签名方法
这里介绍 API 请求中签名 ( signature ) 的生成方法。您可以根据实际情况选择使用 API 密钥 或 IAM 身份 来完成签名。
API 密钥签名
您需要先在控制台创建 API 密钥,获得 accesss_key_id 和 secret_access_key,这里我们假设
access_key_id = 'QYACCESSKEYIDEXAMPLE'
secret_access_key = 'SECRETACCESSKEY'
例如我们的请求参数如下:
{
"count":1,
"vxnets.1":"vxnet-0",
"zone":"pek3a",
"instance_type":"small_b",
"signature_version":1,
"signature_method":"HmacSHA256",
"instance_name":"demo",
"image_id":"centos64x86a",
"login_mode":"passwd",
"login_passwd":"QingCloud20130712",
"version":1,
"access_key_id":"QYACCESSKEYIDEXAMPLE",
"action":"RunInstances",
"time_stamp":"2013-08-27T14:30:10Z"
}
说明 |
---|
你可以使用上述的 AccessKey 和 Request 调试你的代码, 当得到跟后面一致的签名结果后(即表示你的代码是正确的), 可再换为你自己的 AccessKey 和其他 API 请求。 |
签名步骤
-
按参数名进行升序排列,排序后的参数为:
{ "access_key_id":"QYACCESSKEYIDEXAMPLE", "action":"RunInstances", "count":1, "image_id":"centos64x86a", "instance_name":"demo", "instance_type":"small_b", "login_mode":"passwd", "login_passwd":"QingCloud20130712", "signature_method":"HmacSHA256", "signature_version":1, "time_stamp":"2013-08-27T14:30:10Z", "version":1, "vxnets.1":"vxnet-0", "zone":"pek3a" }
-
对参数名称和参数值进行 URL 编码,编码后的请求串为:
{ "access_key_id":"QYACCESSKEYIDEXAMPLE", "action":"RunInstances", "count":1, "image_id":"centos64x86a", "instance_name":"demo", "instance_type":"small_b", "login_mode":"passwd", "login_passwd":"QingCloud20130712", "signature_method":"HmacSHA256", "signature_version":1, "time_stamp":"2013-08-27T14%3A30%3A10Z", "version":1, "vxnets.1":"vxnet-0", "zone":"pek3a" }
注意 -
编码时空格要转换成
%20
, 而不是+
。 -
转码部分的字符要用大写,如
:
应转成%3A
,而不是%3a
-
-
构造 URL 请求。参数名和参数值之间用
=
号连接,参数和参数之间用&
号连接,构造后的 URL 请求为access_key_id=QYACCESSKEYIDEXAMPLE&action=RunInstances&count=1&image_id=centos64x86a&instance_name=demo&instance_type=small_b&login_mode=passwd&login_passwd=QingCloud20130712&signature_method=HmacSHA256&signature_version=1&time_stamp=2013-08-27T14%3A30%3A10Z&version=1&vxnets.1=vxnet-0&zone=pek3a
-
构造被签名串。被签名串的构造规则为: 被签名串 = HTTP请求方式 + "\n" + uri + "\n" + url 请求串
注意 “\n” 是换行符,不要将 “\” 转义。也就是说,不要用 “\n” ,有些语言,比如 php 和 ruby ,请用 “\n” , 而不是 ‘\n’
假设 HTTP 请求方法为 GET 请求的uri路径为 "/iaas/" , 则被签名串为
GET\n/iaas/\naccess_key_id=QYACCESSKEYIDEXAMPLE&action=RunInstances&count=1&image_id=centos64x86a&instance_name=demo&instance_type=small_b&login_mode=passwd&login_passwd=QingCloud20130712&signature_method=HmacSHA256&signature_version=1&time_stamp=2013-08-27T14%3A30%3A10Z&version=1&vxnets.1=vxnet-0&zone=pek3a
-
计算签名。计算被签名串的签名 signature。
-
将API密钥的私钥 ( secret_access_key ) 作为key,生成被签名串的 HMAC-SHA256 或者 HMAC-SHA1 签名,更多信息可参见 RFC2104
-
将签名进行 Base64 编码
-
将 Base64 编码后的结果进行 URL 编码
注意 当 Base64 编码后存在空格时,不要对空格进行 URL 编码,而要直接将空格转为
+
。以 Python (版本 2.7) 代码为例 (其他语言类似,需要使用 sha256 + base64 编码,最后需要再进行 URL 编码,URL 编码时需要将原有的空格转为 “+”)
import base64 import hmac import urllib from hashlib import sha256 # 前面生成的被签名串 string_to_sign = 'GET\n/iaas/\naccess_key_id=QYACCESSKEYIDEXAMPLE&action=RunInstances&count=1&image_id=centos64x86a&instance_name=demo&instance_type=small_b&login_mode=passwd&login_passwd=QingCloud20130712&signature_method=HmacSHA256&signature_version=1&time_stamp=2013-08-27T14%3A30%3A10Z&version=1&vxnets.1=vxnet-0&zone=pek3a' h = hmac.new(secret_access_key, digestmod=sha256) h.update(string_to_sign) sign = base64.b64encode(h.digest()).strip() signature = urllib.quote_plus(sign)
-
-
添加签名。将签名参数附在原有请求串的最后面。 最终的 HTTP 请求串为(为了查看方便,我们人为地将参数之间用回车分隔开)。
access_key_id=QYACCESSKEYIDEXAMPLE &action=RunInstances &count=1 &image_id=centos64x86a &instance_name=demo &instance_type=small_b &login_mode=passwd &login_passwd=QingCloud20130712 &signature_method=HmacSHA256 &signature_version=1 &time_stamp=2013-08-27T14%3A30%3A10Z &version=1 &vxnets.1=vxnet-0 &zone=pek3a &signature=byjccvWIvAftaq%2BoublemagH3bYAlDWxxLFAzAsyslw%3D
完整的请求 URL 为(为了查看方便,我们人为地将参数之间用回车分隔开)。
https://api.qingcloud.com/iaas/?access_key_id=QYACCESSKEYIDEXAMPLE &action=RunInstances &count=1 &image_id=centos64x86a &instance_name=demo &instance_type=small_b &login_mode=passwd &login_passwd=QingCloud20130712 &signature_method=HmacSHA256 &signature_version=1 &time_stamp=2013-08-27T14%3A30%3A10Z &version=1 &vxnets.1=vxnet-0 &zone=pek3a &signature=byjccvWIvAftaq%2BoublemagH3bYAlDWxxLFAzAsyslw%3D
实际URL为:
https://api.qingcloud.com/iaas/?access_key_id=QYACCESSKEYIDEXAMPLE&action=RunInstances&count=1&image_id=centos64x86a&instance_name=demo&instance_type=small_b&login_mode=passwd&login_passwd=QingCloud20130712&signature_method=HmacSHA256&signature_version=1&time_stamp=2013-08-27T14%3A30%3A10Z&version=1&vxnets.1=vxnet-0&zone=pek3a&signature=byjccvWIvAftaq%2BoublemagH3bYAlDWxxLFAzAsyslw%3D
IAM 身份签名
您需要先到 IAM 控制面板创建一个基于特定信任载体类型的身份,并将身份绑定到 API 执行设备上。
-
获取 IAM 身份的临时凭证。
在云服务器中执行如下命令,即可取得身份的临时凭证:
curl -i -H "Accept: application/json" http://169.254.169.254/latest/meta-data/security-credentials
返回信息:
"{\"jti\":\"0z7dO3oN03byx1CepBDTyl\",\"id_token\":\"eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJhY3IiOiIxIiwiYXVkIjoiaWFtIiwiYXpwIjoiaWFtIiwiY29ucyI6ImFkbWluIiwiY3VpZCI6ImlhbXItejU3dm42anIiLCJlaXNrIjoieUxjcFViRXZVOWZQZmJSQTA2eUFQMUtMS21keVpoX1JueDJmNmRmeFZZZz0iLCJleHAiOjE1OTAzMTk1MjMsImlhdCI6MTU5MDMxNTkyMywiaXNzIjoic3RzIiwianRpIjoiMHo3ZE8zb04wM2J5eDFDZXBCRFR5bCIsIm5iZiI6MCwib3JnaSI6ImFwcC0xMjM0NTY3OCIsIm93dXIiOiJ1c3ItQ29qOGFIZ24iLCJwcmVmIjoicXJuOnFpbmdjbG91ZDppYW06Iiwicm91ciI6InVzci1Db2o4YUhnbiIsInJ0eXAiOiJyb2xlIiwic3ViIjoic3RzIiwidHlwIjoiSUQifQ.YrCnvySApej2zHsn9cfn3D7tgOahDzeTP1TRBVMZ_3TyToo-H7hB2_mx_J_Qy1NY5K-WykYE4NFxqVN7PqsnAmskqAnRM2D7Gza_PffO7ajEJhtVF7Fo7nsmPKs7y1kryQ2Rvj3ABBJThHjQDtYVsk_pLUio5P0Nl9zb1sSswN4\",\"access_key\":\"0z7dO3oN03byx1CepBDTyl\",\"secret_key\":\"5qlKnUc3esKJp3G\",\"expiration\":1590319523}"
为了查看方便,我们人为地将参数之间用回车分隔开:
"jti":"0z7dO3oN03byx1CepBDTyl", "id_token":"eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJhY3IiOiIxIiwiYXVkIjoiaWFtIiwiYXpwIjoiaWFtIiwiY29ucyI6ImFkbWluIiwiY3VpZCI6ImlhbXItejU3dm42anIiLCJlaXNrIjoieUxjcFViRXZVOWZQZmJSQTA2eUFQMUtMS21keVpoX1JueDJmNmRmeFZZZz0iLCJleHAiOjE1OTAzMTk1MjMsImlhdCI6MTU5MDMxNTkyMywiaXNzIjoic3RzIiwianRpIjoiMHo3ZE8zb04wM2J5eDFDZXBCRFR5bCIsIm5iZiI6MCwib3JnaSI6ImFwcC0xMjM0NTY3OCIsIm93dXIiOiJ1c3ItQ29qOGFIZ24iLCJwcmVmIjoicXJuOnFpbmdjbG91ZDppYW06Iiwicm91ciI6InVzci1Db2o4YUhnbiIsInJ0eXAiOiJyb2xlIiwic3ViIjoic3RzIiwidHlwIjoiSUQifQ.YrCnvySApej2zHsn9cfn3D7tgOahDzeTP1TRBVMZ_3TyToo-H7hB2_mx_J_Qy1NY5K-WykYE4NFxqVN7PqsnAmskqAnRM2D7Gza_PffO7ajEJhtVF7Fo7nsmPKs7y1kryQ2Rvj3ABBJThHjQDtYVsk_pLUio5P0Nl9zb1sSswN4", "access_key":"0z7dO3oN03byx1CepBDTyl", "secret_key":"5qlKnUc3esKJp3G", "expiration":1590319523
-
添加签名
将身份临时凭证中的 access_key 和 secret_key 按照前文 API 密钥同样的方法进行签名计算,然后将请求的 uri 路径改为 "/iam/",最后在请求中附上 token 参数(参数值为临时凭证中的 id_token )。
以 DescribeInstances 为例,最后请求的 URL 为(为了查看方便,我们人为地将参数之间用回车分隔开):
https://api.qingcloud.com/iam/?access_key_id=0z7dO3oN03byx1CepBDTyl &action=DescribeInstances &req_id=35430c022b694133a6a758b62e21067b &signature_method=HmacSHA256 &signature_version=2 &status.1=running &status.2=stopped &time_stamp=2020-05-25T07%3A20%3A28Z &token=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJhY3IiOiIxIiwiYXVkIjoiaWFtIiwiYXpwIjoiaWFtIiwiY29ucyI6ImFkbWluIiwiY3VpZCI6ImlhbXItejU3dm42anIiLCJlaXNrIjoieUxjcFViRXZVOWZQZmJSQTA2eUFQMUtMS21keVpoX1JueDJmNmRmeFZZZz0iLCJleHAiOjE1OTAzMTk1MjMsImlhdCI6MTU5MDMxNTkyMywiaXNzIjoic3RzIiwianRpIjoiMHo3ZE8zb04wM2J5eDFDZXBCRFR5bCIsIm5iZiI6MCwib3JnaSI6ImFwcC0xMjM0NTY3OCIsIm93dXIiOiJ1c3ItQ29qOGFIZ24iLCJwcmVmIjoicXJuOnFpbmdjbG91ZDppYW06Iiwicm91ciI6InVzci1Db2o4YUhnbiIsInJ0eXAiOiJyb2xlIiwic3ViIjoic3RzIiwidHlwIjoiSUQifQ.YrCnvySApej2zHsn9cfn3D7tgOahDzeTP1TRBVMZ_3TyToo-H7hB2_mx_J_Qy1NY5K-WykYE4NFxqVN7PqsnAmskqAnRM2D7Gza_PffO7ajEJhtVF7Fo7nsmPKs7y1kryQ2Rvj3ABBJThHjQDtYVsk_pLUio5P0Nl9zb1sSswN4 &verbose=0 &version=1 &zone=pekt3 &signature=o8TW8DUQ3wyHz5YSkpMd9fSj4pJ24U7%2Buf7CeWKMoQw%3D
实际 URL 为:
https://api.qingcloud.com/iam/?access_key_id=0z7dO3oN03byx1CepBDTyl&action=DescribeInstances&req_id=35430c022b694133a6a758b62e21067b&signature_method=HmacSHA256&signature_version=2&status.1=running&status.2=stopped&time_stamp=2020-05-25T07%3A20%3A28Z&token=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJhY3IiOiIxIiwiYXVkIjoiaWFtIiwiYXpwIjoiaWFtIiwiY29ucyI6ImFkbWluIiwiY3VpZCI6ImlhbXItejU3dm42anIiLCJlaXNrIjoieUxjcFViRXZVOWZQZmJSQTA2eUFQMUtMS21keVpoX1JueDJmNmRmeFZZZz0iLCJleHAiOjE1OTAzMTk1MjMsImlhdCI6MTU5MDMxNTkyMywiaXNzIjoic3RzIiwianRpIjoiMHo3ZE8zb04wM2J5eDFDZXBCRFR5bCIsIm5iZiI6MCwib3JnaSI6ImFwcC0xMjM0NTY3OCIsIm93dXIiOiJ1c3ItQ29qOGFIZ24iLCJwcmVmIjoicXJuOnFpbmdjbG91ZDppYW06Iiwicm91ciI6InVzci1Db2o4YUhnbiIsInJ0eXAiOiJyb2xlIiwic3ViIjoic3RzIiwidHlwIjoiSUQifQ.YrCnvySApej2zHsn9cfn3D7tgOahDzeTP1TRBVMZ_3TyToo-H7hB2_mx_J_Qy1NY5K-WykYE4NFxqVN7PqsnAmskqAnRM2D7Gza_PffO7ajEJhtVF7Fo7nsmPKs7y1kryQ2Rvj3ABBJThHjQDtYVsk_pLUio5P0Nl9zb1sSswN4&verbose=0&version=1&zone=pekt3&signature=o8TW8DUQ3wyHz5YSkpMd9fSj4pJ24U7%2Buf7CeWKMoQw%3D