fd240d0ec5a3cc1537b0aa8776e7f911 Bearer fd240d0ec5a3cc1537b0aa8776e7f911 { "model": "jimeng-3.0", "prompt": "高达在宇宙中飞行", "negativePrompt": "", "width": 1024, "height": 1024, "sample_strength": 0.5 } "GET / Action=ApplyImageUpload&FileSize=2603128&ServiceId=tb4s082cfz&Version=2018-08-01&s=odorxpjp67n x-amz-date:20250529T162653Z x-amz-security-token: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 x-amz-date;x-amz-security-token e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855" def generateAuthorization(secretAccessKey, region, service, canonical_querystring, amz_date, SessionToken, date_stamp, AccessKeyID): signing_key = getSignatureKey(secretAccessKey, date_stamp, region, service) canonical_headers = 'x-amz-date:' + amz_date + '\n' + 'x-amz-security-token:' + SessionToken + '\n' canonical_request = "GET" + '\n' + "/" + '\n' + canonical_querystring + '\n' + canonical_headers + '\n' + 'x-amz-date;x-amz-security-token' + '\n' + hashlib.sha256("".encode("utf-8")).hexdigest() algorithm = 'AWS4-HMAC-SHA256' credential_scope = date_stamp + '/' + region + '/' + service + '/' + 'aws4_request' string_to_sign = algorithm + '\n' + amz_date + '\n' + credential_scope + '\n' + hashlib.sha256(canonical_request.encode("utf-8")).hexdigest() Signature = hmac.new(signing_key, string_to_sign.encode("utf-8"), hashlib.sha256).hexdigest() data = f"AWS4-HMAC-SHA256 Credential={AccessKeyID}/{date_stamp}/{region}/{service}/aws4_request, SignedHeaders=x-amz-date;x-amz-security-token, Signature={Signature}" return data