2019-07-04 02:35:59 +03:00
|
|
|
require 'base64'
|
|
|
|
require 'digest'
|
|
|
|
require 'openssl'
|
|
|
|
|
|
|
|
##
|
|
|
|
# S3URISigner implements AWS SigV4 for S3 Source to avoid a dependency on the aws-sdk-* gems
|
|
|
|
# More on AWS SigV4: https://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html
|
|
|
|
class Gem::S3URISigner
|
|
|
|
|
|
|
|
class ConfigurationError < Gem::Exception
|
|
|
|
|
|
|
|
def initialize(message)
|
|
|
|
super message
|
|
|
|
end
|
|
|
|
|
|
|
|
def to_s # :nodoc:
|
|
|
|
"#{super}"
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
class InstanceProfileError < Gem::Exception
|
|
|
|
|
|
|
|
def initialize(message)
|
|
|
|
super message
|
|
|
|
end
|
|
|
|
|
|
|
|
def to_s # :nodoc:
|
|
|
|
"#{super}"
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
attr_accessor :uri
|
|
|
|
|
|
|
|
def initialize(uri)
|
|
|
|
@uri = uri
|
|
|
|
end
|
|
|
|
|
|
|
|
##
|
|
|
|
# Signs S3 URI using query-params according to the reference: https://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-query-string-auth.html
|
2019-07-06 23:05:43 +03:00
|
|
|
def sign(expiration = 86400)
|
2019-07-04 02:35:59 +03:00
|
|
|
s3_config = fetch_s3_config
|
|
|
|
|
|
|
|
current_time = Time.now.utc
|
|
|
|
date_time = current_time.strftime("%Y%m%dT%H%m%SZ")
|
|
|
|
date = date_time[0,8]
|
|
|
|
|
|
|
|
credential_info = "#{date}/#{s3_config.region}/s3/aws4_request"
|
|
|
|
canonical_host = "#{uri.host}.s3.#{s3_config.region}.amazonaws.com"
|
|
|
|
|
2019-07-10 04:52:54 +03:00
|
|
|
uri.query = generate_canonical_query_params(s3_config, date_time, credential_info, expiration)
|
|
|
|
canonical_request = generate_canonical_request(canonical_host)
|
|
|
|
string_to_sign = generate_string_to_sign(date_time, credential_info, canonical_request)
|
|
|
|
signature = generate_signature(s3_config, date, string_to_sign)
|
|
|
|
|
|
|
|
URI.parse("https://#{canonical_host}#{uri.path}?#{uri.query}&X-Amz-Signature=#{signature}")
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
S3Config = Struct.new :access_key_id, :secret_access_key, :security_token, :region
|
|
|
|
|
|
|
|
def generate_canonical_query_params(s3_config, date_time, credential_info, expiration)
|
2019-07-04 02:35:59 +03:00
|
|
|
canonical_params = {}
|
|
|
|
canonical_params["X-Amz-Algorithm"] = "AWS4-HMAC-SHA256"
|
|
|
|
canonical_params["X-Amz-Credential"] = "#{s3_config.access_key_id}/#{credential_info}"
|
|
|
|
canonical_params["X-Amz-Date"] = date_time
|
|
|
|
canonical_params["X-Amz-Expires"] = expiration.to_s
|
|
|
|
canonical_params["X-Amz-SignedHeaders"] = "host"
|
|
|
|
canonical_params["X-Amz-Security-Token"] = s3_config.security_token if s3_config.security_token
|
|
|
|
|
|
|
|
# Sorting is required to generate proper signature
|
2019-07-10 04:52:54 +03:00
|
|
|
canonical_params.sort.to_h.map do |key, value|
|
2019-07-04 02:35:59 +03:00
|
|
|
"#{base64_uri_escape(key)}=#{base64_uri_escape(value)}"
|
|
|
|
end.join("&")
|
2019-07-10 04:52:54 +03:00
|
|
|
end
|
2019-07-04 02:35:59 +03:00
|
|
|
|
2019-07-10 04:52:54 +03:00
|
|
|
def generate_canonical_request(canonical_host)
|
|
|
|
[
|
2019-07-04 02:35:59 +03:00
|
|
|
"GET",
|
|
|
|
uri.path,
|
2019-07-10 04:52:54 +03:00
|
|
|
uri.query,
|
2019-07-04 02:35:59 +03:00
|
|
|
"host:#{canonical_host}",
|
|
|
|
"", # empty params
|
|
|
|
"host",
|
|
|
|
"UNSIGNED-PAYLOAD",
|
|
|
|
].join("\n")
|
2019-07-10 04:52:54 +03:00
|
|
|
end
|
2019-07-04 02:35:59 +03:00
|
|
|
|
2019-07-10 04:52:54 +03:00
|
|
|
def generate_string_to_sign(date_time, credential_info, canonical_request)
|
|
|
|
[
|
2019-07-04 02:35:59 +03:00
|
|
|
"AWS4-HMAC-SHA256",
|
|
|
|
date_time,
|
|
|
|
credential_info,
|
|
|
|
Digest::SHA256.hexdigest(canonical_request)
|
|
|
|
].join("\n")
|
2019-07-10 04:52:54 +03:00
|
|
|
end
|
2019-07-04 02:35:59 +03:00
|
|
|
|
2019-07-10 04:52:54 +03:00
|
|
|
def generate_signature(s3_config, date, string_to_sign)
|
2019-07-04 02:35:59 +03:00
|
|
|
date_key = OpenSSL::HMAC.digest("sha256", "AWS4" + s3_config.secret_access_key, date)
|
|
|
|
date_region_key = OpenSSL::HMAC.digest("sha256", date_key, s3_config.region)
|
|
|
|
date_region_service_key = OpenSSL::HMAC.digest("sha256", date_region_key, "s3")
|
|
|
|
signing_key = OpenSSL::HMAC.digest("sha256", date_region_service_key, "aws4_request")
|
2019-07-10 04:52:54 +03:00
|
|
|
OpenSSL::HMAC.hexdigest("sha256", signing_key, string_to_sign)
|
2019-07-04 02:35:59 +03:00
|
|
|
end
|
|
|
|
|
|
|
|
##
|
|
|
|
# Extracts S3 configuration for S3 bucket
|
|
|
|
def fetch_s3_config
|
|
|
|
return S3Config.new(uri.user, uri.password, nil, "us-east-1") if uri.user && uri.password
|
|
|
|
|
|
|
|
s3_source = Gem.configuration[:s3_source] || Gem.configuration["s3_source"]
|
|
|
|
host = uri.host
|
|
|
|
raise ConfigurationError.new("no s3_source key exists in .gemrc") unless s3_source
|
|
|
|
|
|
|
|
auth = s3_source[host] || s3_source[host.to_sym]
|
|
|
|
raise ConfigurationError.new("no key for host #{host} in s3_source in .gemrc") unless auth
|
|
|
|
|
|
|
|
provider = auth[:provider] || auth["provider"]
|
|
|
|
case provider
|
|
|
|
when "env"
|
|
|
|
id = ENV["AWS_ACCESS_KEY_ID"]
|
|
|
|
secret = ENV["AWS_SECRET_ACCESS_KEY"]
|
|
|
|
security_token = ENV["AWS_SESSION_TOKEN"]
|
|
|
|
when "instance_profile"
|
2019-07-10 04:52:54 +03:00
|
|
|
credentials = ec2_metadata_credentials_json
|
2019-07-04 02:35:59 +03:00
|
|
|
id = credentials["AccessKeyId"]
|
|
|
|
secret = credentials["SecretAccessKey"]
|
|
|
|
security_token = credentials["Token"]
|
|
|
|
else
|
|
|
|
id = auth[:id] || auth["id"]
|
|
|
|
secret = auth[:secret] || auth["secret"]
|
|
|
|
raise ConfigurationError.new("s3_source for #{host} missing id or secret") unless id && secret
|
|
|
|
|
|
|
|
security_token = auth[:security_token] || auth["security_token"]
|
|
|
|
end
|
|
|
|
|
|
|
|
region = auth[:region] || auth["region"] || "us-east-1"
|
|
|
|
S3Config.new(id, secret, security_token, region)
|
|
|
|
end
|
|
|
|
|
|
|
|
def base64_uri_escape(str)
|
2019-08-01 12:00:32 +03:00
|
|
|
str.gsub(/[\+\/=\n]/, BASE64_URI_TRANSLATE)
|
2019-07-04 02:35:59 +03:00
|
|
|
end
|
|
|
|
|
2019-07-10 04:52:54 +03:00
|
|
|
def ec2_metadata_credentials_json
|
2019-07-04 02:35:59 +03:00
|
|
|
require 'net/http'
|
2019-07-05 03:16:25 +03:00
|
|
|
require 'rubygems/request'
|
|
|
|
require 'rubygems/request/connection_pools'
|
2019-07-10 04:52:54 +03:00
|
|
|
require 'json'
|
2019-07-04 02:35:59 +03:00
|
|
|
|
|
|
|
metadata_uri = URI(EC2_METADATA_CREDENTIALS)
|
|
|
|
@request_pool ||= create_request_pool(metadata_uri)
|
|
|
|
request = Gem::Request.new(metadata_uri, Net::HTTP::Get, nil, @request_pool)
|
|
|
|
response = request.fetch
|
|
|
|
|
|
|
|
case response
|
|
|
|
when Net::HTTPOK then
|
2019-07-10 04:52:54 +03:00
|
|
|
JSON.parse(response.body)
|
2019-07-04 02:35:59 +03:00
|
|
|
else
|
|
|
|
raise InstanceProfileError.new("Unable to fetch AWS credentials from #{metadata_uri}: #{response.message} #{response.code}")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def create_request_pool(uri)
|
|
|
|
proxy_uri = Gem::Request.proxy_uri(Gem::Request.get_proxy_from_env(uri.scheme))
|
|
|
|
certs = Gem::Request.get_cert_files
|
|
|
|
Gem::Request::ConnectionPools.new(proxy_uri, certs).pool_for(uri)
|
|
|
|
end
|
|
|
|
|
2019-08-01 12:00:32 +03:00
|
|
|
BASE64_URI_TRANSLATE = { "+" => "%2B", "/" => "%2F", "=" => "%3D", "\n" => "" }.freeze
|
2019-07-04 02:35:59 +03:00
|
|
|
EC2_METADATA_CREDENTIALS = "http://169.254.169.254/latest/meta-data/identity-credentials/ec2/security-credentials/ec2-instance".freeze
|
|
|
|
|
|
|
|
end
|