mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-11-03 23:02:24 -06:00 
			
		
		
		
	
		
			
				
	
	
		
			228 lines
		
	
	
	
		
			7.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			228 lines
		
	
	
	
		
			7.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
 * MinIO Go Library for Amazon S3 Compatible Cloud Storage
 | 
						|
 * Copyright 2015-2017 MinIO, Inc.
 | 
						|
 *
 | 
						|
 * Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
 * you may not use this file except in compliance with the License.
 | 
						|
 * You may obtain a copy of the License at
 | 
						|
 *
 | 
						|
 *     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 *
 | 
						|
 * Unless required by applicable law or agreed to in writing, software
 | 
						|
 * distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
 * See the License for the specific language governing permissions and
 | 
						|
 * limitations under the License.
 | 
						|
 */
 | 
						|
 | 
						|
package minio
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"errors"
 | 
						|
	"net/http"
 | 
						|
	"net/url"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/minio/minio-go/v7/pkg/s3utils"
 | 
						|
	"github.com/minio/minio-go/v7/pkg/signer"
 | 
						|
)
 | 
						|
 | 
						|
// presignURL - Returns a presigned URL for an input 'method'.
 | 
						|
// Expires maximum is 7days - ie. 604800 and minimum is 1.
 | 
						|
func (c *Client) presignURL(ctx context.Context, method, bucketName, objectName string, expires time.Duration, reqParams url.Values, extraHeaders http.Header) (u *url.URL, err error) {
 | 
						|
	// Input validation.
 | 
						|
	if method == "" {
 | 
						|
		return nil, errInvalidArgument("method cannot be empty.")
 | 
						|
	}
 | 
						|
	if err = s3utils.CheckValidBucketName(bucketName); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	if err = isValidExpiry(expires); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	// Convert expires into seconds.
 | 
						|
	expireSeconds := int64(expires / time.Second)
 | 
						|
	reqMetadata := requestMetadata{
 | 
						|
		presignURL:         true,
 | 
						|
		bucketName:         bucketName,
 | 
						|
		objectName:         objectName,
 | 
						|
		expires:            expireSeconds,
 | 
						|
		queryValues:        reqParams,
 | 
						|
		extraPresignHeader: extraHeaders,
 | 
						|
	}
 | 
						|
 | 
						|
	// Instantiate a new request.
 | 
						|
	// Since expires is set newRequest will presign the request.
 | 
						|
	var req *http.Request
 | 
						|
	if req, err = c.newRequest(ctx, method, reqMetadata); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	return req.URL, nil
 | 
						|
}
 | 
						|
 | 
						|
// PresignedGetObject - Returns a presigned URL to access an object
 | 
						|
// data without credentials. URL can have a maximum expiry of
 | 
						|
// upto 7days or a minimum of 1sec. Additionally you can override
 | 
						|
// a set of response headers using the query parameters.
 | 
						|
func (c *Client) PresignedGetObject(ctx context.Context, bucketName, objectName string, expires time.Duration, reqParams url.Values) (u *url.URL, err error) {
 | 
						|
	if err = s3utils.CheckValidObjectName(objectName); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	return c.presignURL(ctx, http.MethodGet, bucketName, objectName, expires, reqParams, nil)
 | 
						|
}
 | 
						|
 | 
						|
// PresignedHeadObject - Returns a presigned URL to access
 | 
						|
// object metadata without credentials. URL can have a maximum expiry
 | 
						|
// of upto 7days or a minimum of 1sec. Additionally you can override
 | 
						|
// a set of response headers using the query parameters.
 | 
						|
func (c *Client) PresignedHeadObject(ctx context.Context, bucketName, objectName string, expires time.Duration, reqParams url.Values) (u *url.URL, err error) {
 | 
						|
	if err = s3utils.CheckValidObjectName(objectName); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	return c.presignURL(ctx, http.MethodHead, bucketName, objectName, expires, reqParams, nil)
 | 
						|
}
 | 
						|
 | 
						|
// PresignedPutObject - Returns a presigned URL to upload an object
 | 
						|
// without credentials. URL can have a maximum expiry of upto 7days
 | 
						|
// or a minimum of 1sec.
 | 
						|
func (c *Client) PresignedPutObject(ctx context.Context, bucketName, objectName string, expires time.Duration) (u *url.URL, err error) {
 | 
						|
	if err = s3utils.CheckValidObjectName(objectName); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	return c.presignURL(ctx, http.MethodPut, bucketName, objectName, expires, nil, nil)
 | 
						|
}
 | 
						|
 | 
						|
// PresignHeader - similar to Presign() but allows including HTTP headers that
 | 
						|
// will be used to build the signature. The request using the resulting URL will
 | 
						|
// need to have the exact same headers to be added for signature validation to
 | 
						|
// pass.
 | 
						|
//
 | 
						|
// FIXME: The extra header parameter should be included in Presign() in the next
 | 
						|
// major version bump, and this function should then be deprecated.
 | 
						|
func (c *Client) PresignHeader(ctx context.Context, method, bucketName, objectName string, expires time.Duration, reqParams url.Values, extraHeaders http.Header) (u *url.URL, err error) {
 | 
						|
	return c.presignURL(ctx, method, bucketName, objectName, expires, reqParams, extraHeaders)
 | 
						|
}
 | 
						|
 | 
						|
// Presign - returns a presigned URL for any http method of your choice along
 | 
						|
// with custom request params and extra signed headers. URL can have a maximum
 | 
						|
// expiry of upto 7days or a minimum of 1sec.
 | 
						|
func (c *Client) Presign(ctx context.Context, method, bucketName, objectName string, expires time.Duration, reqParams url.Values) (u *url.URL, err error) {
 | 
						|
	return c.presignURL(ctx, method, bucketName, objectName, expires, reqParams, nil)
 | 
						|
}
 | 
						|
 | 
						|
// PresignedPostPolicy - Returns POST urlString, form data to upload an object.
 | 
						|
func (c *Client) PresignedPostPolicy(ctx context.Context, p *PostPolicy) (u *url.URL, formData map[string]string, err error) {
 | 
						|
	// Validate input arguments.
 | 
						|
	if p.expiration.IsZero() {
 | 
						|
		return nil, nil, errors.New("Expiration time must be specified")
 | 
						|
	}
 | 
						|
	if _, ok := p.formData["key"]; !ok {
 | 
						|
		return nil, nil, errors.New("object key must be specified")
 | 
						|
	}
 | 
						|
	if _, ok := p.formData["bucket"]; !ok {
 | 
						|
		return nil, nil, errors.New("bucket name must be specified")
 | 
						|
	}
 | 
						|
 | 
						|
	bucketName := p.formData["bucket"]
 | 
						|
	// Fetch the bucket location.
 | 
						|
	location, err := c.getBucketLocation(ctx, bucketName)
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	isVirtualHost := c.isVirtualHostStyleRequest(*c.endpointURL, bucketName)
 | 
						|
 | 
						|
	u, err = c.makeTargetURL(bucketName, "", location, isVirtualHost, nil)
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	// Get credentials from the configured credentials provider.
 | 
						|
	credValues, err := c.credsProvider.Get()
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	var (
 | 
						|
		signerType      = credValues.SignerType
 | 
						|
		sessionToken    = credValues.SessionToken
 | 
						|
		accessKeyID     = credValues.AccessKeyID
 | 
						|
		secretAccessKey = credValues.SecretAccessKey
 | 
						|
	)
 | 
						|
 | 
						|
	if signerType.IsAnonymous() {
 | 
						|
		return nil, nil, errInvalidArgument("Presigned operations are not supported for anonymous credentials")
 | 
						|
	}
 | 
						|
 | 
						|
	// Keep time.
 | 
						|
	t := time.Now().UTC()
 | 
						|
	// For signature version '2' handle here.
 | 
						|
	if signerType.IsV2() {
 | 
						|
		policyBase64 := p.base64()
 | 
						|
		p.formData["policy"] = policyBase64
 | 
						|
		// For Google endpoint set this value to be 'GoogleAccessId'.
 | 
						|
		if s3utils.IsGoogleEndpoint(*c.endpointURL) {
 | 
						|
			p.formData["GoogleAccessId"] = accessKeyID
 | 
						|
		} else {
 | 
						|
			// For all other endpoints set this value to be 'AWSAccessKeyId'.
 | 
						|
			p.formData["AWSAccessKeyId"] = accessKeyID
 | 
						|
		}
 | 
						|
		// Sign the policy.
 | 
						|
		p.formData["signature"] = signer.PostPresignSignatureV2(policyBase64, secretAccessKey)
 | 
						|
		return u, p.formData, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// Add date policy.
 | 
						|
	if err = p.addNewPolicy(policyCondition{
 | 
						|
		matchType: "eq",
 | 
						|
		condition: "$x-amz-date",
 | 
						|
		value:     t.Format(iso8601DateFormat),
 | 
						|
	}); err != nil {
 | 
						|
		return nil, nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	// Add algorithm policy.
 | 
						|
	if err = p.addNewPolicy(policyCondition{
 | 
						|
		matchType: "eq",
 | 
						|
		condition: "$x-amz-algorithm",
 | 
						|
		value:     signV4Algorithm,
 | 
						|
	}); err != nil {
 | 
						|
		return nil, nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	// Add a credential policy.
 | 
						|
	credential := signer.GetCredential(accessKeyID, location, t, signer.ServiceTypeS3)
 | 
						|
	if err = p.addNewPolicy(policyCondition{
 | 
						|
		matchType: "eq",
 | 
						|
		condition: "$x-amz-credential",
 | 
						|
		value:     credential,
 | 
						|
	}); err != nil {
 | 
						|
		return nil, nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	if sessionToken != "" {
 | 
						|
		if err = p.addNewPolicy(policyCondition{
 | 
						|
			matchType: "eq",
 | 
						|
			condition: "$x-amz-security-token",
 | 
						|
			value:     sessionToken,
 | 
						|
		}); err != nil {
 | 
						|
			return nil, nil, err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Get base64 encoded policy.
 | 
						|
	policyBase64 := p.base64()
 | 
						|
 | 
						|
	// Fill in the form data.
 | 
						|
	p.formData["policy"] = policyBase64
 | 
						|
	p.formData["x-amz-algorithm"] = signV4Algorithm
 | 
						|
	p.formData["x-amz-credential"] = credential
 | 
						|
	p.formData["x-amz-date"] = t.Format(iso8601DateFormat)
 | 
						|
	if sessionToken != "" {
 | 
						|
		p.formData["x-amz-security-token"] = sessionToken
 | 
						|
	}
 | 
						|
	p.formData["x-amz-signature"] = signer.PostPresignSignatureV4(policyBase64, t, secretAccessKey, location)
 | 
						|
	return u, p.formData, nil
 | 
						|
}
 |