123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477 |
- package s3api
- import (
- "bytes"
- "crypto/md5"
- "crypto/sha256"
- "encoding/base64"
- "encoding/hex"
- "errors"
- "fmt"
- "github.com/seaweedfs/seaweedfs/weed/pb/iam_pb"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
- "io"
- "net/http"
- "net/url"
- "sort"
- "strconv"
- "strings"
- "sync"
- "testing"
- "time"
- "unicode/utf8"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
- )
- // TestIsRequestPresignedSignatureV4 - Test validates the logic for presign signature version v4 detection.
- func TestIsRequestPresignedSignatureV4(t *testing.T) {
- testCases := []struct {
- inputQueryKey string
- inputQueryValue string
- expectedResult bool
- }{
- // Test case - 1.
- // Test case with query key ""X-Amz-Credential" set.
- {"", "", false},
- // Test case - 2.
- {"X-Amz-Credential", "", true},
- // Test case - 3.
- {"X-Amz-Content-Sha256", "", false},
- }
- for i, testCase := range testCases {
- // creating an input HTTP request.
- // Only the query parameters are relevant for this particular test.
- inputReq, err := http.NewRequest("GET", "http://example.com", nil)
- if err != nil {
- t.Fatalf("Error initializing input HTTP request: %v", err)
- }
- q := inputReq.URL.Query()
- q.Add(testCase.inputQueryKey, testCase.inputQueryValue)
- inputReq.URL.RawQuery = q.Encode()
- actualResult := isRequestPresignedSignatureV4(inputReq)
- if testCase.expectedResult != actualResult {
- t.Errorf("Test %d: Expected the result to `%v`, but instead got `%v`", i+1, testCase.expectedResult, actualResult)
- }
- }
- }
- // Tests is requested authenticated function, tests replies for s3 errors.
- func TestIsReqAuthenticated(t *testing.T) {
- iam := &IdentityAccessManagement{
- hashes: make(map[string]*sync.Pool),
- hashCounters: make(map[string]*int32),
- }
- _ = iam.loadS3ApiConfiguration(&iam_pb.S3ApiConfiguration{
- Identities: []*iam_pb.Identity{
- {
- Name: "someone",
- Credentials: []*iam_pb.Credential{
- {
- AccessKey: "access_key_1",
- SecretKey: "secret_key_1",
- },
- },
- Actions: []string{},
- },
- },
- })
- // List of test cases for validating http request authentication.
- testCases := []struct {
- req *http.Request
- s3Error s3err.ErrorCode
- }{
- // When request is unsigned, access denied is returned.
- {mustNewRequest("GET", "http://127.0.0.1:9000", 0, nil, t), s3err.ErrAccessDenied},
- // When request is properly signed, error is none.
- {mustNewSignedRequest("GET", "http://127.0.0.1:9000", 0, nil, t), s3err.ErrNone},
- }
- // Validates all testcases.
- for i, testCase := range testCases {
- if _, s3Error := iam.reqSignatureV4Verify(testCase.req); s3Error != testCase.s3Error {
- io.ReadAll(testCase.req.Body)
- t.Fatalf("Test %d: Unexpected S3 error: want %d - got %d", i, testCase.s3Error, s3Error)
- }
- }
- }
- func TestCheckaAnonymousRequestAuthType(t *testing.T) {
- iam := &IdentityAccessManagement{
- hashes: make(map[string]*sync.Pool),
- hashCounters: make(map[string]*int32),
- }
- _ = iam.loadS3ApiConfiguration(&iam_pb.S3ApiConfiguration{
- Identities: []*iam_pb.Identity{
- {
- Name: "anonymous",
- Actions: []string{s3_constants.ACTION_READ},
- },
- },
- })
- testCases := []struct {
- Request *http.Request
- ErrCode s3err.ErrorCode
- Action Action
- }{
- {Request: mustNewRequest("GET", "http://127.0.0.1:9000/bucket", 0, nil, t), ErrCode: s3err.ErrNone, Action: s3_constants.ACTION_READ},
- {Request: mustNewRequest("PUT", "http://127.0.0.1:9000/bucket", 0, nil, t), ErrCode: s3err.ErrAccessDenied, Action: s3_constants.ACTION_WRITE},
- }
- for i, testCase := range testCases {
- _, s3Error := iam.authRequest(testCase.Request, testCase.Action)
- if s3Error != testCase.ErrCode {
- t.Errorf("Test %d: Unexpected s3error returned wanted %d, got %d", i, testCase.ErrCode, s3Error)
- }
- if testCase.Request.Header.Get(s3_constants.AmzAuthType) != "Anonymous" {
- t.Errorf("Test %d: Unexpected AuthType returned wanted %s, got %s", i, "Anonymous", testCase.Request.Header.Get(s3_constants.AmzAuthType))
- }
- }
- }
- func TestCheckAdminRequestAuthType(t *testing.T) {
- iam := &IdentityAccessManagement{
- hashes: make(map[string]*sync.Pool),
- hashCounters: make(map[string]*int32),
- }
- _ = iam.loadS3ApiConfiguration(&iam_pb.S3ApiConfiguration{
- Identities: []*iam_pb.Identity{
- {
- Name: "someone",
- Credentials: []*iam_pb.Credential{
- {
- AccessKey: "access_key_1",
- SecretKey: "secret_key_1",
- },
- },
- Actions: []string{},
- },
- },
- })
- testCases := []struct {
- Request *http.Request
- ErrCode s3err.ErrorCode
- }{
- {Request: mustNewRequest("GET", "http://127.0.0.1:9000", 0, nil, t), ErrCode: s3err.ErrAccessDenied},
- {Request: mustNewSignedRequest("GET", "http://127.0.0.1:9000", 0, nil, t), ErrCode: s3err.ErrNone},
- {Request: mustNewPresignedRequest(iam, "GET", "http://127.0.0.1:9000", 0, nil, t), ErrCode: s3err.ErrNone},
- }
- for i, testCase := range testCases {
- if _, s3Error := iam.reqSignatureV4Verify(testCase.Request); s3Error != testCase.ErrCode {
- t.Errorf("Test %d: Unexpected s3error returned wanted %d, got %d", i, testCase.ErrCode, s3Error)
- }
- }
- }
- func BenchmarkGetSignature(b *testing.B) {
- t := time.Now()
- iam := IdentityAccessManagement{
- hashes: make(map[string]*sync.Pool),
- hashCounters: make(map[string]*int32),
- }
- b.ReportAllocs()
- b.ResetTimer()
- for i := 0; i < b.N; i++ {
- iam.getSignature("secret-key", t, "us-east-1", "s3", "random data")
- }
- }
- // Provides a fully populated http request instance, fails otherwise.
- func mustNewRequest(method string, urlStr string, contentLength int64, body io.ReadSeeker, t *testing.T) *http.Request {
- req, err := newTestRequest(method, urlStr, contentLength, body)
- if err != nil {
- t.Fatalf("Unable to initialize new http request %s", err)
- }
- return req
- }
- // This is similar to mustNewRequest but additionally the request
- // is signed with AWS Signature V4, fails if not able to do so.
- func mustNewSignedRequest(method string, urlStr string, contentLength int64, body io.ReadSeeker, t *testing.T) *http.Request {
- req := mustNewRequest(method, urlStr, contentLength, body, t)
- cred := &Credential{"access_key_1", "secret_key_1"}
- if err := signRequestV4(req, cred.AccessKey, cred.SecretKey); err != nil {
- t.Fatalf("Unable to initialized new signed http request %s", err)
- }
- return req
- }
- // This is similar to mustNewRequest but additionally the request
- // is presigned with AWS Signature V4, fails if not able to do so.
- func mustNewPresignedRequest(iam *IdentityAccessManagement, method string, urlStr string, contentLength int64, body io.ReadSeeker, t *testing.T) *http.Request {
- req := mustNewRequest(method, urlStr, contentLength, body, t)
- cred := &Credential{"access_key_1", "secret_key_1"}
- if err := preSignV4(iam, req, cred.AccessKey, cred.SecretKey, int64(10*time.Minute.Seconds())); err != nil {
- t.Fatalf("Unable to initialized new signed http request %s", err)
- }
- return req
- }
- // Returns new HTTP request object.
- func newTestRequest(method, urlStr string, contentLength int64, body io.ReadSeeker) (*http.Request, error) {
- if method == "" {
- method = "POST"
- }
- // Save for subsequent use
- var hashedPayload string
- var md5Base64 string
- switch {
- case body == nil:
- hashedPayload = getSHA256Hash([]byte{})
- default:
- payloadBytes, err := io.ReadAll(body)
- if err != nil {
- return nil, err
- }
- hashedPayload = getSHA256Hash(payloadBytes)
- md5Base64 = getMD5HashBase64(payloadBytes)
- }
- // Seek back to beginning.
- if body != nil {
- body.Seek(0, 0)
- } else {
- body = bytes.NewReader([]byte(""))
- }
- req, err := http.NewRequest(method, urlStr, body)
- if err != nil {
- return nil, err
- }
- if md5Base64 != "" {
- req.Header.Set("Content-Md5", md5Base64)
- }
- req.Header.Set("x-amz-content-sha256", hashedPayload)
- // Add Content-Length
- req.ContentLength = contentLength
- return req, nil
- }
- // getSHA256Hash returns SHA-256 hash in hex encoding of given data.
- func getSHA256Hash(data []byte) string {
- return hex.EncodeToString(getSHA256Sum(data))
- }
- // getMD5HashBase64 returns MD5 hash in base64 encoding of given data.
- func getMD5HashBase64(data []byte) string {
- return base64.StdEncoding.EncodeToString(getMD5Sum(data))
- }
- // getSHA256Sum returns SHA-256 sum of given data.
- func getSHA256Sum(data []byte) []byte {
- hash := sha256.New()
- hash.Write(data)
- return hash.Sum(nil)
- }
- // getMD5Sum returns MD5 sum of given data.
- func getMD5Sum(data []byte) []byte {
- hash := md5.New()
- hash.Write(data)
- return hash.Sum(nil)
- }
- // getMD5Hash returns MD5 hash in hex encoding of given data.
- func getMD5Hash(data []byte) string {
- return hex.EncodeToString(getMD5Sum(data))
- }
- var ignoredHeaders = map[string]bool{
- "Authorization": true,
- "Content-Type": true,
- "Content-Length": true,
- "User-Agent": true,
- }
- // Sign given request using Signature V4.
- func signRequestV4(req *http.Request, accessKey, secretKey string) error {
- // Get hashed payload.
- hashedPayload := req.Header.Get("x-amz-content-sha256")
- if hashedPayload == "" {
- return fmt.Errorf("Invalid hashed payload")
- }
- currTime := time.Now()
- // Set x-amz-date.
- req.Header.Set("x-amz-date", currTime.Format(iso8601Format))
- // Get header map.
- headerMap := make(map[string][]string)
- for k, vv := range req.Header {
- // If request header key is not in ignored headers, then add it.
- if _, ok := ignoredHeaders[http.CanonicalHeaderKey(k)]; !ok {
- headerMap[strings.ToLower(k)] = vv
- }
- }
- // Get header keys.
- headers := []string{"host"}
- for k := range headerMap {
- headers = append(headers, k)
- }
- sort.Strings(headers)
- region := "us-east-1"
- // Get canonical headers.
- var buf bytes.Buffer
- for _, k := range headers {
- buf.WriteString(k)
- buf.WriteByte(':')
- switch {
- case k == "host":
- buf.WriteString(req.URL.Host)
- fallthrough
- default:
- for idx, v := range headerMap[k] {
- if idx > 0 {
- buf.WriteByte(',')
- }
- buf.WriteString(v)
- }
- buf.WriteByte('\n')
- }
- }
- canonicalHeaders := buf.String()
- // Get signed headers.
- signedHeaders := strings.Join(headers, ";")
- // Get canonical query string.
- req.URL.RawQuery = strings.Replace(req.URL.Query().Encode(), "+", "%20", -1)
- // Get canonical URI.
- canonicalURI := EncodePath(req.URL.Path)
- // Get canonical request.
- // canonicalRequest =
- // <HTTPMethod>\n
- // <CanonicalURI>\n
- // <CanonicalQueryString>\n
- // <CanonicalHeaders>\n
- // <SignedHeaders>\n
- // <HashedPayload>
- //
- canonicalRequest := strings.Join([]string{
- req.Method,
- canonicalURI,
- req.URL.RawQuery,
- canonicalHeaders,
- signedHeaders,
- hashedPayload,
- }, "\n")
- // Get scope.
- scope := strings.Join([]string{
- currTime.Format(yyyymmdd),
- region,
- "s3",
- "aws4_request",
- }, "/")
- stringToSign := "AWS4-HMAC-SHA256" + "\n" + currTime.Format(iso8601Format) + "\n"
- stringToSign = stringToSign + scope + "\n"
- stringToSign = stringToSign + getSHA256Hash([]byte(canonicalRequest))
- date := sumHMAC([]byte("AWS4"+secretKey), []byte(currTime.Format(yyyymmdd)))
- regionHMAC := sumHMAC(date, []byte(region))
- service := sumHMAC(regionHMAC, []byte("s3"))
- signingKey := sumHMAC(service, []byte("aws4_request"))
- signature := hex.EncodeToString(sumHMAC(signingKey, []byte(stringToSign)))
- // final Authorization header
- parts := []string{
- "AWS4-HMAC-SHA256" + " Credential=" + accessKey + "/" + scope,
- "SignedHeaders=" + signedHeaders,
- "Signature=" + signature,
- }
- auth := strings.Join(parts, ", ")
- req.Header.Set("Authorization", auth)
- return nil
- }
- // preSignV4 presign the request, in accordance with
- // http://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-query-string-auth.html.
- func preSignV4(iam *IdentityAccessManagement, req *http.Request, accessKeyID, secretAccessKey string, expires int64) error {
- // Presign is not needed for anonymous credentials.
- if accessKeyID == "" || secretAccessKey == "" {
- return errors.New("Presign cannot be generated without access and secret keys")
- }
- region := "us-east-1"
- date := time.Now().UTC()
- scope := getScope(date, region)
- credential := fmt.Sprintf("%s/%s", accessKeyID, scope)
- // Set URL query.
- query := req.URL.Query()
- query.Set("X-Amz-Algorithm", signV4Algorithm)
- query.Set("X-Amz-Date", date.Format(iso8601Format))
- query.Set("X-Amz-Expires", strconv.FormatInt(expires, 10))
- query.Set("X-Amz-SignedHeaders", "host")
- query.Set("X-Amz-Credential", credential)
- query.Set("X-Amz-Content-Sha256", unsignedPayload)
- // "host" is the only header required to be signed for Presigned URLs.
- extractedSignedHeaders := make(http.Header)
- extractedSignedHeaders.Set("host", req.Host)
- queryStr := strings.Replace(query.Encode(), "+", "%20", -1)
- canonicalRequest := getCanonicalRequest(extractedSignedHeaders, unsignedPayload, queryStr, req.URL.Path, req.Method)
- stringToSign := getStringToSign(canonicalRequest, date, scope)
- signature := iam.getSignature(secretAccessKey, date, region, "s3", stringToSign)
- req.URL.RawQuery = query.Encode()
- // Add signature header to RawQuery.
- req.URL.RawQuery += "&X-Amz-Signature=" + url.QueryEscape(signature)
- // Construct the final presigned URL.
- return nil
- }
- // EncodePath encode the strings from UTF-8 byte representations to HTML hex escape sequences
- //
- // This is necessary since regular url.Parse() and url.Encode() functions do not support UTF-8
- // non english characters cannot be parsed due to the nature in which url.Encode() is written
- //
- // This function on the other hand is a direct replacement for url.Encode() technique to support
- // pretty much every UTF-8 character.
- func EncodePath(pathName string) string {
- if reservedObjectNames.MatchString(pathName) {
- return pathName
- }
- var encodedPathname string
- for _, s := range pathName {
- if 'A' <= s && s <= 'Z' || 'a' <= s && s <= 'z' || '0' <= s && s <= '9' { // §2.3 Unreserved characters (mark)
- encodedPathname = encodedPathname + string(s)
- continue
- }
- switch s {
- case '-', '_', '.', '~', '/': // §2.3 Unreserved characters (mark)
- encodedPathname = encodedPathname + string(s)
- continue
- default:
- len := utf8.RuneLen(s)
- if len < 0 {
- // if utf8 cannot convert return the same string as is
- return pathName
- }
- u := make([]byte, len)
- utf8.EncodeRune(u, s)
- for _, r := range u {
- hex := hex.EncodeToString([]byte{r})
- encodedPathname = encodedPathname + "%" + strings.ToUpper(hex)
- }
- }
- }
- return encodedPathname
- }
|