You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							276 lines
						
					
					
						
							9.0 KiB
						
					
					
				
			
		
		
		
			
			
			
		
		
	
	
							276 lines
						
					
					
						
							9.0 KiB
						
					
					
				| package policy | |
| 
 | |
| /* | |
|  * MinIO Cloud Storage, (C) 2015, 2016, 2017 MinIO, Inc. | |
|  * | |
|  * Licensed under the Apache License, Version 2.0 (the "License"); | |
|  * you may not use this file except in compliance with the License. | |
|  * You may obtain a copy of the License at | |
|  * | |
|  *     http://www.apache.org/licenses/LICENSE-2.0 | |
|  * | |
|  * Unless required by applicable law or agreed to in writing, software | |
|  * distributed under the License is distributed on an "AS IS" BASIS, | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
|  * See the License for the specific language governing permissions and | |
|  * limitations under the License. | |
|  */ | |
| 
 | |
| import ( | |
| 	"encoding/json" | |
| 	"errors" | |
| 	"fmt" | |
| 	"net/http" | |
| 	"reflect" | |
| 	"strconv" | |
| 	"strings" | |
| 	"time" | |
| ) | |
| 
 | |
| // startWithConds - map which indicates if a given condition supports starts-with policy operator | |
| var startsWithConds = map[string]bool{ | |
| 	"$acl":                     true, | |
| 	"$bucket":                  false, | |
| 	"$cache-control":           true, | |
| 	"$content-type":            true, | |
| 	"$content-disposition":     true, | |
| 	"$content-encoding":        true, | |
| 	"$expires":                 true, | |
| 	"$key":                     true, | |
| 	"$success_action_redirect": true, | |
| 	"$redirect":                true, | |
| 	"$success_action_status":   false, | |
| 	"$x-amz-algorithm":         false, | |
| 	"$x-amz-credential":        false, | |
| 	"$x-amz-date":              false, | |
| } | |
| 
 | |
| // Add policy conditionals. | |
| const ( | |
| 	policyCondEqual         = "eq" | |
| 	policyCondStartsWith    = "starts-with" | |
| 	policyCondContentLength = "content-length-range" | |
| ) | |
| 
 | |
| // toString - Safely convert interface to string without causing panic. | |
| func toString(val interface{}) string { | |
| 	switch v := val.(type) { | |
| 	case string: | |
| 		return v | |
| 	default: | |
| 		return "" | |
| 	} | |
| } | |
| 
 | |
| // toLowerString - safely convert interface to lower string | |
| func toLowerString(val interface{}) string { | |
| 	return strings.ToLower(toString(val)) | |
| } | |
| 
 | |
| // toInteger _ Safely convert interface to integer without causing panic. | |
| func toInteger(val interface{}) (int64, error) { | |
| 	switch v := val.(type) { | |
| 	case float64: | |
| 		return int64(v), nil | |
| 	case int64: | |
| 		return v, nil | |
| 	case int: | |
| 		return int64(v), nil | |
| 	case string: | |
| 		i, err := strconv.Atoi(v) | |
| 		return int64(i), err | |
| 	default: | |
| 		return 0, errors.New("Invalid number format") | |
| 	} | |
| } | |
| 
 | |
| // isString - Safely check if val is of type string without causing panic. | |
| func isString(val interface{}) bool { | |
| 	_, ok := val.(string) | |
| 	return ok | |
| } | |
| 
 | |
| // ContentLengthRange - policy content-length-range field. | |
| type contentLengthRange struct { | |
| 	Min   int64 | |
| 	Max   int64 | |
| 	Valid bool // If content-length-range was part of policy | |
| } | |
| 
 | |
| // PostPolicyForm provides strict static type conversion and validation for Amazon S3's POST policy JSON string. | |
| type PostPolicyForm struct { | |
| 	Expiration time.Time // Expiration date and time of the POST policy. | |
| 	Conditions struct {  // Conditional policy structure. | |
| 		Policies []struct { | |
| 			Operator string | |
| 			Key      string | |
| 			Value    string | |
| 		} | |
| 		ContentLengthRange contentLengthRange | |
| 	} | |
| } | |
| 
 | |
| // ParsePostPolicyForm - Parse JSON policy string into typed PostPolicyForm structure. | |
| func ParsePostPolicyForm(policy string) (ppf PostPolicyForm, e error) { | |
| 	// Convert po into interfaces and | |
| 	// perform strict type conversion using reflection. | |
| 	var rawPolicy struct { | |
| 		Expiration string        `json:"expiration"` | |
| 		Conditions []interface{} `json:"conditions"` | |
| 	} | |
| 
 | |
| 	err := json.Unmarshal([]byte(policy), &rawPolicy) | |
| 	if err != nil { | |
| 		return ppf, err | |
| 	} | |
| 
 | |
| 	parsedPolicy := PostPolicyForm{} | |
| 
 | |
| 	// Parse expiry time. | |
| 	parsedPolicy.Expiration, err = time.Parse(time.RFC3339Nano, rawPolicy.Expiration) | |
| 	if err != nil { | |
| 		return ppf, err | |
| 	} | |
| 
 | |
| 	// Parse conditions. | |
| 	for _, val := range rawPolicy.Conditions { | |
| 		switch condt := val.(type) { | |
| 		case map[string]interface{}: // Handle key:value map types. | |
| 			for k, v := range condt { | |
| 				if !isString(v) { // Pre-check value type. | |
| 					// All values must be of type string. | |
| 					return parsedPolicy, fmt.Errorf("Unknown type %s of conditional field value %s found in POST policy form", reflect.TypeOf(condt).String(), condt) | |
| 				} | |
| 				// {"acl": "public-read" } is an alternate way to indicate - [ "eq", "$acl", "public-read" ] | |
| 				// In this case we will just collapse this into "eq" for all use cases. | |
| 				parsedPolicy.Conditions.Policies = append(parsedPolicy.Conditions.Policies, struct { | |
| 					Operator string | |
| 					Key      string | |
| 					Value    string | |
| 				}{ | |
| 					policyCondEqual, "$" + strings.ToLower(k), toString(v), | |
| 				}) | |
| 			} | |
| 		case []interface{}: // Handle array types. | |
| 			if len(condt) != 3 { // Return error if we have insufficient elements. | |
| 				return parsedPolicy, fmt.Errorf("Malformed conditional fields %s of type %s found in POST policy form", condt, reflect.TypeOf(condt).String()) | |
| 			} | |
| 			switch toLowerString(condt[0]) { | |
| 			case policyCondEqual, policyCondStartsWith: | |
| 				for _, v := range condt { // Pre-check all values for type. | |
| 					if !isString(v) { | |
| 						// All values must be of type string. | |
| 						return parsedPolicy, fmt.Errorf("Unknown type %s of conditional field value %s found in POST policy form", reflect.TypeOf(condt).String(), condt) | |
| 					} | |
| 				} | |
| 				operator, matchType, value := toLowerString(condt[0]), toLowerString(condt[1]), toString(condt[2]) | |
| 				if !strings.HasPrefix(matchType, "$") { | |
| 					return parsedPolicy, fmt.Errorf("Invalid according to Policy: Policy Condition failed: [%s, %s, %s]", operator, matchType, value) | |
| 				} | |
| 				parsedPolicy.Conditions.Policies = append(parsedPolicy.Conditions.Policies, struct { | |
| 					Operator string | |
| 					Key      string | |
| 					Value    string | |
| 				}{ | |
| 					operator, matchType, value, | |
| 				}) | |
| 			case policyCondContentLength: | |
| 				min, err := toInteger(condt[1]) | |
| 				if err != nil { | |
| 					return parsedPolicy, err | |
| 				} | |
| 
 | |
| 				max, err := toInteger(condt[2]) | |
| 				if err != nil { | |
| 					return parsedPolicy, err | |
| 				} | |
| 
 | |
| 				parsedPolicy.Conditions.ContentLengthRange = contentLengthRange{ | |
| 					Min:   min, | |
| 					Max:   max, | |
| 					Valid: true, | |
| 				} | |
| 			default: | |
| 				// Condition should be valid. | |
| 				return parsedPolicy, fmt.Errorf("Unknown type %s of conditional field value %s found in POST policy form", | |
| 					reflect.TypeOf(condt).String(), condt) | |
| 			} | |
| 		default: | |
| 			return parsedPolicy, fmt.Errorf("Unknown field %s of type %s found in POST policy form", | |
| 				condt, reflect.TypeOf(condt).String()) | |
| 		} | |
| 	} | |
| 	return parsedPolicy, nil | |
| } | |
| 
 | |
| // checkPolicyCond returns a boolean to indicate if a condition is satisified according | |
| // to the passed operator | |
| func checkPolicyCond(op string, input1, input2 string) bool { | |
| 	switch op { | |
| 	case policyCondEqual: | |
| 		return input1 == input2 | |
| 	case policyCondStartsWith: | |
| 		return strings.HasPrefix(input1, input2) | |
| 	} | |
| 	return false | |
| } | |
| 
 | |
| // CheckPostPolicy - apply policy conditions and validate input values. | |
| // (http://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-HTTPPOSTConstructPolicy.html) | |
| func CheckPostPolicy(formValues http.Header, postPolicyForm PostPolicyForm) error { | |
| 	// Check if policy document expiry date is still not reached | |
| 	if !postPolicyForm.Expiration.After(time.Now().UTC()) { | |
| 		return fmt.Errorf("Invalid according to Policy: Policy expired") | |
| 	} | |
| 	// map to store the metadata | |
| 	metaMap := make(map[string]string) | |
| 	for _, policy := range postPolicyForm.Conditions.Policies { | |
| 		if strings.HasPrefix(policy.Key, "$x-amz-meta-") { | |
| 			formCanonicalName := http.CanonicalHeaderKey(strings.TrimPrefix(policy.Key, "$")) | |
| 			metaMap[formCanonicalName] = policy.Value | |
| 		} | |
| 	} | |
| 	// Check if any extra metadata field is passed as input | |
| 	for key := range formValues { | |
| 		if strings.HasPrefix(key, "X-Amz-Meta-") { | |
| 			if _, ok := metaMap[key]; !ok { | |
| 				return fmt.Errorf("Invalid according to Policy: Extra input fields: %s", key) | |
| 			} | |
| 		} | |
| 	} | |
| 
 | |
| 	// Flag to indicate if all policies conditions are satisfied | |
| 	var condPassed bool | |
| 
 | |
| 	// Iterate over policy conditions and check them against received form fields | |
| 	for _, policy := range postPolicyForm.Conditions.Policies { | |
| 		// Form fields names are in canonical format, convert conditions names | |
| 		// to canonical for simplification purpose, so `$key` will become `Key` | |
| 		formCanonicalName := http.CanonicalHeaderKey(strings.TrimPrefix(policy.Key, "$")) | |
| 		// Operator for the current policy condition | |
| 		op := policy.Operator | |
| 		// If the current policy condition is known | |
| 		if startsWithSupported, condFound := startsWithConds[policy.Key]; condFound { | |
| 			// Check if the current condition supports starts-with operator | |
| 			if op == policyCondStartsWith && !startsWithSupported { | |
| 				return fmt.Errorf("Invalid according to Policy: Policy Condition failed") | |
| 			} | |
| 			// Check if current policy condition is satisfied | |
| 			condPassed = checkPolicyCond(op, formValues.Get(formCanonicalName), policy.Value) | |
| 			if !condPassed { | |
| 				return fmt.Errorf("Invalid according to Policy: Policy Condition failed") | |
| 			} | |
| 		} else { | |
| 			// This covers all conditions X-Amz-Meta-* and X-Amz-* | |
| 			if strings.HasPrefix(policy.Key, "$x-amz-meta-") || strings.HasPrefix(policy.Key, "$x-amz-") { | |
| 				// Check if policy condition is satisfied | |
| 				condPassed = checkPolicyCond(op, formValues.Get(formCanonicalName), policy.Value) | |
| 				if !condPassed { | |
| 					return fmt.Errorf("Invalid according to Policy: Policy Condition failed: [%s, %s, %s]", op, policy.Key, policy.Value) | |
| 				} | |
| 			} | |
| 		} | |
| 	} | |
| 
 | |
| 	return nil | |
| }
 |