
|
*/
|
|
public function signRequest(
|
|
RequestInterface $request,
|
|
CredentialsInterface $credentials
|
|
) {
|
|
// Always add a x-amz-content-sha-256 for data integrity
|
|
if (!$request->hasHeader('x-amz-content-sha256')) {
|
|
$request = $request->withHeader(
|
|
'x-amz-content-sha256',
|
|
$this->getPayload($request)
|
|
);
|
|
}
|
|
|
|
return parent::signRequest($request, $credentials);
|
|
}
|
|
|
|
/**
|
|
* Always add a x-amz-content-sha-256 for data integrity.
|
|
*
|
|
* {@inheritdoc}
|
|
*/
|
|
public function presign(
|
|
RequestInterface $request,
|
|
CredentialsInterface $credentials,
|
|
$expires,
|
|
array $options = []
|
|
) {
|
|
if (!$request->hasHeader('x-amz-content-sha256')) {
|
|
$request = $request->withHeader(
|
|
'X-Amz-Content-Sha256',
|
|
$this->getPresignedPayload($request)
|
|
);
|
|
}
|
|
|
|
return parent::presign($request, $credentials, $expires, $options);
|
|
}
|
|
|
|
/**
|
|
* Override used to allow pre-signed URLs to be created for an
|
|
* in-determinate request payload.
|
|
*/
|
|
protected function getPresignedPayload(RequestInterface $request)
|
|
{
|
|
return SignatureV4::UNSIGNED_PAYLOAD;
|
|
}
|
|
|
|
/**
|
|
* Amazon S3 does not double-encode the path component in the canonical request
|
|
*/
|
|
protected function createCanonicalizedPath($path)
|
|
{
|
|
// Only remove one slash in case of keys that have a preceding slash
|
|
if (substr($path, 0, 1) === '/') {
|
|
$path = substr($path, 1);
|
|
}
|
|
return '/' . $path;
|
|
}
|
|
}
|