Hi Cedric/Yehuda,

I have generated the signature dynamically as like in this documentation
http://s3.amazonaws.com/doc/s3-developer-guide/RESTAuthentication.html

by using a reference

http://birkoff.net/blog/amazon-s3-query-string-authentication-using-php/

and my code is like



------------------------------------------------------------------------



$aws_access_key_id = 'KGXJJGKDM5G7G4CNKC7R';

   $aws_secret_key = 'LC7S0twZdhtXA1XxthfMDsj5TgJpeKhZrloWa9WN';

   $downloadAudioTimeout = '+20 minutes';

  $file_path = "usage";



   $http_verb = "GET";

   $content_md5 = "";

   $content_type = "";

   $expires = strtotime($downloadAudioTimeout);

   $canonicalizedAmzHeaders = "";



     $canonicalizedResource = '/usage';;



   $stringToSign = $http_verb . "\n" . $content_md5 . "\n" .

$content_type . "\n" . $expires . "\n" . $canonicalizedAmzHeaders .

$canonicalizedResource;



   $signature = urlencode(hex2b64(hmacsha1($aws_secret_key,

utf8_encode($stringToSign))));



   echo "url=".$url =

"
http://gateway.3linux.com/$file_path?AWSAccessKeyId=$aws_access_key_id&Signature=$signature&Expires=$expires
";



   return $url;



    function hmacsha1($key,$data)

   {

     $blocksize=64;

     $hashfunc='sha1';

     if (strlen($key)>$blocksize)

         $key=pack('H*', $hashfunc($key));

     $key=str_pad($key,$blocksize,chr(0x00));

     $ipad=str_repeat(chr(0x36),$blocksize);

     $opad=str_repeat(chr(0x5c),$blocksize);

     $hmac = pack(

                 'H*',$hashfunc(

                     ($key^$opad).pack(

                         'H*',$hashfunc(

                             ($key^$ipad).$data



                         )

                     )

                 )

             );

     return bin2hex($hmac);

   }



   /*

    * Used to encode a field for Amazon Auth

    * (taken from the Amazon S3 PHP example library)

    */

    function hex2b64($str)

   {

       $raw = '';

       for ($i=0; $i < strlen($str); $i+=2)

       {

           $raw .= chr(hexdec(substr($str, $i, 2)));

       }

       return base64_encode($raw);

   }



--------------------------------------------------------------





I got the url like

http://gateway.3linux.com//admin/usage?AWSAccessKeyId=KGXJJGKDM5G7G4CNKC7R&Signature=ivLXdG9TltSTYEGc5nf%2B5%2B2lyxs%3D&Expires=1398757716<http://gateway.3linux.com/admin/usage?AWSAccessKeyId=KGXJJGKDM5G7G4CNKC7R&Signature=ivLXdG9TltSTYEGc5nf%2B5%2B2lyxs%3D&Expires=1398757716>

by using the above. When i enter this on the browser, i got the same access
denied error.

Could you please check if there is any issues with this ?





On Mon, Apr 28, 2014 at 8:08 PM, Cedric Lemarchand <ced...@yipikai.org>wrote:

>  Hi Punit,
>
> Le 28 avr. 2014 à 11:55, Punit Dambiwal <hypu...@gmail.com> a écrit :
>
>   Hi Yehuda,
>
> I am using the same above method to call the api and used the way which
> described in the
> http://ceph.com/docs/master/radosgw/s3/authentication/#access-control-lists-aclsfor
>  connection. The method in the
> http://s3.amazonaws.com/doc/s3-developer-guide/RESTAuthentication.html is
> for generating the hash of the header string and secret keys, since these
> keys are created already and i think we don't need this method, right ?
>
> No, there are difference between the aws_access_id and aws_secret_key
> (static, generated by radogw at the user creation) and the AWS
> Authentication header, which is dynamic. As of my understanding, the AWS
> signature header need to be regularly generated because of the parts it
> embeds, plus the time expiration period. I think you can safely regenerate
> the AWS Auth signature for each request.
>
> Cheers
>
>   I also tried one function to list out the bucket data as like
>
> curl -i 'http://gateway.3linux.com/test?format=json' -X GET -H
> 'Authorization: AWS
> KGXJJGKDM5G7G4CNKC7R:LC7S0twZdhtXA1XxthfMDsj5TgJpeKhZrloWa9WN' -H 'Host:
> gateway.3linux.com' -H 'Date: Mon, 28 April 2014 07:25:00 GMT ' -H
> 'Content-Length: 0'
>
> but its also getting the access denied error. But i can view the bucket
> details by directly entering http://gateway.3linux.com/test?format=jsonin the 
> browser. What do you think ? what may be the reason ? I am able to
> connect and list buckets etc using cyberduck ftp clients these access keys
> but unable to do with the function calls.
>
>
>
>
> On Sat, Apr 26, 2014 at 12:22 AM, Yehuda Sadeh <yeh...@inktank.com> wrote:
>
>> On Fri, Apr 25, 2014 at 1:03 AM, Punit Dambiwal <hypu...@gmail.com>
>> wrote:
>> > Hi Yehuda,
>> >
>>  > Thanks for your help...that missing date error gone but still i am
>> getting
>> > the access denied error :-
>> >
>> > -----------------------------
>> > 2014-04-25 15:52:56.988025 7f00d37c6700  1 ====== starting new request
>> > req=0x237a090 =====
>> > 2014-04-25 15:52:56.988072 7f00d37c6700  2 req 24:0.000046::GET
>> > /admin/usage::initializing
>> > 2014-04-25 15:52:56.988077 7f00d37c6700 10 host=gateway.3linux.com
>> > rgw_dns_name=gateway.3linux.com
>> > 2014-04-25 15:52:56.988102 7f00d37c6700 20 FCGI_ROLE=RESPONDER
>> > 2014-04-25 15:52:56.988103 7f00d37c6700 20 SCRIPT_URL=/admin/usage
>> > 2014-04-25 15:52:56.988104 7f00d37c6700 20
>> > SCRIPT_URI=http://gateway.3linux.com/admin/usage
>> > 2014-04-25 15:52:56.988105 7f00d37c6700 20 HTTP_AUTHORIZATION=AWS
>> > KGXJJGKDM5G7G4CNKC7R:LC7S0twZdhtXA1XxthfMDsj5TgJpeKhZrloWa9WN
>> > 2014-04-25 15:52:56.988107 7f00d37c6700 20 HTTP_USER_AGENT=curl/7.22.0
>> > (x86_64-pc-linux-gnu) libcurl/7.22.0 OpenSSL/1.0.1 zlib/1.2.3.4libidn/1.23
>> > librtmp/2.3
>> > 2014-04-25 15:52:56.988108 7f00d37c6700 20 HTTP_ACCEPT=*/*
>> > 2014-04-25 15:52:56.988109 7f00d37c6700 20 HTTP_HOST=gateway.3linux.com
>> > 2014-04-25 15:52:56.988110 7f00d37c6700 20 HTTP_DATE=Fri, 25 April 2014
>> > 07:50:00 GMT
>> > 2014-04-25 15:52:56.988111 7f00d37c6700 20 CONTENT_LENGTH=0
>> > 2014-04-25 15:52:56.988112 7f00d37c6700 20
>> PATH=/usr/local/bin:/usr/bin:/bin
>> > 2014-04-25 15:52:56.988113 7f00d37c6700 20 SERVER_SIGNATURE=
>> > 2014-04-25 15:52:56.988114 7f00d37c6700 20 SERVER_SOFTWARE=Apache/2.2.22
>> > (Ubuntu)
>> > 2014-04-25 15:52:56.988115 7f00d37c6700 20 SERVER_NAME=
>> gateway.3linux.com
>> > 2014-04-25 15:52:56.988116 7f00d37c6700 20 SERVER_ADDR=117.18.79.110
>> > 2014-04-25 15:52:56.988117 7f00d37c6700 20 SERVER_PORT=80
>> > 2014-04-25 15:52:56.988117 7f00d37c6700 20 REMOTE_ADDR=122.166.115.191
>> > 2014-04-25 15:52:56.988118 7f00d37c6700 20 DOCUMENT_ROOT=/var/www
>> > 2014-04-25 15:52:56.988119 7f00d37c6700 20 SERVER_ADMIN=c...@3linux.com
>> > 2014-04-25 15:52:56.988120 7f00d37c6700 20
>> > SCRIPT_FILENAME=/var/www/s3gw.fcgi
>> > 2014-04-25 15:52:56.988120 7f00d37c6700 20 REMOTE_PORT=28840
>> > 2014-04-25 15:52:56.988121 7f00d37c6700 20 GATEWAY_INTERFACE=CGI/1.1
>> > 2014-04-25 15:52:56.988122 7f00d37c6700 20 SERVER_PROTOCOL=HTTP/1.1
>> > 2014-04-25 15:52:56.988123 7f00d37c6700 20 REQUEST_METHOD=GET
>> > 2014-04-25 15:52:56.988123 7f00d37c6700 20
>> > QUERY_STRING=page=admin&params=/usage&format=json
>> > 2014-04-25 15:52:56.988124 7f00d37c6700 20
>> > REQUEST_URI=/admin/usage?format=json
>> > 2014-04-25 15:52:56.988125 7f00d37c6700 20 SCRIPT_NAME=/admin/usage
>> > 2014-04-25 15:52:56.988126 7f00d37c6700  2 req 24:0.000101::GET
>> > /admin/usage::getting op
>> > 2014-04-25 15:52:56.988129 7f00d37c6700  2 req 24:0.000104::GET
>> > /admin/usage:get_usage:authorizing
>> > 2014-04-25 15:52:56.988141 7f00d37c6700 20 get_obj_state:
>> > rctx=0x7effbc004aa0 obj=.users:KGXJJGKDM5G7G4CNKC7R state=0x7effbc00e718
>> > s->prefetch_data=0
>> > 2014-04-25 15:52:56.988148 7f00d37c6700 10 moving
>> > .users+KGXJJGKDM5G7G4CNKC7R to cache LRU end
>> > 2014-04-25 15:52:56.988150 7f00d37c6700 10 cache get:
>> > name=.users+KGXJJGKDM5G7G4CNKC7R : hit
>> > 2014-04-25 15:52:56.988155 7f00d37c6700 20 get_obj_state: s->obj_tag
>> was set
>> > empty
>> > 2014-04-25 15:52:56.988160 7f00d37c6700 10 moving
>> > .users+KGXJJGKDM5G7G4CNKC7R to cache LRU end
>> > 2014-04-25 15:52:56.988161 7f00d37c6700 10 cache get:
>> > name=.users+KGXJJGKDM5G7G4CNKC7R : hit
>> > 2014-04-25 15:52:56.988179 7f00d37c6700 20 get_obj_state:
>> > rctx=0x7effbc001ce0 obj=.users.uid:admin state=0x7effbc00ec58
>> > s->prefetch_data=0
>> > 2014-04-25 15:52:56.988185 7f00d37c6700 10 moving .users.uid+admin to
>> cache
>> > LRU end
>> > 2014-04-25 15:52:56.988186 7f00d37c6700 10 cache get:
>> name=.users.uid+admin
>> > : hit
>> > 2014-04-25 15:52:56.988190 7f00d37c6700 20 get_obj_state: s->obj_tag
>> was set
>> > empty
>> > 2014-04-25 15:52:56.988193 7f00d37c6700 10 moving .users.uid+admin to
>> cache
>> > LRU end
>> > 2014-04-25 15:52:56.988195 7f00d37c6700 10 cache get:
>> name=.users.uid+admin
>> > : hit
>> > 2014-04-25 15:52:56.988236 7f00d37c6700 10 get_canon_resource():
>> > dest=/admin/usage
>> > 2014-04-25 15:52:56.988239 7f00d37c6700 10 auth_hdr:
>> > GET
>> >
>> >
>> > Fri, 25 April 2014 07:50:00 GMT
>> > /admin/usage
>> > 2014-04-25 15:52:56.988325 7f00d37c6700 15 calculated
>> > digest=nLKirQEEPeSS0Lzvr52NAB2phpA=
>> > 2014-04-25 15:52:56.988329 7f00d37c6700 15
>> > auth_sign=LC7S0twZdhtXA1XxthfMDsj5TgJpeKhZrloWa9WN
>> > 2014-04-25 15:52:56.988330 7f00d37c6700 15 compare=-34
>>
>>
>>  Still signing issues. If you're manually constructing the auth header
>> you need to make it look like the above (copy pasted here):
>>
>> > 2014-04-25 15:52:56.988239 7f00d37c6700 10 auth_hdr:
>> > GET
>> >
>> >
>> > Fri, 25 April 2014 07:50:00 GMT
>> > /admin/usage
>>
>>  Then you need to run hmac-sha1 on it, as described here:
>>
>> http://s3.amazonaws.com/doc/s3-developer-guide/RESTAuthentication.html
>>
>> If you have any backslash in the key then you need to remove it, it's
>> just an escape character for representing slashes in json.
>>
>> Yehuda
>>
>
>   _______________________________________________
> ceph-users mailing list
> ceph-users@lists.ceph.com
> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
>
>
_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com

Reply via email to