Amazon-DynamoDB

 view release on metacpan or  search on metacpan

CHANGES  view on Meta::CPAN

    using IAM roles. 

-----------------------------------------
version 0.24 at 2014-10-15 00:55:58 +0000
-----------------------------------------

  Change: 0bc85b03ad06c7a28f9bf0a86c09fd122751b10a
  Author: Rusty Conover <rusty@luckydinosaur.com>
  Date : 2014-10-14 20:55:58 +0000

    Add support for using credentials from IAM roles. 

-----------------------------------------
version 0.23 at 2014-10-10 22:00:40 +0000
-----------------------------------------

  Change: 358f942b22afe717bd963eda2d8ba14fd362ad60
  Author: Rusty Conover <rusty@luckydinosaur.com>
  Date : 2014-10-10 18:00:40 +0000

    Release 0.22 

lib/Amazon/DynamoDB/20120810.pm  view on Meta::CPAN

    $req->protocol('HTTP/1.1');
    $req->header( 'Date' => $http_date );
    $req->header( 'x-amz-target', 'DynamoDB_'. $api_version. '.'. $target );
    $req->header( 'content-type' => 'application/x-amz-json-1.0' );
    $payload = encode_json($payload);
    $req->content($payload);
    $req->header( 'Content-Length' => length($payload));
    
    if ($self->{use_iam_role}) {
        my $creds = VM::EC2::Security::CredentialCache->get();
        defined($creds) || die("Unable to retrieve IAM role credentials");
        $self->{access_key} = $creds->accessKeyId;
        $self->{secret_key} = $creds->secretAccessKey;
        $req->header('x-amz-security-token' => $creds->sessionToken);
    }        

    my $signer = AWS::Signature4->new(-access_key => $self->access_key,
                                      -secret_key => $self->secret_key);
    
    $signer->sign($req);
    return $req;

 view all matches for this distribution
 view release on metacpan -  search on metacpan

( run in 1.122 second using v1.00-cache-2.02-grep-82fe00e-cpan-f5108d614456 )