sse.go 1.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354
  1. package s3
  2. import (
  3. "crypto/md5"
  4. "encoding/base64"
  5. "github.com/aws/aws-sdk-go/aws/awserr"
  6. "github.com/aws/aws-sdk-go/aws/request"
  7. )
  8. var errSSERequiresSSL = awserr.New("ConfigError", "cannot send SSE keys over HTTP.", nil)
  9. func validateSSERequiresSSL(r *request.Request) {
  10. if r.HTTPRequest.URL.Scheme == "https" {
  11. return
  12. }
  13. if iface, ok := r.Params.(sseCustomerKeyGetter); ok {
  14. if len(iface.getSSECustomerKey()) > 0 {
  15. r.Error = errSSERequiresSSL
  16. return
  17. }
  18. }
  19. if iface, ok := r.Params.(copySourceSSECustomerKeyGetter); ok {
  20. if len(iface.getCopySourceSSECustomerKey()) > 0 {
  21. r.Error = errSSERequiresSSL
  22. return
  23. }
  24. }
  25. }
  26. func computeSSEKeys(r *request.Request) {
  27. headers := []string{
  28. "x-amz-server-side-encryption-customer-key",
  29. "x-amz-copy-source-server-side-encryption-customer-key",
  30. }
  31. for _, h := range headers {
  32. md5h := h + "-md5"
  33. if key := r.HTTPRequest.Header.Get(h); key != "" {
  34. // Base64-encode the value
  35. b64v := base64.StdEncoding.EncodeToString([]byte(key))
  36. r.HTTPRequest.Header.Set(h, b64v)
  37. // Add MD5 if it wasn't computed
  38. if r.HTTPRequest.Header.Get(md5h) == "" {
  39. sum := md5.Sum([]byte(key))
  40. b64sum := base64.StdEncoding.EncodeToString(sum[:])
  41. r.HTTPRequest.Header.Set(md5h, b64sum)
  42. }
  43. }
  44. }
  45. }