-
Notifications
You must be signed in to change notification settings - Fork 4.3k
Use AWS CRT instead of cryptography for Cloudfront url signing #9423
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: v2
Are you sure you want to change the base?
Conversation
69d3886
to
fffc73b
Compare
Does this still need the changes to cloudfront.py that were originally in #9109, since we reverted to all of the |
Yeah. Not sure how I missed pushing that commit. |
Fixed in 53c3b0e |
f7650cf
to
533be41
Compare
Uses the method described in the CloudFront docs to generate a private key: https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-content-trusted-signers.html#private-content-creating-cloudfront-key-pairs
533be41
to
50007b9
Compare
Issue #, if available:
Description of changes:
Fixes issue from #9258 to support PKCS8-formatted private key PEM files. The support for this was added directly to
awscrt==0.25.6
(awslabs/aws-crt-python#638).Added a test to prevent regression for support of this format. I also manually ran
aws cloudfront sign
commands and confirmed that the expected signature is generated using both a PKCS1 and PKCS8 pem file.By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.