1use crate::auth::{
7 self, extract_endpoint_auth_scheme_signing_name, extract_endpoint_auth_scheme_signing_options,
8 extract_endpoint_auth_scheme_signing_region, PayloadSigningOverride,
9 SigV4OperationSigningConfig, SigV4SessionTokenNameOverride, SigV4SigningError,
10};
11use crate::content_encoding::{DeferredSignerSender, SignChunk};
12use aws_credential_types::Credentials;
13use aws_sigv4::http_request::{
14 sign, SignableBody, SignableRequest, SigningError, SigningParams, SigningSettings,
15};
16use aws_sigv4::sign::v4::{self, sign_chunk, sign_trailer};
17use aws_smithy_async::time::{SharedTimeSource, StaticTimeSource};
18use aws_smithy_runtime_api::box_error::BoxError;
19use aws_smithy_runtime_api::client::auth::{
20 AuthScheme, AuthSchemeEndpointConfig, AuthSchemeId, Sign,
21};
22use aws_smithy_runtime_api::client::identity::{Identity, SharedIdentityResolver};
23use aws_smithy_runtime_api::client::orchestrator::HttpRequest;
24use aws_smithy_runtime_api::client::runtime_components::{GetIdentityResolver, RuntimeComponents};
25use aws_smithy_runtime_api::http::Headers;
26use aws_smithy_types::config_bag::ConfigBag;
27use aws_types::region::SigningRegion;
28use aws_types::SigningName;
29use bytes::Bytes;
30use std::borrow::Cow;
31use std::time::SystemTime;
32
33const EXPIRATION_WARNING: &str = "Presigned request will expire before the given \
34 `expires_in` duration because the credentials used to sign it will expire first.";
35
36pub const SCHEME_ID: AuthSchemeId = AuthSchemeId::new("sigv4");
38
39#[derive(Debug, Default)]
41pub struct SigV4AuthScheme {
42 signer: SigV4Signer,
43}
44
45impl SigV4AuthScheme {
46 pub fn new() -> Self {
48 Default::default()
49 }
50}
51
52impl AuthScheme for SigV4AuthScheme {
53 fn scheme_id(&self) -> AuthSchemeId {
54 SCHEME_ID
55 }
56
57 fn identity_resolver(
58 &self,
59 identity_resolvers: &dyn GetIdentityResolver,
60 ) -> Option<SharedIdentityResolver> {
61 identity_resolvers.identity_resolver(self.scheme_id())
62 }
63
64 fn signer(&self) -> &dyn Sign {
65 &self.signer
66 }
67}
68
69#[derive(Debug, Default)]
71pub struct SigV4Signer;
72
73impl SigV4Signer {
74 pub fn new() -> Self {
76 Self
77 }
78
79 fn settings(operation_config: &SigV4OperationSigningConfig) -> SigningSettings {
80 super::settings(operation_config)
81 }
82
83 fn signing_params<'a>(
84 settings: SigningSettings,
85 identity: &'a Identity,
86 operation_config: &'a SigV4OperationSigningConfig,
87 request_timestamp: SystemTime,
88 ) -> Result<v4::SigningParams<'a, SigningSettings>, SigV4SigningError> {
89 let creds = identity
90 .data::<Credentials>()
91 .ok_or_else(|| SigV4SigningError::WrongIdentityType(identity.clone()))?;
92
93 if let Some(expires_in) = settings.expires_in {
94 if let Some(creds_expires_time) = creds.expiry() {
95 let presigned_expires_time = request_timestamp + expires_in;
96 if presigned_expires_time > creds_expires_time {
97 tracing::warn!(EXPIRATION_WARNING);
98 }
99 }
100 }
101
102 Ok(v4::SigningParams::builder()
103 .identity(identity)
104 .region(
105 operation_config
106 .region
107 .as_ref()
108 .ok_or(SigV4SigningError::MissingSigningRegion)?
109 .as_ref(),
110 )
111 .name(
112 operation_config
113 .name
114 .as_ref()
115 .ok_or(SigV4SigningError::MissingSigningName)?
116 .as_ref(),
117 )
118 .time(request_timestamp)
119 .settings(settings)
120 .build()
121 .expect("all required fields set"))
122 }
123
124 fn extract_operation_config<'a>(
125 auth_scheme_endpoint_config: AuthSchemeEndpointConfig<'a>,
126 config_bag: &'a ConfigBag,
127 ) -> Result<Cow<'a, SigV4OperationSigningConfig>, SigV4SigningError> {
128 let operation_config = config_bag
129 .load::<SigV4OperationSigningConfig>()
130 .ok_or(SigV4SigningError::MissingOperationSigningConfig)?;
131
132 let name = extract_endpoint_auth_scheme_signing_name(&auth_scheme_endpoint_config)?
133 .or(config_bag.load::<SigningName>().cloned());
134
135 let region = extract_endpoint_auth_scheme_signing_region(&auth_scheme_endpoint_config)?
136 .or(config_bag.load::<SigningRegion>().cloned());
137
138 let signing_options = extract_endpoint_auth_scheme_signing_options(
139 &auth_scheme_endpoint_config,
140 &operation_config.signing_options,
141 )?;
142
143 match (region, name, signing_options) {
144 (None, None, Cow::Borrowed(_)) => Ok(Cow::Borrowed(operation_config)),
145 (region, name, signing_options) => {
146 let mut operation_config = operation_config.clone();
147 operation_config.region = region.or(operation_config.region);
148 operation_config.name = name.or(operation_config.name);
149 operation_config.signing_options = match signing_options {
150 Cow::Owned(opts) => opts,
151 Cow::Borrowed(_) => operation_config.signing_options,
152 };
153 Ok(Cow::Owned(operation_config))
154 }
155 }
156 }
157}
158
159impl Sign for SigV4Signer {
160 fn sign_http_request(
161 &self,
162 request: &mut HttpRequest,
163 identity: &Identity,
164 auth_scheme_endpoint_config: AuthSchemeEndpointConfig<'_>,
165 runtime_components: &RuntimeComponents,
166 config_bag: &ConfigBag,
167 ) -> Result<(), BoxError> {
168 if identity.data::<Credentials>().is_none() {
169 return Err(SigV4SigningError::WrongIdentityType(identity.clone()).into());
170 };
171
172 let operation_config =
173 Self::extract_operation_config(auth_scheme_endpoint_config, config_bag)?;
174 let request_time = runtime_components.time_source().unwrap_or_default().now();
175
176 let settings = if let Some(session_token_name_override) =
177 config_bag.load::<SigV4SessionTokenNameOverride>()
178 {
179 let mut settings = Self::settings(&operation_config);
180 let name_override = session_token_name_override.name_override(&settings, config_bag)?;
181 settings.session_token_name_override = name_override;
182 settings
183 } else {
184 Self::settings(&operation_config)
185 };
186
187 let chunk_signer_sender = config_bag.load::<DeferredSignerSender>();
188
189 let (signing_params, sender_and_settings) = if let Some(signer_sender) = chunk_signer_sender
191 {
192 let signing_params =
194 Self::signing_params(settings.clone(), identity, &operation_config, request_time)?;
195 (signing_params, Some((signer_sender, settings)))
196 } else {
197 let signing_params =
199 Self::signing_params(settings, identity, &operation_config, request_time)?;
200 (signing_params, None)
201 };
202
203 let (signing_instructions, _signature) = {
204 let mut signable_body = operation_config
207 .signing_options
208 .payload_override
209 .as_ref()
210 .cloned()
213 .unwrap_or_else(|| {
214 request
215 .body()
216 .bytes()
217 .map(SignableBody::Bytes)
218 .unwrap_or(SignableBody::UnsignedPayload)
219 });
220
221 if let Some(payload_signing_override) = config_bag.load::<PayloadSigningOverride>() {
224 tracing::trace!(
225 "payload signing was overridden, now set to {payload_signing_override:?}"
226 );
227 signable_body = payload_signing_override.clone().to_signable_body();
228 }
229
230 let signable_request = SignableRequest::new(
231 request.method(),
232 request.uri(),
233 request.headers().iter(),
234 signable_body,
235 )?;
236 sign(signable_request, &SigningParams::V4(signing_params))?
237 }
238 .into_parts();
239
240 if let Some((signer_sender, settings)) = sender_and_settings {
241 let time_source = StaticTimeSource::new(request_time).into();
242 let region = operation_config
243 .region
244 .clone()
245 .expect("`Self::signing_params` above would have errored, if region was missing");
246 let name = operation_config
247 .name
248 .clone()
249 .expect("`Self::signing_params` above would have errored, if name was missing");
250 signer_sender
251 .send(Box::new(SigV4MessageSigner::new(
252 _signature.clone(),
253 identity.clone(),
254 region,
255 name,
256 time_source,
257 settings,
258 )) as _)
259 .expect("failed to send deferred signer");
260 };
261
262 #[cfg(feature = "event-stream")]
264 {
265 use crate::auth::sigv4::SigV4MessageSigner;
266 use aws_smithy_eventstream::frame::DeferredSignerSender;
267
268 if let Some(signer_sender) = config_bag.load::<DeferredSignerSender>() {
269 let time_source = runtime_components.time_source().unwrap_or_default();
270 let region = operation_config.region.clone().expect(
271 "`Self::signing_params` above would have errored, if region was missing",
272 );
273 let name = operation_config
274 .name
275 .clone()
276 .expect("`Self::signing_params` above would have errored, if name was missing");
277 signer_sender
278 .send(Box::new(SigV4MessageSigner::new(
279 _signature,
280 identity.clone(),
281 region,
282 name,
283 time_source,
284 (),
285 )) as _)
286 .expect("failed to send deferred signer");
287 }
288 }
289 auth::apply_signing_instructions(signing_instructions, request)?;
290 Ok(())
291 }
292}
293
294#[derive(Debug)]
295pub(crate) struct SigV4MessageSigner<S> {
296 running_signature: String,
297 identity: Identity,
298 signing_region: SigningRegion,
299 signing_name: SigningName,
300 time: SharedTimeSource,
301 signing_settings: S,
302}
303
304impl<S> SigV4MessageSigner<S>
305where
306 S: Clone + Default,
307{
308 pub(crate) fn new(
309 running_signature: String,
310 identity: Identity,
311 signing_region: SigningRegion,
312 signing_name: SigningName,
313 time: SharedTimeSource,
314 signing_settings: S,
315 ) -> Self {
316 Self {
317 running_signature,
318 identity,
319 signing_region,
320 signing_name,
321 time,
322 signing_settings,
323 }
324 }
325
326 fn signing_params(&self) -> v4::SigningParams<'_, S> {
327 let builder = v4::SigningParams::builder()
328 .identity(&self.identity)
329 .region(self.signing_region.as_ref())
330 .name(self.signing_name.as_ref())
331 .time(self.time.now())
332 .settings(self.signing_settings.clone());
333 builder.build().unwrap()
334 }
335}
336
337impl SignChunk for SigV4MessageSigner<SigningSettings> {
338 fn chunk_signature(&mut self, chunk: &Bytes) -> Result<String, SigningError> {
339 let params = self.signing_params();
340 let (_, signature) = sign_chunk(chunk, &self.running_signature, ¶ms)?.into_parts();
341 self.running_signature = signature.clone();
342 Ok(signature)
343 }
344
345 fn trailer_signature(&mut self, trailing_headers: &Headers) -> Result<String, SigningError> {
346 let params = self.signing_params();
347 let (_, signature) =
348 sign_trailer(trailing_headers, &self.running_signature, ¶ms)?.into_parts();
349 self.running_signature = signature.clone();
350 Ok(signature)
351 }
352}
353
354#[cfg(feature = "event-stream")]
355mod event_stream {
356 use crate::auth::sigv4::SigV4MessageSigner;
357 use aws_sigv4::event_stream::{sign_empty_message, sign_message};
358 use aws_smithy_eventstream::frame::{SignMessage, SignMessageError};
359 use aws_smithy_types::event_stream::Message;
360
361 impl SignMessage for SigV4MessageSigner<()> {
362 fn sign(&mut self, message: Message) -> Result<Message, SignMessageError> {
363 let (signed_message, signature) = {
364 let params = self.signing_params();
365 sign_message(&message, &self.running_signature, ¶ms)?.into_parts()
366 };
367 self.running_signature = signature;
368 Ok(signed_message)
369 }
370
371 fn sign_empty(&mut self) -> Option<Result<Message, SignMessageError>> {
372 let (signed_message, signature) = {
373 let params = self.signing_params();
374 sign_empty_message(&self.running_signature, ¶ms)
375 .ok()?
376 .into_parts()
377 };
378 self.running_signature = signature;
379 Some(Ok(signed_message))
380 }
381 }
382
383 #[cfg(test)]
384 mod tests {
385 use crate::auth::sigv4::SigV4MessageSigner;
386 use aws_credential_types::Credentials;
387 use aws_smithy_async::time::SharedTimeSource;
388 use aws_smithy_eventstream::frame::SignMessage;
389 use aws_smithy_types::event_stream::{HeaderValue, Message};
390
391 use aws_types::region::Region;
392 use aws_types::region::SigningRegion;
393 use aws_types::SigningName;
394 use std::time::{Duration, UNIX_EPOCH};
395
396 fn check_send_sync<T: Send + Sync>(value: T) -> T {
397 value
398 }
399
400 #[test]
401 fn sign_message() {
402 let region = Region::new("us-east-1");
403 let mut signer = check_send_sync(SigV4MessageSigner::new(
404 "initial-signature".into(),
405 Credentials::for_tests_with_session_token().into(),
406 SigningRegion::from(region),
407 SigningName::from_static("transcribe"),
408 SharedTimeSource::new(UNIX_EPOCH + Duration::new(1611160427, 0)),
409 (),
410 ));
411 let mut signatures = Vec::new();
412 for _ in 0..5 {
413 let signed = signer
414 .sign(Message::new(&b"identical message"[..]))
415 .unwrap();
416 if let HeaderValue::ByteArray(signature) = signed
417 .headers()
418 .iter()
419 .find(|h| h.name().as_str() == ":chunk-signature")
420 .unwrap()
421 .value()
422 {
423 signatures.push(signature.clone());
424 } else {
425 panic!("failed to get the :chunk-signature")
426 }
427 }
428 for i in 1..signatures.len() {
429 assert_ne!(signatures[i - 1], signatures[i]);
430 }
431 }
432 }
433}
434
435#[cfg(test)]
436mod tests {
437 use super::*;
438 use crate::auth::{HttpSignatureType, SigningOptions};
439 use aws_credential_types::Credentials;
440 use aws_sigv4::http_request::SigningSettings;
441 use aws_smithy_types::config_bag::Layer;
442 use aws_smithy_types::Document;
443 use aws_types::region::SigningRegion;
444 use aws_types::SigningName;
445 use std::collections::HashMap;
446 use std::time::{Duration, SystemTime};
447 use tracing_test::traced_test;
448
449 #[test]
450 #[traced_test]
451 fn expiration_warning() {
452 let now = SystemTime::UNIX_EPOCH + Duration::from_secs(1000);
453 let creds_expire_in = Duration::from_secs(100);
454
455 let mut settings = SigningSettings::default();
456 settings.expires_in = Some(creds_expire_in - Duration::from_secs(10));
457
458 let identity = Credentials::new(
459 "test-access-key",
460 "test-secret-key",
461 Some("test-session-token".into()),
462 Some(now + creds_expire_in),
463 "test",
464 )
465 .into();
466 let operation_config = SigV4OperationSigningConfig {
467 region: Some(SigningRegion::from_static("test")),
468 name: Some(SigningName::from_static("test")),
469 signing_options: SigningOptions {
470 double_uri_encode: true,
471 content_sha256_header: true,
472 normalize_uri_path: true,
473 omit_session_token: true,
474 signature_type: HttpSignatureType::HttpRequestHeaders,
475 signing_optional: false,
476 expires_in: None,
477 payload_override: None,
478 },
479 ..Default::default()
480 };
481 SigV4Signer::signing_params(settings, &identity, &operation_config, now).unwrap();
482 assert!(!logs_contain(EXPIRATION_WARNING));
483
484 let mut settings = SigningSettings::default();
485 settings.expires_in = Some(creds_expire_in + Duration::from_secs(10));
486
487 SigV4Signer::signing_params(settings, &identity, &operation_config, now).unwrap();
488 assert!(logs_contain(EXPIRATION_WARNING));
489 }
490
491 #[test]
492 fn endpoint_config_overrides_region_and_service() {
493 let mut layer = Layer::new("test");
494 layer.store_put(SigV4OperationSigningConfig {
495 region: Some(SigningRegion::from_static("override-this-region")),
496 name: Some(SigningName::from_static("override-this-name")),
497 ..Default::default()
498 });
499 let config = Document::Object({
500 let mut out = HashMap::new();
501 out.insert("name".to_string(), "sigv4".to_string().into());
502 out.insert(
503 "signingName".to_string(),
504 "qldb-override".to_string().into(),
505 );
506 out.insert(
507 "signingRegion".to_string(),
508 "us-east-override".to_string().into(),
509 );
510 out
511 });
512 let config = AuthSchemeEndpointConfig::from(Some(&config));
513
514 let cfg = ConfigBag::of_layers(vec![layer]);
515 let result = SigV4Signer::extract_operation_config(config, &cfg).expect("success");
516
517 assert_eq!(
518 result.region,
519 Some(SigningRegion::from_static("us-east-override"))
520 );
521 assert_eq!(result.name, Some(SigningName::from_static("qldb-override")));
522 assert!(matches!(result, Cow::Owned(_)));
523 }
524
525 #[test]
526 fn endpoint_config_supports_fallback_when_region_or_service_are_unset() {
527 let mut layer = Layer::new("test");
528 layer.store_put(SigV4OperationSigningConfig {
529 region: Some(SigningRegion::from_static("us-east-1")),
530 name: Some(SigningName::from_static("qldb")),
531 ..Default::default()
532 });
533 let cfg = ConfigBag::of_layers(vec![layer]);
534 let config = AuthSchemeEndpointConfig::empty();
535
536 let result = SigV4Signer::extract_operation_config(config, &cfg).expect("success");
537
538 assert_eq!(result.region, Some(SigningRegion::from_static("us-east-1")));
539 assert_eq!(result.name, Some(SigningName::from_static("qldb")));
540 assert!(matches!(result, Cow::Borrowed(_)));
541 }
542}