123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051 |
- package security
- import (
- "crypto/hmac"
- "crypto/sha256"
- "encoding/base64"
- "slices"
- "github.com/imgproxy/imgproxy/v3/config"
- )
- func VerifySignature(signature, path string) error {
- if len(config.Keys) == 0 || len(config.Salts) == 0 {
- return nil
- }
- if slices.Contains(config.TrustedSignatures, signature) {
- return nil
- }
- messageMAC, err := base64.RawURLEncoding.DecodeString(signature)
- if err != nil {
- return newSignatureError("Invalid signature encoding")
- }
- for i := 0; i < len(config.Keys); i++ {
- if hmac.Equal(messageMAC, signatureFor(path, config.Keys[i], config.Salts[i], config.SignatureSize)) {
- return nil
- }
- }
- return newSignatureError("Invalid signature")
- }
- func signatureFor(str string, key, salt []byte, signatureSize int) []byte {
- mac := hmac.New(sha256.New, key)
- mac.Write(salt)
- // It's supposed that path starts with '/'. However, if and input path comes with the
- // leading slash split, let's re-add it here.
- if str[0] != '/' {
- mac.Write([]byte{'/'})
- }
- mac.Write([]byte(str))
- expectedMAC := mac.Sum(nil)
- if signatureSize < 32 {
- return expectedMAC[:signatureSize]
- }
- return expectedMAC
- }
|