1
0
Fork 0
mirror of https://github.com/ruby/ruby.git synced 2022-11-09 12:17:21 -05:00

[rubygems/rubygems] Upgrading S3 source signature to AWS SigV4

https://github.com/rubygems/rubygems/commit/f289788ca5
This commit is contained in:
Alexander Pakulov 2019-06-24 17:36:31 -07:00 committed by Hiroshi SHIBATA
parent 688ccc9602
commit 38daeded66
No known key found for this signature in database
GPG key ID: F9CF13417264FAC2
2 changed files with 205 additions and 25 deletions

View file

@ -343,31 +343,71 @@ class Gem::RemoteFetcher
protected
S3Config = Struct.new :access_key_id, :secret_access_key, :security_token, :region
# we have our own signing code here to avoid a dependency on the aws-sdk gem
# fortunately, a simple GET request isn't too complex to sign properly
def sign_s3_url(uri, expiration = nil)
require 'base64'
require 'digest'
require 'openssl'
id, secret = s3_source_auth uri
s3_config = s3_source_auth uri
expiration ||= 3600
expiration ||= s3_expiration
canonical_path = "/#{uri.host}#{uri.path}"
payload = "GET\n\n\n#{expiration}\n#{canonical_path}"
digest = OpenSSL::HMAC.digest('sha1', secret, payload)
# URI.escape is deprecated, and there isn't yet a replacement that does quite what we want
signature = Base64.encode64(digest).gsub("\n", '').gsub(/[\+\/=]/) { |c| BASE64_URI_TRANSLATE[c] }
URI.parse("https://#{uri.host}.s3.amazonaws.com#{uri.path}?AWSAccessKeyId=#{id}&Expires=#{expiration}&Signature=#{signature}")
end
current_time = Time.now.utc
date_time = current_time.strftime("%Y%m%dT%H%m%SZ")
date = date_time[0,8]
def s3_expiration
(Time.now + 3600).to_i # one hour from now
credential_info = "#{date}/#{s3_config.region}/s3/aws4_request"
canonical_host = "#{uri.host}.s3.#{s3_config.region}.amazonaws.com"
canonical_params = {}
canonical_params['X-Amz-Algorithm'] = 'AWS4-HMAC-SHA256'
canonical_params['X-Amz-Credential'] = "#{s3_config.access_key_id}/#{credential_info}"
canonical_params['X-Amz-Date'] = date_time
canonical_params['X-Amz-Expires'] = expiration.to_s
canonical_params['X-Amz-SignedHeaders'] = 'host'
canonical_params['X-Amz-Security-Token'] = s3_config.security_token if s3_config.security_token
query_params = canonical_params.sort.to_h.map do |key, value|
"#{base64_uri_escape(key)}=#{base64_uri_escape(value)}"
end.join('&')
canonical_request = [
'GET',
uri.path,
query_params,
"host:#{canonical_host}",
'', # empty params
'host',
'UNSIGNED-PAYLOAD',
].join("\n")
string_to_sign = [
"AWS4-HMAC-SHA256",
date_time,
credential_info,
Digest::SHA256.hexdigest(canonical_request)
].join("\n")
date_key = OpenSSL::HMAC.digest('sha256', "AWS4" + s3_config.secret_access_key, date)
date_region_key = OpenSSL::HMAC.digest('sha256', date_key, s3_config.region)
date_region_service_key = OpenSSL::HMAC.digest('sha256', date_region_key, "s3")
signing_key = OpenSSL::HMAC.digest('sha256', date_region_service_key, "aws4_request")
signature = OpenSSL::HMAC.hexdigest('sha256', signing_key, string_to_sign)
URI.parse("https://#{canonical_host}#{uri.path}?#{query_params}&X-Amz-Signature=#{signature}")
end
BASE64_URI_TRANSLATE = { '+' => '%2B', '/' => '%2F', '=' => '%3D' }.freeze
private
def base64_uri_escape(str)
str.gsub("\n", '').gsub(/[\+\/=]/) { |c| BASE64_URI_TRANSLATE[c] }
end
def proxy_for(proxy, uri)
Gem::Request.proxy_uri(proxy || Gem::Request.get_proxy_from_env(uri.scheme))
end
@ -379,7 +419,7 @@ class Gem::RemoteFetcher
end
def s3_source_auth(uri)
return [uri.user, uri.password] if uri.user && uri.password
return S3Config.new(uri.user, uri.password, nil, 'us-east-1') if uri.user && uri.password
s3_source = Gem.configuration[:s3_source] || Gem.configuration['s3_source']
host = uri.host
@ -388,11 +428,31 @@ class Gem::RemoteFetcher
auth = s3_source[host] || s3_source[host.to_sym]
raise FetchError.new("no key for host #{host} in s3_source in .gemrc", "s3://#{host}") unless auth
id = auth[:id] || auth['id']
secret = auth[:secret] || auth['secret']
raise FetchError.new("s3_source for #{host} missing id or secret", "s3://#{host}") unless id and secret
provider = auth[:provider] || auth['provider']
case provider
when 'env'
id = ENV['AWS_ACCESS_KEY_ID']
secret = ENV['AWS_SECRET_ACCESS_KEY']
security_token = ENV['AWS_SESSION_TOKEN']
when 'instance_profile'
require 'json'
credentials_response = fetch_http URI(EC2_METADATA_CREDENTIALS)
credentials = JSON.parse(credentials_response)
id = credentials['AccessKeyId']
secret = credentials['SecretAccessKey']
security_token = credentials['Token']
else
id = auth[:id] || auth['id']
secret = auth[:secret] || auth['secret']
raise FetchError.new("s3_source for #{host} missing id or secret", "s3://#{host}") unless id and secret
[id, secret]
security_token = auth[:security_token] || auth['security_token']
end
region = auth[:region] || auth['region'] || 'us-east-1'
S3Config.new(id, secret, security_token, region)
end
EC2_METADATA_CREDENTIALS = "http://169.254.169.254/latest/meta-data/identity-credentials/ec2/security-credentials/ec2-instance"
end

View file

@ -650,25 +650,27 @@ PeIQQkFng2VVot/WAQbv3ePqWq07g1BBcwIBAg==
assert_equal "murphy", fetcher.fetch_path(@server_uri)
end
def assert_fetch_s3(url)
def assert_fetch_s3(url, signature, token=nil, region='us-east-1', instance_profile_json=nil)
fetcher = Gem::RemoteFetcher.new nil
@fetcher = fetcher
$fetched_uri = nil
$instance_profile = instance_profile_json
def fetcher.request(uri, request_class, last_modified = nil)
$fetched_uri = uri
res = Net::HTTPOK.new nil, 200, nil
def res.body() 'success' end
case uri.to_s
when /^http:\/\/169\.254\.169\.254.*/
def res.body() $instance_profile end
else
def res.body() 'success' end
end
res
end
def fetcher.s3_expiration
1395098371
end
data = fetcher.fetch_s3 URI.parse(url)
assert_equal 'https://my-bucket.s3.amazonaws.com/gems/specs.4.8.gz?AWSAccessKeyId=testuser&Expires=1395098371&Signature=eUTr7NkpZEet%2BJySE%2BfH6qukroI%3D', $fetched_uri.to_s
assert_equal "https://my-bucket.s3.#{region}.amazonaws.com/gems/specs.4.8.gz?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=testuser%2F20190624%2F#{region}%2Fs3%2Faws4_request&X-Amz-Date=20190624T050641Z&X-Amz-Expires=3600#{token ? "&X-Amz-Security-Token=" + token : ""}&X-Amz-SignedHeaders=host&X-Amz-Signature=#{signature}", $fetched_uri.to_s
assert_equal 'success', data
ensure
$fetched_uri = nil
@ -679,14 +681,132 @@ PeIQQkFng2VVot/WAQbv3ePqWq07g1BBcwIBAg==
'my-bucket' => {:id => 'testuser', :secret => 'testpass'}
}
url = 's3://my-bucket/gems/specs.4.8.gz'
assert_fetch_s3 url
Time.stub :now, Time.at(1561353581) do
assert_fetch_s3 url, '8464fcf293454689ec1d3399463c9eeafe2a5b22f2cbd948cba28175a34b073d'
end
ensure
Gem.configuration[:s3_source] = nil
end
def test_fetch_s3_config_creds_with_region
Gem.configuration[:s3_source] = {
'my-bucket' => {:id => 'testuser', :secret => 'testpass', :region => 'us-west-2'}
}
url = 's3://my-bucket/gems/specs.4.8.gz'
Time.stub :now, Time.at(1561353581) do
assert_fetch_s3 url, '800419b6efb5eacabef2c13c7e493f093df417afc10961f6dcc7e085c9c89e93', nil, 'us-west-2'
end
ensure
Gem.configuration[:s3_source] = nil
end
def test_fetch_s3_config_creds_with_token
Gem.configuration[:s3_source] = {
'my-bucket' => {:id => 'testuser', :secret => 'testpass', :security_token => 'testtoken'}
}
url = 's3://my-bucket/gems/specs.4.8.gz'
Time.stub :now, Time.at(1561353581) do
assert_fetch_s3 url, '9686a7b85d29b983f0ee723fd444536258ae1d3a7afa7f8599b3852aef3c8c11', 'testtoken'
end
ensure
Gem.configuration[:s3_source] = nil
end
def test_fetch_s3_env_creds
ENV['AWS_ACCESS_KEY_ID'] = 'testuser'
ENV['AWS_SECRET_ACCESS_KEY'] = 'testpass'
ENV['AWS_SESSION_TOKEN'] = nil
Gem.configuration[:s3_source] = {
'my-bucket' => {:provider => 'env'}
}
url = 's3://my-bucket/gems/specs.4.8.gz'
Time.stub :now, Time.at(1561353581) do
assert_fetch_s3 url, '8464fcf293454689ec1d3399463c9eeafe2a5b22f2cbd948cba28175a34b073d'
end
ensure
ENV.each_key {|key| ENV.delete(key) if key.start_with?('AWS')}
Gem.configuration[:s3_source] = nil
end
def test_fetch_s3_env_creds_with_region
ENV['AWS_ACCESS_KEY_ID'] = 'testuser'
ENV['AWS_SECRET_ACCESS_KEY'] = 'testpass'
ENV['AWS_SESSION_TOKEN'] = nil
Gem.configuration[:s3_source] = {
'my-bucket' => {:provider => 'env', :region => 'us-west-2'}
}
url = 's3://my-bucket/gems/specs.4.8.gz'
Time.stub :now, Time.at(1561353581) do
assert_fetch_s3 url, '800419b6efb5eacabef2c13c7e493f093df417afc10961f6dcc7e085c9c89e93', nil, 'us-west-2'
end
ensure
ENV.each_key {|key| ENV.delete(key) if key.start_with?('AWS')}
Gem.configuration[:s3_source] = nil
end
def test_fetch_s3_env_creds_with_token
ENV['AWS_ACCESS_KEY_ID'] = 'testuser'
ENV['AWS_SECRET_ACCESS_KEY'] = 'testpass'
ENV['AWS_SESSION_TOKEN'] = 'testtoken'
Gem.configuration[:s3_source] = {
'my-bucket' => {:provider => 'env'}
}
url = 's3://my-bucket/gems/specs.4.8.gz'
Time.stub :now, Time.at(1561353581) do
assert_fetch_s3 url, '9686a7b85d29b983f0ee723fd444536258ae1d3a7afa7f8599b3852aef3c8c11', 'testtoken'
end
ensure
ENV.each_key {|key| ENV.delete(key) if key.start_with?('AWS')}
Gem.configuration[:s3_source] = nil
end
def test_fetch_s3_url_creds
url = 's3://testuser:testpass@my-bucket/gems/specs.4.8.gz'
assert_fetch_s3 url
Time.stub :now, Time.at(1561353581) do
assert_fetch_s3 url, '8464fcf293454689ec1d3399463c9eeafe2a5b22f2cbd948cba28175a34b073d'
end
end
def test_fetch_s3_instance_profile_creds
Gem.configuration[:s3_source] = {
'my-bucket' => {:provider => 'instance_profile'}
}
url = 's3://my-bucket/gems/specs.4.8.gz'
Time.stub :now, Time.at(1561353581) do
assert_fetch_s3 url, '8464fcf293454689ec1d3399463c9eeafe2a5b22f2cbd948cba28175a34b073d', nil, 'us-east-1',
'{"AccessKeyId": "testuser", "SecretAccessKey": "testpass"}'
end
ensure
Gem.configuration[:s3_source] = nil
end
def test_fetch_s3_instance_profile_creds_with_region
Gem.configuration[:s3_source] = {
'my-bucket' => {:provider => 'instance_profile', :region => 'us-west-2'}
}
url = 's3://my-bucket/gems/specs.4.8.gz'
Time.stub :now, Time.at(1561353581) do
assert_fetch_s3 url, '800419b6efb5eacabef2c13c7e493f093df417afc10961f6dcc7e085c9c89e93', nil, 'us-west-2',
'{"AccessKeyId": "testuser", "SecretAccessKey": "testpass"}'
end
ensure
Gem.configuration[:s3_source] = nil
end
def test_fetch_s3_instance_profile_creds_with_token
Gem.configuration[:s3_source] = {
'my-bucket' => {:provider => 'instance_profile'}
}
url = 's3://my-bucket/gems/specs.4.8.gz'
Time.stub :now, Time.at(1561353581) do
assert_fetch_s3 url, '9686a7b85d29b983f0ee723fd444536258ae1d3a7afa7f8599b3852aef3c8c11', 'testtoken', 'us-east-1',
'{"AccessKeyId": "testuser", "SecretAccessKey": "testpass", "Token": "testtoken"}'
end
ensure
Gem.configuration[:s3_source] = nil
end
def refute_fetch_s3(url, expected_message)