Last active
March 20, 2025 15:59
-
-
Save JamoCA/bbdb652e4390898ea27eee489923ede3 to your computer and use it in GitHub Desktop.
CFML example code on how to generate a pre-signed Wasabi URL. (ColdFusion 2016+ compatible)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<cfscript> | |
/** | |
* generateS3PresignedUrl: Generates a pre-signed Wasabi URL (ColdFusion 2016+ compatible) | |
* documentation https://docs.wasabi.com/v1/docs/how-do-i-generate-pre-signed-urls-for-temporary-access-with-wasabi | |
* How to calculate: https://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-query-string-auth.html | |
* @displayname generateS3PresignedUrl | |
* @author James Moberg http://sunstarmedia.com, @sunstarmedia | |
* @version 1 | |
* @lastUpdate 3/20/2025 | |
* @gist https://gist.github.com/JamoCA/bbdb652e4390898ea27eee489923ede3 | |
* @blog https://dev.to/gamesover/using-coldfusion-to-generate-pre-signed-wasabi-download-url-1fe0 | |
* @twitter https://x.com/gamesover/status/1902748921388269703 | |
* @LinkedIn https://www.linkedin.com/posts/jamesmoberg_using-coldfusion-to-generate-pre-signed-wasabi-activity-7308517169632288770-vu4J | |
* @param accessKey Wasabi access key | |
* @param secretKey Wasabi secret key | |
* @param bucketName Wasabi bucket name | |
* @param objectKey Object (file) path | |
* @param region Wasabi region (e.g., us-west-1) | |
* @param expiresIn Expiration time in seconds (1 hour default) | |
*/ | |
public string function generateS3PresignedUrl( | |
required string accessKey, | |
required string secretKey, | |
required string bucketName, | |
required string objectKey, | |
string region = "us-west-1", | |
numeric expiresIn = 3600 | |
) hint="Function to generate a presigned Wasabi URL" { | |
local.endpoint = "https://" & arguments.bucketname & ".s3." & lcase(arguments.region) & ".wasabisys.com"; | |
local.objectKey = (len(trim(arguments.objectKey))) ? arguments.objectKey : "/"; | |
if (left(local.objectKey, 1) neq "/") { | |
local.objectKey = "/" & local.objectKey; | |
} | |
// Current timestamp in ISO 8601 format (e.g., 20250314T185200Z) | |
local.utcTime = dateconvert("local2Utc", now()); | |
local.amzDate = dateformat(local.utcTime, "yyyymmdd") & "T" & timeformat(local.utcTime, "HHmmss") & "Z"; | |
local.dateStamp = tostring(dateformat(local.utcTime, "yyyymmdd")); | |
// canonical URI | |
local.canonicalQueryString = [ | |
"X-Amz-Algorithm=AWS4-HMAC-SHA256" | |
,"X-Amz-Credential=" & arguments.accessKey & "%2F" & local.dateStamp & "%2F" & lcase(arguments.region) & "%2Fs3%2Faws4_request" | |
,"X-Amz-Date=" & local.amzDate | |
,"X-Amz-Expires=" & abs(val(arguments.expiresIn)) | |
,"X-Amz-SignedHeaders=host" | |
]; | |
// Canonical request | |
local.canonicalRequest = [ | |
"GET" | |
,local.objectKey | |
,arraytolist(local.canonicalQueryString, "&") | |
,"host:" & rereplacenocase(local.endpoint, "https?:\/\/", "") | |
,"" | |
,"host" | |
,"UNSIGNED-PAYLOAD" | |
]; | |
// String to sign | |
local.stringToSign = [ | |
"AWS4-HMAC-SHA256" | |
,local.amzDate | |
,local.dateStamp & "/" & lcase(arguments.region) & "/s3/aws4_request" | |
,lcase(hash(arraytolist(local.canonicalRequest, chr(10)), "SHA-256")) | |
]; | |
// Generates signing key for AWS Signature V4 | |
local.kSecret = charsetdecode("AWS4" & arguments.secretKey, "UTF-8"); | |
local.kDate = binarydecode(hmac(left(local.dateStamp,8), local.kSecret, "HMACSHA256", "utf-8"), "hex"); | |
local.kRegion = binarydecode(hmac(lcase(arguments.region), local.kDate, "HMACSHA256", "utf-8"), "hex"); | |
local.kService = binarydecode(hmac("s3", local.kRegion, "HMACSHA256", "utf-8"), "hex"); | |
local.kSigning = binarydecode(hmac("aws4_request", local.kService, "HMACSHA256", "utf-8"), "hex"); | |
local.signature = lcase(hmac(arraytolist(local.stringToSign, chr(10)), local.kSigning, "HMACSHA256", "utf-8")); | |
// Final presigned URL | |
local.presignedUrl = [ | |
local.endpoint | |
,local.objectKey | |
,"?" | |
,arraytolist(local.canonicalQueryString, "&") | |
,"&X-Amz-Signature=" | |
,local.signature | |
]; | |
return arraytolist(local.presignedUrl, ""); | |
} | |
// Example usage | |
args = [ | |
"accessKey": "my-access-key" | |
,"secretKey": "my-secret-key" | |
,"bucketName": "my-bucket-name" | |
,"objectKey": "mydir/myfile.mp3" | |
,"region": "us-west-1" | |
,"expiresIn": 3600 | |
]; | |
// writedump(var=args, label="args"); | |
signedUrl = generateS3PresignedUrl(argumentcollection=args); | |
</cfscript> | |
<cfoutput> | |
<div><a href="#signedUrl#" target="_blank">New Window</a></div> | |
<div><textarea style="height:90px; width:95%">#signedUrl#</textarea></div> | |
<iframe src="#signedUrl#" style="height:200px; width:95%"></iframe> | |
</cfoutput> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment