2023-05-05 22:53:12 -04:00
|
|
|
// Copyright (c) 2015-2023 MinIO, Inc.
|
2021-04-18 15:41:13 -04:00
|
|
|
//
|
|
|
|
// This file is part of MinIO Object Storage stack
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2016-02-21 20:57:05 -05:00
|
|
|
|
2016-08-18 19:23:42 -04:00
|
|
|
package cmd
|
2016-02-15 20:42:39 -05:00
|
|
|
|
|
|
|
import (
|
2019-02-27 20:46:55 -05:00
|
|
|
"bytes"
|
2016-02-15 20:42:39 -05:00
|
|
|
"crypto/hmac"
|
2019-02-27 20:46:55 -05:00
|
|
|
"encoding/hex"
|
2019-08-05 13:06:40 -04:00
|
|
|
"io"
|
2016-02-15 20:42:39 -05:00
|
|
|
"net/http"
|
2017-04-05 20:00:24 -04:00
|
|
|
"strconv"
|
2016-02-15 20:42:39 -05:00
|
|
|
"strings"
|
2016-09-19 13:17:46 -04:00
|
|
|
|
2021-06-01 17:59:40 -04:00
|
|
|
"github.com/minio/minio/internal/auth"
|
2022-05-27 09:00:19 -04:00
|
|
|
"github.com/minio/minio/internal/hash/sha256"
|
2021-06-01 17:59:40 -04:00
|
|
|
xhttp "github.com/minio/minio/internal/http"
|
|
|
|
"github.com/minio/minio/internal/logger"
|
2023-04-28 15:24:14 -04:00
|
|
|
iampolicy "github.com/minio/pkg/iam/policy"
|
2016-02-15 20:42:39 -05:00
|
|
|
)
|
|
|
|
|
2016-07-05 04:04:50 -04:00
|
|
|
// http Header "x-amz-content-sha256" == "UNSIGNED-PAYLOAD" indicates that the
|
|
|
|
// client did not calculate sha256 of the payload.
|
|
|
|
const unsignedPayload = "UNSIGNED-PAYLOAD"
|
|
|
|
|
2023-05-05 22:53:12 -04:00
|
|
|
// http Header "x-amz-content-sha256" == "STREAMING-UNSIGNED-PAYLOAD-TRAILER" indicates that the
|
|
|
|
// client did not calculate sha256 of the payload and there is a trailer.
|
|
|
|
const unsignedPayloadTrailer = "STREAMING-UNSIGNED-PAYLOAD-TRAILER"
|
|
|
|
|
2018-01-09 02:19:50 -05:00
|
|
|
// skipContentSha256Cksum returns true if caller needs to skip
|
|
|
|
// payload checksum, false if not.
|
2016-07-05 04:04:50 -04:00
|
|
|
func skipContentSha256Cksum(r *http.Request) bool {
|
2018-01-09 02:19:50 -05:00
|
|
|
var (
|
|
|
|
v []string
|
|
|
|
ok bool
|
|
|
|
)
|
|
|
|
|
|
|
|
if isRequestPresignedSignatureV4(r) {
|
2021-08-08 01:43:01 -04:00
|
|
|
v, ok = r.Form[xhttp.AmzContentSha256]
|
2018-06-15 17:21:17 -04:00
|
|
|
if !ok {
|
2019-07-03 01:34:32 -04:00
|
|
|
v, ok = r.Header[xhttp.AmzContentSha256]
|
2018-06-15 17:21:17 -04:00
|
|
|
}
|
2018-01-09 02:19:50 -05:00
|
|
|
} else {
|
2019-07-03 01:34:32 -04:00
|
|
|
v, ok = r.Header[xhttp.AmzContentSha256]
|
2016-11-11 00:57:15 -05:00
|
|
|
}
|
2018-01-09 02:19:50 -05:00
|
|
|
|
2021-10-08 15:40:34 -04:00
|
|
|
// Skip if no header was set.
|
|
|
|
if !ok {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2018-01-09 02:19:50 -05:00
|
|
|
// If x-amz-content-sha256 is set and the value is not
|
|
|
|
// 'UNSIGNED-PAYLOAD' we should validate the content sha256.
|
2021-10-08 15:40:34 -04:00
|
|
|
switch v[0] {
|
2023-05-05 22:53:12 -04:00
|
|
|
case unsignedPayload, unsignedPayloadTrailer:
|
2021-10-08 15:40:34 -04:00
|
|
|
return true
|
|
|
|
case emptySHA256:
|
|
|
|
// some broken clients set empty-sha256
|
|
|
|
// with > 0 content-length in the body,
|
|
|
|
// we should skip such clients and allow
|
|
|
|
// blindly such insecure clients only if
|
|
|
|
// S3 strict compatibility is disabled.
|
2023-05-05 22:53:12 -04:00
|
|
|
|
|
|
|
// We return true only in situations when
|
|
|
|
// deployment has asked MinIO to allow for
|
|
|
|
// such broken clients and content-length > 0.
|
|
|
|
return r.ContentLength > 0 && !globalCLIContext.StrictS3Compat
|
2021-10-08 15:40:34 -04:00
|
|
|
}
|
|
|
|
return false
|
2016-07-05 04:04:50 -04:00
|
|
|
}
|
|
|
|
|
2017-04-10 12:58:08 -04:00
|
|
|
// Returns SHA256 for calculating canonical-request.
|
2019-02-27 20:46:55 -05:00
|
|
|
func getContentSha256Cksum(r *http.Request, stype serviceType) string {
|
|
|
|
if stype == serviceSTS {
|
2022-09-19 14:05:16 -04:00
|
|
|
payload, err := io.ReadAll(io.LimitReader(r.Body, stsRequestBodyLimit))
|
2019-02-27 20:46:55 -05:00
|
|
|
if err != nil {
|
2020-04-09 12:30:02 -04:00
|
|
|
logger.CriticalIf(GlobalContext, err)
|
2019-02-27 20:46:55 -05:00
|
|
|
}
|
2021-02-24 12:00:15 -05:00
|
|
|
sum256 := sha256.Sum256(payload)
|
2022-09-19 14:05:16 -04:00
|
|
|
r.Body = io.NopCloser(bytes.NewReader(payload))
|
2021-02-24 12:00:15 -05:00
|
|
|
return hex.EncodeToString(sum256[:])
|
2019-02-27 20:46:55 -05:00
|
|
|
}
|
|
|
|
|
2018-01-09 02:19:50 -05:00
|
|
|
var (
|
|
|
|
defaultSha256Cksum string
|
|
|
|
v []string
|
|
|
|
ok bool
|
|
|
|
)
|
|
|
|
|
2017-04-10 12:58:08 -04:00
|
|
|
// For a presigned request we look at the query param for sha256.
|
|
|
|
if isRequestPresignedSignatureV4(r) {
|
2018-01-09 02:19:50 -05:00
|
|
|
// X-Amz-Content-Sha256, if not set in presigned requests, checksum
|
|
|
|
// will default to 'UNSIGNED-PAYLOAD'.
|
|
|
|
defaultSha256Cksum = unsignedPayload
|
2021-08-08 01:43:01 -04:00
|
|
|
v, ok = r.Form[xhttp.AmzContentSha256]
|
2018-06-15 17:21:17 -04:00
|
|
|
if !ok {
|
2019-07-03 01:34:32 -04:00
|
|
|
v, ok = r.Header[xhttp.AmzContentSha256]
|
2018-06-15 17:21:17 -04:00
|
|
|
}
|
2018-01-09 02:19:50 -05:00
|
|
|
} else {
|
|
|
|
// X-Amz-Content-Sha256, if not set in signed requests, checksum
|
|
|
|
// will default to sha256([]byte("")).
|
|
|
|
defaultSha256Cksum = emptySHA256
|
2019-07-03 01:34:32 -04:00
|
|
|
v, ok = r.Header[xhttp.AmzContentSha256]
|
2017-04-10 12:58:08 -04:00
|
|
|
}
|
2018-01-09 02:19:50 -05:00
|
|
|
|
|
|
|
// We found 'X-Amz-Content-Sha256' return the captured value.
|
|
|
|
if ok {
|
|
|
|
return v[0]
|
2017-04-10 12:58:08 -04:00
|
|
|
}
|
2018-01-09 02:19:50 -05:00
|
|
|
|
|
|
|
// We couldn't find 'X-Amz-Content-Sha256'.
|
|
|
|
return defaultSha256Cksum
|
2017-04-10 12:58:08 -04:00
|
|
|
}
|
|
|
|
|
2016-02-15 20:42:39 -05:00
|
|
|
// isValidRegion - verify if incoming region value is valid with configured Region.
|
|
|
|
func isValidRegion(reqRegion string, confRegion string) bool {
|
2017-05-15 21:17:02 -04:00
|
|
|
if confRegion == "" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if confRegion == "US" {
|
2017-01-18 15:24:34 -05:00
|
|
|
confRegion = globalMinioDefaultRegion
|
2016-02-15 20:42:39 -05:00
|
|
|
}
|
|
|
|
// Some older s3 clients set region as "US" instead of
|
2017-01-18 15:24:34 -05:00
|
|
|
// globalMinioDefaultRegion, handle it.
|
2016-02-15 20:42:39 -05:00
|
|
|
if reqRegion == "US" {
|
2017-01-18 15:24:34 -05:00
|
|
|
reqRegion = globalMinioDefaultRegion
|
2016-02-15 20:42:39 -05:00
|
|
|
}
|
|
|
|
return reqRegion == confRegion
|
|
|
|
}
|
|
|
|
|
2018-10-09 17:00:01 -04:00
|
|
|
// check if the access key is valid and recognized, additionally
|
|
|
|
// also returns if the access key is owner/admin.
|
2021-08-12 21:07:08 -04:00
|
|
|
func checkKeyValid(r *http.Request, accessKey string) (auth.Credentials, bool, APIErrorCode) {
|
2021-10-12 16:18:02 -04:00
|
|
|
cred := globalActiveCred
|
2018-11-07 09:40:03 -05:00
|
|
|
if cred.AccessKey != accessKey {
|
2022-12-21 18:52:29 -05:00
|
|
|
if !globalIAMSys.Initialized() {
|
|
|
|
// Check if server has initialized, then only proceed
|
|
|
|
// to check for IAM users otherwise its okay for clients
|
|
|
|
// to retry with 503 errors when server is coming up.
|
|
|
|
return auth.Credentials{}, false, ErrServerNotInitialized
|
|
|
|
}
|
|
|
|
|
2018-10-09 17:00:01 -04:00
|
|
|
// Check if the access key is part of users credentials.
|
2022-07-01 16:19:13 -04:00
|
|
|
u, ok := globalIAMSys.GetUser(r.Context(), accessKey)
|
2021-07-09 13:35:09 -04:00
|
|
|
if !ok {
|
2021-12-22 14:40:21 -05:00
|
|
|
// Credentials will be invalid but and disabled
|
|
|
|
// return a different error in such a scenario.
|
2022-07-01 16:19:13 -04:00
|
|
|
if u.Credentials.Status == auth.AccountOff {
|
2021-12-22 14:40:21 -05:00
|
|
|
return cred, false, ErrAccessKeyDisabled
|
|
|
|
}
|
2018-11-07 09:40:03 -05:00
|
|
|
return cred, false, ErrInvalidAccessKeyID
|
2018-10-09 17:00:01 -04:00
|
|
|
}
|
2022-07-01 16:19:13 -04:00
|
|
|
cred = u.Credentials
|
2021-10-10 01:00:23 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
claims, s3Err := checkClaimsFromToken(r, cred)
|
|
|
|
if s3Err != ErrNone {
|
|
|
|
return cred, false, s3Err
|
|
|
|
}
|
2021-10-12 16:18:02 -04:00
|
|
|
cred.Claims = claims
|
2021-10-10 01:00:23 -04:00
|
|
|
|
2023-04-28 15:24:14 -04:00
|
|
|
owner := cred.AccessKey == globalActiveCred.AccessKey || (cred.ParentUser == globalActiveCred.AccessKey && cred.AccessKey != siteReplicatorSvcAcc)
|
|
|
|
if owner && !globalAPIConfig.permitRootAccess() {
|
|
|
|
// We disable root access and its service accounts if asked for.
|
|
|
|
return cred, owner, ErrAccessKeyDisabled
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, ok := claims[iampolicy.SessionPolicyName]; ok {
|
|
|
|
owner = false
|
|
|
|
}
|
|
|
|
|
2018-11-07 09:40:03 -05:00
|
|
|
return cred, owner, ErrNone
|
2018-10-09 17:00:01 -04:00
|
|
|
}
|
|
|
|
|
2016-02-15 20:42:39 -05:00
|
|
|
// sumHMAC calculate hmac between two input byte array.
|
|
|
|
func sumHMAC(key []byte, data []byte) []byte {
|
2016-05-10 17:20:11 -04:00
|
|
|
hash := hmac.New(sha256.New, key)
|
2016-02-15 20:42:39 -05:00
|
|
|
hash.Write(data)
|
|
|
|
return hash.Sum(nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
// extractSignedHeaders extract signed headers from Authorization header
|
2017-04-05 18:08:33 -04:00
|
|
|
func extractSignedHeaders(signedHeaders []string, r *http.Request) (http.Header, APIErrorCode) {
|
|
|
|
reqHeaders := r.Header
|
2021-08-08 01:43:01 -04:00
|
|
|
reqQueries := r.Form
|
2016-11-11 00:57:15 -05:00
|
|
|
// find whether "host" is part of list of signed headers.
|
|
|
|
// if not return ErrUnsignedHeaders. "host" is mandatory.
|
|
|
|
if !contains(signedHeaders, "host") {
|
|
|
|
return nil, ErrUnsignedHeaders
|
2016-08-09 12:13:15 -04:00
|
|
|
}
|
2016-02-15 20:42:39 -05:00
|
|
|
extractedSignedHeaders := make(http.Header)
|
|
|
|
for _, header := range signedHeaders {
|
2016-08-09 12:13:15 -04:00
|
|
|
// `host` will not be found in the headers, can be found in r.Host.
|
|
|
|
// but its alway necessary that the list of signed headers containing host in it.
|
2016-02-15 20:42:39 -05:00
|
|
|
val, ok := reqHeaders[http.CanonicalHeaderKey(header)]
|
2019-05-22 00:00:02 -04:00
|
|
|
if !ok {
|
|
|
|
// try to set headers from Query String
|
|
|
|
val, ok = reqQueries[header]
|
|
|
|
}
|
2017-04-05 20:00:24 -04:00
|
|
|
if ok {
|
2020-09-01 19:58:13 -04:00
|
|
|
extractedSignedHeaders[http.CanonicalHeaderKey(header)] = val
|
2017-04-05 20:00:24 -04:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
switch header {
|
|
|
|
case "expect":
|
2016-02-15 20:42:39 -05:00
|
|
|
// Golang http server strips off 'Expect' header, if the
|
|
|
|
// client sent this as part of signed headers we need to
|
|
|
|
// handle otherwise we would see a signature mismatch.
|
|
|
|
// `aws-cli` sets this as part of signed headers.
|
|
|
|
//
|
|
|
|
// According to
|
|
|
|
// http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.20
|
|
|
|
// Expect header is always of form:
|
|
|
|
//
|
|
|
|
// Expect = "Expect" ":" 1#expectation
|
|
|
|
// expectation = "100-continue" | expectation-extension
|
|
|
|
//
|
|
|
|
// So it safe to assume that '100-continue' is what would
|
|
|
|
// be sent, for the time being keep this work around.
|
|
|
|
// Adding a *TODO* to remove this later when Golang server
|
|
|
|
// doesn't filter out the 'Expect' header.
|
2017-04-05 20:00:24 -04:00
|
|
|
extractedSignedHeaders.Set(header, "100-continue")
|
|
|
|
case "host":
|
|
|
|
// Go http server removes "host" from Request.Header
|
|
|
|
extractedSignedHeaders.Set(header, r.Host)
|
|
|
|
case "transfer-encoding":
|
|
|
|
// Go http server removes "host" from Request.Header
|
2020-09-01 19:58:13 -04:00
|
|
|
extractedSignedHeaders[http.CanonicalHeaderKey(header)] = r.TransferEncoding
|
2017-04-05 20:00:24 -04:00
|
|
|
case "content-length":
|
|
|
|
// Signature-V4 spec excludes Content-Length from signed headers list for signature calculation.
|
|
|
|
// But some clients deviate from this rule. Hence we consider Content-Length for signature
|
|
|
|
// calculation to be compatible with such clients.
|
|
|
|
extractedSignedHeaders.Set(header, strconv.FormatInt(r.ContentLength, 10))
|
|
|
|
default:
|
2016-08-09 12:13:15 -04:00
|
|
|
return nil, ErrUnsignedHeaders
|
2016-02-15 20:42:39 -05:00
|
|
|
}
|
|
|
|
}
|
2016-08-09 12:13:15 -04:00
|
|
|
return extractedSignedHeaders, ErrNone
|
2016-02-15 20:42:39 -05:00
|
|
|
}
|
2016-11-03 19:41:25 -04:00
|
|
|
|
|
|
|
// Trim leading and trailing spaces and replace sequential spaces with one space, following Trimall()
|
|
|
|
// in http://docs.aws.amazon.com/general/latest/gr/sigv4-create-canonical-request.html
|
|
|
|
func signV4TrimAll(input string) string {
|
2016-11-04 16:52:22 -04:00
|
|
|
// Compress adjacent spaces (a space is determined by
|
|
|
|
// unicode.IsSpace() internally here) to one space and return
|
2016-11-03 19:41:25 -04:00
|
|
|
return strings.Join(strings.Fields(input), " ")
|
|
|
|
}
|