AWS SDK for C++

AWS SDK for C++ Version 1.11.611

Loading...
Searching...
No Matches
SigV4aSigner.h
1
6#pragma once
7
8#include <smithy/identity/signer/AwsSignerBase.h>
9#include <smithy/identity/identity/AwsCredentialIdentityBase.h>
10#include <aws/core/auth/AWSCredentials.h>
11#include <aws/crt/auth/Credentials.h>
12
13#include <aws/core/http/HttpRequest.h>
14#include <aws/core/auth/signer/AWSAuthSignerHelper.h>
15#include <aws/crt/http/HttpConnection.h>
16#include <aws/crt/http/HttpRequestResponse.h>
17#include <condition_variable>
18#include <mutex>
19#include <smithy/identity/signer/built-in/SignerProperties.h>
20#include <smithy/identity/auth/AuthSchemeResolverBase.h>
21
22namespace smithy {
23 static const char* UNSIGNED_PAYLOAD = "UNSIGNED-PAYLOAD";
24 static const char* EMPTY_STRING_SHA256 = "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855";
25 static const char v4AsymmetricLogTag[] = "AWSAuthSymmetricV4Signer";
26 static const char* USER_AGENT = "user-agent";
27 static const char* X_AMZN_TRACE_ID = "x-amzn-trace-id";
28
33 class AwsSigV4aSigner : public AwsSignerBase<AwsCredentialIdentityBase> {
34
35 public:
37 explicit AwsSigV4aSigner(const Aws::String& serviceName, const Aws::String& region)
38 : m_serviceName(serviceName), m_region(region)
39 {
40 }
41
42 //for legacy constructors
44 : m_serviceName(serviceName), m_region(region), m_policy(Aws::MakeShared<Aws::Client::AWSAuthV4Signer::PayloadSigningPolicy>("AwsSigV4aSigner", policy))
45 {
46 }
47
48 explicit AwsSigV4aSigner(const Aws::String& serviceName, const Aws::String& region, Aws::Client::AWSAuthV4Signer::PayloadSigningPolicy policy, bool urlEscape)
49 : m_serviceName(serviceName), m_region(region), m_policy(Aws::MakeShared<Aws::Client::AWSAuthV4Signer::PayloadSigningPolicy>("AwsSigV4aSigner", policy)), m_urlEscape{urlEscape}
50 {
51 }
52
53 SigningFutureOutcome sign(std::shared_ptr<HttpRequest> httpRequest, const AwsCredentialIdentityBase& identity, SigningProperties properties) override
54 {
55 return sign(httpRequest, identity, properties, m_region, m_serviceName, m_expirationTimeInSeconds, Aws::Crt::Auth::SignatureType::HttpRequestViaHeaders);
56 }
57
58 SigningFutureOutcome presign(std::shared_ptr<HttpRequest> httpRequest, const AwsCredentialIdentityBase& identity, SigningProperties properties, const Aws::String& region, const Aws::String& serviceName, long long expirationTimeInSeconds) override
59 {
60 Aws::String signingRegion = !region.empty() ? region : m_region;
61 Aws::String signingServiceName = !serviceName.empty() ? serviceName : m_serviceName;
62 Aws::Crt::Auth::SignatureType signatureType = Aws::Crt::Auth::SignatureType::HttpRequestViaQueryParams;
63
64 const auto credentials = [&identity]() -> Aws::Auth::AWSCredentials {
65 if(identity.sessionToken().has_value() && identity.expiration().has_value())
66 {
67 return {identity.accessKeyId(), identity.secretAccessKey(), *identity.sessionToken(), *identity.expiration()};
68 }
69 if(identity.sessionToken().has_value())
70 {
71 return {identity.accessKeyId(), identity.secretAccessKey(), *identity.sessionToken()};
72 }
73 return {identity.accessKeyId(), identity.secretAccessKey()};
74 }();
75
76 //don't sign anonymous requests
77 if (credentials.GetAWSAccessKeyId().empty() || credentials.GetAWSSecretKey().empty())
78 {
79 return SigningFutureOutcome(std::move(httpRequest)) ;
80 }
81 return sign(httpRequest, identity, properties, signingRegion, signingServiceName, expirationTimeInSeconds, signatureType);
82 }
83
84 virtual ~AwsSigV4aSigner() {};
85 protected:
86
88 std::shared_ptr<Aws::Crt::Auth::Credentials>& crtCredentials,
89 const Aws::Http::HttpRequest& request,
90 const Aws::String& serviceName,
91 const Aws::String& region,
92 Aws::Crt::Auth::AwsSigningConfig& awsSigningConfig,
93 bool signBody,
94 Aws::Crt::Auth::SignatureType signatureType) const
95 {
96 awsSigningConfig.SetSigningAlgorithm(static_cast<Aws::Crt::Auth::SigningAlgorithm>(Aws::Auth::AWSSigningAlgorithm::ASYMMETRIC_SIGV4));
97 awsSigningConfig.SetSignatureType(signatureType);
98 awsSigningConfig.SetRegion(serviceName.c_str());
99 awsSigningConfig.SetService(region.c_str());
100 awsSigningConfig.SetSigningTimepoint(GetSigningTimestamp().UnderlyingTimestamp());
101 awsSigningConfig.SetUseDoubleUriEncode(m_urlEscape);
102 awsSigningConfig.SetShouldNormalizeUriPath(true);
103 awsSigningConfig.SetOmitSessionToken(false);
104 awsSigningConfig.SetShouldSignHeaderUserData(reinterpret_cast<void*>(const_cast<Aws::Set<Aws::String>*>(&m_unsignedHeaders)));
105 awsSigningConfig.SetShouldSignHeaderCallback([](const Aws::Crt::ByteCursor *name, void *user_data) {
106 Aws::Set<Aws::String>* unsignedHeaders = static_cast<Aws::Set<Aws::String>*>(user_data);
107 Aws::String headerKey(reinterpret_cast<const char*>(name->ptr), name->len);
108 return unsignedHeaders->find(Aws::Utils::StringUtils::ToLower(headerKey.c_str())) == unsignedHeaders->cend();
109 });
110 if (signatureType == Aws::Crt::Auth::SignatureType::HttpRequestViaHeaders)
111 {
112 Aws::String payloadHash(UNSIGNED_PAYLOAD);
113 if(signBody || request.GetUri().GetScheme() != Aws::Http::Scheme::HTTPS)
114 {
115 if (!request.GetContentBody())
116 {
117 AWS_LOGSTREAM_DEBUG(v4AsymmetricLogTag, "Using cached empty string sha256 " << EMPTY_STRING_SHA256 << " because payload is empty.");
118 payloadHash = EMPTY_STRING_SHA256;
119 }
120 else
121 {
122 // The hash will be calculated from the payload during signing.
123 payloadHash = {};
124 }
125 }
126 else
127 {
128 AWS_LOGSTREAM_DEBUG(v4AsymmetricLogTag, "Note: Http payloads are not being signed. signPayloads=" << signBody
129 << " http scheme=" << Aws::Http::SchemeMapper::ToString(request.GetUri().GetScheme()));
130 }
131 awsSigningConfig.SetSignedBodyValue(payloadHash.c_str());
132 awsSigningConfig.SetSignedBodyHeader(m_includeSha256HashHeader ? Aws::Crt::Auth::SignedBodyHeaderType::XAmzContentSha256 : Aws::Crt::Auth::SignedBodyHeaderType::None);
133 }
134 else if (signatureType == Aws::Crt::Auth::SignatureType::HttpRequestViaQueryParams)
135 {
136 if (ServiceRequireUnsignedPayload(serviceName))
137 {
138 awsSigningConfig.SetSignedBodyValue(UNSIGNED_PAYLOAD);
139 }
140 else
141 {
142 awsSigningConfig.SetSignedBodyValue(EMPTY_STRING_SHA256);
143 }
144 }
145 else
146 {
147 AWS_LOGSTREAM_ERROR(v4AsymmetricLogTag, "The signature type should be either \"HttpRequestViaHeaders\" or \"HttpRequestViaQueryParams\"");
148 return false;
149 }
150 awsSigningConfig.SetExpirationInSeconds(static_cast<uint64_t>(m_expirationTimeInSeconds));
151 awsSigningConfig.SetCredentials(crtCredentials);
152 return true;
153 }
154
155
156 SigningFutureOutcome sign(std::shared_ptr<HttpRequest> httpRequest, const AwsCredentialIdentityBase& identity, SigningProperties properties, const Aws::String& region, const Aws::String& svcName, long long expirationTimeInSeconds,
157 Aws::Crt::Auth::SignatureType signatureType)
158 {
159 assert(httpRequest);
160 assert(identity.expiration().has_value());
161
162 const auto legacyCreds = [&identity]() -> Aws::Auth::AWSCredentials {
163 if(identity.sessionToken().has_value() && identity.expiration().has_value())
164 {
165 return {identity.accessKeyId(), identity.secretAccessKey(), *identity.sessionToken(), *identity.expiration()};
166 }
167 if(identity.sessionToken().has_value())
168 {
169 return {identity.accessKeyId(), identity.secretAccessKey(), *identity.sessionToken()};
170 }
171 return {identity.accessKeyId(), identity.secretAccessKey()};
172 }();
173
174 auto signPayloadIt = properties.find("SignPayload");
175 bool signPayload = signPayloadIt != properties.end() ? signPayloadIt->second.get<Aws::String>() == "true" : false;
176
177 auto signerRegionOverrideIt = properties.find(smithy::SIGNER_REGION_PROPERTY);
178 auto regionOverride = signerRegionOverrideIt != properties.end() ? signerRegionOverrideIt->second.get<Aws::String>().c_str() : region.c_str();
179
180 auto signerServiceNameOverrideIt = properties.find(smithy::SIGNER_SERVICE_NAME);
181 auto serviceName = signerServiceNameOverrideIt != properties.end() ? signerServiceNameOverrideIt->second.get<Aws::String>().c_str() : svcName.c_str();
182
183 auto &request = *httpRequest;
184
185 //don't sign anonymous requests
186 if (legacyCreds.GetAWSAccessKeyId().empty() || legacyCreds.GetAWSSecretKey().empty())
187 {
188 return SigningFutureOutcome(std::move(httpRequest));
189 }
190
191 httpRequest->SetSigningAccessKey(legacyCreds.GetAWSAccessKeyId());
192 httpRequest->SetSigningRegion(regionOverride);
193
194 auto crtCredentials = Aws::MakeShared<Aws::Crt::Auth::Credentials>(v4AsymmetricLogTag,
195 Aws::Crt::ByteCursorFromCString(identity.accessKeyId().c_str()),
196 Aws::Crt::ByteCursorFromCString(identity.secretAccessKey().c_str()),
197 Aws::Crt::ByteCursorFromCString((*identity.sessionToken()).c_str()),
198 (*identity.expiration()).Seconds());
199
200 Aws::Crt::Auth::AwsSigningConfig awsSigningConfig;
201
202 bool success = createAwsSigningConfig(crtCredentials, request, serviceName, regionOverride, awsSigningConfig, signPayload, signatureType);
203
204 if(!success)
205 {
206 AWS_LOGSTREAM_ERROR(v4AsymmetricLogTag, "Failed to get Auth configuration");
207
208 return SigningError(Aws::Client::CoreErrors::MEMORY_ALLOCATION, "", "Failed to get Auth configuration", false);
209 }
210
211 awsSigningConfig.SetRegion(regionOverride);
212 awsSigningConfig.SetService(serviceName);
213 awsSigningConfig.SetExpirationInSeconds(expirationTimeInSeconds);
214
215 std::shared_ptr<Aws::Crt::Http::HttpRequest> crtHttpRequest = request.ToCrtHttpRequest();
216
217 auto sigv4HttpRequestSigner = Aws::MakeShared<Aws::Crt::Auth::Sigv4HttpRequestSigner>(v4AsymmetricLogTag);
218 //This is an async call, so we need to wait till we have received an outcome
219 Aws::String errorMessage;
220 bool processed = false;
221 //producer function
222 sigv4HttpRequestSigner->SignRequest(crtHttpRequest, awsSigningConfig,
223 [&request, &success, &errorMessage, &processed, this, signatureType](const std::shared_ptr<Aws::Crt::Http::HttpRequest>& signedCrtHttpRequest, int errorCode) {
224 std::unique_lock<std::mutex> lock(m_mutex);
225 m_cv.wait(lock, [&]{ return !processed; });
226 success = (errorCode == AWS_ERROR_SUCCESS);
227 if (success)
228 {
229 if (signatureType == Aws::Crt::Auth::SignatureType::HttpRequestViaHeaders)
230 {
231 for (size_t i = 0; i < signedCrtHttpRequest->GetHeaderCount(); i++)
232 {
233 Aws::Crt::Optional<Aws::Crt::Http::HttpHeader> httpHeader = signedCrtHttpRequest->GetHeader(i);
234 request.SetHeaderValue(Aws::String(reinterpret_cast<const char*>(httpHeader->name.ptr), httpHeader->name.len),
235 Aws::String(reinterpret_cast<const char*>(httpHeader->value.ptr), httpHeader->value.len));
236 }
237 }
238 else if (signatureType == Aws::Crt::Auth::SignatureType::HttpRequestViaQueryParams)
239 {
240 Aws::Http::URI newPath(reinterpret_cast<const char*>(signedCrtHttpRequest->GetPath()->ptr));
241 request.GetUri().SetQueryString(newPath.GetQueryString());
242 }
243 else
244 {
245 errorMessage = "No action to take when signature type is neither \"HttpRequestViaHeaders\" nor \"HttpRequestViaQueryParams\"";
246 AWS_LOGSTREAM_ERROR(v4AsymmetricLogTag, errorMessage);
247 success = false;
248 }
249 }
250 else
251 {
252 Aws::OStringStream errStream;
253 errStream << "Encountered internal error during signing process with AWS signature version 4 (Asymmetric):" << aws_error_str(errorCode);
254 errorMessage = errStream.str();
255 AWS_LOGSTREAM_ERROR(v4AsymmetricLogTag, errorMessage);
256 }
257
258 processed = true;
259 m_cv.notify_all();
260 }
261 );
262
263 //consumer
264 {
265 std::unique_lock<std::mutex> lock(m_mutex);
266 m_cv.wait(lock, [&]{ return processed; });
267
268 }
269
270 return success? SigningFutureOutcome(std::move(httpRequest)) : SigningError(Aws::Client::CoreErrors::MEMORY_ALLOCATION, "", "Failed to sign the request with sigv4", false);
271
272 }
273
274 bool ServiceRequireUnsignedPayload(const Aws::String& serviceName) const
275 {
276 // S3 uses a magic string (instead of the empty string) for its body hash for presigned URLs as outlined here:
277 // https://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-query-string-auth.html
278 // this is true for PUT, POST, GET, DELETE and HEAD operations.
279 // However, other services (for example RDS) implement the specification as outlined here:
280 // https://docs.aws.amazon.com/general/latest/gr/sigv4-create-canonical-request.html
281 // which states that body-less requests should use the empty-string SHA256 hash.
282 return "s3" == serviceName || "s3-object-lambda" == serviceName;
283 }
284
287 std::shared_ptr<Aws::Client::AWSAuthV4Signer::PayloadSigningPolicy> m_policy;
288 //params that can be exposed later
291 const bool m_urlEscape{true};
293 const Aws::Crt::Auth::SignatureType m_signatureType{Aws::Crt::Auth::SignatureType::HttpRequestViaHeaders};
294 std::condition_variable m_cv;
295 std::mutex m_mutex;
296 };
297}
virtual const std::shared_ptr< Aws::IOStream > & GetContentBody() const =0
const Aws::String & GetQueryString() const
Definition URI.h:162
Scheme GetScheme() const
Definition URI.h:66
static Aws::String ToLower(const char *source)
virtual Aws::String accessKeyId() const =0
virtual Aws::Crt::Optional< AwsIdentity::DateTime > expiration() const override=0
virtual Aws::String secretAccessKey() const =0
virtual Aws::Crt::Optional< Aws::String > sessionToken() const =0
std::condition_variable m_cv
const Aws::Crt::Auth::SignatureType m_signatureType
bool createAwsSigningConfig(std::shared_ptr< Aws::Crt::Auth::Credentials > &crtCredentials, const Aws::Http::HttpRequest &request, const Aws::String &serviceName, const Aws::String &region, Aws::Crt::Auth::AwsSigningConfig &awsSigningConfig, bool signBody, Aws::Crt::Auth::SignatureType signatureType) const
bool ServiceRequireUnsignedPayload(const Aws::String &serviceName) const
std::shared_ptr< Aws::Client::AWSAuthV4Signer::PayloadSigningPolicy > m_policy
AwsSigV4aSigner(const Aws::String &serviceName, const Aws::String &region, Aws::Client::AWSAuthV4Signer::PayloadSigningPolicy policy)
AwsSigV4aSigner(const Aws::String &serviceName, const Aws::String &region)
const Aws::Set< Aws::String > m_unsignedHeaders
long long m_expirationTimeInSeconds
const bool m_includeSha256HashHeader
AwsSigV4aSigner(const Aws::String &serviceName, const Aws::String &region, Aws::Client::AWSAuthV4Signer::PayloadSigningPolicy policy, bool urlEscape)
SigningFutureOutcome sign(std::shared_ptr< HttpRequest > httpRequest, const AwsCredentialIdentityBase &identity, SigningProperties properties) override
SigningFutureOutcome presign(std::shared_ptr< HttpRequest > httpRequest, const AwsCredentialIdentityBase &identity, SigningProperties properties, const Aws::String &region, const Aws::String &serviceName, long long expirationTimeInSeconds) override
SigningFutureOutcome sign(std::shared_ptr< HttpRequest > httpRequest, const AwsCredentialIdentityBase &identity, SigningProperties properties, const Aws::String &region, const Aws::String &svcName, long long expirationTimeInSeconds, Aws::Crt::Auth::SignatureType signatureType)
Aws::Client::AWSError< Aws::Client::CoreErrors > SigningError
Aws::Utils::FutureOutcome< std::shared_ptr< HttpRequest >, SigningError > SigningFutureOutcome
Aws::UnorderedMap< Aws::String, Aws::Crt::Variant< Aws::String, bool > > SigningProperties
virtual Aws::Utils::DateTime GetSigningTimestamp() const
AWS_CORE_API const char * ToString(Scheme scheme)
std::basic_string< char, std::char_traits< char >, Aws::Allocator< char > > String
Definition AWSString.h:97
std::set< T, std::less< T >, Aws::Allocator< T > > Set
Definition AWSSet.h:18
std::basic_ostringstream< char, std::char_traits< char >, Aws::Allocator< char > > OStringStream
static const char v4AsymmetricLogTag[]
SMITHY_API const char * SIGNER_REGION_PROPERTY
static const char * UNSIGNED_PAYLOAD
static const char * EMPTY_STRING_SHA256
SMITHY_API const char * SIGNER_SERVICE_NAME
static const char * X_AMZN_TRACE_ID
static const char * USER_AGENT