|
|
package oss
|
|
|
|
|
|
import (
|
|
|
"crypto"
|
|
|
"crypto/md5"
|
|
|
"crypto/rsa"
|
|
|
"crypto/x509"
|
|
|
"encoding/base64"
|
|
|
"encoding/pem"
|
|
|
"errors"
|
|
|
"fmt"
|
|
|
"io/ioutil"
|
|
|
"net/http"
|
|
|
"strconv"
|
|
|
|
|
|
"github.com/astaxie/beego"
|
|
|
)
|
|
|
|
|
|
func ValidSignure(r *http.Request, requestBody []byte) bool {
|
|
|
if r.Method != "POST" {
|
|
|
beego.Error("request.Method!=post")
|
|
|
return false
|
|
|
}
|
|
|
// Get PublicKey bytes
|
|
|
bytePublicKey, err := getPublicKey(r)
|
|
|
if err != nil {
|
|
|
beego.Error(err)
|
|
|
return false
|
|
|
}
|
|
|
// Get Authorization bytes : decode from Base64String
|
|
|
byteAuthorization, err := getAuthorization(r)
|
|
|
if err != nil {
|
|
|
beego.Error(err)
|
|
|
return false
|
|
|
}
|
|
|
// Get MD5 bytes from Newly Constructed Authrization String.
|
|
|
byteMD5, err := getMD5FromNewAuthString(r, requestBody)
|
|
|
if err != nil {
|
|
|
beego.Error(err)
|
|
|
return false
|
|
|
}
|
|
|
|
|
|
// VerifySignature and response to client
|
|
|
if verifySignature(bytePublicKey, byteMD5, byteAuthorization) {
|
|
|
return true
|
|
|
} else {
|
|
|
beego.Error("verifySignature return false")
|
|
|
return false
|
|
|
}
|
|
|
|
|
|
return false
|
|
|
}
|
|
|
|
|
|
func handlerRequest(w http.ResponseWriter, r *http.Request) {
|
|
|
if r.Method == "POST" {
|
|
|
fmt.Println("\nHandle Post Request...")
|
|
|
|
|
|
// Get PublicKey bytes
|
|
|
bytePublicKey, err := getPublicKey(r)
|
|
|
if err != nil {
|
|
|
responseFailed(w)
|
|
|
return
|
|
|
}
|
|
|
beego.Debug("bytePublicKey:", string(bytePublicKey))
|
|
|
// Get Authorization bytes : decode from Base64String
|
|
|
byteAuthorization, err := getAuthorization(r)
|
|
|
if err != nil {
|
|
|
responseFailed(w)
|
|
|
return
|
|
|
}
|
|
|
beego.Debug("byteAuthorization:", string(byteAuthorization))
|
|
|
// Get MD5 bytes from Newly Constructed Authrization String.
|
|
|
byteMD5, err := getMD5FromNewAuthString(r, []byte{})
|
|
|
if err != nil {
|
|
|
responseFailed(w)
|
|
|
return
|
|
|
}
|
|
|
|
|
|
// VerifySignature and response to client
|
|
|
if verifySignature(bytePublicKey, byteMD5, byteAuthorization) {
|
|
|
|
|
|
// Do something you want accoding to callback_body ...
|
|
|
|
|
|
// response OK : 200
|
|
|
responseSuccess(w)
|
|
|
} else {
|
|
|
// response FAILED : 400
|
|
|
responseFailed(w)
|
|
|
}
|
|
|
}
|
|
|
}
|
|
|
|
|
|
// getPublicKey : Get PublicKey bytes from Request.URL
|
|
|
func getPublicKey(r *http.Request) ([]byte, error) {
|
|
|
var bytePublicKey []byte
|
|
|
|
|
|
// get PublicKey URL
|
|
|
publicKeyURLBase64 := r.Header.Get("x-oss-pub-key-url")
|
|
|
if publicKeyURLBase64 == "" {
|
|
|
fmt.Println("GetPublicKey from Request header failed : No x-oss-pub-key-url field. ")
|
|
|
return bytePublicKey, errors.New("no x-oss-pub-key-url field in Request header ")
|
|
|
}
|
|
|
publicKeyURL, _ := base64.StdEncoding.DecodeString(publicKeyURLBase64)
|
|
|
// get PublicKey Content from URL
|
|
|
responsePublicKeyURL, err := http.Get(string(publicKeyURL))
|
|
|
if err != nil {
|
|
|
fmt.Printf("Get PublicKey Content from URL failed : %s \n", err.Error())
|
|
|
return bytePublicKey, err
|
|
|
}
|
|
|
defer responsePublicKeyURL.Body.Close()
|
|
|
bytePublicKey, err = ioutil.ReadAll(responsePublicKeyURL.Body)
|
|
|
if err != nil {
|
|
|
fmt.Printf("Read PublicKey Content from URL failed : %s \n", err.Error())
|
|
|
return bytePublicKey, err
|
|
|
}
|
|
|
|
|
|
return bytePublicKey, nil
|
|
|
}
|
|
|
|
|
|
// getAuthorization : decode from Base64String
|
|
|
func getAuthorization(r *http.Request) ([]byte, error) {
|
|
|
var byteAuthorization []byte
|
|
|
|
|
|
strAuthorizationBase64 := r.Header.Get("authorization")
|
|
|
if strAuthorizationBase64 == "" {
|
|
|
fmt.Println("Failed to get authorization field from request header. ")
|
|
|
return byteAuthorization, errors.New("no authorization field in Request header")
|
|
|
}
|
|
|
byteAuthorization, _ = base64.StdEncoding.DecodeString(strAuthorizationBase64)
|
|
|
|
|
|
return byteAuthorization, nil
|
|
|
}
|
|
|
|
|
|
// getMD5FromNewAuthString : Get MD5 bytes from Newly Constructed Authrization String.
|
|
|
func getMD5FromNewAuthString(r *http.Request, requestBody []byte) ([]byte, error) {
|
|
|
var byteMD5 []byte
|
|
|
// Construct the New Auth String from URI+Query+Body
|
|
|
_, err := ioutil.ReadAll(r.Body)
|
|
|
r.Body.Close()
|
|
|
if err != nil {
|
|
|
fmt.Printf("Read Request Body failed : %s \n", err.Error())
|
|
|
return byteMD5, err
|
|
|
}
|
|
|
//strCallbackBody := string(bodyContent)
|
|
|
strCallbackBody := string(requestBody)
|
|
|
strURLPathDecode, errUnescape := unescapePath(r.URL.Path, encodePathSegment)
|
|
|
if errUnescape != nil {
|
|
|
fmt.Printf("url.PathUnescape failed : URL.Path=%s, error=%s \n", r.URL.Path, err.Error())
|
|
|
return byteMD5, errUnescape
|
|
|
}
|
|
|
|
|
|
// Generate New Auth String prepare for MD5
|
|
|
strAuth := ""
|
|
|
if r.URL.RawQuery == "" {
|
|
|
strAuth = fmt.Sprintf("%s\n%s", strURLPathDecode, strCallbackBody)
|
|
|
} else {
|
|
|
strAuth = fmt.Sprintf("%s?%s\n%s", strURLPathDecode, r.URL.RawQuery, strCallbackBody)
|
|
|
}
|
|
|
// Generate MD5 from the New Auth String
|
|
|
md5Ctx := md5.New()
|
|
|
md5Ctx.Write([]byte(strAuth))
|
|
|
byteMD5 = md5Ctx.Sum(nil)
|
|
|
|
|
|
return byteMD5, nil
|
|
|
}
|
|
|
|
|
|
// verifySignature
|
|
|
func verifySignature(bytePublicKey []byte, byteMd5 []byte, authorization []byte) bool {
|
|
|
pubBlock, _ := pem.Decode(bytePublicKey)
|
|
|
if pubBlock == nil {
|
|
|
beego.Error("Failed to parse PEM block containing the public key")
|
|
|
return false
|
|
|
}
|
|
|
pubInterface, err := x509.ParsePKIXPublicKey(pubBlock.Bytes)
|
|
|
if (pubInterface == nil) || (err != nil) {
|
|
|
beego.Error(fmt.Sprintf("x509.ParsePKIXPublicKey(publicKey) failed : %s \n", err.Error()))
|
|
|
return false
|
|
|
}
|
|
|
pub := pubInterface.(*rsa.PublicKey)
|
|
|
|
|
|
errorVerifyPKCS1v15 := rsa.VerifyPKCS1v15(pub, crypto.MD5, byteMd5, authorization)
|
|
|
if errorVerifyPKCS1v15 != nil {
|
|
|
beego.Error(fmt.Sprintf("Signature Verification is Failed : %s \n", errorVerifyPKCS1v15.Error()))
|
|
|
return false
|
|
|
}
|
|
|
|
|
|
fmt.Printf("Signature Verification is Successful. \n")
|
|
|
return true
|
|
|
}
|
|
|
|
|
|
// responseSuccess : Response 200 to client
|
|
|
func responseSuccess(w http.ResponseWriter) {
|
|
|
strResponseBody := "{\"Status\":\"OK\"}"
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
w.Header().Set("Content-Length", strconv.Itoa(len(strResponseBody)))
|
|
|
w.WriteHeader(http.StatusOK)
|
|
|
w.Write([]byte(strResponseBody))
|
|
|
fmt.Printf("\nPost Response : 200 OK . \n")
|
|
|
}
|
|
|
|
|
|
// responseFailed : Response 400 to client
|
|
|
func responseFailed(w http.ResponseWriter) {
|
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
|
fmt.Printf("\nPost Response : 400 BAD . \n")
|
|
|
}
|
|
|
|
|
|
func printByteArray(byteArrary []byte, arrName string) {
|
|
|
fmt.Printf("printByteArray : ArrayName=%s, ArrayLength=%d \n", arrName, len(byteArrary))
|
|
|
for i := 0; i < len(byteArrary); i++ {
|
|
|
fmt.Printf("%02x", byteArrary[i])
|
|
|
}
|
|
|
fmt.Printf("printByteArray : End . \n")
|
|
|
}
|
|
|
|
|
|
// EscapeError Escape Error
|
|
|
type EscapeError string
|
|
|
|
|
|
func (e EscapeError) Error() string {
|
|
|
return "invalid URL escape " + strconv.Quote(string(e))
|
|
|
}
|
|
|
|
|
|
// InvalidHostError Invalid Host Error
|
|
|
type InvalidHostError string
|
|
|
|
|
|
func (e InvalidHostError) Error() string {
|
|
|
return "invalid character " + strconv.Quote(string(e)) + " in host name"
|
|
|
}
|
|
|
|
|
|
type encoding int
|
|
|
|
|
|
const (
|
|
|
encodePath encoding = 1 + iota
|
|
|
encodePathSegment
|
|
|
encodeHost
|
|
|
encodeZone
|
|
|
encodeUserPassword
|
|
|
encodeQueryComponent
|
|
|
encodeFragment
|
|
|
)
|
|
|
|
|
|
// unescapePath : unescapes a string; the mode specifies, which section of the URL string is being unescaped.
|
|
|
func unescapePath(s string, mode encoding) (string, error) {
|
|
|
|
|
|
// Count %, check that they're well-formed.
|
|
|
mode = encodePathSegment
|
|
|
n := 0
|
|
|
hasPlus := false
|
|
|
for i := 0; i < len(s); {
|
|
|
switch s[i] {
|
|
|
case '%':
|
|
|
n++
|
|
|
if i+2 >= len(s) || !ishex(s[i+1]) || !ishex(s[i+2]) {
|
|
|
s = s[i:]
|
|
|
if len(s) > 3 {
|
|
|
s = s[:3]
|
|
|
}
|
|
|
return "", EscapeError(s)
|
|
|
}
|
|
|
// Per https://tools.ietf.org/html/rfc3986#page-21
|
|
|
// in the host component %-encoding can only be used
|
|
|
// for non-ASCII bytes.
|
|
|
// But https://tools.ietf.org/html/rfc6874#section-2
|
|
|
// introduces %25 being allowed to escape a percent sign
|
|
|
// in IPv6 scoped-address literals. Yay.
|
|
|
if mode == encodeHost && unhex(s[i+1]) < 8 && s[i:i+3] != "%25" {
|
|
|
return "", EscapeError(s[i : i+3])
|
|
|
}
|
|
|
if mode == encodeZone {
|
|
|
// RFC 6874 says basically "anything goes" for zone identifiers
|
|
|
// and that even non-ASCII can be redundantly escaped,
|
|
|
// but it seems prudent to restrict %-escaped bytes here to those
|
|
|
// that are valid host name bytes in their unescaped form.
|
|
|
// That is, you can use escaping in the zone identifier but not
|
|
|
// to introduce bytes you couldn't just write directly.
|
|
|
// But Windows puts spaces here! Yay.
|
|
|
v := unhex(s[i+1])<<4 | unhex(s[i+2])
|
|
|
if s[i:i+3] != "%25" && v != ' ' && shouldEscape(v, encodeHost) {
|
|
|
return "", EscapeError(s[i : i+3])
|
|
|
}
|
|
|
}
|
|
|
i += 3
|
|
|
case '+':
|
|
|
hasPlus = mode == encodeQueryComponent
|
|
|
i++
|
|
|
default:
|
|
|
if (mode == encodeHost || mode == encodeZone) && s[i] < 0x80 && shouldEscape(s[i], mode) {
|
|
|
return "", InvalidHostError(s[i : i+1])
|
|
|
}
|
|
|
i++
|
|
|
}
|
|
|
}
|
|
|
|
|
|
if n == 0 && !hasPlus {
|
|
|
return s, nil
|
|
|
}
|
|
|
|
|
|
t := make([]byte, len(s)-2*n)
|
|
|
j := 0
|
|
|
for i := 0; i < len(s); {
|
|
|
switch s[i] {
|
|
|
case '%':
|
|
|
t[j] = unhex(s[i+1])<<4 | unhex(s[i+2])
|
|
|
j++
|
|
|
i += 3
|
|
|
case '+':
|
|
|
if mode == encodeQueryComponent {
|
|
|
t[j] = ' '
|
|
|
} else {
|
|
|
t[j] = '+'
|
|
|
}
|
|
|
j++
|
|
|
i++
|
|
|
default:
|
|
|
t[j] = s[i]
|
|
|
j++
|
|
|
i++
|
|
|
}
|
|
|
}
|
|
|
return string(t), nil
|
|
|
}
|
|
|
|
|
|
// Please be informed that for now shouldEscape does not check all
|
|
|
// reserved characters correctly. See golang.org/issue/5684.
|
|
|
func shouldEscape(c byte, mode encoding) bool {
|
|
|
// §2.3 Unreserved characters (alphanum)
|
|
|
if 'A' <= c && c <= 'Z' || 'a' <= c && c <= 'z' || '0' <= c && c <= '9' {
|
|
|
return false
|
|
|
}
|
|
|
|
|
|
if mode == encodeHost || mode == encodeZone {
|
|
|
// §3.2.2 Host allows
|
|
|
// sub-delims = "!" / "$" / "&" / "'" / "(" / ")" / "*" / "+" / "," / ";" / "="
|
|
|
// as part of reg-name.
|
|
|
// We add : because we include :port as part of host.
|
|
|
// We add [ ] because we include [ipv6]:port as part of host.
|
|
|
// We add < > because they're the only characters left that
|
|
|
// we could possibly allow, and Parse will reject them if we
|
|
|
// escape them (because hosts can't use %-encoding for
|
|
|
// ASCII bytes).
|
|
|
switch c {
|
|
|
case '!', '$', '&', '\'', '(', ')', '*', '+', ',', ';', '=', ':', '[', ']', '<', '>', '"':
|
|
|
return false
|
|
|
}
|
|
|
}
|
|
|
|
|
|
switch c {
|
|
|
case '-', '_', '.', '~': // §2.3 Unreserved characters (mark)
|
|
|
return false
|
|
|
|
|
|
case '$', '&', '+', ',', '/', ':', ';', '=', '?', '@': // §2.2 Reserved characters (reserved)
|
|
|
// Different sections of the URL allow a few of
|
|
|
// the reserved characters to appear unescaped.
|
|
|
switch mode {
|
|
|
case encodePath: // §3.3
|
|
|
// The RFC allows : @ & = + $ but saves / ; , for assigning
|
|
|
// meaning to individual path segments. This package
|
|
|
// only manipulates the path as a whole, so we allow those
|
|
|
// last three as well. That leaves only ? to escape.
|
|
|
return c == '?'
|
|
|
|
|
|
case encodePathSegment: // §3.3
|
|
|
// The RFC allows : @ & = + $ but saves / ; , for assigning
|
|
|
// meaning to individual path segments.
|
|
|
return c == '/' || c == ';' || c == ',' || c == '?'
|
|
|
|
|
|
case encodeUserPassword: // §3.2.1
|
|
|
// The RFC allows ';', ':', '&', '=', '+', '$', and ',' in
|
|
|
// userinfo, so we must escape only '@', '/', and '?'.
|
|
|
// The parsing of userinfo treats ':' as special so we must escape
|
|
|
// that too.
|
|
|
return c == '@' || c == '/' || c == '?' || c == ':'
|
|
|
|
|
|
case encodeQueryComponent: // §3.4
|
|
|
// The RFC reserves (so we must escape) everything.
|
|
|
return true
|
|
|
|
|
|
case encodeFragment: // §4.1
|
|
|
// The RFC text is silent but the grammar allows
|
|
|
// everything, so escape nothing.
|
|
|
return false
|
|
|
}
|
|
|
}
|
|
|
|
|
|
// Everything else must be escaped.
|
|
|
return true
|
|
|
}
|
|
|
|
|
|
func ishex(c byte) bool {
|
|
|
switch {
|
|
|
case '0' <= c && c <= '9':
|
|
|
return true
|
|
|
case 'a' <= c && c <= 'f':
|
|
|
return true
|
|
|
case 'A' <= c && c <= 'F':
|
|
|
return true
|
|
|
}
|
|
|
return false
|
|
|
}
|
|
|
|
|
|
func unhex(c byte) byte {
|
|
|
switch {
|
|
|
case '0' <= c && c <= '9':
|
|
|
return c - '0'
|
|
|
case 'a' <= c && c <= 'f':
|
|
|
return c - 'a' + 10
|
|
|
case 'A' <= c && c <= 'F':
|
|
|
return c - 'A' + 10
|
|
|
}
|
|
|
return 0
|
|
|
} |
...
|
...
|
|