Skip to main content

aws_runtime/auth/
sigv4.rs

1/*
2 * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3 * SPDX-License-Identifier: Apache-2.0
4 */
5
6use crate::auth::{
7    self, extract_endpoint_auth_scheme_signing_name, extract_endpoint_auth_scheme_signing_options,
8    extract_endpoint_auth_scheme_signing_region, PayloadSigningOverride,
9    SigV4OperationSigningConfig, SigV4SessionTokenNameOverride, SigV4SigningError,
10};
11use crate::content_encoding::{DeferredSignerSender, SignChunk};
12use aws_credential_types::Credentials;
13use aws_sigv4::http_request::{
14    sign, SignableBody, SignableRequest, SigningError, SigningParams, SigningSettings,
15};
16use aws_sigv4::sign::v4::{self, sign_chunk, sign_trailer};
17use aws_smithy_async::time::{SharedTimeSource, StaticTimeSource};
18use aws_smithy_runtime_api::box_error::BoxError;
19use aws_smithy_runtime_api::client::auth::{
20    AuthScheme, AuthSchemeEndpointConfig, AuthSchemeId, Sign,
21};
22use aws_smithy_runtime_api::client::identity::{Identity, SharedIdentityResolver};
23use aws_smithy_runtime_api::client::orchestrator::HttpRequest;
24use aws_smithy_runtime_api::client::runtime_components::{GetIdentityResolver, RuntimeComponents};
25use aws_smithy_runtime_api::http::Headers;
26use aws_smithy_types::config_bag::ConfigBag;
27use aws_types::region::SigningRegion;
28use aws_types::SigningName;
29use bytes::Bytes;
30use std::borrow::Cow;
31use std::time::SystemTime;
32
33const EXPIRATION_WARNING: &str = "Presigned request will expire before the given \
34        `expires_in` duration because the credentials used to sign it will expire first.";
35
36/// Auth scheme ID for SigV4.
37pub const SCHEME_ID: AuthSchemeId = AuthSchemeId::new("sigv4");
38
39/// SigV4 auth scheme.
40#[derive(Debug, Default)]
41pub struct SigV4AuthScheme {
42    signer: SigV4Signer,
43}
44
45impl SigV4AuthScheme {
46    /// Creates a new `SigV4AuthScheme`.
47    pub fn new() -> Self {
48        Default::default()
49    }
50}
51
52impl AuthScheme for SigV4AuthScheme {
53    fn scheme_id(&self) -> AuthSchemeId {
54        SCHEME_ID
55    }
56
57    fn identity_resolver(
58        &self,
59        identity_resolvers: &dyn GetIdentityResolver,
60    ) -> Option<SharedIdentityResolver> {
61        identity_resolvers.identity_resolver(self.scheme_id())
62    }
63
64    fn signer(&self) -> &dyn Sign {
65        &self.signer
66    }
67}
68
69/// SigV4 signer.
70#[derive(Debug, Default)]
71pub struct SigV4Signer;
72
73impl SigV4Signer {
74    /// Creates a new signer instance.
75    pub fn new() -> Self {
76        Self
77    }
78
79    fn settings(operation_config: &SigV4OperationSigningConfig) -> SigningSettings {
80        super::settings(operation_config)
81    }
82
83    fn signing_params<'a>(
84        settings: SigningSettings,
85        identity: &'a Identity,
86        operation_config: &'a SigV4OperationSigningConfig,
87        request_timestamp: SystemTime,
88    ) -> Result<v4::SigningParams<'a, SigningSettings>, SigV4SigningError> {
89        let creds = identity
90            .data::<Credentials>()
91            .ok_or_else(|| SigV4SigningError::WrongIdentityType(identity.clone()))?;
92
93        if let Some(expires_in) = settings.expires_in {
94            if let Some(creds_expires_time) = creds.expiry() {
95                let presigned_expires_time = request_timestamp + expires_in;
96                if presigned_expires_time > creds_expires_time {
97                    tracing::warn!(EXPIRATION_WARNING);
98                }
99            }
100        }
101
102        Ok(v4::SigningParams::builder()
103            .identity(identity)
104            .region(
105                operation_config
106                    .region
107                    .as_ref()
108                    .ok_or(SigV4SigningError::MissingSigningRegion)?
109                    .as_ref(),
110            )
111            .name(
112                operation_config
113                    .name
114                    .as_ref()
115                    .ok_or(SigV4SigningError::MissingSigningName)?
116                    .as_ref(),
117            )
118            .time(request_timestamp)
119            .settings(settings)
120            .build()
121            .expect("all required fields set"))
122    }
123
124    fn extract_operation_config<'a>(
125        auth_scheme_endpoint_config: AuthSchemeEndpointConfig<'a>,
126        config_bag: &'a ConfigBag,
127    ) -> Result<Cow<'a, SigV4OperationSigningConfig>, SigV4SigningError> {
128        let operation_config = config_bag
129            .load::<SigV4OperationSigningConfig>()
130            .ok_or(SigV4SigningError::MissingOperationSigningConfig)?;
131
132        let name = extract_endpoint_auth_scheme_signing_name(&auth_scheme_endpoint_config)?
133            .or(config_bag.load::<SigningName>().cloned());
134
135        let region = extract_endpoint_auth_scheme_signing_region(&auth_scheme_endpoint_config)?
136            .or(config_bag.load::<SigningRegion>().cloned());
137
138        let signing_options = extract_endpoint_auth_scheme_signing_options(
139            &auth_scheme_endpoint_config,
140            &operation_config.signing_options,
141        )?;
142
143        match (region, name, signing_options) {
144            (None, None, Cow::Borrowed(_)) => Ok(Cow::Borrowed(operation_config)),
145            (region, name, signing_options) => {
146                let mut operation_config = operation_config.clone();
147                operation_config.region = region.or(operation_config.region);
148                operation_config.name = name.or(operation_config.name);
149                operation_config.signing_options = match signing_options {
150                    Cow::Owned(opts) => opts,
151                    Cow::Borrowed(_) => operation_config.signing_options,
152                };
153                Ok(Cow::Owned(operation_config))
154            }
155        }
156    }
157}
158
159impl Sign for SigV4Signer {
160    fn sign_http_request(
161        &self,
162        request: &mut HttpRequest,
163        identity: &Identity,
164        auth_scheme_endpoint_config: AuthSchemeEndpointConfig<'_>,
165        runtime_components: &RuntimeComponents,
166        config_bag: &ConfigBag,
167    ) -> Result<(), BoxError> {
168        if identity.data::<Credentials>().is_none() {
169            return Err(SigV4SigningError::WrongIdentityType(identity.clone()).into());
170        };
171
172        let operation_config =
173            Self::extract_operation_config(auth_scheme_endpoint_config, config_bag)?;
174        let request_time = runtime_components.time_source().unwrap_or_default().now();
175
176        let settings = if let Some(session_token_name_override) =
177            config_bag.load::<SigV4SessionTokenNameOverride>()
178        {
179            let mut settings = Self::settings(&operation_config);
180            let name_override = session_token_name_override.name_override(&settings, config_bag)?;
181            settings.session_token_name_override = name_override;
182            settings
183        } else {
184            Self::settings(&operation_config)
185        };
186
187        let chunk_signer_sender = config_bag.load::<DeferredSignerSender>();
188
189        // `sender_and_settings` needs to include a cloned `settings` to satisfy Rust's borrow checker
190        let (signing_params, sender_and_settings) = if let Some(signer_sender) = chunk_signer_sender
191        {
192            // Clone settings since we'll need it later for the message signer
193            let signing_params =
194                Self::signing_params(settings.clone(), identity, &operation_config, request_time)?;
195            (signing_params, Some((signer_sender, settings)))
196        } else {
197            // Move settings since we won't need it later
198            let signing_params =
199                Self::signing_params(settings, identity, &operation_config, request_time)?;
200            (signing_params, None)
201        };
202
203        let (signing_instructions, _signature) = {
204            // A body that is already in memory can be signed directly. A body that is not in memory
205            // (any sort of streaming body or presigned request) will be signed via UNSIGNED-PAYLOAD.
206            let mut signable_body = operation_config
207                .signing_options
208                .payload_override
209                .as_ref()
210                // the payload_override is a cheap clone because it contains either a
211                // reference or a short checksum (we're not cloning the entire body)
212                .cloned()
213                .unwrap_or_else(|| {
214                    request
215                        .body()
216                        .bytes()
217                        .map(SignableBody::Bytes)
218                        .unwrap_or(SignableBody::UnsignedPayload)
219                });
220
221            // Sometimes it's necessary to override the payload signing scheme.
222            // If an override exists then fetch and apply it.
223            if let Some(payload_signing_override) = config_bag.load::<PayloadSigningOverride>() {
224                tracing::trace!(
225                    "payload signing was overridden, now set to {payload_signing_override:?}"
226                );
227                signable_body = payload_signing_override.clone().to_signable_body();
228            }
229
230            let signable_request = SignableRequest::new(
231                request.method(),
232                request.uri(),
233                request.headers().iter(),
234                signable_body,
235            )?;
236            sign(signable_request, &SigningParams::V4(signing_params))?
237        }
238        .into_parts();
239
240        if let Some((signer_sender, settings)) = sender_and_settings {
241            let time_source = StaticTimeSource::new(request_time).into();
242            let region = operation_config
243                .region
244                .clone()
245                .expect("`Self::signing_params` above would have errored, if region was missing");
246            let name = operation_config
247                .name
248                .clone()
249                .expect("`Self::signing_params` above would have errored, if name was missing");
250            signer_sender
251                .send(Box::new(SigV4MessageSigner::new(
252                    _signature.clone(),
253                    identity.clone(),
254                    region,
255                    name,
256                    time_source,
257                    settings,
258                )) as _)
259                .expect("failed to send deferred signer");
260        };
261
262        // If this is an event stream operation, set up the event stream signer
263        #[cfg(feature = "event-stream")]
264        {
265            use crate::auth::sigv4::SigV4MessageSigner;
266            use aws_smithy_eventstream::frame::DeferredSignerSender;
267
268            if let Some(signer_sender) = config_bag.load::<DeferredSignerSender>() {
269                let time_source = runtime_components.time_source().unwrap_or_default();
270                let region = operation_config.region.clone().expect(
271                    "`Self::signing_params` above would have errored, if region was missing",
272                );
273                let name = operation_config
274                    .name
275                    .clone()
276                    .expect("`Self::signing_params` above would have errored, if name was missing");
277                signer_sender
278                    .send(Box::new(SigV4MessageSigner::new(
279                        _signature,
280                        identity.clone(),
281                        region,
282                        name,
283                        time_source,
284                        (),
285                    )) as _)
286                    .expect("failed to send deferred signer");
287            }
288        }
289        auth::apply_signing_instructions(signing_instructions, request)?;
290        Ok(())
291    }
292}
293
294#[derive(Debug)]
295pub(crate) struct SigV4MessageSigner<S> {
296    running_signature: String,
297    identity: Identity,
298    signing_region: SigningRegion,
299    signing_name: SigningName,
300    time: SharedTimeSource,
301    signing_settings: S,
302}
303
304impl<S> SigV4MessageSigner<S>
305where
306    S: Clone + Default,
307{
308    pub(crate) fn new(
309        running_signature: String,
310        identity: Identity,
311        signing_region: SigningRegion,
312        signing_name: SigningName,
313        time: SharedTimeSource,
314        signing_settings: S,
315    ) -> Self {
316        Self {
317            running_signature,
318            identity,
319            signing_region,
320            signing_name,
321            time,
322            signing_settings,
323        }
324    }
325
326    fn signing_params(&self) -> v4::SigningParams<'_, S> {
327        let builder = v4::SigningParams::builder()
328            .identity(&self.identity)
329            .region(self.signing_region.as_ref())
330            .name(self.signing_name.as_ref())
331            .time(self.time.now())
332            .settings(self.signing_settings.clone());
333        builder.build().unwrap()
334    }
335}
336
337impl SignChunk for SigV4MessageSigner<SigningSettings> {
338    fn chunk_signature(&mut self, chunk: &Bytes) -> Result<String, SigningError> {
339        let params = self.signing_params();
340        let (_, signature) = sign_chunk(chunk, &self.running_signature, &params)?.into_parts();
341        self.running_signature = signature.clone();
342        Ok(signature)
343    }
344
345    fn trailer_signature(&mut self, trailing_headers: &Headers) -> Result<String, SigningError> {
346        let params = self.signing_params();
347        let (_, signature) =
348            sign_trailer(trailing_headers, &self.running_signature, &params)?.into_parts();
349        self.running_signature = signature.clone();
350        Ok(signature)
351    }
352}
353
354#[cfg(feature = "event-stream")]
355mod event_stream {
356    use crate::auth::sigv4::SigV4MessageSigner;
357    use aws_sigv4::event_stream::{sign_empty_message, sign_message};
358    use aws_smithy_eventstream::frame::{SignMessage, SignMessageError};
359    use aws_smithy_types::event_stream::Message;
360
361    impl SignMessage for SigV4MessageSigner<()> {
362        fn sign(&mut self, message: Message) -> Result<Message, SignMessageError> {
363            let (signed_message, signature) = {
364                let params = self.signing_params();
365                sign_message(&message, &self.running_signature, &params)?.into_parts()
366            };
367            self.running_signature = signature;
368            Ok(signed_message)
369        }
370
371        fn sign_empty(&mut self) -> Option<Result<Message, SignMessageError>> {
372            let (signed_message, signature) = {
373                let params = self.signing_params();
374                sign_empty_message(&self.running_signature, &params)
375                    .ok()?
376                    .into_parts()
377            };
378            self.running_signature = signature;
379            Some(Ok(signed_message))
380        }
381    }
382
383    #[cfg(test)]
384    mod tests {
385        use crate::auth::sigv4::SigV4MessageSigner;
386        use aws_credential_types::Credentials;
387        use aws_smithy_async::time::SharedTimeSource;
388        use aws_smithy_eventstream::frame::SignMessage;
389        use aws_smithy_types::event_stream::{HeaderValue, Message};
390
391        use aws_types::region::Region;
392        use aws_types::region::SigningRegion;
393        use aws_types::SigningName;
394        use std::time::{Duration, UNIX_EPOCH};
395
396        fn check_send_sync<T: Send + Sync>(value: T) -> T {
397            value
398        }
399
400        #[test]
401        fn sign_message() {
402            let region = Region::new("us-east-1");
403            let mut signer = check_send_sync(SigV4MessageSigner::new(
404                "initial-signature".into(),
405                Credentials::for_tests_with_session_token().into(),
406                SigningRegion::from(region),
407                SigningName::from_static("transcribe"),
408                SharedTimeSource::new(UNIX_EPOCH + Duration::new(1611160427, 0)),
409                (),
410            ));
411            let mut signatures = Vec::new();
412            for _ in 0..5 {
413                let signed = signer
414                    .sign(Message::new(&b"identical message"[..]))
415                    .unwrap();
416                if let HeaderValue::ByteArray(signature) = signed
417                    .headers()
418                    .iter()
419                    .find(|h| h.name().as_str() == ":chunk-signature")
420                    .unwrap()
421                    .value()
422                {
423                    signatures.push(signature.clone());
424                } else {
425                    panic!("failed to get the :chunk-signature")
426                }
427            }
428            for i in 1..signatures.len() {
429                assert_ne!(signatures[i - 1], signatures[i]);
430            }
431        }
432    }
433}
434
435#[cfg(test)]
436mod tests {
437    use super::*;
438    use crate::auth::{HttpSignatureType, SigningOptions};
439    use aws_credential_types::Credentials;
440    use aws_sigv4::http_request::SigningSettings;
441    use aws_smithy_types::config_bag::Layer;
442    use aws_smithy_types::Document;
443    use aws_types::region::SigningRegion;
444    use aws_types::SigningName;
445    use std::collections::HashMap;
446    use std::time::{Duration, SystemTime};
447    use tracing_test::traced_test;
448
449    #[test]
450    #[traced_test]
451    fn expiration_warning() {
452        let now = SystemTime::UNIX_EPOCH + Duration::from_secs(1000);
453        let creds_expire_in = Duration::from_secs(100);
454
455        let mut settings = SigningSettings::default();
456        settings.expires_in = Some(creds_expire_in - Duration::from_secs(10));
457
458        let identity = Credentials::new(
459            "test-access-key",
460            "test-secret-key",
461            Some("test-session-token".into()),
462            Some(now + creds_expire_in),
463            "test",
464        )
465        .into();
466        let operation_config = SigV4OperationSigningConfig {
467            region: Some(SigningRegion::from_static("test")),
468            name: Some(SigningName::from_static("test")),
469            signing_options: SigningOptions {
470                double_uri_encode: true,
471                content_sha256_header: true,
472                normalize_uri_path: true,
473                omit_session_token: true,
474                signature_type: HttpSignatureType::HttpRequestHeaders,
475                signing_optional: false,
476                expires_in: None,
477                payload_override: None,
478            },
479            ..Default::default()
480        };
481        SigV4Signer::signing_params(settings, &identity, &operation_config, now).unwrap();
482        assert!(!logs_contain(EXPIRATION_WARNING));
483
484        let mut settings = SigningSettings::default();
485        settings.expires_in = Some(creds_expire_in + Duration::from_secs(10));
486
487        SigV4Signer::signing_params(settings, &identity, &operation_config, now).unwrap();
488        assert!(logs_contain(EXPIRATION_WARNING));
489    }
490
491    #[test]
492    fn endpoint_config_overrides_region_and_service() {
493        let mut layer = Layer::new("test");
494        layer.store_put(SigV4OperationSigningConfig {
495            region: Some(SigningRegion::from_static("override-this-region")),
496            name: Some(SigningName::from_static("override-this-name")),
497            ..Default::default()
498        });
499        let config = Document::Object({
500            let mut out = HashMap::new();
501            out.insert("name".to_string(), "sigv4".to_string().into());
502            out.insert(
503                "signingName".to_string(),
504                "qldb-override".to_string().into(),
505            );
506            out.insert(
507                "signingRegion".to_string(),
508                "us-east-override".to_string().into(),
509            );
510            out
511        });
512        let config = AuthSchemeEndpointConfig::from(Some(&config));
513
514        let cfg = ConfigBag::of_layers(vec![layer]);
515        let result = SigV4Signer::extract_operation_config(config, &cfg).expect("success");
516
517        assert_eq!(
518            result.region,
519            Some(SigningRegion::from_static("us-east-override"))
520        );
521        assert_eq!(result.name, Some(SigningName::from_static("qldb-override")));
522        assert!(matches!(result, Cow::Owned(_)));
523    }
524
525    #[test]
526    fn endpoint_config_supports_fallback_when_region_or_service_are_unset() {
527        let mut layer = Layer::new("test");
528        layer.store_put(SigV4OperationSigningConfig {
529            region: Some(SigningRegion::from_static("us-east-1")),
530            name: Some(SigningName::from_static("qldb")),
531            ..Default::default()
532        });
533        let cfg = ConfigBag::of_layers(vec![layer]);
534        let config = AuthSchemeEndpointConfig::empty();
535
536        let result = SigV4Signer::extract_operation_config(config, &cfg).expect("success");
537
538        assert_eq!(result.region, Some(SigningRegion::from_static("us-east-1")));
539        assert_eq!(result.name, Some(SigningName::from_static("qldb")));
540        assert!(matches!(result, Cow::Borrowed(_)));
541    }
542}