AWS Developer Tools Blog

Generating HAQM S3 Pre-signed URLs with SSE-C (Part 5 Finale)

In the previous blog (Part 4), we demonstrated how you can generate and consume pre-signed URLs using SSE-C. In this last and final blog of the series, I will provide code examples that show how to generate and consume pre-signed URLs using SSE-C, but restricting the URLs to be used only with specific customer-provided encryption […]

Version 3 of the AWS SDK for PHP

Last October, we announced the Developer Preview of Version 3 of the AWS SDK for PHP. We even presented about it at AWS re:Invent last November. We are grateful for your early feedback and support. Since last fall, we’ve been hard at work on improving, testing, and documenting Version 3 to get it ready for […]

Creating HAQM CloudFront Signed URLs in Node.js

HAQM CloudFront allows you to use signed URLs to restrict access to content. This allows you to securely serve private content, or content intended for selected users using CloudFront. Read more about how CloudFront signed URLs work. This article describes how to generate HAQM CloudFront signed URLs in Node.js. To generate signed URLs, you can […]

Generating HAQM S3 Pre-signed URLs with SSE-C (Part 4)

In Part 3 of this blog, we demonstrated how you can generate and consume pre-signed URLs using SSE-S3. In this blog, I will provide code examples to show how you can generate and consume pre-signed URLs using one of the more advanced options, namely SSE-C (server-side encryption with customer-provided encryption keys). The code samples assume the […]

Serving Private Content Through HAQM CloudFront Using Signed Cookies

Private content can be served through HAQM CloudFront in two ways: through signed URLs or signed cookies. For information about which approach to choose, see Choosing Between Signed URLs and Signed Cookies. The AWS SDK for .NET includes an HAQM.CloudFront.HAQMCloudFrontUrlSigner utility class that can be used to generate signed URLs. Based on a customer request, […]

Generating HAQM S3 Pre-signed URLs with SSE-S3 (Part 3)

As mentioned in Part 1 and Part 2 of this blog, there are fundamentally four ways you can generate HAQM S3 pre-signed URLs using server-side encryption (SSE). We demonstrated how you could do so with SSE-KMS (server-side encryption with AWS Key Management Service). In this blog, I will provide further sample code that shows how […]

Announcing Support for the PowerShell Gallery

The AWS Tools for Windows PowerShell have until now been made available in a single MSI installer that also contains the AWS SDK for .NET and AWS Toolkit for Visual Studio. MSIs have historically been the primary method of installing software on Windows. On the Linux and OS X platforms, package managers have become the […]

DynamoDB XSpec API

One of the most powerful tools for accessing HAQM DynamoDB is the use of a DynamoDB domain-specific language (DSL) called expressions. If you look closely, you will find the support of DynamoDB expressions everywhere. For instance, you can access the attributes of an item using projection expressions. You can query or scan items using filter […]

Generating HAQM S3 Pre-signed URLs with SSE-KMS (Part 2)

To continue from the previous blog, I will provide specific code examples that show how you can generate and consume pre-signed URLs using server-side encryption with AWS Key Management Service (SSE-KMS). A pre-requisite to this option is that you must be using Signature Version 4 (SigV4). You can enable SigV4 in the AWS SDK for […]

Modularization Released to NuGet in Preview

Today, we pushed our new modularized version of the AWS SDK for .NET to NuGet in preview. This means there are separate NuGet packages for each AWS service. For example, if your application uses HAQM S3 and HAQM DynamoDB, then instead of including the existing AWSSDK package that includes all the AWS services, you can […]