Skip to content

Commit

Permalink
Chore: fix CI for v5-backports
Browse files Browse the repository at this point in the history
  • Loading branch information
gabrielmoise17 committed Oct 29, 2024
1 parent 0bb4e19 commit d1e3a6e
Show file tree
Hide file tree
Showing 3 changed files with 7 additions and 26 deletions.
2 changes: 1 addition & 1 deletion cohttp-async.opam
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ depends: [
"cohttp" {= version}
"conduit-async" {>= "1.2.0"}
"magic-mime"
"mirage-crypto" {with-test}
"digestif" {with-test}
"logs"
"fmt" {>= "0.8.2"}
"sexplib0"
Expand Down
2 changes: 1 addition & 1 deletion examples/async/dune
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
(executables
(names hello_world receive_post s3_cp)
(libraries mirage-crypto cohttp-async base async_kernel core_unix.command_unix))
(libraries digestif.c cohttp-async base async_kernel core_unix.command_unix))

(alias
(name runtest)
Expand Down
29 changes: 5 additions & 24 deletions examples/async/s3_cp.ml
Original file line number Diff line number Diff line change
Expand Up @@ -83,18 +83,6 @@ module Compat = struct
let x = Char.to_int c in
(hexa.[x lsr 4], hexa.[x land 0xf])

let cstruct_to_hex_string cs =
let open Cstruct in
let n = cs.len in
let buf = Buffer.create (n * 2) in
for i = 0 to n - 1 do
let c = cs.buffer.{cs.off + i} in
let x, y = of_char c in
Buffer.add_char buf x;
Buffer.add_char buf y
done;
Buffer.contents buf

let encode_query_string uri =
(* Sort and encode query string.
Note that AWS wants null keys to have '=' for all keys.
Expand Down Expand Up @@ -170,8 +158,7 @@ module Auth = struct

let digest s =
(* string -> sha256 as a hex string *)
Mirage_crypto.Hash.(digest `SHA256 (Cstruct.of_string s))
|> Compat.cstruct_to_hex_string
Digestif.SHA256.(digest_string s |> to_hex)

let make_amz_headers ?body time =
(* Return x-amz-date and x-amz-sha256 headers *)
Expand Down Expand Up @@ -239,16 +226,12 @@ module Auth = struct
Printf.sprintf "AWS4-HMAC-SHA256\n%s\n%s\n%s" time_str scope_str hashed_req

let make_signing_key ?date ~region ~service ~secret_access_key () =
let mac k v =
Mirage_crypto.Hash.(mac `SHA256 ~key:k (Cstruct.of_string v))
in
let mac k v = Digestif.SHA256.(hmac_string ~key:k v |> to_raw_string) in
let date' =
match date with None -> Date.today ~zone:Time.Zone.utc | Some d -> d
in
let date_str = Date.to_string_iso8601_basic date' in
let date_key =
mac (Cstruct.of_string ("AWS4" ^ secret_access_key)) date_str
in
let date_key = mac ("AWS4" ^ secret_access_key) date_str in
let date_region_key = mac date_key (string_of_region region) in
let date_region_service_key =
mac date_region_key (string_of_service service)
Expand Down Expand Up @@ -278,14 +261,12 @@ module Auth = struct
(string_of_service service)
in
let signature =
Mirage_crypto.Hash.(
mac `SHA256 ~key:signing_key (Cstruct.of_string string_to_sign))
Digestif.SHA256.(hmac_string ~key:signing_key string_to_sign |> to_hex)
in
let auth_header =
Printf.sprintf
"AWS4-HMAC-SHA256 Credential=%s,SignedHeaders=%s,Signature=%s" creds
signed_headers
(Compat.cstruct_to_hex_string signature)
signed_headers signature
in
[ ("Authorization", auth_header) ]
end
Expand Down

0 comments on commit d1e3a6e

Please sign in to comment.