oss_auth.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570
  1. #include "oss_auth.h"
  2. #include "aos_log.h"
  3. #include "oss_util.h"
  4. static const char *g_s_oss_sub_resource_list[] = {
  5. "acl",
  6. "uploadId",
  7. "uploads",
  8. "partNumber",
  9. "response-content-type",
  10. "response-content-language",
  11. "response-expires",
  12. "response-cache-control",
  13. "response-content-disposition",
  14. "response-content-encoding",
  15. "append",
  16. "position",
  17. "lifecycle",
  18. "delete",
  19. "live",
  20. "status",
  21. "comp",
  22. "vod",
  23. "startTime",
  24. "endTime",
  25. "x-oss-process",
  26. "security-token",
  27. NULL,
  28. };
  29. static int is_oss_sub_resource(const char *str);
  30. static int is_oss_canonicalized_header(const char *str);
  31. static int oss_get_canonicalized_headers(aos_pool_t *p,
  32. const aos_table_t *headers, aos_buf_t *signbuf);
  33. static int oss_get_canonicalized_resource(aos_pool_t *p,
  34. const aos_table_t *params, aos_buf_t *signbuf);
  35. static int oss_get_canonicalized_params(aos_pool_t *p,
  36. const aos_table_t *params, aos_buf_t *signbuf);
  37. static int is_oss_sub_resource(const char *str)
  38. {
  39. int i = 0;
  40. for ( ; g_s_oss_sub_resource_list[i]; i++) {
  41. if (apr_strnatcmp(g_s_oss_sub_resource_list[i], str) == 0) {
  42. return 1;
  43. }
  44. }
  45. return 0;
  46. }
  47. static int is_oss_canonicalized_header(const char *str)
  48. {
  49. size_t len = strlen(OSS_CANNONICALIZED_HEADER_PREFIX);
  50. return strncasecmp(str, OSS_CANNONICALIZED_HEADER_PREFIX, len) == 0;
  51. }
  52. static int oss_get_canonicalized_headers(aos_pool_t *p,
  53. const aos_table_t *headers,
  54. aos_buf_t *signbuf)
  55. {
  56. int pos;
  57. int meta_count = 0;
  58. int i;
  59. int len;
  60. const aos_array_header_t *tarr;
  61. const aos_table_entry_t *telts;
  62. char **meta_headers;
  63. const char *value;
  64. aos_string_t tmp_str;
  65. char *tmpbuf = (char*)malloc(AOS_MAX_HEADER_LEN + 1);
  66. if (NULL == tmpbuf) {
  67. aos_error_log("malloc %d memory failed.", AOS_MAX_HEADER_LEN + 1);
  68. return AOSE_OVER_MEMORY;
  69. }
  70. if (apr_is_empty_table(headers)) {
  71. free(tmpbuf);
  72. return AOSE_OK;
  73. }
  74. // sort user meta header
  75. tarr = aos_table_elts(headers);
  76. telts = (aos_table_entry_t*)tarr->elts;
  77. meta_headers = aos_pcalloc(p, tarr->nelts * sizeof(char*));
  78. for (pos = 0; pos < tarr->nelts; ++pos) {
  79. if (is_oss_canonicalized_header(telts[pos].key)) {
  80. aos_string_t key = aos_string(telts[pos].key);
  81. aos_string_tolower(&key);
  82. meta_headers[meta_count++] = key.data;
  83. }
  84. }
  85. if (meta_count == 0) {
  86. free(tmpbuf);
  87. return AOSE_OK;
  88. }
  89. aos_gnome_sort((const char **)meta_headers, meta_count);
  90. // sign string
  91. for (i = 0; i < meta_count; ++i) {
  92. value = apr_table_get(headers, meta_headers[i]);
  93. aos_str_set(&tmp_str, value);
  94. aos_strip_space(&tmp_str);
  95. len = apr_snprintf(tmpbuf, AOS_MAX_HEADER_LEN + 1, "%s:%.*s",
  96. meta_headers[i], tmp_str.len, tmp_str.data);
  97. if (len > AOS_MAX_HEADER_LEN) {
  98. free(tmpbuf);
  99. aos_error_log("user meta header too many, %d > %d.",
  100. len, AOS_MAX_HEADER_LEN);
  101. return AOSE_INVALID_ARGUMENT;
  102. }
  103. tmp_str.data = tmpbuf;
  104. tmp_str.len = len;
  105. aos_buf_append_string(p, signbuf, tmpbuf, len);
  106. aos_buf_append_string(p, signbuf, "\n", sizeof("\n")-1);
  107. }
  108. free(tmpbuf);
  109. return AOSE_OK;
  110. }
  111. static int oss_get_canonicalized_resource(aos_pool_t *p,
  112. const aos_table_t *params,
  113. aos_buf_t *signbuf)
  114. {
  115. int pos;
  116. int subres_count = 0;
  117. int i;
  118. int len;
  119. char sep;
  120. const char *value;
  121. char tmpbuf[AOS_MAX_QUERY_ARG_LEN+1];
  122. char **subres_headers;
  123. const aos_array_header_t *tarr;
  124. const aos_table_entry_t *telts;
  125. if (apr_is_empty_table(params)) {
  126. return AOSE_OK;
  127. }
  128. // sort sub resource param
  129. tarr = aos_table_elts(params);
  130. telts = (aos_table_entry_t*)tarr->elts;
  131. subres_headers = aos_pcalloc(p, tarr->nelts * sizeof(char*));
  132. for (pos = 0; pos < tarr->nelts; ++pos) {
  133. if (is_oss_sub_resource(telts[pos].key)) {
  134. subres_headers[subres_count++] = telts[pos].key;
  135. }
  136. }
  137. if (subres_count == 0) {
  138. return AOSE_OK;
  139. }
  140. aos_gnome_sort((const char **)subres_headers, subres_count);
  141. // sign string
  142. sep = '?';
  143. for (i = 0; i < subres_count; ++i) {
  144. value = apr_table_get(params, subres_headers[i]);
  145. if (value != NULL && *value != '\0') {
  146. len = apr_snprintf(tmpbuf, sizeof(tmpbuf), "%c%s=%s",
  147. sep, subres_headers[i], value);
  148. } else {
  149. len = apr_snprintf(tmpbuf, sizeof(tmpbuf), "%c%s",
  150. sep, subres_headers[i]);
  151. }
  152. if (len >= AOS_MAX_QUERY_ARG_LEN) {
  153. aos_error_log("http query params too long, %s.", tmpbuf);
  154. return AOSE_INVALID_ARGUMENT;
  155. }
  156. aos_buf_append_string(p, signbuf, tmpbuf, len);
  157. sep = '&';
  158. }
  159. return AOSE_OK;
  160. }
  161. int oss_get_string_to_sign(aos_pool_t *p,
  162. http_method_e method,
  163. const aos_string_t *canon_res,
  164. const aos_table_t *headers,
  165. const aos_table_t *params,
  166. aos_string_t *signstr)
  167. {
  168. int res;
  169. aos_buf_t *signbuf;
  170. const char *value;
  171. aos_str_null(signstr);
  172. signbuf = aos_create_buf(p, 1024);
  173. #define signbuf_append_from_headers(KEY) do { \
  174. if ((value = apr_table_get(headers, KEY)) != NULL) { \
  175. aos_buf_append_string(p, signbuf, value, strlen(value)); \
  176. } \
  177. aos_buf_append_string(p, signbuf, "\n", sizeof("\n")-1); \
  178. } while (0)
  179. #define signbuf_append(VALUE, LEN) do { \
  180. aos_buf_append_string(p, signbuf, VALUE, LEN); \
  181. aos_buf_append_string(p, signbuf, "\n", sizeof("\n")-1); \
  182. } while (0)
  183. value = aos_http_method_to_string(method);
  184. signbuf_append(value, strlen(value));
  185. signbuf_append_from_headers(OSS_CONTENT_MD5);
  186. signbuf_append_from_headers(OSS_CONTENT_TYPE);
  187. // date
  188. if ((value = apr_table_get(headers, OSS_CANNONICALIZED_HEADER_DATE)) == NULL) {
  189. value = apr_table_get(headers, OSS_DATE);
  190. }
  191. if (NULL == value || *value == '\0') {
  192. aos_error_log("http header date is empty.");
  193. return AOSE_INVALID_ARGUMENT;
  194. }
  195. signbuf_append(value, strlen(value));
  196. // user meta headers
  197. if ((res = oss_get_canonicalized_headers(p, headers, signbuf)) != AOSE_OK) {
  198. return res;
  199. }
  200. // canonicalized resource
  201. aos_buf_append_string(p, signbuf, canon_res->data, canon_res->len);
  202. if (params != NULL && (res = oss_get_canonicalized_resource(p, params, signbuf)) != AOSE_OK) {
  203. return res;
  204. }
  205. // result
  206. signstr->data = (char *)signbuf->pos;
  207. signstr->len = aos_buf_size(signbuf);
  208. return AOSE_OK;
  209. }
  210. void oss_sign_headers(aos_pool_t *p,
  211. const aos_string_t *signstr,
  212. const aos_string_t *access_key_id,
  213. const aos_string_t *access_key_secret,
  214. aos_table_t *headers)
  215. {
  216. int b64Len;
  217. char *value;
  218. unsigned char hmac[20];
  219. char b64[((20 + 1) * 4) / 3];
  220. HMAC_SHA1(hmac, (unsigned char *)access_key_secret->data, access_key_secret->len,
  221. (unsigned char *)signstr->data, signstr->len);
  222. // Now base-64 encode the results
  223. b64Len = aos_base64_encode(hmac, 20, b64);
  224. value = apr_psprintf(p, "OSS %.*s:%.*s", access_key_id->len, access_key_id->data, b64Len, b64);
  225. apr_table_addn(headers, OSS_AUTHORIZATION, value);
  226. return;
  227. }
  228. int oss_get_signed_headers(aos_pool_t *p,
  229. const aos_string_t *access_key_id,
  230. const aos_string_t *access_key_secret,
  231. const aos_string_t* canon_res,
  232. aos_http_request_t *req)
  233. {
  234. int res;
  235. aos_string_t signstr;
  236. res = oss_get_string_to_sign(p, req->method, canon_res,
  237. req->headers, req->query_params, &signstr);
  238. if (res != AOSE_OK) {
  239. return res;
  240. }
  241. aos_debug_log("signstr:%.*s.", signstr.len, signstr.data);
  242. oss_sign_headers(p, &signstr, access_key_id, access_key_secret, req->headers);
  243. return AOSE_OK;
  244. }
  245. int oss_sign_request(aos_http_request_t *req,
  246. const oss_config_t *config)
  247. {
  248. aos_string_t canon_res;
  249. char canon_buf[AOS_MAX_URI_LEN];
  250. char datestr[AOS_MAX_GMT_TIME_LEN];
  251. const char *value;
  252. int res = AOSE_OK;
  253. int len = 0;
  254. len = strlen(req->resource);
  255. if (len >= AOS_MAX_URI_LEN - 1) {
  256. aos_error_log("http resource too long, %s.", req->resource);
  257. return AOSE_INVALID_ARGUMENT;
  258. }
  259. canon_res.data = canon_buf;
  260. canon_res.len = apr_snprintf(canon_buf, sizeof(canon_buf), "/%s", req->resource);
  261. if ((value = apr_table_get(req->headers, OSS_CANNONICALIZED_HEADER_DATE)) == NULL) {
  262. aos_get_gmt_str_time(datestr);
  263. apr_table_set(req->headers, OSS_DATE, datestr);
  264. }
  265. res = oss_get_signed_headers(req->pool, &config->access_key_id,
  266. &config->access_key_secret, &canon_res, req);
  267. return res;
  268. }
  269. int get_oss_request_signature(const oss_request_options_t *options,
  270. aos_http_request_t *req,
  271. const aos_string_t *expires,
  272. aos_string_t *signature)
  273. {
  274. aos_string_t canon_res;
  275. char canon_buf[AOS_MAX_URI_LEN];
  276. const char *value;
  277. aos_string_t signstr;
  278. int res = AOSE_OK;
  279. int b64Len;
  280. unsigned char hmac[20];
  281. char b64[((20 + 1) * 4) / 3];
  282. canon_res.data = canon_buf;
  283. canon_res.len = apr_snprintf(canon_buf, sizeof(canon_buf), "/%s", req->resource);
  284. apr_table_set(req->headers, OSS_DATE, expires->data);
  285. if ((res = oss_get_string_to_sign(options->pool, req->method, &canon_res,
  286. req->headers, req->query_params, &signstr))!= AOSE_OK) {
  287. return res;
  288. }
  289. HMAC_SHA1(hmac, (unsigned char *)options->config->access_key_secret.data,
  290. options->config->access_key_secret.len,
  291. (unsigned char *)signstr.data, signstr.len);
  292. b64Len = aos_base64_encode(hmac, 20, b64);
  293. value = apr_psprintf(options->pool, "%.*s", b64Len, b64);
  294. aos_str_set(signature, value);
  295. return res;
  296. }
  297. int oss_get_signed_url(const oss_request_options_t *options,
  298. aos_http_request_t *req,
  299. const aos_string_t *expires,
  300. aos_string_t *signed_url)
  301. {
  302. char *signed_url_str;
  303. aos_string_t querystr;
  304. char uristr[3*AOS_MAX_URI_LEN+1];
  305. int res = AOSE_OK;
  306. aos_string_t signature;
  307. const char *proto;
  308. if (options->config->sts_token.data != NULL) {
  309. apr_table_set(req->query_params, OSS_SECURITY_TOKEN, options->config->sts_token.data);
  310. }
  311. res = get_oss_request_signature(options, req, expires, &signature);
  312. if (res != AOSE_OK) {
  313. return res;
  314. }
  315. apr_table_set(req->query_params, OSS_ACCESSKEYID, options->config->access_key_id.data);
  316. apr_table_set(req->query_params, OSS_EXPIRES, expires->data);
  317. apr_table_set(req->query_params, OSS_SIGNATURE, signature.data);
  318. uristr[0] = '\0';
  319. aos_str_null(&querystr);
  320. res = aos_url_encode(uristr, req->uri, AOS_MAX_URI_LEN);
  321. if (res != AOSE_OK) {
  322. return res;
  323. }
  324. res = aos_query_params_to_string(options->pool, req->query_params, &querystr);
  325. if (res != AOSE_OK) {
  326. return res;
  327. }
  328. proto = strlen(req->proto) != 0 ? req->proto : AOS_HTTP_PREFIX;
  329. signed_url_str = apr_psprintf(options->pool, "%s%s/%s%.*s",
  330. proto, req->host, uristr,
  331. querystr.len, querystr.data);
  332. aos_str_set(signed_url, signed_url_str);
  333. return res;
  334. }
  335. int oss_get_rtmp_signed_url(const oss_request_options_t *options,
  336. aos_http_request_t *req,
  337. const aos_string_t *expires,
  338. const aos_string_t *play_list_name,
  339. aos_table_t *params,
  340. aos_string_t *signed_url)
  341. {
  342. char *signed_url_str;
  343. aos_string_t querystr;
  344. char uristr[3*AOS_MAX_URI_LEN+1];
  345. int res = AOSE_OK;
  346. aos_string_t signature;
  347. int pos = 0;
  348. const aos_array_header_t *tarr;
  349. const aos_table_entry_t *telts;
  350. if (NULL != params) {
  351. tarr = aos_table_elts(params);
  352. telts = (aos_table_entry_t*)tarr->elts;
  353. for (pos = 0; pos < tarr->nelts; ++pos) {
  354. apr_table_set(req->query_params, telts[pos].key, telts[pos].val);
  355. }
  356. }
  357. apr_table_set(req->query_params, OSS_PLAY_LIST_NAME, play_list_name->data);
  358. res = get_oss_rtmp_request_signature(options, req, expires,&signature);
  359. if (res != AOSE_OK) {
  360. return res;
  361. }
  362. apr_table_set(req->query_params, OSS_ACCESSKEYID,
  363. options->config->access_key_id.data);
  364. apr_table_set(req->query_params, OSS_EXPIRES, expires->data);
  365. apr_table_set(req->query_params, OSS_SIGNATURE, signature.data);
  366. uristr[0] = '\0';
  367. aos_str_null(&querystr);
  368. res = aos_url_encode(uristr, req->uri, AOS_MAX_URI_LEN);
  369. if (res != AOSE_OK) {
  370. return res;
  371. }
  372. res = aos_query_params_to_string(options->pool, req->query_params, &querystr);
  373. if (res != AOSE_OK) {
  374. return res;
  375. }
  376. signed_url_str = apr_psprintf(options->pool, "%s%s/%s%.*s",
  377. req->proto, req->host, uristr,
  378. querystr.len, querystr.data);
  379. aos_str_set(signed_url, signed_url_str);
  380. return res;
  381. }
  382. int get_oss_rtmp_request_signature(const oss_request_options_t *options,
  383. aos_http_request_t *req,
  384. const aos_string_t *expires,
  385. aos_string_t *signature)
  386. {
  387. aos_string_t canon_res;
  388. char canon_buf[AOS_MAX_URI_LEN];
  389. const char *value;
  390. aos_string_t signstr;
  391. int res = AOSE_OK;
  392. int b64Len;
  393. unsigned char hmac[20];
  394. char b64[((20 + 1) * 4) / 3];
  395. canon_res.data = canon_buf;
  396. canon_res.len = apr_snprintf(canon_buf, sizeof(canon_buf), "/%s", req->resource);
  397. if ((res = oss_get_rtmp_string_to_sign(options->pool, expires, &canon_res,
  398. req->query_params, &signstr))!= AOSE_OK) {
  399. return res;
  400. }
  401. HMAC_SHA1(hmac, (unsigned char *)options->config->access_key_secret.data,
  402. options->config->access_key_secret.len,
  403. (unsigned char *)signstr.data, signstr.len);
  404. b64Len = aos_base64_encode(hmac, 20, b64);
  405. value = apr_psprintf(options->pool, "%.*s", b64Len, b64);
  406. aos_str_set(signature, value);
  407. return res;
  408. }
  409. int oss_get_rtmp_string_to_sign(aos_pool_t *p,
  410. const aos_string_t *expires,
  411. const aos_string_t *canon_res,
  412. const aos_table_t *params,
  413. aos_string_t *signstr)
  414. {
  415. int res;
  416. aos_buf_t *signbuf;
  417. aos_str_null(signstr);
  418. signbuf = aos_create_buf(p, 1024);
  419. // expires
  420. aos_buf_append_string(p, signbuf, expires->data, expires->len);
  421. aos_buf_append_string(p, signbuf, "\n", sizeof("\n")-1);
  422. // canonicalized params
  423. if ((res = oss_get_canonicalized_params(p, params, signbuf)) != AOSE_OK) {
  424. return res;
  425. }
  426. // canonicalized resource
  427. aos_buf_append_string(p, signbuf, canon_res->data, canon_res->len);
  428. // result
  429. signstr->data = (char *)signbuf->pos;
  430. signstr->len = aos_buf_size(signbuf);
  431. return AOSE_OK;
  432. }
  433. static int oss_get_canonicalized_params(aos_pool_t *p,
  434. const aos_table_t *params,
  435. aos_buf_t *signbuf)
  436. {
  437. int pos;
  438. int meta_count = 0;
  439. int i;
  440. int len;
  441. const aos_array_header_t *tarr;
  442. const aos_table_entry_t *telts;
  443. char **meta_headers;
  444. const char *value;
  445. aos_string_t tmp_str;
  446. char *tmpbuf = (char*)malloc(AOS_MAX_HEADER_LEN + 1);
  447. if (NULL == tmpbuf) {
  448. aos_error_log("malloc %d memory failed.", AOS_MAX_HEADER_LEN + 1);
  449. return AOSE_OVER_MEMORY;
  450. }
  451. if (apr_is_empty_table(params)) {
  452. free(tmpbuf);
  453. return AOSE_OK;
  454. }
  455. // sort user meta header
  456. tarr = aos_table_elts(params);
  457. telts = (aos_table_entry_t*)tarr->elts;
  458. meta_headers = aos_pcalloc(p, tarr->nelts * sizeof(char*));
  459. for (pos = 0; pos < tarr->nelts; ++pos) {
  460. aos_string_t key = aos_string(telts[pos].key);
  461. meta_headers[meta_count++] = key.data;
  462. }
  463. if (meta_count == 0) {
  464. free(tmpbuf);
  465. return AOSE_OK;
  466. }
  467. aos_gnome_sort((const char **)meta_headers, meta_count);
  468. // sign string
  469. for (i = 0; i < meta_count; ++i) {
  470. value = apr_table_get(params, meta_headers[i]);
  471. aos_str_set(&tmp_str, value);
  472. aos_strip_space(&tmp_str);
  473. len = apr_snprintf(tmpbuf, AOS_MAX_HEADER_LEN + 1, "%s:%.*s",
  474. meta_headers[i], tmp_str.len, tmp_str.data);
  475. if (len > AOS_MAX_HEADER_LEN) {
  476. free(tmpbuf);
  477. aos_error_log("rtmp parameters too many, %d > %d.",
  478. len, AOS_MAX_HEADER_LEN);
  479. return AOSE_INVALID_ARGUMENT;
  480. }
  481. tmp_str.data = tmpbuf;
  482. tmp_str.len = len;
  483. aos_buf_append_string(p, signbuf, tmpbuf, len);
  484. aos_buf_append_string(p, signbuf, "\n", sizeof("\n")-1);
  485. }
  486. free(tmpbuf);
  487. return AOSE_OK;
  488. }