AWS-CloudFront
view release on metacpan or search on metacpan
inc/Module/Install/Metadata.pm view on Meta::CPAN
$self->provides( %{ $build->find_dist_packages || {} } );
}
sub feature {
my $self = shift;
my $name = shift;
my $features = ( $self->{values}{features} ||= [] );
my $mods;
if ( @_ == 1 and ref( $_[0] ) ) {
# The user used ->feature like ->features by passing in the second
# argument as a reference. Accomodate for that.
$mods = $_[0];
} else {
$mods = \@_;
}
my $count = 0;
push @$features, (
$name => [
map {
lib/AWS/CloudFront.pm view on Meta::CPAN
use AWS::CloudFront::OriginAccessIdentity;
our $VERSION = '0.003';
has 'access_key_id' => (
is => 'ro',
isa => 'Str',
required => 1,
);
has 'secret_access_key' => (
is => 'ro',
isa => 'Str',
required => 1,
);
has 'ua' => (
is => 'ro',
isa => 'LWP::UserAgent',
lazy => 1,
required => 0,
lib/AWS/CloudFront/Signer.pm view on Meta::CPAN
}
);
has 'signature' => (
is => 'ro',
isa => 'Str',
required => 1,
lazy => 1,
default => sub {
my $s = shift;
encode_base64(hmac_sha1($s->date, $s->cf->secret_access_key));
}
);
sub auth_header
{
my $s = shift;
return 'AWS ' . $s->cf->access_key_id . ':' . $s->signature;
}# end auth_header()
t/010-basic/010-basic.t view on Meta::CPAN
use_ok('AWS::CloudFront');
unless( $ENV{AWS_ACCESS_KEY_ID} && $ENV{AWS_SECRET_ACCESS_KEY} )
{
warn '$ENV{AWS_ACCESS_KEY_ID} && $ENV{AWS_SECRET_ACCESS_KEY} must both be defined to run these tests.', "\n";
exit(0);
}# end unless()
my $cf = AWS::CloudFront->new(
access_key_id => $ENV{AWS_ACCESS_KEY_ID},
secret_access_key => $ENV{AWS_SECRET_ACCESS_KEY},
);
ok( $cf, 'got a new cloudfront object' );
use_ok('AWS::S3');
my $s3 = AWS::S3->new(
access_key_id => $ENV{AWS_ACCESS_KEY_ID},
secret_access_key => $ENV{AWS_SECRET_ACCESS_KEY},
);
ok( $s3, 'got an s3 object too');
my @dists = $cf->distributions();
foreach my $dist ( @dists )
{
is $dist->Id, $cf->distribution(Id => $dist->Id)->Id, 'Ids match up';
}# end foreach()
( run in 0.530 second using v1.01-cache-2.11-cpan-39bf76dae61 )