use super::error::SigningError;
use super::{PayloadChecksumKind, SignatureLocation};
use crate::http_request::canonical_request::header;
use crate::http_request::canonical_request::param;
use crate::http_request::canonical_request::{CanonicalRequest, StringToSign};
use crate::http_request::error::CanonicalRequestError;
use crate::http_request::SigningParams;
use crate::sign::v4;
#[cfg(feature = "sigv4a")]
use crate::sign::v4a;
use crate::{SignatureVersion, SigningOutput};
use http0::Uri;
use std::borrow::Cow;
use std::fmt::{Debug, Formatter};
use std::str;
#[derive(Debug)]
#[non_exhaustive]
pub struct SignableRequest<'a> {
method: &'a str,
uri: Uri,
headers: Vec<(&'a str, &'a str)>,
body: SignableBody<'a>,
}
impl<'a> SignableRequest<'a> {
pub fn new(
method: &'a str,
uri: impl Into<Cow<'a, str>>,
headers: impl Iterator<Item = (&'a str, &'a str)>,
body: SignableBody<'a>,
) -> Result<Self, SigningError> {
let uri = uri
.into()
.parse()
.map_err(|e| SigningError::from(CanonicalRequestError::from(e)))?;
let headers = headers.collect();
Ok(Self {
method,
uri,
headers,
body,
})
}
pub(crate) fn uri(&self) -> &Uri {
&self.uri
}
pub(crate) fn method(&self) -> &str {
self.method
}
pub(crate) fn headers(&self) -> &[(&str, &str)] {
self.headers.as_slice()
}
pub fn body(&self) -> &SignableBody<'_> {
&self.body
}
}
#[derive(Debug, Clone, Eq, PartialEq)]
#[non_exhaustive]
pub enum SignableBody<'a> {
Bytes(&'a [u8]),
UnsignedPayload,
Precomputed(String),
StreamingUnsignedPayloadTrailer,
}
#[derive(Debug)]
pub struct SigningInstructions {
headers: Vec<Header>,
params: Vec<(&'static str, Cow<'static, str>)>,
}
pub struct Header {
key: &'static str,
value: String,
sensitive: bool,
}
impl Debug for Header {
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
let mut fmt = f.debug_struct("Header");
fmt.field("key", &self.key);
let value = if self.sensitive {
"** REDACTED **"
} else {
&self.value
};
fmt.field("value", &value);
fmt.finish()
}
}
impl Header {
pub fn name(&self) -> &'static str {
self.key
}
pub fn value(&self) -> &str {
&self.value
}
pub fn sensitive(&self) -> bool {
self.sensitive
}
}
impl SigningInstructions {
fn new(headers: Vec<Header>, params: Vec<(&'static str, Cow<'static, str>)>) -> Self {
Self { headers, params }
}
pub fn into_parts(self) -> (Vec<Header>, Vec<(&'static str, Cow<'static, str>)>) {
(self.headers, self.params)
}
pub fn headers(&self) -> impl Iterator<Item = (&str, &str)> {
self.headers
.iter()
.map(|header| (header.key, header.value.as_str()))
}
pub fn params(&self) -> &[(&str, Cow<'static, str>)] {
self.params.as_slice()
}
#[cfg(any(feature = "http0-compat", test))]
pub fn apply_to_request_http0x<B>(self, request: &mut http0::Request<B>) {
let (new_headers, new_query) = self.into_parts();
for header in new_headers.into_iter() {
let mut value = http0::HeaderValue::from_str(&header.value).unwrap();
value.set_sensitive(header.sensitive);
request.headers_mut().insert(header.key, value);
}
if !new_query.is_empty() {
let mut query = aws_smithy_http::query_writer::QueryWriter::new(request.uri());
for (name, value) in new_query {
query.insert(name, &value);
}
*request.uri_mut() = query.build_uri();
}
}
#[cfg(any(feature = "http1", test))]
pub fn apply_to_request_http1x<B>(self, request: &mut http::Request<B>) {
let (new_headers, new_query) = self.into_parts();
for header in new_headers.into_iter() {
let mut value = http::HeaderValue::from_str(&header.value).unwrap();
value.set_sensitive(header.sensitive);
request.headers_mut().insert(header.key, value);
}
if !new_query.is_empty() {
let mut query = aws_smithy_http::query_writer::QueryWriter::new_from_string(
&request.uri().to_string(),
)
.expect("unreachable: URI is valid");
for (name, value) in new_query {
query.insert(name, &value);
}
*request.uri_mut() = query
.build_uri()
.to_string()
.parse()
.expect("unreachable: URI is valid");
}
}
}
pub fn sign<'a>(
request: SignableRequest<'a>,
params: &'a SigningParams<'a>,
) -> Result<SigningOutput<SigningInstructions>, SigningError> {
tracing::trace!(request = ?request, params = ?params, "signing request");
match params.settings().signature_location {
SignatureLocation::Headers => {
let (signing_headers, signature) =
calculate_signing_headers(&request, params)?.into_parts();
Ok(SigningOutput::new(
SigningInstructions::new(signing_headers, vec![]),
signature,
))
}
SignatureLocation::QueryParams => {
let (params, signature) = calculate_signing_params(&request, params)?;
Ok(SigningOutput::new(
SigningInstructions::new(vec![], params),
signature,
))
}
}
}
type CalculatedParams = Vec<(&'static str, Cow<'static, str>)>;
fn calculate_signing_params<'a>(
request: &'a SignableRequest<'a>,
params: &'a SigningParams<'a>,
) -> Result<(CalculatedParams, String), SigningError> {
let creds = params.credentials()?;
let creq = CanonicalRequest::from(request, params)?;
let encoded_creq = &v4::sha256_hex_string(creq.to_string().as_bytes());
let (signature, string_to_sign) = match params {
SigningParams::V4(params) => {
let string_to_sign =
StringToSign::new_v4(params.time, params.region, params.name, encoded_creq)
.to_string();
let signing_key = v4::generate_signing_key(
creds.secret_access_key(),
params.time,
params.region,
params.name,
);
let signature = v4::calculate_signature(signing_key, string_to_sign.as_bytes());
(signature, string_to_sign)
}
#[cfg(feature = "sigv4a")]
SigningParams::V4a(params) => {
let string_to_sign =
StringToSign::new_v4a(params.time, params.region_set, params.name, encoded_creq)
.to_string();
let secret_key =
v4a::generate_signing_key(creds.access_key_id(), creds.secret_access_key());
let signature = v4a::calculate_signature(&secret_key, string_to_sign.as_bytes());
(signature, string_to_sign)
}
};
tracing::trace!(canonical_request = %creq, string_to_sign = %string_to_sign, "calculated signing parameters");
let values = creq.values.into_query_params().expect("signing with query");
let mut signing_params = vec![
(param::X_AMZ_ALGORITHM, Cow::Borrowed(values.algorithm)),
(param::X_AMZ_CREDENTIAL, Cow::Owned(values.credential)),
(param::X_AMZ_DATE, Cow::Owned(values.date_time)),
(param::X_AMZ_EXPIRES, Cow::Owned(values.expires)),
(
param::X_AMZ_SIGNED_HEADERS,
Cow::Owned(values.signed_headers.as_str().into()),
),
(param::X_AMZ_SIGNATURE, Cow::Owned(signature.clone())),
];
#[cfg(feature = "sigv4a")]
if let Some(region_set) = params.region_set() {
if params.signature_version() == SignatureVersion::V4a {
signing_params.push((
crate::http_request::canonical_request::sigv4a::param::X_AMZ_REGION_SET,
Cow::Owned(region_set.to_owned()),
));
}
}
if let Some(security_token) = creds.session_token() {
signing_params.push((
params
.settings()
.session_token_name_override
.unwrap_or(param::X_AMZ_SECURITY_TOKEN),
Cow::Owned(security_token.to_string()),
));
}
Ok((signing_params, signature))
}
fn calculate_signing_headers<'a>(
request: &'a SignableRequest<'a>,
params: &'a SigningParams<'a>,
) -> Result<SigningOutput<Vec<Header>>, SigningError> {
let creds = params.credentials()?;
let creq = CanonicalRequest::from(request, params)?;
let encoded_creq = v4::sha256_hex_string(creq.to_string().as_bytes());
tracing::trace!(canonical_request = %creq);
let mut headers = vec![];
let signature = match params {
SigningParams::V4(params) => {
let sts = StringToSign::new_v4(
params.time,
params.region,
params.name,
encoded_creq.as_str(),
);
let signing_key = v4::generate_signing_key(
creds.secret_access_key(),
params.time,
params.region,
params.name,
);
let signature = v4::calculate_signature(signing_key, sts.to_string().as_bytes());
let values = creq.values.as_headers().expect("signing with headers");
add_header(&mut headers, header::X_AMZ_DATE, &values.date_time, false);
headers.push(Header {
key: "authorization",
value: build_authorization_header(
creds.access_key_id(),
&creq,
sts,
&signature,
SignatureVersion::V4,
),
sensitive: false,
});
if params.settings.payload_checksum_kind == PayloadChecksumKind::XAmzSha256 {
add_header(
&mut headers,
header::X_AMZ_CONTENT_SHA_256,
&values.content_sha256,
false,
);
}
if let Some(security_token) = creds.session_token() {
add_header(
&mut headers,
params
.settings
.session_token_name_override
.unwrap_or(header::X_AMZ_SECURITY_TOKEN),
security_token,
true,
);
}
signature
}
#[cfg(feature = "sigv4a")]
SigningParams::V4a(params) => {
let sts = StringToSign::new_v4a(
params.time,
params.region_set,
params.name,
encoded_creq.as_str(),
);
let signing_key =
v4a::generate_signing_key(creds.access_key_id(), creds.secret_access_key());
let signature = v4a::calculate_signature(&signing_key, sts.to_string().as_bytes());
let values = creq.values.as_headers().expect("signing with headers");
add_header(&mut headers, header::X_AMZ_DATE, &values.date_time, false);
add_header(
&mut headers,
crate::http_request::canonical_request::sigv4a::header::X_AMZ_REGION_SET,
params.region_set,
false,
);
headers.push(Header {
key: "authorization",
value: build_authorization_header(
creds.access_key_id(),
&creq,
sts,
&signature,
SignatureVersion::V4a,
),
sensitive: false,
});
if params.settings.payload_checksum_kind == PayloadChecksumKind::XAmzSha256 {
add_header(
&mut headers,
header::X_AMZ_CONTENT_SHA_256,
&values.content_sha256,
false,
);
}
if let Some(security_token) = creds.session_token() {
add_header(
&mut headers,
header::X_AMZ_SECURITY_TOKEN,
security_token,
true,
);
}
signature
}
};
Ok(SigningOutput::new(headers, signature))
}
fn add_header(map: &mut Vec<Header>, key: &'static str, value: &str, sensitive: bool) {
map.push(Header {
key,
value: value.to_string(),
sensitive,
});
}
fn build_authorization_header(
access_key: &str,
creq: &CanonicalRequest<'_>,
sts: StringToSign<'_>,
signature: &str,
signature_version: SignatureVersion,
) -> String {
let scope = match signature_version {
SignatureVersion::V4 => sts.scope.to_string(),
SignatureVersion::V4a => sts.scope.v4a_display(),
};
format!(
"{} Credential={}/{}, SignedHeaders={}, Signature={}",
sts.algorithm,
access_key,
scope,
creq.values.signed_headers().as_str(),
signature
)
}
#[cfg(test)]
mod tests {
use crate::date_time::test_parsers::parse_date_time;
use crate::http_request::sign::{add_header, SignableRequest};
use crate::http_request::{
sign, test, SessionTokenMode, SignableBody, SignatureLocation, SigningInstructions,
SigningSettings,
};
use crate::sign::v4;
use aws_credential_types::Credentials;
use http0::{HeaderValue, Request};
use pretty_assertions::assert_eq;
use proptest::proptest;
use std::borrow::Cow;
use std::iter;
use std::time::Duration;
macro_rules! assert_req_eq {
(http: $expected:expr, $actual:expr) => {
let mut expected = ($expected).map(|_b|"body");
let mut actual = ($actual).map(|_b|"body");
make_headers_comparable(&mut expected);
make_headers_comparable(&mut actual);
assert_eq!(format!("{:?}", expected), format!("{:?}", actual));
};
($expected:tt, $actual:tt) => {
assert_req_eq!(http: ($expected).as_http_request(), $actual);
};
}
pub(crate) fn make_headers_comparable<B>(request: &mut Request<B>) {
for (_name, value) in request.headers_mut() {
value.set_sensitive(false);
}
}
#[test]
fn test_sign_vanilla_with_headers() {
let settings = SigningSettings::default();
let identity = &Credentials::for_tests().into();
let params = v4::SigningParams {
identity,
region: "us-east-1",
name: "service",
time: parse_date_time("20150830T123600Z").unwrap(),
settings,
}
.into();
let original = test::v4::test_request("get-vanilla-query-order-key-case");
let signable = SignableRequest::from(&original);
let out = sign(signable, ¶ms).unwrap();
assert_eq!(
"5557820e7380d585310524bd93d51a08d7757fb5efd7344ee12088f2b0860947",
out.signature
);
let mut signed = original.as_http_request();
out.output.apply_to_request_http0x(&mut signed);
let expected = test::v4::test_signed_request("get-vanilla-query-order-key-case");
assert_req_eq!(expected, signed);
}
#[cfg(feature = "sigv4a")]
mod sigv4a_tests {
use super::*;
use crate::http_request::canonical_request::{CanonicalRequest, StringToSign};
use crate::http_request::{sign, test, SigningParams};
use crate::sign::v4a;
use p256::ecdsa::signature::{Signature, Verifier};
use p256::ecdsa::{DerSignature, SigningKey};
use pretty_assertions::assert_eq;
fn new_v4a_signing_params_from_context(
test_context: &'_ test::v4a::TestContext,
signature_location: SignatureLocation,
) -> SigningParams<'_> {
let mut params = v4a::SigningParams::from(test_context);
params.settings.signature_location = signature_location;
params.into()
}
fn run_v4a_test_suite(test_name: &str, signature_location: SignatureLocation) {
let tc = test::v4a::test_context(test_name);
let params = new_v4a_signing_params_from_context(&tc, signature_location);
let req = test::v4a::test_request(test_name);
let expected_creq = test::v4a::test_canonical_request(test_name, signature_location);
let signable_req = SignableRequest::from(&req);
let actual_creq = CanonicalRequest::from(&signable_req, ¶ms).unwrap();
assert_eq!(expected_creq, actual_creq.to_string(), "creq didn't match");
let expected_string_to_sign =
test::v4a::test_string_to_sign(test_name, signature_location);
let hashed_creq = &v4::sha256_hex_string(actual_creq.to_string().as_bytes());
let actual_string_to_sign = StringToSign::new_v4a(
*params.time(),
params.region_set().unwrap(),
params.name(),
hashed_creq,
)
.to_string();
assert_eq!(
expected_string_to_sign, actual_string_to_sign,
"'string to sign' didn't match"
);
let out = sign(signable_req, ¶ms).unwrap();
out.output
.apply_to_request_http0x(&mut req.as_http_request());
let creds = params.credentials().unwrap();
let signing_key =
v4a::generate_signing_key(creds.access_key_id(), creds.secret_access_key());
let sig = DerSignature::from_bytes(&hex::decode(out.signature).unwrap()).unwrap();
let sig = sig
.try_into()
.expect("DER-style signatures are always convertible into fixed-size signatures");
let signing_key = SigningKey::from_bytes(signing_key.as_ref()).unwrap();
let peer_public_key = signing_key.verifying_key();
let sts = actual_string_to_sign.as_bytes();
peer_public_key.verify(sts, &sig).unwrap();
}
#[test]
fn test_get_header_key_duplicate() {
run_v4a_test_suite("get-header-key-duplicate", SignatureLocation::Headers);
}
#[test]
fn test_get_header_value_order() {
run_v4a_test_suite("get-header-value-order", SignatureLocation::Headers);
}
#[test]
fn test_get_header_value_trim() {
run_v4a_test_suite("get-header-value-trim", SignatureLocation::Headers);
}
#[test]
fn test_get_relative_normalized() {
run_v4a_test_suite("get-relative-normalized", SignatureLocation::Headers);
}
#[test]
fn test_get_relative_relative_normalized() {
run_v4a_test_suite(
"get-relative-relative-normalized",
SignatureLocation::Headers,
);
}
#[test]
fn test_get_relative_relative_unnormalized() {
run_v4a_test_suite(
"get-relative-relative-unnormalized",
SignatureLocation::Headers,
);
}
#[test]
fn test_get_relative_unnormalized() {
run_v4a_test_suite("get-relative-unnormalized", SignatureLocation::Headers);
}
#[test]
fn test_get_slash_dot_slash_normalized() {
run_v4a_test_suite("get-slash-dot-slash-normalized", SignatureLocation::Headers);
}
#[test]
fn test_get_slash_dot_slash_unnormalized() {
run_v4a_test_suite(
"get-slash-dot-slash-unnormalized",
SignatureLocation::Headers,
);
}
#[test]
fn test_get_slash_normalized() {
run_v4a_test_suite("get-slash-normalized", SignatureLocation::Headers);
}
#[test]
fn test_get_slash_pointless_dot_normalized() {
run_v4a_test_suite(
"get-slash-pointless-dot-normalized",
SignatureLocation::Headers,
);
}
#[test]
fn test_get_slash_pointless_dot_unnormalized() {
run_v4a_test_suite(
"get-slash-pointless-dot-unnormalized",
SignatureLocation::Headers,
);
}
#[test]
fn test_get_slash_unnormalized() {
run_v4a_test_suite("get-slash-unnormalized", SignatureLocation::Headers);
}
#[test]
fn test_get_slashes_normalized() {
run_v4a_test_suite("get-slashes-normalized", SignatureLocation::Headers);
}
#[test]
fn test_get_slashes_unnormalized() {
run_v4a_test_suite("get-slashes-unnormalized", SignatureLocation::Headers);
}
#[test]
fn test_get_unreserved() {
run_v4a_test_suite("get-unreserved", SignatureLocation::Headers);
}
#[test]
fn test_get_vanilla() {
run_v4a_test_suite("get-vanilla", SignatureLocation::Headers);
}
#[test]
fn test_get_vanilla_empty_query_key() {
run_v4a_test_suite(
"get-vanilla-empty-query-key",
SignatureLocation::QueryParams,
);
}
#[test]
fn test_get_vanilla_query() {
run_v4a_test_suite("get-vanilla-query", SignatureLocation::QueryParams);
}
#[test]
fn test_get_vanilla_query_order_key_case() {
run_v4a_test_suite(
"get-vanilla-query-order-key-case",
SignatureLocation::QueryParams,
);
}
#[test]
fn test_get_vanilla_query_unreserved() {
run_v4a_test_suite(
"get-vanilla-query-unreserved",
SignatureLocation::QueryParams,
);
}
#[test]
fn test_get_vanilla_with_session_token() {
run_v4a_test_suite("get-vanilla-with-session-token", SignatureLocation::Headers);
}
#[test]
fn test_post_header_key_case() {
run_v4a_test_suite("post-header-key-case", SignatureLocation::Headers);
}
#[test]
fn test_post_header_key_sort() {
run_v4a_test_suite("post-header-key-sort", SignatureLocation::Headers);
}
#[test]
fn test_post_header_value_case() {
run_v4a_test_suite("post-header-value-case", SignatureLocation::Headers);
}
#[test]
fn test_post_sts_header_after() {
run_v4a_test_suite("post-sts-header-after", SignatureLocation::Headers);
}
#[test]
fn test_post_sts_header_before() {
run_v4a_test_suite("post-sts-header-before", SignatureLocation::Headers);
}
#[test]
fn test_post_vanilla() {
run_v4a_test_suite("post-vanilla", SignatureLocation::Headers);
}
#[test]
fn test_post_vanilla_empty_query_value() {
run_v4a_test_suite(
"post-vanilla-empty-query-value",
SignatureLocation::QueryParams,
);
}
#[test]
fn test_post_vanilla_query() {
run_v4a_test_suite("post-vanilla-query", SignatureLocation::QueryParams);
}
#[test]
fn test_post_x_www_form_urlencoded() {
run_v4a_test_suite("post-x-www-form-urlencoded", SignatureLocation::Headers);
}
#[test]
fn test_post_x_www_form_urlencoded_parameters() {
run_v4a_test_suite(
"post-x-www-form-urlencoded-parameters",
SignatureLocation::QueryParams,
);
}
}
#[test]
fn test_sign_url_escape() {
let test = "double-encode-path";
let settings = SigningSettings::default();
let identity = &Credentials::for_tests().into();
let params = v4::SigningParams {
identity,
region: "us-east-1",
name: "service",
time: parse_date_time("20150830T123600Z").unwrap(),
settings,
}
.into();
let original = test::v4::test_request(test);
let signable = SignableRequest::from(&original);
let out = sign(signable, ¶ms).unwrap();
assert_eq!(
"57d157672191bac40bae387e48bbe14b15303c001fdbb01f4abf295dccb09705",
out.signature
);
let mut signed = original.as_http_request();
out.output.apply_to_request_http0x(&mut signed);
let expected = test::v4::test_signed_request(test);
assert_req_eq!(expected, signed);
}
#[test]
fn test_sign_vanilla_with_query_params() {
let settings = SigningSettings {
signature_location: SignatureLocation::QueryParams,
expires_in: Some(Duration::from_secs(35)),
..Default::default()
};
let identity = &Credentials::for_tests().into();
let params = v4::SigningParams {
identity,
region: "us-east-1",
name: "service",
time: parse_date_time("20150830T123600Z").unwrap(),
settings,
}
.into();
let original = test::v4::test_request("get-vanilla-query-order-key-case");
let signable = SignableRequest::from(&original);
let out = sign(signable, ¶ms).unwrap();
assert_eq!(
"ecce208e4b4f7d7e3a4cc22ced6acc2ad1d170ee8ba87d7165f6fa4b9aff09ab",
out.signature
);
let mut signed = original.as_http_request();
out.output.apply_to_request_http0x(&mut signed);
let expected =
test::v4::test_signed_request_query_params("get-vanilla-query-order-key-case");
assert_req_eq!(expected, signed);
}
#[test]
fn test_sign_headers_utf8() {
let settings = SigningSettings::default();
let identity = &Credentials::for_tests().into();
let params = v4::SigningParams {
identity,
region: "us-east-1",
name: "service",
time: parse_date_time("20150830T123600Z").unwrap(),
settings,
}
.into();
let original = http0::Request::builder()
.uri("https://some-endpoint.some-region.amazonaws.com")
.header("some-header", HeaderValue::from_str("テスト").unwrap())
.body("")
.unwrap()
.into();
let signable = SignableRequest::from(&original);
let out = sign(signable, ¶ms).unwrap();
assert_eq!(
"55e16b31f9bde5fd04f9d3b780dd2b5e5f11a5219001f91a8ca9ec83eaf1618f",
out.signature
);
let mut signed = original.as_http_request();
out.output.apply_to_request_http0x(&mut signed);
let expected = http0::Request::builder()
.uri("https://some-endpoint.some-region.amazonaws.com")
.header("some-header", HeaderValue::from_str("テスト").unwrap())
.header(
"x-amz-date",
HeaderValue::from_str("20150830T123600Z").unwrap(),
)
.header(
"authorization",
HeaderValue::from_str(
"AWS4-HMAC-SHA256 \
Credential=ANOTREAL/20150830/us-east-1/service/aws4_request, \
SignedHeaders=host;some-header;x-amz-date, \
Signature=55e16b31f9bde5fd04f9d3b780dd2b5e5f11a5219001f91a8ca9ec83eaf1618f",
)
.unwrap(),
)
.body("")
.unwrap();
assert_req_eq!(http: expected, signed);
}
#[test]
fn test_sign_headers_excluding_session_token() {
let settings = SigningSettings {
session_token_mode: SessionTokenMode::Exclude,
..Default::default()
};
let identity = &Credentials::for_tests_with_session_token().into();
let params = v4::SigningParams {
identity,
region: "us-east-1",
name: "service",
time: parse_date_time("20150830T123600Z").unwrap(),
settings,
}
.into();
let original = http0::Request::builder()
.uri("https://some-endpoint.some-region.amazonaws.com")
.body("")
.unwrap()
.into();
let out_without_session_token = sign(SignableRequest::from(&original), ¶ms).unwrap();
let out_with_session_token_but_excluded =
sign(SignableRequest::from(&original), ¶ms).unwrap();
assert_eq!(
"ab32de057edf094958d178b3c91f3c8d5c296d526b11da991cd5773d09cea560",
out_with_session_token_but_excluded.signature
);
assert_eq!(
out_with_session_token_but_excluded.signature,
out_without_session_token.signature
);
let mut signed = original.as_http_request();
out_with_session_token_but_excluded
.output
.apply_to_request_http0x(&mut signed);
let expected = http0::Request::builder()
.uri("https://some-endpoint.some-region.amazonaws.com")
.header(
"x-amz-date",
HeaderValue::from_str("20150830T123600Z").unwrap(),
)
.header(
"authorization",
HeaderValue::from_str(
"AWS4-HMAC-SHA256 \
Credential=ANOTREAL/20150830/us-east-1/service/aws4_request, \
SignedHeaders=host;x-amz-date, \
Signature=ab32de057edf094958d178b3c91f3c8d5c296d526b11da991cd5773d09cea560",
)
.unwrap(),
)
.header(
"x-amz-security-token",
HeaderValue::from_str("notarealsessiontoken").unwrap(),
)
.body(b"")
.unwrap();
assert_req_eq!(http: expected, signed);
}
#[test]
fn test_sign_headers_space_trimming() {
let settings = SigningSettings::default();
let identity = &Credentials::for_tests().into();
let params = v4::SigningParams {
identity,
region: "us-east-1",
name: "service",
time: parse_date_time("20150830T123600Z").unwrap(),
settings,
}
.into();
let original = http0::Request::builder()
.uri("https://some-endpoint.some-region.amazonaws.com")
.header(
"some-header",
HeaderValue::from_str(" test test ").unwrap(),
)
.body("")
.unwrap()
.into();
let signable = SignableRequest::from(&original);
let out = sign(signable, ¶ms).unwrap();
assert_eq!(
"244f2a0db34c97a528f22715fe01b2417b7750c8a95c7fc104a3c48d81d84c08",
out.signature
);
let mut signed = original.as_http_request();
out.output.apply_to_request_http0x(&mut signed);
let expected = http0::Request::builder()
.uri("https://some-endpoint.some-region.amazonaws.com")
.header(
"some-header",
HeaderValue::from_str(" test test ").unwrap(),
)
.header(
"x-amz-date",
HeaderValue::from_str("20150830T123600Z").unwrap(),
)
.header(
"authorization",
HeaderValue::from_str(
"AWS4-HMAC-SHA256 \
Credential=ANOTREAL/20150830/us-east-1/service/aws4_request, \
SignedHeaders=host;some-header;x-amz-date, \
Signature=244f2a0db34c97a528f22715fe01b2417b7750c8a95c7fc104a3c48d81d84c08",
)
.unwrap(),
)
.body("")
.unwrap();
assert_req_eq!(http: expected, signed);
}
proptest! {
#[test]
fn test_sign_headers_no_panic(
header in ".*"
) {
let settings = SigningSettings::default();
let identity = &Credentials::for_tests().into();
let params = v4::SigningParams {
identity,
region: "us-east-1",
name: "foo",
time: std::time::SystemTime::UNIX_EPOCH,
settings,
}.into();
let req = SignableRequest::new(
"GET",
"https://foo.com",
iter::once(("x-sign-me", header.as_str())),
SignableBody::Bytes(&[])
);
if let Ok(req) = req {
let _creq = crate::http_request::sign(req, ¶ms);
}
}
}
#[test]
fn apply_signing_instructions_headers() {
let mut headers = vec![];
add_header(&mut headers, "some-header", "foo", false);
add_header(&mut headers, "some-other-header", "bar", false);
let instructions = SigningInstructions::new(headers, vec![]);
let mut request = http0::Request::builder()
.uri("https://some-endpoint.some-region.amazonaws.com")
.body("")
.unwrap();
instructions.apply_to_request_http0x(&mut request);
let get_header = |n: &str| request.headers().get(n).unwrap().to_str().unwrap();
assert_eq!("foo", get_header("some-header"));
assert_eq!("bar", get_header("some-other-header"));
}
#[test]
fn apply_signing_instructions_query_params() {
let params = vec![
("some-param", Cow::Borrowed("f&o?o")),
("some-other-param?", Cow::Borrowed("bar")),
];
let instructions = SigningInstructions::new(vec![], params);
let mut request = http0::Request::builder()
.uri("https://some-endpoint.some-region.amazonaws.com/some/path")
.body("")
.unwrap();
instructions.apply_to_request_http0x(&mut request);
assert_eq!(
"/some/path?some-param=f%26o%3Fo&some-other-param%3F=bar",
request.uri().path_and_query().unwrap().to_string()
);
}
#[test]
fn apply_signing_instructions_query_params_http_1x() {
let params = vec![
("some-param", Cow::Borrowed("f&o?o")),
("some-other-param?", Cow::Borrowed("bar")),
];
let instructions = SigningInstructions::new(vec![], params);
let mut request = http::Request::builder()
.uri("https://some-endpoint.some-region.amazonaws.com/some/path")
.body("")
.unwrap();
instructions.apply_to_request_http1x(&mut request);
assert_eq!(
"/some/path?some-param=f%26o%3Fo&some-other-param%3F=bar",
request.uri().path_and_query().unwrap().to_string()
);
}
}