You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							276 lines
						
					
					
						
							9.0 KiB
						
					
					
				
			
		
		
		
			
			
			
		
		
	
	
							276 lines
						
					
					
						
							9.0 KiB
						
					
					
				
								package policy
							 | 
						|
								
							 | 
						|
								/*
							 | 
						|
								 * MinIO Cloud Storage, (C) 2015, 2016, 2017 MinIO, Inc.
							 | 
						|
								 *
							 | 
						|
								 * Licensed under the Apache License, Version 2.0 (the "License");
							 | 
						|
								 * you may not use this file except in compliance with the License.
							 | 
						|
								 * You may obtain a copy of the License at
							 | 
						|
								 *
							 | 
						|
								 *     http://www.apache.org/licenses/LICENSE-2.0
							 | 
						|
								 *
							 | 
						|
								 * Unless required by applicable law or agreed to in writing, software
							 | 
						|
								 * distributed under the License is distributed on an "AS IS" BASIS,
							 | 
						|
								 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
							 | 
						|
								 * See the License for the specific language governing permissions and
							 | 
						|
								 * limitations under the License.
							 | 
						|
								 */
							 | 
						|
								
							 | 
						|
								import (
							 | 
						|
									"encoding/json"
							 | 
						|
									"errors"
							 | 
						|
									"fmt"
							 | 
						|
									"net/http"
							 | 
						|
									"reflect"
							 | 
						|
									"strconv"
							 | 
						|
									"strings"
							 | 
						|
									"time"
							 | 
						|
								)
							 | 
						|
								
							 | 
						|
								// startWithConds - map which indicates if a given condition supports starts-with policy operator
							 | 
						|
								var startsWithConds = map[string]bool{
							 | 
						|
									"$acl":                     true,
							 | 
						|
									"$bucket":                  false,
							 | 
						|
									"$cache-control":           true,
							 | 
						|
									"$content-type":            true,
							 | 
						|
									"$content-disposition":     true,
							 | 
						|
									"$content-encoding":        true,
							 | 
						|
									"$expires":                 true,
							 | 
						|
									"$key":                     true,
							 | 
						|
									"$success_action_redirect": true,
							 | 
						|
									"$redirect":                true,
							 | 
						|
									"$success_action_status":   false,
							 | 
						|
									"$x-amz-algorithm":         false,
							 | 
						|
									"$x-amz-credential":        false,
							 | 
						|
									"$x-amz-date":              false,
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// Add policy conditionals.
							 | 
						|
								const (
							 | 
						|
									policyCondEqual         = "eq"
							 | 
						|
									policyCondStartsWith    = "starts-with"
							 | 
						|
									policyCondContentLength = "content-length-range"
							 | 
						|
								)
							 | 
						|
								
							 | 
						|
								// toString - Safely convert interface to string without causing panic.
							 | 
						|
								func toString(val interface{}) string {
							 | 
						|
									switch v := val.(type) {
							 | 
						|
									case string:
							 | 
						|
										return v
							 | 
						|
									default:
							 | 
						|
										return ""
							 | 
						|
									}
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// toLowerString - safely convert interface to lower string
							 | 
						|
								func toLowerString(val interface{}) string {
							 | 
						|
									return strings.ToLower(toString(val))
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// toInteger _ Safely convert interface to integer without causing panic.
							 | 
						|
								func toInteger(val interface{}) (int64, error) {
							 | 
						|
									switch v := val.(type) {
							 | 
						|
									case float64:
							 | 
						|
										return int64(v), nil
							 | 
						|
									case int64:
							 | 
						|
										return v, nil
							 | 
						|
									case int:
							 | 
						|
										return int64(v), nil
							 | 
						|
									case string:
							 | 
						|
										i, err := strconv.Atoi(v)
							 | 
						|
										return int64(i), err
							 | 
						|
									default:
							 | 
						|
										return 0, errors.New("Invalid number format")
							 | 
						|
									}
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// isString - Safely check if val is of type string without causing panic.
							 | 
						|
								func isString(val interface{}) bool {
							 | 
						|
									_, ok := val.(string)
							 | 
						|
									return ok
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// ContentLengthRange - policy content-length-range field.
							 | 
						|
								type contentLengthRange struct {
							 | 
						|
									Min   int64
							 | 
						|
									Max   int64
							 | 
						|
									Valid bool // If content-length-range was part of policy
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// PostPolicyForm provides strict static type conversion and validation for Amazon S3's POST policy JSON string.
							 | 
						|
								type PostPolicyForm struct {
							 | 
						|
									Expiration time.Time // Expiration date and time of the POST policy.
							 | 
						|
									Conditions struct {  // Conditional policy structure.
							 | 
						|
										Policies []struct {
							 | 
						|
											Operator string
							 | 
						|
											Key      string
							 | 
						|
											Value    string
							 | 
						|
										}
							 | 
						|
										ContentLengthRange contentLengthRange
							 | 
						|
									}
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// ParsePostPolicyForm - Parse JSON policy string into typed PostPolicyForm structure.
							 | 
						|
								func ParsePostPolicyForm(policy string) (ppf PostPolicyForm, e error) {
							 | 
						|
									// Convert po into interfaces and
							 | 
						|
									// perform strict type conversion using reflection.
							 | 
						|
									var rawPolicy struct {
							 | 
						|
										Expiration string        `json:"expiration"`
							 | 
						|
										Conditions []interface{} `json:"conditions"`
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									err := json.Unmarshal([]byte(policy), &rawPolicy)
							 | 
						|
									if err != nil {
							 | 
						|
										return ppf, err
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									parsedPolicy := PostPolicyForm{}
							 | 
						|
								
							 | 
						|
									// Parse expiry time.
							 | 
						|
									parsedPolicy.Expiration, err = time.Parse(time.RFC3339Nano, rawPolicy.Expiration)
							 | 
						|
									if err != nil {
							 | 
						|
										return ppf, err
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Parse conditions.
							 | 
						|
									for _, val := range rawPolicy.Conditions {
							 | 
						|
										switch condt := val.(type) {
							 | 
						|
										case map[string]interface{}: // Handle key:value map types.
							 | 
						|
											for k, v := range condt {
							 | 
						|
												if !isString(v) { // Pre-check value type.
							 | 
						|
													// All values must be of type string.
							 | 
						|
													return parsedPolicy, fmt.Errorf("Unknown type %s of conditional field value %s found in POST policy form", reflect.TypeOf(condt).String(), condt)
							 | 
						|
												}
							 | 
						|
												// {"acl": "public-read" } is an alternate way to indicate - [ "eq", "$acl", "public-read" ]
							 | 
						|
												// In this case we will just collapse this into "eq" for all use cases.
							 | 
						|
												parsedPolicy.Conditions.Policies = append(parsedPolicy.Conditions.Policies, struct {
							 | 
						|
													Operator string
							 | 
						|
													Key      string
							 | 
						|
													Value    string
							 | 
						|
												}{
							 | 
						|
													policyCondEqual, "$" + strings.ToLower(k), toString(v),
							 | 
						|
												})
							 | 
						|
											}
							 | 
						|
										case []interface{}: // Handle array types.
							 | 
						|
											if len(condt) != 3 { // Return error if we have insufficient elements.
							 | 
						|
												return parsedPolicy, fmt.Errorf("Malformed conditional fields %s of type %s found in POST policy form", condt, reflect.TypeOf(condt).String())
							 | 
						|
											}
							 | 
						|
											switch toLowerString(condt[0]) {
							 | 
						|
											case policyCondEqual, policyCondStartsWith:
							 | 
						|
												for _, v := range condt { // Pre-check all values for type.
							 | 
						|
													if !isString(v) {
							 | 
						|
														// All values must be of type string.
							 | 
						|
														return parsedPolicy, fmt.Errorf("Unknown type %s of conditional field value %s found in POST policy form", reflect.TypeOf(condt).String(), condt)
							 | 
						|
													}
							 | 
						|
												}
							 | 
						|
												operator, matchType, value := toLowerString(condt[0]), toLowerString(condt[1]), toString(condt[2])
							 | 
						|
												if !strings.HasPrefix(matchType, "$") {
							 | 
						|
													return parsedPolicy, fmt.Errorf("Invalid according to Policy: Policy Condition failed: [%s, %s, %s]", operator, matchType, value)
							 | 
						|
												}
							 | 
						|
												parsedPolicy.Conditions.Policies = append(parsedPolicy.Conditions.Policies, struct {
							 | 
						|
													Operator string
							 | 
						|
													Key      string
							 | 
						|
													Value    string
							 | 
						|
												}{
							 | 
						|
													operator, matchType, value,
							 | 
						|
												})
							 | 
						|
											case policyCondContentLength:
							 | 
						|
												min, err := toInteger(condt[1])
							 | 
						|
												if err != nil {
							 | 
						|
													return parsedPolicy, err
							 | 
						|
												}
							 | 
						|
								
							 | 
						|
												max, err := toInteger(condt[2])
							 | 
						|
												if err != nil {
							 | 
						|
													return parsedPolicy, err
							 | 
						|
												}
							 | 
						|
								
							 | 
						|
												parsedPolicy.Conditions.ContentLengthRange = contentLengthRange{
							 | 
						|
													Min:   min,
							 | 
						|
													Max:   max,
							 | 
						|
													Valid: true,
							 | 
						|
												}
							 | 
						|
											default:
							 | 
						|
												// Condition should be valid.
							 | 
						|
												return parsedPolicy, fmt.Errorf("Unknown type %s of conditional field value %s found in POST policy form",
							 | 
						|
													reflect.TypeOf(condt).String(), condt)
							 | 
						|
											}
							 | 
						|
										default:
							 | 
						|
											return parsedPolicy, fmt.Errorf("Unknown field %s of type %s found in POST policy form",
							 | 
						|
												condt, reflect.TypeOf(condt).String())
							 | 
						|
										}
							 | 
						|
									}
							 | 
						|
									return parsedPolicy, nil
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// checkPolicyCond returns a boolean to indicate if a condition is satisfied according
							 | 
						|
								// to the passed operator
							 | 
						|
								func checkPolicyCond(op string, input1, input2 string) bool {
							 | 
						|
									switch op {
							 | 
						|
									case policyCondEqual:
							 | 
						|
										return input1 == input2
							 | 
						|
									case policyCondStartsWith:
							 | 
						|
										return strings.HasPrefix(input1, input2)
							 | 
						|
									}
							 | 
						|
									return false
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// CheckPostPolicy - apply policy conditions and validate input values.
							 | 
						|
								// (http://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-HTTPPOSTConstructPolicy.html)
							 | 
						|
								func CheckPostPolicy(formValues http.Header, postPolicyForm PostPolicyForm) error {
							 | 
						|
									// Check if policy document expiry date is still not reached
							 | 
						|
									if !postPolicyForm.Expiration.After(time.Now().UTC()) {
							 | 
						|
										return fmt.Errorf("Invalid according to Policy: Policy expired")
							 | 
						|
									}
							 | 
						|
									// map to store the metadata
							 | 
						|
									metaMap := make(map[string]string)
							 | 
						|
									for _, policy := range postPolicyForm.Conditions.Policies {
							 | 
						|
										if strings.HasPrefix(policy.Key, "$x-amz-meta-") {
							 | 
						|
											formCanonicalName := http.CanonicalHeaderKey(strings.TrimPrefix(policy.Key, "$"))
							 | 
						|
											metaMap[formCanonicalName] = policy.Value
							 | 
						|
										}
							 | 
						|
									}
							 | 
						|
									// Check if any extra metadata field is passed as input
							 | 
						|
									for key := range formValues {
							 | 
						|
										if strings.HasPrefix(key, "X-Amz-Meta-") {
							 | 
						|
											if _, ok := metaMap[key]; !ok {
							 | 
						|
												return fmt.Errorf("Invalid according to Policy: Extra input fields: %s", key)
							 | 
						|
											}
							 | 
						|
										}
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Flag to indicate if all policies conditions are satisfied
							 | 
						|
									var condPassed bool
							 | 
						|
								
							 | 
						|
									// Iterate over policy conditions and check them against received form fields
							 | 
						|
									for _, policy := range postPolicyForm.Conditions.Policies {
							 | 
						|
										// Form fields names are in canonical format, convert conditions names
							 | 
						|
										// to canonical for simplification purpose, so `$key` will become `Key`
							 | 
						|
										formCanonicalName := http.CanonicalHeaderKey(strings.TrimPrefix(policy.Key, "$"))
							 | 
						|
										// Operator for the current policy condition
							 | 
						|
										op := policy.Operator
							 | 
						|
										// If the current policy condition is known
							 | 
						|
										if startsWithSupported, condFound := startsWithConds[policy.Key]; condFound {
							 | 
						|
											// Check if the current condition supports starts-with operator
							 | 
						|
											if op == policyCondStartsWith && !startsWithSupported {
							 | 
						|
												return fmt.Errorf("Invalid according to Policy: Policy Condition failed")
							 | 
						|
											}
							 | 
						|
											// Check if current policy condition is satisfied
							 | 
						|
											condPassed = checkPolicyCond(op, formValues.Get(formCanonicalName), policy.Value)
							 | 
						|
											if !condPassed {
							 | 
						|
												return fmt.Errorf("Invalid according to Policy: Policy Condition failed")
							 | 
						|
											}
							 | 
						|
										} else {
							 | 
						|
											// This covers all conditions X-Amz-Meta-* and X-Amz-*
							 | 
						|
											if strings.HasPrefix(policy.Key, "$x-amz-meta-") || strings.HasPrefix(policy.Key, "$x-amz-") {
							 | 
						|
												// Check if policy condition is satisfied
							 | 
						|
												condPassed = checkPolicyCond(op, formValues.Get(formCanonicalName), policy.Value)
							 | 
						|
												if !condPassed {
							 | 
						|
													return fmt.Errorf("Invalid according to Policy: Policy Condition failed: [%s, %s, %s]", op, policy.Key, policy.Value)
							 | 
						|
												}
							 | 
						|
											}
							 | 
						|
										}
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									return nil
							 | 
						|
								}
							 |