2021-04-18 15:41:13 -04:00
|
|
|
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
|
|
//
|
|
|
|
// This file is part of MinIO Object Storage stack
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2016-08-16 20:02:35 -04:00
|
|
|
|
2016-08-18 19:23:42 -04:00
|
|
|
package cmd
|
2016-08-16 20:02:35 -04:00
|
|
|
|
|
|
|
import (
|
2022-10-14 06:08:40 -04:00
|
|
|
"context"
|
2016-08-16 20:02:35 -04:00
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"net/url"
|
2017-08-12 22:25:43 -04:00
|
|
|
"os"
|
2016-08-16 20:02:35 -04:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
func niceError(code APIErrorCode) string {
|
|
|
|
// Special-handle ErrNone
|
|
|
|
if code == ErrNone {
|
|
|
|
return "ErrNone"
|
|
|
|
}
|
|
|
|
|
2019-02-12 04:25:52 -05:00
|
|
|
return fmt.Sprintf("%s (%s)", errorCodes[code].Code, errorCodes[code].Description)
|
2016-08-16 20:02:35 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestDoesPolicySignatureMatch(t *testing.T) {
|
2024-06-13 18:26:38 -04:00
|
|
|
_, fsDir, err := prepareFS(context.Background())
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer removeRoots([]string{fsDir})
|
|
|
|
|
2016-08-16 20:02:35 -04:00
|
|
|
credentialTemplate := "%s/%s/%s/s3/aws4_request"
|
2017-03-18 14:28:41 -04:00
|
|
|
now := UTCNow()
|
2019-10-23 01:59:13 -04:00
|
|
|
accessKey := globalActiveCred.AccessKey
|
2016-08-16 20:02:35 -04:00
|
|
|
|
|
|
|
testCases := []struct {
|
2017-03-13 17:41:13 -04:00
|
|
|
form http.Header
|
2016-08-16 20:02:35 -04:00
|
|
|
expected APIErrorCode
|
|
|
|
}{
|
|
|
|
// (0) It should fail if 'X-Amz-Credential' is missing.
|
|
|
|
{
|
2017-03-13 17:41:13 -04:00
|
|
|
form: http.Header{},
|
2020-08-24 01:06:22 -04:00
|
|
|
expected: ErrCredMalformed,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
|
|
|
// (1) It should fail if the access key is incorrect.
|
|
|
|
{
|
2017-03-13 17:41:13 -04:00
|
|
|
form: http.Header{
|
|
|
|
"X-Amz-Credential": []string{fmt.Sprintf(credentialTemplate, "EXAMPLEINVALIDEXAMPL", now.Format(yyyymmdd), globalMinioDefaultRegion)},
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
|
|
|
expected: ErrInvalidAccessKeyID,
|
|
|
|
},
|
2017-05-15 21:17:02 -04:00
|
|
|
// (2) It should fail with a bad signature.
|
2016-08-16 20:02:35 -04:00
|
|
|
{
|
2017-03-13 17:41:13 -04:00
|
|
|
form: http.Header{
|
|
|
|
"X-Amz-Credential": []string{fmt.Sprintf(credentialTemplate, accessKey, now.Format(yyyymmdd), globalMinioDefaultRegion)},
|
|
|
|
"X-Amz-Date": []string{now.Format(iso8601Format)},
|
|
|
|
"X-Amz-Signature": []string{"invalidsignature"},
|
|
|
|
"Policy": []string{"policy"},
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
|
|
|
expected: ErrSignatureDoesNotMatch,
|
|
|
|
},
|
2017-05-15 21:17:02 -04:00
|
|
|
// (3) It should succeed if everything is correct.
|
2016-08-16 20:02:35 -04:00
|
|
|
{
|
2017-03-13 17:41:13 -04:00
|
|
|
form: http.Header{
|
|
|
|
"X-Amz-Credential": []string{
|
|
|
|
fmt.Sprintf(credentialTemplate, accessKey, now.Format(yyyymmdd), globalMinioDefaultRegion),
|
|
|
|
},
|
|
|
|
"X-Amz-Date": []string{now.Format(iso8601Format)},
|
|
|
|
"X-Amz-Signature": []string{
|
2019-10-23 01:59:13 -04:00
|
|
|
getSignature(getSigningKey(globalActiveCred.SecretKey, now,
|
2019-02-27 20:46:55 -05:00
|
|
|
globalMinioDefaultRegion, serviceS3), "policy"),
|
2017-03-13 17:41:13 -04:00
|
|
|
},
|
|
|
|
"Policy": []string{"policy"},
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
|
|
|
expected: ErrNone,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run each test case individually.
|
|
|
|
for i, testCase := range testCases {
|
2021-03-03 11:47:08 -05:00
|
|
|
_, code := doesPolicySignatureMatch(testCase.form)
|
2016-08-16 20:02:35 -04:00
|
|
|
if code != testCase.expected {
|
|
|
|
t.Errorf("(%d) expected to get %s, instead got %s", i, niceError(testCase.expected), niceError(code))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDoesPresignedSignatureMatch(t *testing.T) {
|
2022-10-14 06:08:40 -04:00
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
obj, fsDir, err := prepareFS(ctx)
|
2016-11-06 14:47:16 -05:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2018-08-15 00:41:47 -04:00
|
|
|
defer os.RemoveAll(fsDir)
|
|
|
|
if err = newTestConfig(globalMinioDefaultRegion, obj); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-11-06 14:47:16 -05:00
|
|
|
|
2016-08-16 20:02:35 -04:00
|
|
|
// sha256 hash of "payload"
|
2016-11-06 14:47:16 -05:00
|
|
|
payloadSHA256 := "239f59ed55e737c77147cf55ad0c1b030b6d7ee748a7426952f9b852d5a935e5"
|
2017-03-18 14:28:41 -04:00
|
|
|
now := UTCNow()
|
2016-08-16 20:02:35 -04:00
|
|
|
credentialTemplate := "%s/%s/%s/s3/aws4_request"
|
|
|
|
|
2024-05-16 19:13:47 -04:00
|
|
|
region := globalSite.Region()
|
2019-10-23 01:59:13 -04:00
|
|
|
accessKeyID := globalActiveCred.AccessKey
|
2016-08-16 20:02:35 -04:00
|
|
|
testCases := []struct {
|
2016-09-29 18:51:00 -04:00
|
|
|
queryParams map[string]string
|
|
|
|
headers map[string]string
|
|
|
|
region string
|
|
|
|
expected APIErrorCode
|
2016-08-16 20:02:35 -04:00
|
|
|
}{
|
|
|
|
// (0) Should error without a set URL query.
|
|
|
|
{
|
2017-01-18 15:24:34 -05:00
|
|
|
region: globalMinioDefaultRegion,
|
2016-09-29 18:51:00 -04:00
|
|
|
expected: ErrInvalidQueryParams,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
|
|
|
// (1) Should error on an invalid access key.
|
|
|
|
{
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"X-Amz-Algorithm": signV4Algorithm,
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
|
|
|
"X-Amz-Expires": "60",
|
|
|
|
"X-Amz-Signature": "badsignature",
|
|
|
|
"X-Amz-SignedHeaders": "host;x-amz-content-sha256;x-amz-date",
|
|
|
|
"X-Amz-Credential": fmt.Sprintf(credentialTemplate, "Z7IXGOO6BZ0REAN1Q26I", now.Format(yyyymmdd), "us-west-1"),
|
|
|
|
},
|
2016-09-29 18:51:00 -04:00
|
|
|
region: "us-west-1",
|
|
|
|
expected: ErrInvalidAccessKeyID,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
2017-05-15 21:17:02 -04:00
|
|
|
// (2) Should NOT fail with an invalid region if it doesn't verify it.
|
2016-08-16 20:02:35 -04:00
|
|
|
{
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"X-Amz-Algorithm": signV4Algorithm,
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
|
|
|
"X-Amz-Expires": "60",
|
|
|
|
"X-Amz-Signature": "badsignature",
|
|
|
|
"X-Amz-SignedHeaders": "host;x-amz-content-sha256;x-amz-date",
|
2016-11-11 00:57:15 -05:00
|
|
|
"X-Amz-Credential": fmt.Sprintf(credentialTemplate, accessKeyID, now.Format(yyyymmdd), "us-west-1"),
|
2016-11-06 14:47:16 -05:00
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
2016-09-29 18:51:00 -04:00
|
|
|
region: "us-west-1",
|
|
|
|
expected: ErrUnsignedHeaders,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
2017-05-15 21:17:02 -04:00
|
|
|
// (3) Should fail to extract headers if the host header is not signed.
|
2016-08-16 20:02:35 -04:00
|
|
|
{
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"X-Amz-Algorithm": signV4Algorithm,
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
|
|
|
"X-Amz-Expires": "60",
|
|
|
|
"X-Amz-Signature": "badsignature",
|
|
|
|
"X-Amz-SignedHeaders": "x-amz-content-sha256;x-amz-date",
|
2016-11-11 00:57:15 -05:00
|
|
|
"X-Amz-Credential": fmt.Sprintf(credentialTemplate, accessKeyID, now.Format(yyyymmdd), region),
|
2016-11-06 14:47:16 -05:00
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
2016-11-11 00:57:15 -05:00
|
|
|
region: region,
|
2016-09-29 18:51:00 -04:00
|
|
|
expected: ErrUnsignedHeaders,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
2017-05-15 21:17:02 -04:00
|
|
|
// (4) Should give an expired request if it has expired.
|
2016-08-16 20:02:35 -04:00
|
|
|
{
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"X-Amz-Algorithm": signV4Algorithm,
|
|
|
|
"X-Amz-Date": now.AddDate(0, 0, -2).Format(iso8601Format),
|
|
|
|
"X-Amz-Expires": "60",
|
|
|
|
"X-Amz-Signature": "badsignature",
|
|
|
|
"X-Amz-SignedHeaders": "host;x-amz-content-sha256;x-amz-date",
|
2016-11-11 00:57:15 -05:00
|
|
|
"X-Amz-Credential": fmt.Sprintf(credentialTemplate, accessKeyID, now.Format(yyyymmdd), region),
|
2016-11-06 14:47:16 -05:00
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
|
|
|
headers: map[string]string{
|
|
|
|
"X-Amz-Date": now.AddDate(0, 0, -2).Format(iso8601Format),
|
2016-11-06 14:47:16 -05:00
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
2016-11-11 00:57:15 -05:00
|
|
|
region: region,
|
2016-09-29 18:51:00 -04:00
|
|
|
expected: ErrExpiredPresignRequest,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
2017-05-15 21:17:02 -04:00
|
|
|
// (5) Should error if the signature is incorrect.
|
2016-08-16 20:02:35 -04:00
|
|
|
{
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"X-Amz-Algorithm": signV4Algorithm,
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
|
|
|
"X-Amz-Expires": "60",
|
|
|
|
"X-Amz-Signature": "badsignature",
|
|
|
|
"X-Amz-SignedHeaders": "host;x-amz-content-sha256;x-amz-date",
|
2016-11-11 00:57:15 -05:00
|
|
|
"X-Amz-Credential": fmt.Sprintf(credentialTemplate, accessKeyID, now.Format(yyyymmdd), region),
|
2016-11-06 14:47:16 -05:00
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
|
|
|
headers: map[string]string{
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
2016-11-06 14:47:16 -05:00
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
2016-11-11 00:57:15 -05:00
|
|
|
region: region,
|
2016-09-29 18:51:00 -04:00
|
|
|
expected: ErrSignatureDoesNotMatch,
|
2016-08-16 20:02:35 -04:00
|
|
|
},
|
2017-05-15 21:17:02 -04:00
|
|
|
// (6) Should error if the request is not ready yet, ie X-Amz-Date is in the future.
|
2016-11-06 14:47:16 -05:00
|
|
|
{
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"X-Amz-Algorithm": signV4Algorithm,
|
|
|
|
"X-Amz-Date": now.Add(1 * time.Hour).Format(iso8601Format),
|
|
|
|
"X-Amz-Expires": "60",
|
|
|
|
"X-Amz-Signature": "badsignature",
|
|
|
|
"X-Amz-SignedHeaders": "host;x-amz-content-sha256;x-amz-date",
|
2016-11-11 00:57:15 -05:00
|
|
|
"X-Amz-Credential": fmt.Sprintf(credentialTemplate, accessKeyID, now.Format(yyyymmdd), region),
|
2016-11-06 14:47:16 -05:00
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
|
|
|
},
|
|
|
|
headers: map[string]string{
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
|
|
|
},
|
2016-11-11 00:57:15 -05:00
|
|
|
region: region,
|
2016-11-06 14:47:16 -05:00
|
|
|
expected: ErrRequestNotReadyYet,
|
|
|
|
},
|
2017-05-15 21:17:02 -04:00
|
|
|
// (7) Should not error with invalid region instead, call should proceed
|
2024-01-18 02:03:17 -05:00
|
|
|
// with signature does not match.
|
2016-11-06 14:47:16 -05:00
|
|
|
{
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"X-Amz-Algorithm": signV4Algorithm,
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
|
|
|
"X-Amz-Expires": "60",
|
|
|
|
"X-Amz-Signature": "badsignature",
|
|
|
|
"X-Amz-SignedHeaders": "host;x-amz-content-sha256;x-amz-date",
|
2016-11-11 00:57:15 -05:00
|
|
|
"X-Amz-Credential": fmt.Sprintf(credentialTemplate, accessKeyID, now.Format(yyyymmdd), region),
|
2016-11-06 14:47:16 -05:00
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
|
|
|
},
|
|
|
|
headers: map[string]string{
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
|
|
|
},
|
|
|
|
region: "",
|
|
|
|
expected: ErrSignatureDoesNotMatch,
|
|
|
|
},
|
2017-05-15 21:17:02 -04:00
|
|
|
// (8) Should error with signature does not match. But handles
|
2016-11-06 14:47:16 -05:00
|
|
|
// query params which do not precede with "x-amz-" header.
|
|
|
|
{
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"X-Amz-Algorithm": signV4Algorithm,
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
|
|
|
"X-Amz-Expires": "60",
|
|
|
|
"X-Amz-Signature": "badsignature",
|
|
|
|
"X-Amz-SignedHeaders": "host;x-amz-content-sha256;x-amz-date",
|
2016-11-11 00:57:15 -05:00
|
|
|
"X-Amz-Credential": fmt.Sprintf(credentialTemplate, accessKeyID, now.Format(yyyymmdd), region),
|
2016-11-06 14:47:16 -05:00
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
|
|
|
"response-content-type": "application/json",
|
|
|
|
},
|
|
|
|
headers: map[string]string{
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
|
|
|
},
|
|
|
|
region: "",
|
|
|
|
expected: ErrSignatureDoesNotMatch,
|
|
|
|
},
|
2017-05-15 21:17:02 -04:00
|
|
|
// (9) Should error with unsigned headers.
|
2016-11-11 00:57:15 -05:00
|
|
|
{
|
|
|
|
queryParams: map[string]string{
|
|
|
|
"X-Amz-Algorithm": signV4Algorithm,
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
|
|
|
"X-Amz-Expires": "60",
|
|
|
|
"X-Amz-Signature": "badsignature",
|
|
|
|
"X-Amz-SignedHeaders": "host;x-amz-content-sha256;x-amz-date",
|
|
|
|
"X-Amz-Credential": fmt.Sprintf(credentialTemplate, accessKeyID, now.Format(yyyymmdd), region),
|
|
|
|
"X-Amz-Content-Sha256": payloadSHA256,
|
|
|
|
"response-content-type": "application/json",
|
|
|
|
},
|
|
|
|
headers: map[string]string{
|
|
|
|
"X-Amz-Date": now.Format(iso8601Format),
|
|
|
|
},
|
|
|
|
region: "",
|
|
|
|
expected: ErrUnsignedHeaders,
|
|
|
|
},
|
2016-08-16 20:02:35 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Run each test case individually.
|
|
|
|
for i, testCase := range testCases {
|
|
|
|
// Turn the map[string]string into map[string][]string, because Go.
|
|
|
|
query := url.Values{}
|
|
|
|
for key, value := range testCase.queryParams {
|
|
|
|
query.Set(key, value)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a request to use.
|
|
|
|
req, e := http.NewRequest(http.MethodGet, "http://host/a/b?"+query.Encode(), nil)
|
|
|
|
if e != nil {
|
|
|
|
t.Errorf("(%d) failed to create http.Request, got %v", i, e)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do the same for the headers.
|
|
|
|
for key, value := range testCase.headers {
|
|
|
|
req.Header.Set(key, value)
|
|
|
|
}
|
|
|
|
|
2021-08-08 01:43:01 -04:00
|
|
|
// parse form.
|
|
|
|
req.ParseForm()
|
|
|
|
|
2016-08-16 20:02:35 -04:00
|
|
|
// Check if it matches!
|
2019-02-27 20:46:55 -05:00
|
|
|
err := doesPresignedSignatureMatch(payloadSHA256, req, testCase.region, serviceS3)
|
2016-08-16 20:02:35 -04:00
|
|
|
if err != testCase.expected {
|
|
|
|
t.Errorf("(%d) expected to get %s, instead got %s", i, niceError(testCase.expected), niceError(err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|