@ -195,7 +195,8 @@ func doesPolicySignatureMatch(formValues map[string]string) APIErrorCode {
}
}
// Verify if the region is valid.
// Verify if the region is valid.
if ! isValidRegion ( credHeader . scope . region , region ) {
sRegion := credHeader . scope . region
if ! isValidRegion ( sRegion , region ) {
return ErrInvalidRegion
return ErrInvalidRegion
}
}
@ -221,7 +222,7 @@ func doesPolicySignatureMatch(formValues map[string]string) APIErrorCode {
// doesPresignedSignatureMatch - Verify query headers with presigned signature
// doesPresignedSignatureMatch - Verify query headers with presigned signature
// - http://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-query-string-auth.html
// - http://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-query-string-auth.html
// returns true if matches, false otherwise. if error is not nil then it is always false
// returns true if matches, false otherwise. if error is not nil then it is always false
func doesPresignedSignatureMatch ( r * http . Request ) APIErrorCode {
func doesPresignedSignatureMatch ( r * http . Request , validateRegion bool ) APIErrorCode {
// Access credentials.
// Access credentials.
cred := serverConfig . GetCredential ( )
cred := serverConfig . GetCredential ( )
@ -244,9 +245,15 @@ func doesPresignedSignatureMatch(r *http.Request) APIErrorCode {
// Verify if region is valid.
// Verify if region is valid.
sRegion := preSignValues . Credential . scope . region
sRegion := preSignValues . Credential . scope . region
// Should validate region, only if region is set. Some operations
// do not need region validated for example GetBucketLocation.
if validateRegion {
if ! isValidRegion ( sRegion , region ) {
if ! isValidRegion ( sRegion , region ) {
return ErrInvalidRegion
return ErrInvalidRegion
}
}
} else {
region = sRegion
}
// Extract all the signed headers along with its values.
// Extract all the signed headers along with its values.
extractedSignedHeaders := extractSignedHeaders ( preSignValues . SignedHeaders , req . Header )
extractedSignedHeaders := extractSignedHeaders ( preSignValues . SignedHeaders , req . Header )
@ -267,7 +274,7 @@ func doesPresignedSignatureMatch(r *http.Request) APIErrorCode {
query . Set ( "X-Amz-Date" , t . Format ( iso8601Format ) )
query . Set ( "X-Amz-Date" , t . Format ( iso8601Format ) )
query . Set ( "X-Amz-Expires" , strconv . Itoa ( expireSeconds ) )
query . Set ( "X-Amz-Expires" , strconv . Itoa ( expireSeconds ) )
query . Set ( "X-Amz-SignedHeaders" , getSignedHeaders ( extractedSignedHeaders ) )
query . Set ( "X-Amz-SignedHeaders" , getSignedHeaders ( extractedSignedHeaders ) )
query . Set ( "X-Amz-Credential" , cred . AccessKeyID + "/" + getScope ( t , r egion) )
query . Set ( "X-Amz-Credential" , cred . AccessKeyID + "/" + getScope ( t , sR egion) )
// Save other headers available in the request parameters.
// Save other headers available in the request parameters.
for k , v := range req . URL . Query ( ) {
for k , v := range req . URL . Query ( ) {
@ -321,7 +328,7 @@ func doesPresignedSignatureMatch(r *http.Request) APIErrorCode {
// doesSignatureMatch - Verify authorization header with calculated header in accordance with
// doesSignatureMatch - Verify authorization header with calculated header in accordance with
// - http://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html
// - http://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html
// returns true if matches, false otherwise. if error is not nil then it is always false
// returns true if matches, false otherwise. if error is not nil then it is always false
func doesSignatureMatch ( hashedPayload string , r * http . Request ) APIErrorCode {
func doesSignatureMatch ( hashedPayload string , r * http . Request , validateRegion bool ) APIErrorCode {
// Access credentials.
// Access credentials.
cred := serverConfig . GetCredential ( )
cred := serverConfig . GetCredential ( )
@ -350,9 +357,15 @@ func doesSignatureMatch(hashedPayload string, r *http.Request) APIErrorCode {
// Verify if region is valid.
// Verify if region is valid.
sRegion := signV4Values . Credential . scope . region
sRegion := signV4Values . Credential . scope . region
// Should validate region, only if region is set. Some operations
// do not need region validated for example GetBucketLocation.
if validateRegion {
if ! isValidRegion ( sRegion , region ) {
if ! isValidRegion ( sRegion , region ) {
return ErrInvalidRegion
return ErrInvalidRegion
}
}
} else {
region = sRegion
}
// Extract date, if not present throw error.
// Extract date, if not present throw error.
var date string
var date string