| 
									
										
										
										
											2016-02-22 09:57:05 +08:00
										 |  |  | /* | 
					
						
							| 
									
										
										
										
											2017-01-19 04:24:34 +08:00
										 |  |  |  * Minio Cloud Storage, (C) 2015, 2016, 2017 Minio, Inc. | 
					
						
							| 
									
										
										
										
											2016-02-22 09:57:05 +08:00
										 |  |  |  * | 
					
						
							|  |  |  |  * Licensed under the Apache License, Version 2.0 (the "License"); | 
					
						
							|  |  |  |  * you may not use this file except in compliance with the License. | 
					
						
							|  |  |  |  * You may obtain a copy of the License at | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  *     http://www.apache.org/licenses/LICENSE-2.0
 | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Unless required by applicable law or agreed to in writing, software | 
					
						
							|  |  |  |  * distributed under the License is distributed on an "AS IS" BASIS, | 
					
						
							|  |  |  |  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
					
						
							|  |  |  |  * See the License for the specific language governing permissions and | 
					
						
							|  |  |  |  * limitations under the License. | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-08-19 07:23:42 +08:00
										 |  |  | package cmd | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"crypto/hmac" | 
					
						
							|  |  |  | 	"encoding/hex" | 
					
						
							|  |  |  | 	"net/http" | 
					
						
							|  |  |  | 	"regexp" | 
					
						
							| 
									
										
										
										
											2017-04-06 08:00:24 +08:00
										 |  |  | 	"strconv" | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	"strings" | 
					
						
							|  |  |  | 	"unicode/utf8" | 
					
						
							| 
									
										
										
										
											2016-09-20 01:17:46 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/minio/sha256-simd" | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-07-05 16:04:50 +08:00
										 |  |  | // http Header "x-amz-content-sha256" == "UNSIGNED-PAYLOAD" indicates that the
 | 
					
						
							|  |  |  | // client did not calculate sha256 of the payload.
 | 
					
						
							|  |  |  | const unsignedPayload = "UNSIGNED-PAYLOAD" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // http Header "x-amz-content-sha256" == "UNSIGNED-PAYLOAD" indicates that the
 | 
					
						
							|  |  |  | // client did not calculate sha256 of the payload. Hence we skip calculating sha256.
 | 
					
						
							| 
									
										
										
										
											2016-11-11 13:57:15 +08:00
										 |  |  | // We also skip calculating sha256 for presigned requests without "x-amz-content-sha256"
 | 
					
						
							|  |  |  | // query header.
 | 
					
						
							| 
									
										
										
										
											2016-07-05 16:04:50 +08:00
										 |  |  | func skipContentSha256Cksum(r *http.Request) bool { | 
					
						
							| 
									
										
										
										
											2016-11-11 13:57:15 +08:00
										 |  |  | 	queryContentSha256 := r.URL.Query().Get("X-Amz-Content-Sha256") | 
					
						
							|  |  |  | 	isRequestPresignedUnsignedPayload := func(r *http.Request) bool { | 
					
						
							|  |  |  | 		if isRequestPresignedSignatureV4(r) { | 
					
						
							|  |  |  | 			return queryContentSha256 == "" || queryContentSha256 == unsignedPayload | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		return false | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return isRequestUnsignedPayload(r) || isRequestPresignedUnsignedPayload(r) | 
					
						
							| 
									
										
										
										
											2016-07-05 16:04:50 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-04-11 00:58:08 +08:00
										 |  |  | // Returns SHA256 for calculating canonical-request.
 | 
					
						
							|  |  |  | func getContentSha256Cksum(r *http.Request) string { | 
					
						
							|  |  |  | 	// For a presigned request we look at the query param for sha256.
 | 
					
						
							|  |  |  | 	if isRequestPresignedSignatureV4(r) { | 
					
						
							|  |  |  | 		presignedCkSum := r.URL.Query().Get("X-Amz-Content-Sha256") | 
					
						
							|  |  |  | 		if presignedCkSum == "" { | 
					
						
							|  |  |  | 			// If not set presigned is defaulted to UNSIGNED-PAYLOAD.
 | 
					
						
							|  |  |  | 			return unsignedPayload | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		return presignedCkSum | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	contentCkSum := r.Header.Get("X-Amz-Content-Sha256") | 
					
						
							|  |  |  | 	if contentCkSum == "" { | 
					
						
							|  |  |  | 		// If not set content checksum is defaulted to sha256([]byte("")).
 | 
					
						
							|  |  |  | 		contentCkSum = emptySHA256 | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return contentCkSum | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | // isValidRegion - verify if incoming region value is valid with configured Region.
 | 
					
						
							|  |  |  | func isValidRegion(reqRegion string, confRegion string) bool { | 
					
						
							| 
									
										
										
										
											2017-05-16 09:17:02 +08:00
										 |  |  | 	if confRegion == "" { | 
					
						
							|  |  |  | 		return true | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if confRegion == "US" { | 
					
						
							| 
									
										
										
										
											2017-01-19 04:24:34 +08:00
										 |  |  | 		confRegion = globalMinioDefaultRegion | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	// Some older s3 clients set region as "US" instead of
 | 
					
						
							| 
									
										
										
										
											2017-01-19 04:24:34 +08:00
										 |  |  | 	// globalMinioDefaultRegion, handle it.
 | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	if reqRegion == "US" { | 
					
						
							| 
									
										
										
										
											2017-01-19 04:24:34 +08:00
										 |  |  | 		reqRegion = globalMinioDefaultRegion | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	return reqRegion == confRegion | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // sumHMAC calculate hmac between two input byte array.
 | 
					
						
							|  |  |  | func sumHMAC(key []byte, data []byte) []byte { | 
					
						
							| 
									
										
										
										
											2016-05-11 05:20:11 +08:00
										 |  |  | 	hash := hmac.New(sha256.New, key) | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	hash.Write(data) | 
					
						
							|  |  |  | 	return hash.Sum(nil) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-07-11 02:10:59 +08:00
										 |  |  | // Reserved string regexp.
 | 
					
						
							|  |  |  | var reservedNames = regexp.MustCompile("^[a-zA-Z0-9-_.~/]+$") | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | // getURLEncodedName encode the strings from UTF-8 byte representations to HTML hex escape sequences
 | 
					
						
							|  |  |  | //
 | 
					
						
							|  |  |  | // This is necessary since regular url.Parse() and url.Encode() functions do not support UTF-8
 | 
					
						
							|  |  |  | // non english characters cannot be parsed due to the nature in which url.Encode() is written
 | 
					
						
							|  |  |  | //
 | 
					
						
							|  |  |  | // This function on the other hand is a direct replacement for url.Encode() technique to support
 | 
					
						
							|  |  |  | // pretty much every UTF-8 character.
 | 
					
						
							|  |  |  | func getURLEncodedName(name string) string { | 
					
						
							|  |  |  | 	// if object matches reserved string, no need to encode them
 | 
					
						
							|  |  |  | 	if reservedNames.MatchString(name) { | 
					
						
							|  |  |  | 		return name | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	var encodedName string | 
					
						
							|  |  |  | 	for _, s := range name { | 
					
						
							|  |  |  | 		if 'A' <= s && s <= 'Z' || 'a' <= s && s <= 'z' || '0' <= s && s <= '9' { // §2.3 Unreserved characters (mark)
 | 
					
						
							|  |  |  | 			encodedName = encodedName + string(s) | 
					
						
							|  |  |  | 			continue | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		switch s { | 
					
						
							|  |  |  | 		case '-', '_', '.', '~', '/': // §2.3 Unreserved characters (mark)
 | 
					
						
							|  |  |  | 			encodedName = encodedName + string(s) | 
					
						
							|  |  |  | 			continue | 
					
						
							|  |  |  | 		default: | 
					
						
							|  |  |  | 			len := utf8.RuneLen(s) | 
					
						
							| 
									
										
										
										
											2016-11-07 03:47:16 +08:00
										 |  |  | 			if len > 0 { | 
					
						
							|  |  |  | 				u := make([]byte, len) | 
					
						
							|  |  |  | 				utf8.EncodeRune(u, s) | 
					
						
							|  |  |  | 				for _, r := range u { | 
					
						
							|  |  |  | 					hex := hex.EncodeToString([]byte{r}) | 
					
						
							|  |  |  | 					encodedName = encodedName + "%" + strings.ToUpper(hex) | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return encodedName | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // extractSignedHeaders extract signed headers from Authorization header
 | 
					
						
							| 
									
										
										
										
											2017-04-06 06:08:33 +08:00
										 |  |  | func extractSignedHeaders(signedHeaders []string, r *http.Request) (http.Header, APIErrorCode) { | 
					
						
							|  |  |  | 	reqHeaders := r.Header | 
					
						
							| 
									
										
										
										
											2016-11-11 13:57:15 +08:00
										 |  |  | 	// find whether "host" is part of list of signed headers.
 | 
					
						
							|  |  |  | 	// if not return ErrUnsignedHeaders. "host" is mandatory.
 | 
					
						
							|  |  |  | 	if !contains(signedHeaders, "host") { | 
					
						
							|  |  |  | 		return nil, ErrUnsignedHeaders | 
					
						
							| 
									
										
										
										
											2016-08-10 00:13:15 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	extractedSignedHeaders := make(http.Header) | 
					
						
							|  |  |  | 	for _, header := range signedHeaders { | 
					
						
							| 
									
										
										
										
											2016-08-10 00:13:15 +08:00
										 |  |  | 		// `host` will not be found in the headers, can be found in r.Host.
 | 
					
						
							|  |  |  | 		// but its alway necessary that the list of signed headers containing host in it.
 | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 		val, ok := reqHeaders[http.CanonicalHeaderKey(header)] | 
					
						
							| 
									
										
										
										
											2017-04-06 08:00:24 +08:00
										 |  |  | 		if ok { | 
					
						
							|  |  |  | 			for _, enc := range val { | 
					
						
							|  |  |  | 				extractedSignedHeaders.Add(header, enc) | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			continue | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		switch header { | 
					
						
							|  |  |  | 		case "expect": | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 			// Golang http server strips off 'Expect' header, if the
 | 
					
						
							|  |  |  | 			// client sent this as part of signed headers we need to
 | 
					
						
							|  |  |  | 			// handle otherwise we would see a signature mismatch.
 | 
					
						
							|  |  |  | 			// `aws-cli` sets this as part of signed headers.
 | 
					
						
							|  |  |  | 			//
 | 
					
						
							|  |  |  | 			// According to
 | 
					
						
							|  |  |  | 			// http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.20
 | 
					
						
							|  |  |  | 			// Expect header is always of form:
 | 
					
						
							|  |  |  | 			//
 | 
					
						
							|  |  |  | 			//   Expect       =  "Expect" ":" 1#expectation
 | 
					
						
							|  |  |  | 			//   expectation  =  "100-continue" | expectation-extension
 | 
					
						
							|  |  |  | 			//
 | 
					
						
							|  |  |  | 			// So it safe to assume that '100-continue' is what would
 | 
					
						
							|  |  |  | 			// be sent, for the time being keep this work around.
 | 
					
						
							|  |  |  | 			// Adding a *TODO* to remove this later when Golang server
 | 
					
						
							|  |  |  | 			// doesn't filter out the 'Expect' header.
 | 
					
						
							| 
									
										
										
										
											2017-04-06 08:00:24 +08:00
										 |  |  | 			extractedSignedHeaders.Set(header, "100-continue") | 
					
						
							|  |  |  | 		case "host": | 
					
						
							|  |  |  | 			// Go http server removes "host" from Request.Header
 | 
					
						
							|  |  |  | 			extractedSignedHeaders.Set(header, r.Host) | 
					
						
							|  |  |  | 		case "transfer-encoding": | 
					
						
							|  |  |  | 			// Go http server removes "host" from Request.Header
 | 
					
						
							|  |  |  | 			for _, enc := range r.TransferEncoding { | 
					
						
							|  |  |  | 				extractedSignedHeaders.Add(header, enc) | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 			} | 
					
						
							| 
									
										
										
										
											2017-04-06 08:00:24 +08:00
										 |  |  | 		case "content-length": | 
					
						
							|  |  |  | 			// Signature-V4 spec excludes Content-Length from signed headers list for signature calculation.
 | 
					
						
							|  |  |  | 			// But some clients deviate from this rule. Hence we consider Content-Length for signature
 | 
					
						
							|  |  |  | 			// calculation to be compatible with such clients.
 | 
					
						
							|  |  |  | 			extractedSignedHeaders.Set(header, strconv.FormatInt(r.ContentLength, 10)) | 
					
						
							|  |  |  | 		default: | 
					
						
							| 
									
										
										
										
											2016-08-10 00:13:15 +08:00
										 |  |  | 			return nil, ErrUnsignedHeaders | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-08-10 00:13:15 +08:00
										 |  |  | 	return extractedSignedHeaders, ErrNone | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | } | 
					
						
							| 
									
										
										
										
											2016-11-04 07:41:25 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | // Trim leading and trailing spaces and replace sequential spaces with one space, following Trimall()
 | 
					
						
							|  |  |  | // in http://docs.aws.amazon.com/general/latest/gr/sigv4-create-canonical-request.html
 | 
					
						
							|  |  |  | func signV4TrimAll(input string) string { | 
					
						
							| 
									
										
										
										
											2016-11-05 04:52:22 +08:00
										 |  |  | 	// Compress adjacent spaces (a space is determined by
 | 
					
						
							|  |  |  | 	// unicode.IsSpace() internally here) to one space and return
 | 
					
						
							| 
									
										
										
										
											2016-11-04 07:41:25 +08:00
										 |  |  | 	return strings.Join(strings.Fields(input), " ") | 
					
						
							|  |  |  | } |