aboutsummaryrefslogtreecommitdiffstats
path: root/vendor/github.com/Azure/azure-storage-blob-go/2018-03-28/azblob/zc_credential_shared_key.go
blob: 51da1627797a9e8bdc5902a985171d6439f908e7 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
package azblob

import (
    "bytes"
    "context"
    "crypto/hmac"
    "crypto/sha256"
    "encoding/base64"
    "net/http"
    "net/url"
    "sort"
    "strings"
    "time"

    "github.com/Azure/azure-pipeline-go/pipeline"
)

// NewSharedKeyCredential creates an immutable SharedKeyCredential containing the
// storage account's name and either its primary or secondary key.
func NewSharedKeyCredential(accountName, accountKey string) *SharedKeyCredential {
    bytes, err := base64.StdEncoding.DecodeString(accountKey)
    if err != nil {
        panic(err)
    }
    return &SharedKeyCredential{accountName: accountName, accountKey: bytes}
}

// SharedKeyCredential contains an account's name and its primary or secondary key.
// It is immutable making it shareable and goroutine-safe.
type SharedKeyCredential struct {
    // Only the NewSharedKeyCredential method should set these; all other methods should treat them as read-only
    accountName string
    accountKey  []byte
}

// AccountName returns the Storage account's name.
func (f SharedKeyCredential) AccountName() string {
    return f.accountName
}

// New creates a credential policy object.
func (f *SharedKeyCredential) New(next pipeline.Policy, po *pipeline.PolicyOptions) pipeline.Policy {
    return pipeline.PolicyFunc(func(ctx context.Context, request pipeline.Request) (pipeline.Response, error) {
        // Add a x-ms-date header if it doesn't already exist
        if d := request.Header.Get(headerXmsDate); d == "" {
            request.Header[headerXmsDate] = []string{time.Now().UTC().Format(http.TimeFormat)}
        }
        stringToSign := f.buildStringToSign(request)
        signature := f.ComputeHMACSHA256(stringToSign)
        authHeader := strings.Join([]string{"SharedKey ", f.accountName, ":", signature}, "")
        request.Header[headerAuthorization] = []string{authHeader}

        response, err := next.Do(ctx, request)
        if err != nil && response != nil && response.Response() != nil && response.Response().StatusCode == http.StatusForbidden {
            // Service failed to authenticate request, log it
            po.Log(pipeline.LogError, "===== HTTP Forbidden status, String-to-Sign:\n"+stringToSign+"\n===============================\n")
        }
        return response, err
    })
}

// credentialMarker is a package-internal method that exists just to satisfy the Credential interface.
func (*SharedKeyCredential) credentialMarker() {}

// Constants ensuring that header names are correctly spelled and consistently cased.
const (
    headerAuthorization      = "Authorization"
    headerCacheControl       = "Cache-Control"
    headerContentEncoding    = "Content-Encoding"
    headerContentDisposition = "Content-Disposition"
    headerContentLanguage    = "Content-Language"
    headerContentLength      = "Content-Length"
    headerContentMD5         = "Content-MD5"
    headerContentType        = "Content-Type"
    headerDate               = "Date"
    headerIfMatch            = "If-Match"
    headerIfModifiedSince    = "If-Modified-Since"
    headerIfNoneMatch        = "If-None-Match"
    headerIfUnmodifiedSince  = "If-Unmodified-Since"
    headerRange              = "Range"
    headerUserAgent          = "User-Agent"
    headerXmsDate            = "x-ms-date"
    headerXmsVersion         = "x-ms-version"
)

// ComputeHMACSHA256 generates a hash signature for an HTTP request or for a SAS.
func (f *SharedKeyCredential) ComputeHMACSHA256(message string) (base64String string) {
    h := hmac.New(sha256.New, f.accountKey)
    h.Write([]byte(message))
    return base64.StdEncoding.EncodeToString(h.Sum(nil))
}

func (f *SharedKeyCredential) buildStringToSign(request pipeline.Request) string {
    // https://docs.microsoft.com/en-us/rest/api/storageservices/authentication-for-the-azure-storage-services
    headers := request.Header
    contentLength := headers.Get(headerContentLength)
    if contentLength == "0" {
        contentLength = ""
    }

    stringToSign := strings.Join([]string{
        request.Method,
        headers.Get(headerContentEncoding),
        headers.Get(headerContentLanguage),
        contentLength,
        headers.Get(headerContentMD5),
        headers.Get(headerContentType),
        "", // Empty date because x-ms-date is expected (as per web page above)
        headers.Get(headerIfModifiedSince),
        headers.Get(headerIfMatch),
        headers.Get(headerIfNoneMatch),
        headers.Get(headerIfUnmodifiedSince),
        headers.Get(headerRange),
        buildCanonicalizedHeader(headers),
        f.buildCanonicalizedResource(request.URL),
    }, "\n")
    return stringToSign
}

func buildCanonicalizedHeader(headers http.Header) string {
    cm := map[string][]string{}
    for k, v := range headers {
        headerName := strings.TrimSpace(strings.ToLower(k))
        if strings.HasPrefix(headerName, "x-ms-") {
            cm[headerName] = v // NOTE: the value must not have any whitespace around it.
        }
    }
    if len(cm) == 0 {
        return ""
    }

    keys := make([]string, 0, len(cm))
    for key := range cm {
        keys = append(keys, key)
    }
    sort.Strings(keys)
    ch := bytes.NewBufferString("")
    for i, key := range keys {
        if i > 0 {
            ch.WriteRune('\n')
        }
        ch.WriteString(key)
        ch.WriteRune(':')
        ch.WriteString(strings.Join(cm[key], ","))
    }
    return string(ch.Bytes())
}

func (f *SharedKeyCredential) buildCanonicalizedResource(u *url.URL) string {
    // https://docs.microsoft.com/en-us/rest/api/storageservices/authentication-for-the-azure-storage-services
    cr := bytes.NewBufferString("/")
    cr.WriteString(f.accountName)

    if len(u.Path) > 0 {
        // Any portion of the CanonicalizedResource string that is derived from
        // the resource's URI should be encoded exactly as it is in the URI.
        // -- https://msdn.microsoft.com/en-gb/library/azure/dd179428.aspx
        cr.WriteString(u.EscapedPath())
    } else {
        // a slash is required to indicate the root path
        cr.WriteString("/")
    }

    // params is a map[string][]string; param name is key; params values is []string
    params, err := url.ParseQuery(u.RawQuery) // Returns URL decoded values
    if err != nil {
        panic(err)
    }

    if len(params) > 0 { // There is at least 1 query parameter
        paramNames := []string{} // We use this to sort the parameter key names
        for paramName := range params {
            paramNames = append(paramNames, paramName) // paramNames must be lowercase
        }
        sort.Strings(paramNames)

        for _, paramName := range paramNames {
            paramValues := params[paramName]
            sort.Strings(paramValues)

            // Join the sorted key values separated by ','
            // Then prepend "keyName:"; then add this string to the buffer
            cr.WriteString("\n" + paramName + ":" + strings.Join(paramValues, ","))
        }
    }
    return string(cr.Bytes())
}