39 lines
2.6 KiB
Plaintext
39 lines
2.6 KiB
Plaintext
fd240d0ec5a3cc1537b0aa8776e7f911
|
|
|
|
|
|
Bearer fd240d0ec5a3cc1537b0aa8776e7f911
|
|
|
|
{
|
|
"model": "jimeng-3.0",
|
|
"prompt": "高达在宇宙中飞行",
|
|
"negativePrompt": "",
|
|
"width": 1024,
|
|
"height": 1024,
|
|
"sample_strength": 0.5
|
|
}
|
|
|
|
"GET
|
|
/
|
|
Action=ApplyImageUpload&FileSize=2603128&ServiceId=tb4s082cfz&Version=2018-08-01&s=odorxpjp67n
|
|
x-amz-date:20250529T162653Z
|
|
x-amz-security-token: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
|
|
|
|
x-amz-date;x-amz-security-token
|
|
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
|
|
|
|
def generateAuthorization(secretAccessKey, region, service, canonical_querystring, amz_date, SessionToken, date_stamp, AccessKeyID):
|
|
signing_key = getSignatureKey(secretAccessKey, date_stamp, region, service)
|
|
canonical_headers = 'x-amz-date:' + amz_date + '\n' + 'x-amz-security-token:' + SessionToken + '\n'
|
|
canonical_request = "GET" + '\n' +
|
|
"/" + '\n' + canonical_querystring +
|
|
'\n' + canonical_headers +
|
|
'\n' + 'x-amz-date;x-amz-security-token' +
|
|
'\n' + hashlib.sha256("".encode("utf-8")).hexdigest()
|
|
algorithm = 'AWS4-HMAC-SHA256'
|
|
credential_scope = date_stamp + '/' + region + '/' + service + '/' + 'aws4_request'
|
|
string_to_sign = algorithm + '\n' + amz_date + '\n' + credential_scope + '\n' +
|
|
hashlib.sha256(canonical_request.encode("utf-8")).hexdigest()
|
|
Signature = hmac.new(signing_key, string_to_sign.encode("utf-8"), hashlib.sha256).hexdigest()
|
|
data = f"AWS4-HMAC-SHA256 Credential={AccessKeyID}/{date_stamp}/{region}/{service}/aws4_request, SignedHeaders=x-amz-date;x-amz-security-token, Signature={Signature}"
|
|
return data
|