2016-01-23 12:07:07 +00:00
|
|
|
package s3
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/md5"
|
|
|
|
"encoding/base64"
|
2019-05-24 22:03:06 +00:00
|
|
|
"net/http"
|
2016-01-23 12:07:07 +00:00
|
|
|
|
|
|
|
"github.com/aws/aws-sdk-go/aws/awserr"
|
2016-03-27 18:46:08 +00:00
|
|
|
"github.com/aws/aws-sdk-go/aws/request"
|
2016-01-23 12:07:07 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var errSSERequiresSSL = awserr.New("ConfigError", "cannot send SSE keys over HTTP.", nil)
|
|
|
|
|
2016-03-27 18:46:08 +00:00
|
|
|
func validateSSERequiresSSL(r *request.Request) {
|
2017-11-22 20:39:52 +00:00
|
|
|
if r.HTTPRequest.URL.Scheme == "https" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if iface, ok := r.Params.(sseCustomerKeyGetter); ok {
|
|
|
|
if len(iface.getSSECustomerKey()) > 0 {
|
|
|
|
r.Error = errSSERequiresSSL
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if iface, ok := r.Params.(copySourceSSECustomerKeyGetter); ok {
|
|
|
|
if len(iface.getCopySourceSSECustomerKey()) > 0 {
|
2016-01-23 12:07:07 +00:00
|
|
|
r.Error = errSSERequiresSSL
|
2017-11-22 20:39:52 +00:00
|
|
|
return
|
2016-01-23 12:07:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-24 22:03:06 +00:00
|
|
|
const (
|
|
|
|
sseKeyHeader = "x-amz-server-side-encryption-customer-key"
|
|
|
|
sseKeyMD5Header = sseKeyHeader + "-md5"
|
|
|
|
)
|
|
|
|
|
|
|
|
func computeSSEKeyMD5(r *request.Request) {
|
|
|
|
var key string
|
|
|
|
if g, ok := r.Params.(sseCustomerKeyGetter); ok {
|
|
|
|
key = g.getSSECustomerKey()
|
|
|
|
}
|
|
|
|
|
|
|
|
computeKeyMD5(sseKeyHeader, sseKeyMD5Header, key, r.HTTPRequest)
|
|
|
|
}
|
|
|
|
|
|
|
|
const (
|
|
|
|
copySrcSSEKeyHeader = "x-amz-copy-source-server-side-encryption-customer-key"
|
|
|
|
copySrcSSEKeyMD5Header = copySrcSSEKeyHeader + "-md5"
|
|
|
|
)
|
|
|
|
|
|
|
|
func computeCopySourceSSEKeyMD5(r *request.Request) {
|
|
|
|
var key string
|
|
|
|
if g, ok := r.Params.(copySourceSSECustomerKeyGetter); ok {
|
|
|
|
key = g.getCopySourceSSECustomerKey()
|
2016-01-23 12:07:07 +00:00
|
|
|
}
|
|
|
|
|
2019-05-24 22:03:06 +00:00
|
|
|
computeKeyMD5(copySrcSSEKeyHeader, copySrcSSEKeyMD5Header, key, r.HTTPRequest)
|
|
|
|
}
|
|
|
|
|
|
|
|
func computeKeyMD5(keyHeader, keyMD5Header, key string, r *http.Request) {
|
|
|
|
if len(key) == 0 {
|
|
|
|
// Backwards compatiablity where user just set the header value instead
|
|
|
|
// of using the API parameter, or setting the header value for an
|
|
|
|
// operation without the parameters modeled.
|
|
|
|
key = r.Header.Get(keyHeader)
|
|
|
|
if len(key) == 0 {
|
|
|
|
return
|
2016-01-23 12:07:07 +00:00
|
|
|
}
|
2019-05-24 22:03:06 +00:00
|
|
|
|
|
|
|
// In backwards compatiable, the header's value is not base64 encoded,
|
|
|
|
// and needs to be encoded and updated by the SDK's customizations.
|
|
|
|
b64Key := base64.StdEncoding.EncodeToString([]byte(key))
|
|
|
|
r.Header.Set(keyHeader, b64Key)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Only update Key's MD5 if not already set.
|
|
|
|
if len(r.Header.Get(keyMD5Header)) == 0 {
|
|
|
|
sum := md5.Sum([]byte(key))
|
|
|
|
keyMD5 := base64.StdEncoding.EncodeToString(sum[:])
|
|
|
|
r.Header.Set(keyMD5Header, keyMD5)
|
2016-01-23 12:07:07 +00:00
|
|
|
}
|
|
|
|
}
|