| 
									
										
										
										
											2021-04-19 03:41:13 +08:00
										 |  |  | // Copyright (c) 2015-2021 MinIO, Inc.
 | 
					
						
							|  |  |  | //
 | 
					
						
							|  |  |  | // This file is part of MinIO Object Storage stack
 | 
					
						
							|  |  |  | //
 | 
					
						
							|  |  |  | // This program is free software: you can redistribute it and/or modify
 | 
					
						
							|  |  |  | // it under the terms of the GNU Affero General Public License as published by
 | 
					
						
							|  |  |  | // the Free Software Foundation, either version 3 of the License, or
 | 
					
						
							|  |  |  | // (at your option) any later version.
 | 
					
						
							|  |  |  | //
 | 
					
						
							|  |  |  | // This program is distributed in the hope that it will be useful
 | 
					
						
							|  |  |  | // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
					
						
							|  |  |  | // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
					
						
							|  |  |  | // GNU Affero General Public License for more details.
 | 
					
						
							|  |  |  | //
 | 
					
						
							|  |  |  | // You should have received a copy of the GNU Affero General Public License
 | 
					
						
							|  |  |  | // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
					
						
							| 
									
										
										
										
											2016-02-22 09:57:05 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-08-19 07:23:42 +08:00
										 |  |  | package cmd | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	"bytes" | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	"crypto/hmac" | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	"encoding/hex" | 
					
						
							| 
									
										
										
										
											2019-08-06 01:06:40 +08:00
										 |  |  | 	"io" | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	"io/ioutil" | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	"net/http" | 
					
						
							| 
									
										
										
										
											2017-04-06 08:00:24 +08:00
										 |  |  | 	"strconv" | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	"strings" | 
					
						
							| 
									
										
										
										
											2016-09-20 01:17:46 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-06-02 05:59:40 +08:00
										 |  |  | 	"github.com/minio/minio/internal/auth" | 
					
						
							| 
									
										
										
										
											2022-05-27 21:00:19 +08:00
										 |  |  | 	"github.com/minio/minio/internal/hash/sha256" | 
					
						
							| 
									
										
										
										
											2021-06-02 05:59:40 +08:00
										 |  |  | 	xhttp "github.com/minio/minio/internal/http" | 
					
						
							|  |  |  | 	"github.com/minio/minio/internal/logger" | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-07-05 16:04:50 +08:00
										 |  |  | // http Header "x-amz-content-sha256" == "UNSIGNED-PAYLOAD" indicates that the
 | 
					
						
							|  |  |  | // client did not calculate sha256 of the payload.
 | 
					
						
							|  |  |  | const unsignedPayload = "UNSIGNED-PAYLOAD" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-01-09 15:19:50 +08:00
										 |  |  | // skipContentSha256Cksum returns true if caller needs to skip
 | 
					
						
							|  |  |  | // payload checksum, false if not.
 | 
					
						
							| 
									
										
										
										
											2016-07-05 16:04:50 +08:00
										 |  |  | func skipContentSha256Cksum(r *http.Request) bool { | 
					
						
							| 
									
										
										
										
											2018-01-09 15:19:50 +08:00
										 |  |  | 	var ( | 
					
						
							|  |  |  | 		v  []string | 
					
						
							|  |  |  | 		ok bool | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if isRequestPresignedSignatureV4(r) { | 
					
						
							| 
									
										
										
										
											2021-08-08 13:43:01 +08:00
										 |  |  | 		v, ok = r.Form[xhttp.AmzContentSha256] | 
					
						
							| 
									
										
										
										
											2018-06-16 05:21:17 +08:00
										 |  |  | 		if !ok { | 
					
						
							| 
									
										
										
										
											2019-07-03 13:34:32 +08:00
										 |  |  | 			v, ok = r.Header[xhttp.AmzContentSha256] | 
					
						
							| 
									
										
										
										
											2018-06-16 05:21:17 +08:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2018-01-09 15:19:50 +08:00
										 |  |  | 	} else { | 
					
						
							| 
									
										
										
										
											2019-07-03 13:34:32 +08:00
										 |  |  | 		v, ok = r.Header[xhttp.AmzContentSha256] | 
					
						
							| 
									
										
										
										
											2016-11-11 13:57:15 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-01-09 15:19:50 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-09 03:40:34 +08:00
										 |  |  | 	// Skip if no header was set.
 | 
					
						
							|  |  |  | 	if !ok { | 
					
						
							|  |  |  | 		return true | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-01-09 15:19:50 +08:00
										 |  |  | 	// If x-amz-content-sha256 is set and the value is not
 | 
					
						
							|  |  |  | 	// 'UNSIGNED-PAYLOAD' we should validate the content sha256.
 | 
					
						
							| 
									
										
										
										
											2021-10-09 03:40:34 +08:00
										 |  |  | 	switch v[0] { | 
					
						
							|  |  |  | 	case unsignedPayload: | 
					
						
							|  |  |  | 		return true | 
					
						
							|  |  |  | 	case emptySHA256: | 
					
						
							|  |  |  | 		// some broken clients set empty-sha256
 | 
					
						
							|  |  |  | 		// with > 0 content-length in the body,
 | 
					
						
							|  |  |  | 		// we should skip such clients and allow
 | 
					
						
							|  |  |  | 		// blindly such insecure clients only if
 | 
					
						
							|  |  |  | 		// S3 strict compatibility is disabled.
 | 
					
						
							|  |  |  | 		if r.ContentLength > 0 && !globalCLIContext.StrictS3Compat { | 
					
						
							|  |  |  | 			// We return true only in situations when
 | 
					
						
							|  |  |  | 			// deployment has asked MinIO to allow for
 | 
					
						
							|  |  |  | 			// such broken clients and content-length > 0.
 | 
					
						
							|  |  |  | 			return true | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return false | 
					
						
							| 
									
										
										
										
											2016-07-05 16:04:50 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-04-11 00:58:08 +08:00
										 |  |  | // Returns SHA256 for calculating canonical-request.
 | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | func getContentSha256Cksum(r *http.Request, stype serviceType) string { | 
					
						
							|  |  |  | 	if stype == serviceSTS { | 
					
						
							| 
									
										
										
										
											2019-08-06 01:06:40 +08:00
										 |  |  | 		payload, err := ioutil.ReadAll(io.LimitReader(r.Body, stsRequestBodyLimit)) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		if err != nil { | 
					
						
							| 
									
										
										
										
											2020-04-10 00:30:02 +08:00
										 |  |  | 			logger.CriticalIf(GlobalContext, err) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2021-02-25 01:00:15 +08:00
										 |  |  | 		sum256 := sha256.Sum256(payload) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 		r.Body = ioutil.NopCloser(bytes.NewReader(payload)) | 
					
						
							| 
									
										
										
										
											2021-02-25 01:00:15 +08:00
										 |  |  | 		return hex.EncodeToString(sum256[:]) | 
					
						
							| 
									
										
										
										
											2019-02-28 09:46:55 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-01-09 15:19:50 +08:00
										 |  |  | 	var ( | 
					
						
							|  |  |  | 		defaultSha256Cksum string | 
					
						
							|  |  |  | 		v                  []string | 
					
						
							|  |  |  | 		ok                 bool | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-04-11 00:58:08 +08:00
										 |  |  | 	// For a presigned request we look at the query param for sha256.
 | 
					
						
							|  |  |  | 	if isRequestPresignedSignatureV4(r) { | 
					
						
							| 
									
										
										
										
											2018-01-09 15:19:50 +08:00
										 |  |  | 		// X-Amz-Content-Sha256, if not set in presigned requests, checksum
 | 
					
						
							|  |  |  | 		// will default to 'UNSIGNED-PAYLOAD'.
 | 
					
						
							|  |  |  | 		defaultSha256Cksum = unsignedPayload | 
					
						
							| 
									
										
										
										
											2021-08-08 13:43:01 +08:00
										 |  |  | 		v, ok = r.Form[xhttp.AmzContentSha256] | 
					
						
							| 
									
										
										
										
											2018-06-16 05:21:17 +08:00
										 |  |  | 		if !ok { | 
					
						
							| 
									
										
										
										
											2019-07-03 13:34:32 +08:00
										 |  |  | 			v, ok = r.Header[xhttp.AmzContentSha256] | 
					
						
							| 
									
										
										
										
											2018-06-16 05:21:17 +08:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2018-01-09 15:19:50 +08:00
										 |  |  | 	} else { | 
					
						
							|  |  |  | 		// X-Amz-Content-Sha256, if not set in signed requests, checksum
 | 
					
						
							|  |  |  | 		// will default to sha256([]byte("")).
 | 
					
						
							|  |  |  | 		defaultSha256Cksum = emptySHA256 | 
					
						
							| 
									
										
										
										
											2019-07-03 13:34:32 +08:00
										 |  |  | 		v, ok = r.Header[xhttp.AmzContentSha256] | 
					
						
							| 
									
										
										
										
											2017-04-11 00:58:08 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-01-09 15:19:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// We found 'X-Amz-Content-Sha256' return the captured value.
 | 
					
						
							|  |  |  | 	if ok { | 
					
						
							|  |  |  | 		return v[0] | 
					
						
							| 
									
										
										
										
											2017-04-11 00:58:08 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2018-01-09 15:19:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// We couldn't find 'X-Amz-Content-Sha256'.
 | 
					
						
							|  |  |  | 	return defaultSha256Cksum | 
					
						
							| 
									
										
										
										
											2017-04-11 00:58:08 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | // isValidRegion - verify if incoming region value is valid with configured Region.
 | 
					
						
							|  |  |  | func isValidRegion(reqRegion string, confRegion string) bool { | 
					
						
							| 
									
										
										
										
											2017-05-16 09:17:02 +08:00
										 |  |  | 	if confRegion == "" { | 
					
						
							|  |  |  | 		return true | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if confRegion == "US" { | 
					
						
							| 
									
										
										
										
											2017-01-19 04:24:34 +08:00
										 |  |  | 		confRegion = globalMinioDefaultRegion | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	// Some older s3 clients set region as "US" instead of
 | 
					
						
							| 
									
										
										
										
											2017-01-19 04:24:34 +08:00
										 |  |  | 	// globalMinioDefaultRegion, handle it.
 | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	if reqRegion == "US" { | 
					
						
							| 
									
										
										
										
											2017-01-19 04:24:34 +08:00
										 |  |  | 		reqRegion = globalMinioDefaultRegion | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	return reqRegion == confRegion | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | // check if the access key is valid and recognized, additionally
 | 
					
						
							|  |  |  | // also returns if the access key is owner/admin.
 | 
					
						
							| 
									
										
										
										
											2021-08-13 09:07:08 +08:00
										 |  |  | func checkKeyValid(r *http.Request, accessKey string) (auth.Credentials, bool, APIErrorCode) { | 
					
						
							| 
									
										
										
										
											2021-05-09 23:14:19 +08:00
										 |  |  | 	if !globalIAMSys.Initialized() && !globalIsGateway { | 
					
						
							|  |  |  | 		// Check if server has initialized, then only proceed
 | 
					
						
							|  |  |  | 		// to check for IAM users otherwise its okay for clients
 | 
					
						
							|  |  |  | 		// to retry with 503 errors when server is coming up.
 | 
					
						
							|  |  |  | 		return auth.Credentials{}, false, ErrServerNotInitialized | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-10-10 13:00:23 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-13 04:18:02 +08:00
										 |  |  | 	cred := globalActiveCred | 
					
						
							| 
									
										
										
										
											2018-11-07 22:40:03 +08:00
										 |  |  | 	if cred.AccessKey != accessKey { | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 		// Check if the access key is part of users credentials.
 | 
					
						
							| 
									
										
										
										
											2022-07-02 04:19:13 +08:00
										 |  |  | 		u, ok := globalIAMSys.GetUser(r.Context(), accessKey) | 
					
						
							| 
									
										
										
										
											2021-07-10 01:35:09 +08:00
										 |  |  | 		if !ok { | 
					
						
							| 
									
										
										
										
											2021-12-23 03:40:21 +08:00
										 |  |  | 			// Credentials will be invalid but and disabled
 | 
					
						
							|  |  |  | 			// return a different error in such a scenario.
 | 
					
						
							| 
									
										
										
										
											2022-07-02 04:19:13 +08:00
										 |  |  | 			if u.Credentials.Status == auth.AccountOff { | 
					
						
							| 
									
										
										
										
											2021-12-23 03:40:21 +08:00
										 |  |  | 				return cred, false, ErrAccessKeyDisabled | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2018-11-07 22:40:03 +08:00
										 |  |  | 			return cred, false, ErrInvalidAccessKeyID | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2022-07-02 04:19:13 +08:00
										 |  |  | 		cred = u.Credentials | 
					
						
							| 
									
										
										
										
											2021-10-10 13:00:23 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	claims, s3Err := checkClaimsFromToken(r, cred) | 
					
						
							|  |  |  | 	if s3Err != ErrNone { | 
					
						
							|  |  |  | 		return cred, false, s3Err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-10-13 04:18:02 +08:00
										 |  |  | 	cred.Claims = claims | 
					
						
							| 
									
										
										
										
											2021-10-10 13:00:23 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-13 04:18:02 +08:00
										 |  |  | 	owner := cred.AccessKey == globalActiveCred.AccessKey | 
					
						
							| 
									
										
										
										
											2018-11-07 22:40:03 +08:00
										 |  |  | 	return cred, owner, ErrNone | 
					
						
							| 
									
										
										
										
											2018-10-10 05:00:01 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | // sumHMAC calculate hmac between two input byte array.
 | 
					
						
							|  |  |  | func sumHMAC(key []byte, data []byte) []byte { | 
					
						
							| 
									
										
										
										
											2016-05-11 05:20:11 +08:00
										 |  |  | 	hash := hmac.New(sha256.New, key) | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	hash.Write(data) | 
					
						
							|  |  |  | 	return hash.Sum(nil) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // extractSignedHeaders extract signed headers from Authorization header
 | 
					
						
							| 
									
										
										
										
											2017-04-06 06:08:33 +08:00
										 |  |  | func extractSignedHeaders(signedHeaders []string, r *http.Request) (http.Header, APIErrorCode) { | 
					
						
							|  |  |  | 	reqHeaders := r.Header | 
					
						
							| 
									
										
										
										
											2021-08-08 13:43:01 +08:00
										 |  |  | 	reqQueries := r.Form | 
					
						
							| 
									
										
										
										
											2016-11-11 13:57:15 +08:00
										 |  |  | 	// find whether "host" is part of list of signed headers.
 | 
					
						
							|  |  |  | 	// if not return ErrUnsignedHeaders. "host" is mandatory.
 | 
					
						
							|  |  |  | 	if !contains(signedHeaders, "host") { | 
					
						
							|  |  |  | 		return nil, ErrUnsignedHeaders | 
					
						
							| 
									
										
										
										
											2016-08-10 00:13:15 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 	extractedSignedHeaders := make(http.Header) | 
					
						
							|  |  |  | 	for _, header := range signedHeaders { | 
					
						
							| 
									
										
										
										
											2016-08-10 00:13:15 +08:00
										 |  |  | 		// `host` will not be found in the headers, can be found in r.Host.
 | 
					
						
							|  |  |  | 		// but its alway necessary that the list of signed headers containing host in it.
 | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 		val, ok := reqHeaders[http.CanonicalHeaderKey(header)] | 
					
						
							| 
									
										
										
										
											2019-05-22 12:00:02 +08:00
										 |  |  | 		if !ok { | 
					
						
							|  |  |  | 			// try to set headers from Query String
 | 
					
						
							|  |  |  | 			val, ok = reqQueries[header] | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2017-04-06 08:00:24 +08:00
										 |  |  | 		if ok { | 
					
						
							| 
									
										
										
										
											2020-09-02 07:58:13 +08:00
										 |  |  | 			extractedSignedHeaders[http.CanonicalHeaderKey(header)] = val | 
					
						
							| 
									
										
										
										
											2017-04-06 08:00:24 +08:00
										 |  |  | 			continue | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		switch header { | 
					
						
							|  |  |  | 		case "expect": | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 			// Golang http server strips off 'Expect' header, if the
 | 
					
						
							|  |  |  | 			// client sent this as part of signed headers we need to
 | 
					
						
							|  |  |  | 			// handle otherwise we would see a signature mismatch.
 | 
					
						
							|  |  |  | 			// `aws-cli` sets this as part of signed headers.
 | 
					
						
							|  |  |  | 			//
 | 
					
						
							|  |  |  | 			// According to
 | 
					
						
							|  |  |  | 			// http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.20
 | 
					
						
							|  |  |  | 			// Expect header is always of form:
 | 
					
						
							|  |  |  | 			//
 | 
					
						
							|  |  |  | 			//   Expect       =  "Expect" ":" 1#expectation
 | 
					
						
							|  |  |  | 			//   expectation  =  "100-continue" | expectation-extension
 | 
					
						
							|  |  |  | 			//
 | 
					
						
							|  |  |  | 			// So it safe to assume that '100-continue' is what would
 | 
					
						
							|  |  |  | 			// be sent, for the time being keep this work around.
 | 
					
						
							|  |  |  | 			// Adding a *TODO* to remove this later when Golang server
 | 
					
						
							|  |  |  | 			// doesn't filter out the 'Expect' header.
 | 
					
						
							| 
									
										
										
										
											2017-04-06 08:00:24 +08:00
										 |  |  | 			extractedSignedHeaders.Set(header, "100-continue") | 
					
						
							|  |  |  | 		case "host": | 
					
						
							|  |  |  | 			// Go http server removes "host" from Request.Header
 | 
					
						
							|  |  |  | 			extractedSignedHeaders.Set(header, r.Host) | 
					
						
							|  |  |  | 		case "transfer-encoding": | 
					
						
							|  |  |  | 			// Go http server removes "host" from Request.Header
 | 
					
						
							| 
									
										
										
										
											2020-09-02 07:58:13 +08:00
										 |  |  | 			extractedSignedHeaders[http.CanonicalHeaderKey(header)] = r.TransferEncoding | 
					
						
							| 
									
										
										
										
											2017-04-06 08:00:24 +08:00
										 |  |  | 		case "content-length": | 
					
						
							|  |  |  | 			// Signature-V4 spec excludes Content-Length from signed headers list for signature calculation.
 | 
					
						
							|  |  |  | 			// But some clients deviate from this rule. Hence we consider Content-Length for signature
 | 
					
						
							|  |  |  | 			// calculation to be compatible with such clients.
 | 
					
						
							|  |  |  | 			extractedSignedHeaders.Set(header, strconv.FormatInt(r.ContentLength, 10)) | 
					
						
							|  |  |  | 		default: | 
					
						
							| 
									
										
										
										
											2016-08-10 00:13:15 +08:00
										 |  |  | 			return nil, ErrUnsignedHeaders | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-08-10 00:13:15 +08:00
										 |  |  | 	return extractedSignedHeaders, ErrNone | 
					
						
							| 
									
										
										
										
											2016-02-16 09:42:39 +08:00
										 |  |  | } | 
					
						
							| 
									
										
										
										
											2016-11-04 07:41:25 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | // Trim leading and trailing spaces and replace sequential spaces with one space, following Trimall()
 | 
					
						
							|  |  |  | // in http://docs.aws.amazon.com/general/latest/gr/sigv4-create-canonical-request.html
 | 
					
						
							|  |  |  | func signV4TrimAll(input string) string { | 
					
						
							| 
									
										
										
										
											2016-11-05 04:52:22 +08:00
										 |  |  | 	// Compress adjacent spaces (a space is determined by
 | 
					
						
							|  |  |  | 	// unicode.IsSpace() internally here) to one space and return
 | 
					
						
							| 
									
										
										
										
											2016-11-04 07:41:25 +08:00
										 |  |  | 	return strings.Join(strings.Fields(input), " ") | 
					
						
							|  |  |  | } |