forked from Deuxfleurs/garage
53 lines
1.5 KiB
Rust
53 lines
1.5 KiB
Rust
use chrono::{DateTime, Utc};
|
|
use hmac::{Hmac, Mac};
|
|
use sha2::Sha256;
|
|
|
|
use garage_util::data::{sha256sum, Hash};
|
|
|
|
pub mod error;
|
|
pub mod payload;
|
|
pub mod streaming;
|
|
|
|
use error::*;
|
|
|
|
pub const SHORT_DATE: &str = "%Y%m%d";
|
|
pub const LONG_DATETIME: &str = "%Y%m%dT%H%M%SZ";
|
|
|
|
type HmacSha256 = Hmac<Sha256>;
|
|
|
|
pub fn verify_signed_content(expected_sha256: Hash, body: &[u8]) -> Result<(), Error> {
|
|
if expected_sha256 != sha256sum(body) {
|
|
return Err(Error::bad_request(
|
|
"Request content hash does not match signed hash".to_string(),
|
|
));
|
|
}
|
|
Ok(())
|
|
}
|
|
|
|
pub fn signing_hmac(
|
|
datetime: &DateTime<Utc>,
|
|
secret_key: &str,
|
|
region: &str,
|
|
service: &str,
|
|
) -> Result<HmacSha256, crypto_common::InvalidLength> {
|
|
let secret = String::from("AWS4") + secret_key;
|
|
let mut date_hmac = HmacSha256::new_from_slice(secret.as_bytes())?;
|
|
date_hmac.update(datetime.format(SHORT_DATE).to_string().as_bytes());
|
|
let mut region_hmac = HmacSha256::new_from_slice(&date_hmac.finalize().into_bytes())?;
|
|
region_hmac.update(region.as_bytes());
|
|
let mut service_hmac = HmacSha256::new_from_slice(®ion_hmac.finalize().into_bytes())?;
|
|
service_hmac.update(service.as_bytes());
|
|
let mut signing_hmac = HmacSha256::new_from_slice(&service_hmac.finalize().into_bytes())?;
|
|
signing_hmac.update(b"aws4_request");
|
|
let hmac = HmacSha256::new_from_slice(&signing_hmac.finalize().into_bytes())?;
|
|
Ok(hmac)
|
|
}
|
|
|
|
pub fn compute_scope(datetime: &DateTime<Utc>, region: &str, service: &str) -> String {
|
|
format!(
|
|
"{}/{}/{}/aws4_request",
|
|
datetime.format(SHORT_DATE),
|
|
region,
|
|
service
|
|
)
|
|
}
|