summaryrefslogtreecommitdiff
path: root/vendor/github.com/minio/minio-go/v7/pkg/signer/request-signature-v4.go
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/github.com/minio/minio-go/v7/pkg/signer/request-signature-v4.go')
-rw-r--r--vendor/github.com/minio/minio-go/v7/pkg/signer/request-signature-v4.go351
1 files changed, 0 insertions, 351 deletions
diff --git a/vendor/github.com/minio/minio-go/v7/pkg/signer/request-signature-v4.go b/vendor/github.com/minio/minio-go/v7/pkg/signer/request-signature-v4.go
deleted file mode 100644
index ffd251451..000000000
--- a/vendor/github.com/minio/minio-go/v7/pkg/signer/request-signature-v4.go
+++ /dev/null
@@ -1,351 +0,0 @@
-/*
- * MinIO Go Library for Amazon S3 Compatible Cloud Storage
- * Copyright 2015-2017 MinIO, Inc.
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-
-package signer
-
-import (
- "bytes"
- "encoding/hex"
- "net/http"
- "sort"
- "strconv"
- "strings"
- "time"
-
- "github.com/minio/minio-go/v7/pkg/s3utils"
-)
-
-// Signature and API related constants.
-const (
- signV4Algorithm = "AWS4-HMAC-SHA256"
- iso8601DateFormat = "20060102T150405Z"
- yyyymmdd = "20060102"
-)
-
-// Different service types
-const (
- ServiceTypeS3 = "s3"
- ServiceTypeSTS = "sts"
-)
-
-// Excerpts from @lsegal -
-// https:/github.com/aws/aws-sdk-js/issues/659#issuecomment-120477258.
-//
-// * User-Agent
-// This is ignored from signing because signing this causes problems with generating pre-signed
-// URLs (that are executed by other agents) or when customers pass requests through proxies, which
-// may modify the user-agent.
-//
-// * Authorization
-// Is skipped for obvious reasons.
-//
-// * Accept-Encoding
-// Some S3 servers like Hitachi Content Platform do not honor this header for signature
-// calculation.
-var v4IgnoredHeaders = map[string]bool{
- "Accept-Encoding": true,
- "Authorization": true,
- "User-Agent": true,
-}
-
-// getSigningKey hmac seed to calculate final signature.
-func getSigningKey(secret, loc string, t time.Time, serviceType string) []byte {
- date := sumHMAC([]byte("AWS4"+secret), []byte(t.Format(yyyymmdd)))
- location := sumHMAC(date, []byte(loc))
- service := sumHMAC(location, []byte(serviceType))
- signingKey := sumHMAC(service, []byte("aws4_request"))
- return signingKey
-}
-
-// getSignature final signature in hexadecimal form.
-func getSignature(signingKey []byte, stringToSign string) string {
- return hex.EncodeToString(sumHMAC(signingKey, []byte(stringToSign)))
-}
-
-// getScope generate a string of a specific date, an AWS region, and a
-// service.
-func getScope(location string, t time.Time, serviceType string) string {
- scope := strings.Join([]string{
- t.Format(yyyymmdd),
- location,
- serviceType,
- "aws4_request",
- }, "/")
- return scope
-}
-
-// GetCredential generate a credential string.
-func GetCredential(accessKeyID, location string, t time.Time, serviceType string) string {
- scope := getScope(location, t, serviceType)
- return accessKeyID + "/" + scope
-}
-
-// getHashedPayload get the hexadecimal value of the SHA256 hash of
-// the request payload.
-func getHashedPayload(req http.Request) string {
- hashedPayload := req.Header.Get("X-Amz-Content-Sha256")
- if hashedPayload == "" {
- // Presign does not have a payload, use S3 recommended value.
- hashedPayload = unsignedPayload
- }
- return hashedPayload
-}
-
-// getCanonicalHeaders generate a list of request headers for
-// signature.
-func getCanonicalHeaders(req http.Request, ignoredHeaders map[string]bool) string {
- var headers []string
- vals := make(map[string][]string)
- for k, vv := range req.Header {
- if _, ok := ignoredHeaders[http.CanonicalHeaderKey(k)]; ok {
- continue // ignored header
- }
- headers = append(headers, strings.ToLower(k))
- vals[strings.ToLower(k)] = vv
- }
- if !headerExists("host", headers) {
- headers = append(headers, "host")
- }
- sort.Strings(headers)
-
- var buf bytes.Buffer
- // Save all the headers in canonical form <header>:<value> newline
- // separated for each header.
- for _, k := range headers {
- buf.WriteString(k)
- buf.WriteByte(':')
- switch {
- case k == "host":
- buf.WriteString(getHostAddr(&req))
- buf.WriteByte('\n')
- default:
- for idx, v := range vals[k] {
- if idx > 0 {
- buf.WriteByte(',')
- }
- buf.WriteString(signV4TrimAll(v))
- }
- buf.WriteByte('\n')
- }
- }
- return buf.String()
-}
-
-func headerExists(key string, headers []string) bool {
- for _, k := range headers {
- if k == key {
- return true
- }
- }
- return false
-}
-
-// getSignedHeaders generate all signed request headers.
-// i.e lexically sorted, semicolon-separated list of lowercase
-// request header names.
-func getSignedHeaders(req http.Request, ignoredHeaders map[string]bool) string {
- var headers []string
- for k := range req.Header {
- if _, ok := ignoredHeaders[http.CanonicalHeaderKey(k)]; ok {
- continue // Ignored header found continue.
- }
- headers = append(headers, strings.ToLower(k))
- }
- if !headerExists("host", headers) {
- headers = append(headers, "host")
- }
- sort.Strings(headers)
- return strings.Join(headers, ";")
-}
-
-// getCanonicalRequest generate a canonical request of style.
-//
-// canonicalRequest =
-//
-// <HTTPMethod>\n
-// <CanonicalURI>\n
-// <CanonicalQueryString>\n
-// <CanonicalHeaders>\n
-// <SignedHeaders>\n
-// <HashedPayload>
-func getCanonicalRequest(req http.Request, ignoredHeaders map[string]bool, hashedPayload string) string {
- req.URL.RawQuery = strings.ReplaceAll(req.URL.Query().Encode(), "+", "%20")
- canonicalRequest := strings.Join([]string{
- req.Method,
- s3utils.EncodePath(req.URL.Path),
- req.URL.RawQuery,
- getCanonicalHeaders(req, ignoredHeaders),
- getSignedHeaders(req, ignoredHeaders),
- hashedPayload,
- }, "\n")
- return canonicalRequest
-}
-
-// getStringToSign a string based on selected query values.
-func getStringToSignV4(t time.Time, location, canonicalRequest, serviceType string) string {
- stringToSign := signV4Algorithm + "\n" + t.Format(iso8601DateFormat) + "\n"
- stringToSign = stringToSign + getScope(location, t, serviceType) + "\n"
- stringToSign += hex.EncodeToString(sum256([]byte(canonicalRequest)))
- return stringToSign
-}
-
-// PreSignV4 presign the request, in accordance with
-// http://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-query-string-auth.html.
-func PreSignV4(req http.Request, accessKeyID, secretAccessKey, sessionToken, location string, expires int64) *http.Request {
- // Presign is not needed for anonymous credentials.
- if accessKeyID == "" || secretAccessKey == "" {
- return &req
- }
-
- // Initial time.
- t := time.Now().UTC()
-
- // Get credential string.
- credential := GetCredential(accessKeyID, location, t, ServiceTypeS3)
-
- // Get all signed headers.
- signedHeaders := getSignedHeaders(req, v4IgnoredHeaders)
-
- // Set URL query.
- query := req.URL.Query()
- query.Set("X-Amz-Algorithm", signV4Algorithm)
- query.Set("X-Amz-Date", t.Format(iso8601DateFormat))
- query.Set("X-Amz-Expires", strconv.FormatInt(expires, 10))
- query.Set("X-Amz-SignedHeaders", signedHeaders)
- query.Set("X-Amz-Credential", credential)
- // Set session token if available.
- if sessionToken != "" {
- query.Set("X-Amz-Security-Token", sessionToken)
- }
- req.URL.RawQuery = query.Encode()
-
- // Get canonical request.
- canonicalRequest := getCanonicalRequest(req, v4IgnoredHeaders, getHashedPayload(req))
-
- // Get string to sign from canonical request.
- stringToSign := getStringToSignV4(t, location, canonicalRequest, ServiceTypeS3)
-
- // Gext hmac signing key.
- signingKey := getSigningKey(secretAccessKey, location, t, ServiceTypeS3)
-
- // Calculate signature.
- signature := getSignature(signingKey, stringToSign)
-
- // Add signature header to RawQuery.
- req.URL.RawQuery += "&X-Amz-Signature=" + signature
-
- return &req
-}
-
-// PostPresignSignatureV4 - presigned signature for PostPolicy
-// requests.
-func PostPresignSignatureV4(policyBase64 string, t time.Time, secretAccessKey, location string) string {
- // Get signining key.
- signingkey := getSigningKey(secretAccessKey, location, t, ServiceTypeS3)
- // Calculate signature.
- signature := getSignature(signingkey, policyBase64)
- return signature
-}
-
-// SignV4STS - signature v4 for STS request.
-func SignV4STS(req http.Request, accessKeyID, secretAccessKey, location string) *http.Request {
- return signV4(req, accessKeyID, secretAccessKey, "", location, ServiceTypeSTS, nil)
-}
-
-// Internal function called for different service types.
-func signV4(req http.Request, accessKeyID, secretAccessKey, sessionToken, location, serviceType string, trailer http.Header) *http.Request {
- // Signature calculation is not needed for anonymous credentials.
- if accessKeyID == "" || secretAccessKey == "" {
- return &req
- }
-
- // Initial time.
- t := time.Now().UTC()
-
- // Set x-amz-date.
- req.Header.Set("X-Amz-Date", t.Format(iso8601DateFormat))
-
- // Set session token if available.
- if sessionToken != "" {
- req.Header.Set("X-Amz-Security-Token", sessionToken)
- }
-
- if len(trailer) > 0 {
- for k := range trailer {
- req.Header.Add("X-Amz-Trailer", strings.ToLower(k))
- }
-
- req.Header.Set("Content-Encoding", "aws-chunked")
- req.Header.Set("x-amz-decoded-content-length", strconv.FormatInt(req.ContentLength, 10))
- }
-
- hashedPayload := getHashedPayload(req)
- if serviceType == ServiceTypeSTS {
- // Content sha256 header is not sent with the request
- // but it is expected to have sha256 of payload for signature
- // in STS service type request.
- req.Header.Del("X-Amz-Content-Sha256")
- }
-
- // Get canonical request.
- canonicalRequest := getCanonicalRequest(req, v4IgnoredHeaders, hashedPayload)
-
- // Get string to sign from canonical request.
- stringToSign := getStringToSignV4(t, location, canonicalRequest, serviceType)
-
- // Get hmac signing key.
- signingKey := getSigningKey(secretAccessKey, location, t, serviceType)
-
- // Get credential string.
- credential := GetCredential(accessKeyID, location, t, serviceType)
-
- // Get all signed headers.
- signedHeaders := getSignedHeaders(req, v4IgnoredHeaders)
-
- // Calculate signature.
- signature := getSignature(signingKey, stringToSign)
-
- // If regular request, construct the final authorization header.
- parts := []string{
- signV4Algorithm + " Credential=" + credential,
- "SignedHeaders=" + signedHeaders,
- "Signature=" + signature,
- }
-
- // Set authorization header.
- auth := strings.Join(parts, ", ")
- req.Header.Set("Authorization", auth)
-
- if len(trailer) > 0 {
- // Use custom chunked encoding.
- req.Trailer = trailer
- return StreamingUnsignedV4(&req, sessionToken, req.ContentLength, time.Now().UTC())
- }
- return &req
-}
-
-// SignV4 sign the request before Do(), in accordance with
-// http://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html.
-func SignV4(req http.Request, accessKeyID, secretAccessKey, sessionToken, location string) *http.Request {
- return signV4(req, accessKeyID, secretAccessKey, sessionToken, location, ServiceTypeS3, nil)
-}
-
-// SignV4Trailer sign the request before Do(), in accordance with
-// http://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html
-func SignV4Trailer(req http.Request, accessKeyID, secretAccessKey, sessionToken, location string, trailer http.Header) *http.Request {
- return signV4(req, accessKeyID, secretAccessKey, sessionToken, location, ServiceTypeS3, trailer)
-}