Amazon-DynamoDB
view release on metacpan - search on metacpan
view release on metacpan or search on metacpan
using IAM roles.
-----------------------------------------
version 0.24 at 2014-10-15 00:55:58 +0000
-----------------------------------------
Change: 0bc85b03ad06c7a28f9bf0a86c09fd122751b10a
Author: Rusty Conover <rusty@luckydinosaur.com>
Date : 2014-10-14 20:55:58 +0000
Add support for using credentials from IAM roles.
-----------------------------------------
version 0.23 at 2014-10-10 22:00:40 +0000
-----------------------------------------
Change: 358f942b22afe717bd963eda2d8ba14fd362ad60
Author: Rusty Conover <rusty@luckydinosaur.com>
Date : 2014-10-10 18:00:40 +0000
Release 0.22
lib/Amazon/DynamoDB/20120810.pm view on Meta::CPAN
$req->protocol('HTTP/1.1');
$req->header( 'Date' => $http_date );
$req->header( 'x-amz-target', 'DynamoDB_'. $api_version. '.'. $target );
$req->header( 'content-type' => 'application/x-amz-json-1.0' );
$payload = encode_json($payload);
$req->content($payload);
$req->header( 'Content-Length' => length($payload));
if ($self->{use_iam_role}) {
my $creds = VM::EC2::Security::CredentialCache->get();
defined($creds) || die("Unable to retrieve IAM role credentials");
$self->{access_key} = $creds->accessKeyId;
$self->{secret_key} = $creds->secretAccessKey;
$req->header('x-amz-security-token' => $creds->sessionToken);
}
my $signer = AWS::Signature4->new(-access_key => $self->access_key,
-secret_key => $self->secret_key);
$signer->sign($req);
return $req;
view all matches for this distributionview release on metacpan - search on metacpan
( run in 1.122 second using v1.00-cache-2.02-grep-82fe00e-cpan-f5108d614456 )