All Projects → FantasticFiasco → aws-signature-version-4

FantasticFiasco / aws-signature-version-4

Licence: Apache-2.0 license
The buttoned-up and boring, but deeply analyzed, implementation of SigV4 in .NET

Programming Languages

C#
18002 projects

Projects that are alternatives of or similar to aws-signature-version-4

Amazon-SP-API-CSharp
.Net C# library for the new Amazon Selling Partner API
Stars: ✭ 95 (+66.67%)
Mutual labels:  amazon-web-services
github-base
Simple, opinionated node.js interface for creating basic apps with the GitHub API.
Stars: ✭ 58 (+1.75%)
Mutual labels:  request
aws-signature-v4
Generate the "new" AWS V4 signatures
Stars: ✭ 49 (-14.04%)
Mutual labels:  aws-signature
untrace
🐳 Minimal event tracking on the client in 300 bytes.
Stars: ✭ 26 (-54.39%)
Mutual labels:  request
cypress-upload-file-post-form
Solution for two Cypress testing use-cases I came across with: perform a direct http FORM request to the server containing a file and other parameters and upload a file into a form before submission
Stars: ✭ 59 (+3.51%)
Mutual labels:  request
aws-lambda-zombie-workshop
Code and walkthrough labs to set up a serverless chat application for the Zombie Apocalypse Workshop
Stars: ✭ 615 (+978.95%)
Mutual labels:  amazon-web-services
aws-fis-templates-cdk
Collection of AWS Fault Injection Simulator (FIS) experiment templates deploy-able via the AWS CDK
Stars: ✭ 43 (-24.56%)
Mutual labels:  amazon-web-services
python-sonarqube-api
Python wrapper for the SonarQube (Community Edition and Enterprise Edition) and SonarCloud API.
Stars: ✭ 107 (+87.72%)
Mutual labels:  request
aws-sqs-sns-client
AWS SNS SQS client UI
Stars: ✭ 26 (-54.39%)
Mutual labels:  amazon-web-services
aws-cfn-custom-resource-lambda-edge
🏗 AWS CloudFormation custom resource that allows deploying Lambda@Edge from any region
Stars: ✭ 19 (-66.67%)
Mutual labels:  amazon-web-services
terraform-aws-vpc
A Terraform module to create an Amazon Web Services (AWS) Virtual Private Cloud (VPC).
Stars: ✭ 24 (-57.89%)
Mutual labels:  amazon-web-services
gists
Methods for working with the GitHub Gist API. Node.js/JavaScript
Stars: ✭ 96 (+68.42%)
Mutual labels:  request
aws-firewall-factory
Deploy, update, and stage your WAFs while managing them centrally via FMS.
Stars: ✭ 72 (+26.32%)
Mutual labels:  amazon-web-services
ethjs-signer
A simple module for signing Ethereum transactions.
Stars: ✭ 27 (-52.63%)
Mutual labels:  sign
social-network
Microservices project
Stars: ✭ 39 (-31.58%)
Mutual labels:  amazon-web-services
terraform-aws-sonarqube
SonarQube Terraform Module for AWS
Stars: ✭ 28 (-50.88%)
Mutual labels:  amazon-web-services
terraform-emr-spark-example
An example Terraform project that will configure a Secure and Customizable Spark Cluster on Amazon EMR.
Stars: ✭ 43 (-24.56%)
Mutual labels:  amazon-web-services
golang-tts
Text-to-Speach golang package based in Amazon Polly service
Stars: ✭ 19 (-66.67%)
Mutual labels:  amazon-web-services
aws-lambda-decorators
A set of Python decorators to simplify AWS lambda development
Stars: ✭ 19 (-66.67%)
Mutual labels:  amazon-web-services
active endpoint
[ARCHIVE] 🔧 ActiveEndpoint is middleware for Rails application that collect and analize request and response per request for route endpoint. It works with minimum affecting to application response time.
Stars: ✭ 13 (-77.19%)
Mutual labels:  request

AwsSignatureVersion4

The buttoned-up and boring, but deeply analyzed, implementation of Signature Version 4 (SigV4) in .NET.

Package - AwsSignatureVersion4
Platforms - .NET Standard 2.0, .NET 5

Table of contents

Introduction

This project is unique for me. It's my first that isn't a labor of love.

Having to sign requests in AWS I went through a series of emotions. My first was disappointment, directed at Amazon for not including a Signature Version 4 signer in their AWS SDK for .NET. The functionality is listed on Open Feature Requests for the AWS SDK for .NET but I haven't seen any actions towards an implementation yet.

My second emotion was being overwhelmed. The signing algorithm involved many more steps than I'd thought be possible, and I knew I'd have to spend a lot of time getting conformable with the algorithm.

So here we are, my attempt at implementing the Signature Version 4 algorithm in .NET. Please lets hope that AWS SDK soon releases this functionality so we can deprecate this piece of code...

Super simple to use

The best API is the one you already know. By extending both HttpClient and IHttpClientFactory we hope you'll get an easy integration.

Integration with HttpClient

This project extends the class HttpClient by providing additional overloads to DeleteAsync, GetAsync, GetStringAsync, PatchAsync, PostAsync, PutAsync, SendAsync, and the new synchronous addition to .NET 5, Send. These overloads accept the following additional arguments.

  • regionName - The name of the AWS region, e.g. us-west-1
  • serviceName - The name of the service, e.g. execute-api for an AWS API Gateway
  • credentials - The AWS credentials of the principal sending the request

These overloads are built to integrate with HttpClient, i.e. HttpClient.BaseAddress and HttpClient.DefaultRequestHeaders will be respected when sending the request.

The following example is demonstrating how one would send a GET /resources request to an IAM authenticated AWS API Gateway on host www.acme.com.

// Don't specify credentials in source code, this is for demo only! See next chapter for more
// information.
var credentials = new ImmutableCredentials("<access key id>", "<secret access key>", null);

var client = new HttpClient();
var response = await client.GetAsync(
  "https://www.acme.com/resources",
  regionName: "us-west-1",
  serviceName: "execute-api",
  credentials: credentials);

Please see the tests directory for other examples.

Integration with IHttpClientFactory

This project supports IHttpClientFactory by means of providing a custom HTTP message handler called AwsSignatureHandler. Once injected into the pipeline of the HTTP client factory it will sign your requests before sending them over the network.

AwsSignatureHandler takes an instance of AwsSignatureHandlerSettings as its only constructor argument, thus you will have to configure your dependency injection container to sufficiently resolve both these classes.

The following example is demonstrating how one would configure the ASP .NET Core service collection to acknowledge a HTTP client named my-client. For more information regarding configuration, please see Dependency injection in ASP.NET Core.

// Don't specify credentials in source code, this is for demo only! See next chapter for more
// information.
var credentials = new ImmutableCredentials("<access key id>", "<secret access key>", null);
services
  .AddTransient<AwsSignatureHandler>()
  .AddTransient(_ => new AwsSignatureHandlerSettings("us-west-1", "execute-api", credentials));

services
  .AddHttpClient("my-client")
  .AddHttpMessageHandler<AwsSignatureHandler>();

Please see the tests directory for other examples.

Credentials

We've come a long way, but let's back up a step. Credentials should not be specified in source code, so where do they come from?

It all starts with a principal, i.e. an entity identifying itself using authentication. In some situations the principal is a IAM user and in other situations it is an entity assuming a IAM role. Whatever your principal is, it has the capability of providing credentials.

How the credentials are provided depend on where you run your code. If you run your code in a ECS Task you get your credentials using ECSTaskCredentials. Other runtime will require other credential providers, all of them are listed in the namespace Amazon.Runtime.

The pledge

This project comes with a pledge, providing transparency on supported and unsupported scenarios.

  • ~200 unit tests are passing before a release
  • ~700 integration tests targeting an IAM authenticated AWS API Gateway are passing before a release
  • ~300 integration tests targeting an IAM authenticated AWS S3 bucket are passing before a release
  • No steps of the signing algorithm have deliberately been left out
  • AWSSDK.Core is reused as much as possible, thus the dependency
  • Signature Version 4 Test Suite scenarios are passing, with the following exceptions:
    • General
      • get-utf8 - The signing algorithm states the following: 'Each path segment must be URI-encoded twice except for Amazon S3 which only gets URI-encoded once.'. This scenario does not URL encode the path segments twice, only once.
      • normalize-path/get-space - The signing algorithm states the following: 'Each path segment must be URI-encoded twice except for Amazon S3 which only gets URI-encoded once.'. This scenario does not URL encode the path segments twice, only once.
      • post-x-www-form-urlencoded - This scenario is based on the fact that we need to specify the charset in the Content-Type header, e.g. Content-Type:application/x-www-form-urlencoded; charset=utf-8. This is not necessary because .NET will add this encoding if omitted by us. We can safely skip this test and rely on integration tests where actual content is sent to an AWS API Gateway.
      • post-x-www-form-urlencoded-parameters - This scenario is based on the fact that we need to specify the charset in the Content-Type header, e.g. Content-Type:application/x-www-form-urlencoded; charset=utf-8. This is not necessary because .NET will add this encoding if omitted by us. We can safely skip this test and rely on integration tests where actual content is sent to an AWS API Gateway.
    • API Gateway
      • get-vanilla-query-unreserved - This scenario defines a request that isn't supported by AWS API Gateway
      • post-sts-token/post-sts-header-before - This scenario is based on the fact that the signing algorithm should support STS tokens, e.g. by assuming a role. This scenario is already covered by numerous other integration tests and can because of this safely be ignored.
    • S3
      • normalize-path/get-slash-pointless-dot - This scenario defines a request that isn't supported by AWS S3.
      • post-header-key-case - This scenario defines a request that isn't supported by AWS S3.
      • post-header-key-sort - This scenario defines a request that isn't supported by AWS S3.
      • post-header-value-case - This scenario defines a request that isn't supported by AWS S3.
      • post-sts-token/post-sts-header-after - This scenario defines a request that isn't supported by AWS S3.
      • post-sts-token/post-sts-header-before - This scenario defines a request that isn't supported by AWS S3.
      • post-vanilla - This scenario defines a request that isn't supported by AWS S3.
      • post-vanilla-empty-query-value - This scenario defines a request that isn't supported by AWS S3.
      • post-vanilla-query - This scenario defines a request that isn't supported by AWS S3.
      • post-x-www-form-urlencoded - This scenario defines a request that isn't supported by AWS S3.
      • post-x-www-form-urlencoded-parameters - This scenario defines a request that isn't supported by AWS S3.
  • All characters are supported in S3 object keys with the following exceptions:
    • Plus (+)
    • Backslash (\)
    • Left curly brace ({)
    • Right curly brace (})
    • Left square bracket ([)
    • Right square bracket (])
    • 'Less Than' symbol (<)
    • 'Greater Than' symbol (>)
    • Grave accent / back tick (`)
    • 'Pound' character (#)
    • Caret (^)
    • Percent character (%)
    • Tilde (~)
    • Vertical bar / pipe (|)
    • Non-printable ASCII characters (128–255 decimal characters)
    • Quotation marks
  • Authentication method
    • HTTP header authentication is supported
    • Query string authentication is not supported
  • HTTP version
    • HTTP/1.1 is supported
    • HTTP/2 is not supported, please create an issue if you wish it to be supported

Install via NuGet

If you want to include AwsSignatureVersion4 in your project, you can install it directly from NuGet.

To install AwsSignatureVersion4, run the following command in the Package Manager Console.

PM> Install-Package AwsSignatureVersion4

You can also install AwsSignatureVersion4 using the dotnet command line interface.

dotnet add package AwsSignatureVersion4

Credit

Thank you JetBrains for your important initiative to support the open source community with free licenses to your products.

JetBrains

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].