aws_cf_signer 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,5 @@
1
+ README.rdoc
2
+ lib/**/*.rb
3
+ bin/*
4
+ features/**/*.feature
5
+ LICENSE
@@ -0,0 +1,21 @@
1
+ ## MAC OS
2
+ .DS_Store
3
+
4
+ ## TEXTMATE
5
+ *.tmproj
6
+ tmtags
7
+
8
+ ## EMACS
9
+ *~
10
+ \#*
11
+ .\#*
12
+
13
+ ## VIM
14
+ *.swp
15
+
16
+ ## PROJECT::GENERAL
17
+ coverage
18
+ rdoc
19
+ pkg
20
+
21
+ ## PROJECT::SPECIFIC
@@ -0,0 +1,66 @@
1
+ = aws_cf_signer
2
+
3
+ Small gem for signing AWS CloudFront URLs given a AWS key_pair_id and pem file. Read more here:
4
+
5
+ * http://docs.amazonwebservices.com/AmazonCloudFront/latest/DeveloperGuide/index.html?PrivateContent.html
6
+
7
+ == Usage
8
+
9
+ # Pass in path to the private CloudFront key from AWS
10
+ signer = AwsCfSigner.new('/path/to/my/pk-1234567890.pem')
11
+
12
+ # If the key filename doesn't contain the key_pair_id (as it usually does from AWS), pass that in as the second arg
13
+ signer = AwsCfSigner.new('/path/to/my/private-key.pem', '1234567890')
14
+
15
+ # expiration date is required
16
+ # See Example Canned Policy at above AWS doc link
17
+ url = signer.sign('http://d604721fxaaqy9.cloudfront.net/horizon.jpg?large=yes&license=yes', :ending => 'Sat, 14 Nov 2009 22:20:00 GMT')
18
+
19
+ # You can also use a Time object
20
+ url = signer.sign('http://d604721fxaaqy9.cloudfront.net/horizon.jpg?large=yes&license=yes', :ending => Time.now + 3600)
21
+
22
+ # Custom Policies
23
+
24
+ # See Example Custom Policy 1 at above AWS doc link
25
+ url = signer.sign('http://d604721fxaaqy9.cloudfront.net/training/orientation.avi',
26
+ :ending => 'Sat, 14 Nov 2009 22:20:00 GMT',
27
+ :resource => 'http://d604721fxaaqy9.cloudfront.net/training/*',
28
+ :ip_range => '145.168.143.0/24'
29
+ )
30
+
31
+ # See Example Custom Policy 2 at above AWS doc link
32
+ url = signer.sign('http://d84l721fxaaqy9.cloudfront.net/downloads/pictures.tgz',
33
+ :starting => 'Thu, 30 Apr 2009 06:43:10 GMT',
34
+ :ending => 'Fri, 16 Oct 2009 06:31:56 GMT',
35
+ :resource => 'http://*',
36
+ :ip_range => '216.98.35.1/32'
37
+ )
38
+
39
+ # You can also pass in a path to a policy file
40
+ # This will supersede any other policy options
41
+ url = signer.sign('http://d84l721fxaaqy9.cloudfront.net/downloads/pictures.tgz', :policy_file => '/path/to/policy/file.txt')
42
+
43
+ See the test/test_aws_cf_signer.rb file for more examples.
44
+
45
+ == Note on Patches/Pull Requests
46
+
47
+ * Fork the project.
48
+ * Make your feature addition or bug fix.
49
+ * Add tests for it. This is important so I don't break it in a
50
+ future version unintentionally.
51
+ * Commit, do not mess with rakefile, version, or history.
52
+ (if you want to have your own version, that is fine but bump version in a commit by itself I can ignore when I pull)
53
+ * Send me a pull request. Bonus points for topic branches.
54
+
55
+ == Attributions
56
+
57
+ Parts of signing code taken from a question on Stack Overflow asked by Ben Wiseley, and answered by Blaz Lipuscek and Manual M:
58
+
59
+ * http://stackoverflow.com/questions/2632457/create-signed-urls-for-cloudfront-with-ruby
60
+ * http://stackoverflow.com/users/315829/ben-wiseley
61
+ * http://stackoverflow.com/users/267804/blaz-lipuscek
62
+ * http://stackoverflow.com/users/327914/manuel-m
63
+
64
+ == License
65
+
66
+ aws_cf_signer is distributed under the MIT License, copyright © 2010 STL
@@ -0,0 +1,53 @@
1
+ require 'rubygems'
2
+ require 'rake'
3
+
4
+ begin
5
+ require 'jeweler'
6
+ Jeweler::Tasks.new do |gem|
7
+ gem.name = "aws_cf_signer"
8
+ gem.summary = %Q{Ruby gem for signing AWS Cloudfront URLs for serving private content}
9
+ gem.description = %Q{Small gem for signing AWS CloudFront URLs given a AWS key_pair_id and pem file. Read more here: http://docs.amazonwebservices.com/AmazonCloudFront/latest/DeveloperGuide/index.html?PrivateContent.html}
10
+ gem.email = "dylan.vaughn@stlondemand.com"
11
+ gem.homepage = "http://github.com/stlondemand/aws_cf_signer"
12
+ gem.authors = ["Dylan Vaughn"]
13
+ gem.add_development_dependency "thoughtbot-shoulda", ">= 0"
14
+ gem.add_development_dependency "yard", ">= 0"
15
+ # gem is a Gem::Specification... see http://www.rubygems.org/read/chapter/20 for additional settings
16
+ end
17
+ Jeweler::GemcutterTasks.new
18
+ rescue LoadError
19
+ puts "Jeweler (or a dependency) not available. Install it with: gem install jeweler"
20
+ end
21
+
22
+ require 'rake/testtask'
23
+ Rake::TestTask.new(:test) do |test|
24
+ test.libs << 'lib' << 'test'
25
+ test.pattern = 'test/**/test_*.rb'
26
+ test.verbose = true
27
+ end
28
+
29
+ begin
30
+ require 'rcov/rcovtask'
31
+ Rcov::RcovTask.new do |test|
32
+ test.libs << 'test'
33
+ test.pattern = 'test/**/test_*.rb'
34
+ test.verbose = true
35
+ end
36
+ rescue LoadError
37
+ task :rcov do
38
+ abort "RCov is not available. In order to run rcov, you must: sudo gem install spicycode-rcov"
39
+ end
40
+ end
41
+
42
+ task :test => :check_dependencies
43
+
44
+ task :default => :test
45
+
46
+ begin
47
+ require 'yard'
48
+ YARD::Rake::YardocTask.new
49
+ rescue LoadError
50
+ task :yardoc do
51
+ abort "YARD is not available. In order to run yardoc, you must: sudo gem install yard"
52
+ end
53
+ end
data/VERSION ADDED
@@ -0,0 +1 @@
1
+ 0.1.0
@@ -0,0 +1,60 @@
1
+ # Generated by jeweler
2
+ # DO NOT EDIT THIS FILE DIRECTLY
3
+ # Instead, edit Jeweler::Tasks in Rakefile, and run the gemspec command
4
+ # -*- encoding: utf-8 -*-
5
+
6
+ Gem::Specification.new do |s|
7
+ s.name = %q{aws_cf_signer}
8
+ s.version = "0.1.0"
9
+
10
+ s.required_rubygems_version = Gem::Requirement.new(">= 0") if s.respond_to? :required_rubygems_version=
11
+ s.authors = ["Dylan Vaughn"]
12
+ s.date = %q{2010-11-17}
13
+ s.description = %q{Small gem for signing AWS CloudFront URLs given a AWS key_pair_id and pem file. Read more here: http://docs.amazonwebservices.com/AmazonCloudFront/latest/DeveloperGuide/index.html?PrivateContent.html}
14
+ s.email = %q{dylan.vaughn@stlondemand.com}
15
+ s.extra_rdoc_files = [
16
+ "README.rdoc"
17
+ ]
18
+ s.files = [
19
+ ".document",
20
+ ".gitignore",
21
+ "README.rdoc",
22
+ "Rakefile",
23
+ "VERSION",
24
+ "aws_cf_signer.gemspec",
25
+ "lib/aws_cf_signer.rb",
26
+ "test/fixtures/README",
27
+ "test/fixtures/custom_policy1",
28
+ "test/fixtures/custom_policy2",
29
+ "test/fixtures/pk-PK123456789754.pem",
30
+ "test/fixtures/rsa-PK123456789754.pem",
31
+ "test/helper.rb",
32
+ "test/test_aws_cf_signer.rb"
33
+ ]
34
+ s.homepage = %q{http://github.com/stlondemand/aws_cf_signer}
35
+ s.rdoc_options = ["--charset=UTF-8"]
36
+ s.require_paths = ["lib"]
37
+ s.rubygems_version = %q{1.3.7}
38
+ s.summary = %q{Ruby gem for signing AWS Cloudfront URLs for serving private content}
39
+ s.test_files = [
40
+ "test/helper.rb",
41
+ "test/test_aws_cf_signer.rb"
42
+ ]
43
+
44
+ if s.respond_to? :specification_version then
45
+ current_version = Gem::Specification::CURRENT_SPECIFICATION_VERSION
46
+ s.specification_version = 3
47
+
48
+ if Gem::Version.new(Gem::VERSION) >= Gem::Version.new('1.2.0') then
49
+ s.add_development_dependency(%q<thoughtbot-shoulda>, [">= 0"])
50
+ s.add_development_dependency(%q<yard>, [">= 0"])
51
+ else
52
+ s.add_dependency(%q<thoughtbot-shoulda>, [">= 0"])
53
+ s.add_dependency(%q<yard>, [">= 0"])
54
+ end
55
+ else
56
+ s.add_dependency(%q<thoughtbot-shoulda>, [">= 0"])
57
+ s.add_dependency(%q<yard>, [">= 0"])
58
+ end
59
+ end
60
+
@@ -0,0 +1,70 @@
1
+ require 'openssl'
2
+ require 'time'
3
+ require 'base64'
4
+
5
+ class AwsCfSigner
6
+
7
+ attr_reader :key_pair_id
8
+
9
+ def initialize(pem_path, key_pair_id = nil)
10
+ @pem_path = pem_path
11
+ @key = OpenSSL::PKey::RSA.new(File.readlines(@pem_path).join(""))
12
+ @key_pair_id = key_pair_id ? key_pair_id : extract_key_pair_id(@pem_path)
13
+ unless @key_pair_id
14
+ raise ArgumentError.new("key_pair_id couldn't be inferred from #{@pem_path} - please pass in explicitly")
15
+ end
16
+ end
17
+
18
+ def sign(url_to_sign, policy_options = {})
19
+ separator = url_to_sign =~ /\?/ ? '&' : '?'
20
+ if policy_options[:policy_file]
21
+ policy = IO.read(policy_options[:policy_file])
22
+ "#{url_to_sign}#{separator}Policy=#{encode_policy(policy)}&Signature=#{create_signature(policy)}&Key-Pair-Id=#{@key_pair_id}"
23
+ else
24
+ raise ArgumentError.new("'ending' argument is required") if policy_options[:ending].nil?
25
+ if policy_options.keys.size == 1
26
+ # Canned Policy - shorter URL
27
+ expires_at = epoch_time(policy_options[:ending])
28
+ policy = %({"Statement":[{"Resource":"#{url_to_sign}","Condition":{"DateLessThan":{"AWS:EpochTime":#{expires_at}}}}]})
29
+ "#{url_to_sign}#{separator}Expires=#{expires_at}&Signature=#{create_signature(policy)}&Key-Pair-Id=#{@key_pair_id}"
30
+ else
31
+ # Custom Policy
32
+ resource = policy_options[:resource] || url_to_sign
33
+ policy = generate_custom_policy(resource, policy_options)
34
+ "#{url_to_sign}#{separator}Policy=#{encode_policy(policy)}&Signature=#{create_signature(policy)}&Key-Pair-Id=#{@key_pair_id}"
35
+ end
36
+ end
37
+ end
38
+
39
+ def generate_custom_policy(resource, options)
40
+ conditions = ["\"DateLessThan\":{\"AWS:EpochTime\":#{epoch_time(options[:ending])}}"]
41
+ conditions << "\"DateGreaterThan\":{\"AWS:EpochTime\":#{epoch_time(options[:starting])}}" if options[:starting]
42
+ conditions << "\"IpAddress\":{\"AWS:SourceIp\":#{options[:ip_range]}" if options[:ip_range]
43
+ %({"Statement":[{"Resource":"#{resource}","Condition":{#{conditions.join(',')}}}]})
44
+ end
45
+
46
+ def epoch_time(timelike)
47
+ case timelike
48
+ when String then Time.parse(timelike).to_i
49
+ when Time then timelike.to_i
50
+ else raise ArgumentError.new("Invalid argument - String or Time required - #{timelike.class} passed.")
51
+ end
52
+ end
53
+
54
+ def encode_policy(policy)
55
+ url_safe(Base64.encode64(policy))
56
+ end
57
+
58
+ def create_signature(policy)
59
+ url_safe(Base64.encode64(@key.sign(OpenSSL::Digest::SHA1.new, (policy))))
60
+ end
61
+
62
+ def extract_key_pair_id(key_path)
63
+ File.basename(key_path) =~ /^pk-(.*).pem$/ ? $1 : nil
64
+ end
65
+
66
+ def url_safe(s)
67
+ s.gsub('+','-').gsub('=','_').gsub('/','~').gsub(/\n/,'').gsub(' ','')
68
+ end
69
+
70
+ end
@@ -0,0 +1,5 @@
1
+ The example keys and policies are from this page:
2
+
3
+ http://docs.amazonwebservices.com/AmazonCloudFront/latest/DeveloperGuide/index.html?PrivateContent.html
4
+
5
+ renamed from private-key.pem and public-key.pem to reflect the normal way AWS names these keys.
@@ -0,0 +1,9 @@
1
+ {
2
+ "Statement": [{
3
+ "Resource":"http://d604721fxaaqy9.cloudfront.net/training/*",
4
+ "Condition":{
5
+ "IpAddress":{"AWS:SourceIp":"145.168.143.0/24"},
6
+ "DateLessThan":{"AWS:EpochTime":1258237200}
7
+ }
8
+ }]
9
+ }
@@ -0,0 +1,10 @@
1
+ {
2
+ "Statement": [{
3
+ "Resource":"http://*",
4
+ "Condition":{
5
+ "IpAddress":{"AWS:SourceIp":"216.98.35.1/32"},
6
+ "DateGreaterThan":{"AWS:EpochTime":1241073790},
7
+ "DateLessThan":{"AWS:EpochTime":1255674716}
8
+ }
9
+ }]
10
+ }
@@ -0,0 +1,15 @@
1
+ -----BEGIN RSA PRIVATE KEY-----
2
+ MIICXQIBAAKBgQDA7ki9gI/lRygIoOjV1yymgx6FYFlzJ+z1ATMaLo57nL57AavW
3
+ hb68HYY8EA0GJU9xQdMVaHBogF3eiCWYXSUZCWM/+M5+ZcdQraRRScucmn6g4EvY
4
+ 2K4W2pxbqH8vmUikPxir41EeBPLjMOzKvbzzQy9e/zzIQVREKSp/7y1mywIDAQAB
5
+ AoGABc7mp7XYHynuPZxChjWNJZIq+A73gm0ASDv6At7F8Vi9r0xUlQe/v0AQS3yc
6
+ N8QlyR4XMbzMLYk3yjxFDXo4ZKQtOGzLGteCU2srANiLv26/imXA8FVidZftTAtL
7
+ viWQZBVPTeYIA69ATUYPEq0a5u5wjGyUOij9OWyuy01mbPkCQQDluYoNpPOekQ0Z
8
+ WrPgJ5rxc8f6zG37ZVoDBiexqtVShIF5W3xYuWhW5kYb0hliYfkq15cS7t9m95h3
9
+ 1QJf/xI/AkEA1v9l/WN1a1N3rOK4VGoCokx7kR2SyTMSbZgF9IWJNOugR/WZw7HT
10
+ njipO3c9dy1Ms9pUKwUF46d7049ck8HwdQJARgrSKuLWXMyBH+/l1Dx/I4tXuAJI
11
+ rlPyo+VmiOc7b5NzHptkSHEPfR9s1OK0VqjknclqCJ3Ig86OMEtEFBzjZQJBAKYz
12
+ 470hcPkaGk7tKYAgP48FvxRsnzeooptURW5E+M+PQ2W9iDPPOX9739+Xi02hGEWF
13
+ B0IGbQoTRFdE4VVcPK0CQQCeS84lODlC0Y2BZv2JxW3Osv/WkUQ4dslfAQl1T303
14
+ 7uwwr7XTroMv8dIFQIPreoPhRKmd/SbJzbiKfS/4QDhU
15
+ -----END RSA PRIVATE KEY-----
@@ -0,0 +1,6 @@
1
+ -----BEGIN PUBLIC KEY-----
2
+ MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDA7ki9gI/lRygIoOjV1yymgx6F
3
+ YFlzJ+z1ATMaLo57nL57AavWhb68HYY8EA0GJU9xQdMVaHBogF3eiCWYXSUZCWM/
4
+ +M5+ZcdQraRRScucmn6g4EvY2K4W2pxbqH8vmUikPxir41EeBPLjMOzKvbzzQy9e
5
+ /zzIQVREKSp/7y1mywIDAQAB
6
+ -----END PUBLIC KEY-----
@@ -0,0 +1,10 @@
1
+ require 'rubygems'
2
+ require 'test/unit'
3
+ require 'shoulda'
4
+
5
+ $LOAD_PATH.unshift(File.join(File.dirname(__FILE__), '..', 'lib'))
6
+ $LOAD_PATH.unshift(File.dirname(__FILE__))
7
+ require 'aws_cf_signer'
8
+
9
+ class Test::Unit::TestCase
10
+ end
@@ -0,0 +1,65 @@
1
+ # -*- coding: utf-8 -*-
2
+ require 'helper'
3
+
4
+ class TestAwsCfSigner < Test::Unit::TestCase
5
+ context "CloudFront Signing" do
6
+ setup do
7
+ @cf_signer = AwsCfSigner.new(File.join(File.dirname(__FILE__), 'fixtures', 'pk-PK123456789754.pem'))
8
+ end
9
+
10
+ context "Initialization and Error Checking" do
11
+ should "be able to extract the key pair id from the filename of a key straight from AWS" do
12
+ assert_equal @cf_signer.extract_key_pair_id('/path/to/my/key/pk-THEKEYID.pem'), 'THEKEYID'
13
+ end
14
+
15
+ should "be able to tell you the key pair id" do
16
+ assert_equal @cf_signer.key_pair_id, 'PK123456789754'
17
+ end
18
+
19
+ should "be able to make a string 'Url-Safe'" do
20
+ assert_equal(
21
+ @cf_signer.url_safe("Test+String_~ =Something/Weird"),
22
+ "Test-String_~_Something~Weird"
23
+ )
24
+ end
25
+ end
26
+
27
+ context "Example Canned Policy" do
28
+ should "generate the correct signature" do
29
+ assert_equal(
30
+ @cf_signer.sign('http://d604721fxaaqy9.cloudfront.net/horizon.jpg?large=yes&license=yes', :ending => 'Sat, 14 Nov 2009 22:20:00 GMT'),
31
+ 'http://d604721fxaaqy9.cloudfront.net/horizon.jpg?large=yes&license=yes&Expires=1258237200&Signature=Nql641NHEUkUaXQHZINK1FZ~SYeUSoBJMxjdgqrzIdzV2gyEXPDNv0pYdWJkflDKJ3xIu7lbwRpSkG98NBlgPi4ZJpRRnVX4kXAJK6tdNx6FucDB7OVqzcxkxHsGFd8VCG1BkC-Afh9~lOCMIYHIaiOB6~5jt9w2EOwi6sIIqrg_&Key-Pair-Id=PK123456789754'
32
+ )
33
+ end
34
+ end
35
+
36
+ context "Custom Policies from files" do
37
+ should "generate custom policy 1 correctly" do
38
+ assert_equal(
39
+ @cf_signer.sign('http://d604721fxaaqy9.cloudfront.net/training/orientation.avi', :policy_file => File.join(File.dirname(__FILE__), 'fixtures', 'custom_policy1')),
40
+ 'http://d604721fxaaqy9.cloudfront.net/training/orientation.avi?Policy=eyAKICAgIlN0YXRlbWVudCI6IFt7IAogICAgICAiUmVzb3VyY2UiOiJodHRwOi8vZDYwNDcyMWZ4YWFxeTkuY2xvdWRmcm9udC5uZXQvdHJhaW5pbmcvKiIsIAogICAgICAiQ29uZGl0aW9uIjp7IAogICAgICAgICAiSXBBZGRyZXNzIjp7IkFXUzpTb3VyY2VJcCI6IjE0NS4xNjguMTQzLjAvMjQifSwgCiAgICAgICAgICJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTI1ODIzNzIwMH0gICAgICAKICAgICAgfSAKICAgfV0gCn0K&Signature=cPFtRKvUfYNYmxek6ZNs6vgKEZP6G3Cb4cyVt~FjqbHOnMdxdT7eT6pYmhHYzuDsFH4Jpsctke2Ux6PCXcKxUcTIm8SO4b29~1QvhMl-CIojki3Hd3~Unxjw7Cpo1qRjtvrimW0DPZBZYHFZtiZXsaPt87yBP9GWnTQoaVysMxQ_&Key-Pair-Id=PK123456789754'
41
+ )
42
+ end
43
+
44
+ should "generate custom policy 2 correctly" do
45
+ assert_equal(
46
+ @cf_signer.sign('http://d84l721fxaaqy9.cloudfront.net/downloads/pictures.tgz', :policy_file => File.join(File.dirname(__FILE__), 'fixtures', 'custom_policy2')),
47
+ 'http://d84l721fxaaqy9.cloudfront.net/downloads/pictures.tgz?Policy=eyAKICAgIlN0YXRlbWVudCI6IFt7IAogICAgICAiUmVzb3VyY2UiOiJodHRwOi8vKiIsIAogICAgICAiQ29uZGl0aW9uIjp7IAogICAgICAgICAiSXBBZGRyZXNzIjp7IkFXUzpTb3VyY2VJcCI6IjIxNi45OC4zNS4xLzMyIn0sCiAgICAgICAgICJEYXRlR3JlYXRlclRoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTI0MTA3Mzc5MH0sCiAgICAgICAgICJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTI1NTY3NDcxNn0KICAgICAgfSAKICAgfV0gCn0K&Signature=rc~5Qbbm8EJXjUTQ6Cn0LAxR72g1DOPrTmdtfbWVVgQNw0q~KHUAmBa2Zv1Wjj8dDET4XSL~Myh44CLQdu4dOH~N9huH7QfPSR~O4tIOS1WWcP~2JmtVPoQyLlEc8YHRCuN3nVNZJ0m4EZcXXNAS-0x6Zco2SYx~hywTRxWR~5Q_&Key-Pair-Id=PK123456789754'
48
+ )
49
+ end
50
+ end
51
+
52
+ context "Custom Policy Generation" do
53
+ should "correctly generate custom policy" do
54
+ starting = Time.now
55
+ ending = Time.now + 3600
56
+ ip_range = '216.98.35.1/32'
57
+ assert_equal(
58
+ @cf_signer.generate_custom_policy('http://d84l721fxaaqy9.cloudfront.net/downloads/*', :starting => starting, :ending => ending, :ip_range => ip_range),
59
+ %({"Statement":[{"Resource":"http://d84l721fxaaqy9.cloudfront.net/downloads/*","Condition":{"DateLessThan":{"AWS:EpochTime":#{ending.to_i}},"DateGreaterThan":{"AWS:EpochTime":#{starting.to_i}},"IpAddress":{"AWS:SourceIp":#{ip_range}}}]})
60
+ )
61
+ end
62
+ end
63
+
64
+ end
65
+ end
metadata ADDED
@@ -0,0 +1,108 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: aws_cf_signer
3
+ version: !ruby/object:Gem::Version
4
+ hash: 27
5
+ prerelease: false
6
+ segments:
7
+ - 0
8
+ - 1
9
+ - 0
10
+ version: 0.1.0
11
+ platform: ruby
12
+ authors:
13
+ - Dylan Vaughn
14
+ autorequire:
15
+ bindir: bin
16
+ cert_chain: []
17
+
18
+ date: 2010-11-17 00:00:00 -08:00
19
+ default_executable:
20
+ dependencies:
21
+ - !ruby/object:Gem::Dependency
22
+ name: thoughtbot-shoulda
23
+ prerelease: false
24
+ requirement: &id001 !ruby/object:Gem::Requirement
25
+ none: false
26
+ requirements:
27
+ - - ">="
28
+ - !ruby/object:Gem::Version
29
+ hash: 3
30
+ segments:
31
+ - 0
32
+ version: "0"
33
+ type: :development
34
+ version_requirements: *id001
35
+ - !ruby/object:Gem::Dependency
36
+ name: yard
37
+ prerelease: false
38
+ requirement: &id002 !ruby/object:Gem::Requirement
39
+ none: false
40
+ requirements:
41
+ - - ">="
42
+ - !ruby/object:Gem::Version
43
+ hash: 3
44
+ segments:
45
+ - 0
46
+ version: "0"
47
+ type: :development
48
+ version_requirements: *id002
49
+ description: "Small gem for signing AWS CloudFront URLs given a AWS key_pair_id and pem file. Read more here: http://docs.amazonwebservices.com/AmazonCloudFront/latest/DeveloperGuide/index.html?PrivateContent.html"
50
+ email: dylan.vaughn@stlondemand.com
51
+ executables: []
52
+
53
+ extensions: []
54
+
55
+ extra_rdoc_files:
56
+ - README.rdoc
57
+ files:
58
+ - .document
59
+ - .gitignore
60
+ - README.rdoc
61
+ - Rakefile
62
+ - VERSION
63
+ - aws_cf_signer.gemspec
64
+ - lib/aws_cf_signer.rb
65
+ - test/fixtures/README
66
+ - test/fixtures/custom_policy1
67
+ - test/fixtures/custom_policy2
68
+ - test/fixtures/pk-PK123456789754.pem
69
+ - test/fixtures/rsa-PK123456789754.pem
70
+ - test/helper.rb
71
+ - test/test_aws_cf_signer.rb
72
+ has_rdoc: true
73
+ homepage: http://github.com/stlondemand/aws_cf_signer
74
+ licenses: []
75
+
76
+ post_install_message:
77
+ rdoc_options:
78
+ - --charset=UTF-8
79
+ require_paths:
80
+ - lib
81
+ required_ruby_version: !ruby/object:Gem::Requirement
82
+ none: false
83
+ requirements:
84
+ - - ">="
85
+ - !ruby/object:Gem::Version
86
+ hash: 3
87
+ segments:
88
+ - 0
89
+ version: "0"
90
+ required_rubygems_version: !ruby/object:Gem::Requirement
91
+ none: false
92
+ requirements:
93
+ - - ">="
94
+ - !ruby/object:Gem::Version
95
+ hash: 3
96
+ segments:
97
+ - 0
98
+ version: "0"
99
+ requirements: []
100
+
101
+ rubyforge_project:
102
+ rubygems_version: 1.3.7
103
+ signing_key:
104
+ specification_version: 3
105
+ summary: Ruby gem for signing AWS Cloudfront URLs for serving private content
106
+ test_files:
107
+ - test/helper.rb
108
+ - test/test_aws_cf_signer.rb