CanonicalizeRequest() защищенный статический Метод

Computes and returns the canonical request
protected static CanonicalizeRequest ( Uri endpoint, string resourcePath, string httpMethod, string>.IDictionary sortedHeaders, string canonicalQueryString, string precomputedBodyHash ) : string
endpoint System.Uri The endpoint URL
resourcePath string the path of the resource being operated on
httpMethod string The http method used for the request
sortedHeaders string>.IDictionary The full request headers, sorted into canonical order
canonicalQueryString string The query parameters for the request
precomputedBodyHash string /// The hash of the binary request body if present. If not supplied, the routine /// will look for the hash as a header on the request. ///
Результат string
        public static AWS4SigningResult SignRequest(IRequest request, IClientConfig clientConfig, RequestMetrics metrics, string awsAccessKeyId, string awsSecretAccessKey, string service, string overrideSigningRegion)
        {
            request.Headers.Remove("Authorization");
            if (!request.Headers.ContainsKey("host"))
            {
                string text = request.Endpoint.Host;
                if (!request.Endpoint.IsDefaultPort)
                {
                    text = text + ":" + request.Endpoint.Port;
                }
                request.Headers.Add("host", text);
            }
            DateTime correctedUtcNow = AWSSDKUtils.CorrectedUtcNow;
            string   text2           = overrideSigningRegion ?? AWS4Signer.DetermineSigningRegion(clientConfig, service, request.AlternateEndpoint, request);

            if (request.Headers.ContainsKey("X-Amz-Content-SHA256"))
            {
                request.Headers.Remove("X-Amz-Content-SHA256");
            }
            IDictionary <string, string> sortedHeaders = AWS4Signer.SortHeaders(request.Headers);
            string text3 = AWS4Signer.CanonicalizeHeaderNames(sortedHeaders);
            IDictionary <string, string> parametersToCanonicalize = AWS4Signer.GetParametersToCanonicalize(request);

            parametersToCanonicalize.Add("X-Amz-Algorithm", "AWS4-HMAC-SHA256");
            parametersToCanonicalize.Add("X-Amz-Credential", string.Format(CultureInfo.InvariantCulture, "{0}/{1}/{2}/{3}/{4}", awsAccessKeyId, AWS4Signer.FormatDateTime(correctedUtcNow, "yyyyMMdd"), text2, service, "aws4_request"));
            parametersToCanonicalize.Add("X-Amz-Date", AWS4Signer.FormatDateTime(correctedUtcNow, "yyyyMMddTHHmmssZ"));
            parametersToCanonicalize.Add("X-Amz-SignedHeaders", text3);
            string canonicalQueryString = AWS4Signer.CanonicalizeQueryParameters(parametersToCanonicalize);
            string text4 = AWS4Signer.CanonicalizeRequest(request.Endpoint, request.ResourcePath, request.HttpMethod, sortedHeaders, canonicalQueryString, (service == "s3") ? "UNSIGNED-PAYLOAD" : "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855");

            metrics?.AddProperty(Metric.CanonicalRequest, text4);
            return(AWS4Signer.ComputeSignature(awsAccessKeyId, awsSecretAccessKey, text2, correctedUtcNow, service, text3, text4, metrics));
        }