sigv4_test.go 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318
  1. package sigv4
  2. import (
  3. "bytes"
  4. "context"
  5. "crypto/hmac"
  6. "crypto/sha256"
  7. "encoding/hex"
  8. "fmt"
  9. "io"
  10. "net/http"
  11. "net/http/httptest"
  12. "testing"
  13. "time"
  14. "github.com/stretchr/testify/assert"
  15. "github.com/stretchr/testify/require"
  16. )
  17. func TestValidateSigV4Middleware(t *testing.T) {
  18. tests := []struct {
  19. name string
  20. setupRequest func() *http.Request
  21. expectError bool
  22. expectedStatus int
  23. expectedCode string
  24. }{
  25. {
  26. name: "Valid signature",
  27. setupRequest: func() *http.Request {
  28. body := []byte("Action=GetCallerIdentity&Version=2011-06-15")
  29. req := createSignedRequest(t, "POST", "/", body, mockCredentials["AKIAIOSFODNN7EXAMPLE"])
  30. return req
  31. },
  32. expectError: false,
  33. expectedStatus: http.StatusOK,
  34. },
  35. {
  36. name: "Missing authorization header",
  37. setupRequest: func() *http.Request {
  38. req := httptest.NewRequest("POST", "/", bytes.NewReader([]byte("test")))
  39. req.Header.Set("X-Amz-Date", time.Now().UTC().Format("20060102T150405Z"))
  40. return req
  41. },
  42. expectError: true,
  43. expectedStatus: http.StatusForbidden,
  44. expectedCode: "MissingAuthenticationToken",
  45. },
  46. {
  47. name: "Invalid access key",
  48. setupRequest: func() *http.Request {
  49. body := []byte("Action=GetCallerIdentity&Version=2011-06-15")
  50. invalidCreds := AWSCredentials{
  51. AccessKeyID: "INVALID_KEY",
  52. SecretAccessKey: "invalid-secret",
  53. AccountID: "123456789012",
  54. }
  55. req := createSignedRequest(t, "POST", "/", body, invalidCreds)
  56. return req
  57. },
  58. expectError: true,
  59. expectedStatus: http.StatusForbidden,
  60. expectedCode: "InvalidClientTokenId",
  61. },
  62. {
  63. name: "Expired request",
  64. setupRequest: func() *http.Request {
  65. body := []byte("Action=GetCallerIdentity&Version=2011-06-15")
  66. req := createSignedRequest(t, "POST", "/", body, mockCredentials["AKIAIOSFODNN7EXAMPLE"])
  67. // Set date to 20 minutes ago
  68. expiredDate := time.Now().UTC().Add(-20 * time.Minute).Format("20060102T150405Z")
  69. req.Header.Set("X-Amz-Date", expiredDate)
  70. return req
  71. },
  72. expectError: true,
  73. expectedStatus: http.StatusForbidden,
  74. expectedCode: "RequestExpired",
  75. },
  76. {
  77. name: "Invalid signature",
  78. setupRequest: func() *http.Request {
  79. body := []byte("Action=GetCallerIdentity&Version=2011-06-15")
  80. req := createSignedRequest(t, "POST", "/", body, mockCredentials["AKIAIOSFODNN7EXAMPLE"])
  81. // Tamper with signature
  82. authHeader := req.Header.Get("Authorization")
  83. authHeader = authHeader[:len(authHeader)-10] + "0000000000"
  84. req.Header.Set("Authorization", authHeader)
  85. return req
  86. },
  87. expectError: true,
  88. expectedStatus: http.StatusForbidden,
  89. expectedCode: "SignatureDoesNotMatch",
  90. },
  91. {
  92. name: "Missing X-Amz-Date header",
  93. setupRequest: func() *http.Request {
  94. body := []byte("Action=GetCallerIdentity&Version=2011-06-15")
  95. req := createSignedRequest(t, "POST", "/", body, mockCredentials["AKIAIOSFODNN7EXAMPLE"])
  96. req.Header.Del("X-Amz-Date")
  97. return req
  98. },
  99. expectError: true,
  100. expectedStatus: http.StatusForbidden,
  101. expectedCode: "InvalidRequest",
  102. },
  103. }
  104. for _, tt := range tests {
  105. t.Run(tt.name, func(t *testing.T) {
  106. // Create test handler
  107. testHandler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  108. w.WriteHeader(http.StatusOK)
  109. w.Write([]byte("OK"))
  110. })
  111. // Wrap with middleware
  112. handler := ValidateSigV4Middleware(testHandler)
  113. // Create test request and recorder
  114. req := tt.setupRequest()
  115. rr := httptest.NewRecorder()
  116. // Execute request
  117. handler.ServeHTTP(rr, req)
  118. // Assert status code
  119. assert.Equal(t, tt.expectedStatus, rr.Code, "Status code mismatch")
  120. if tt.expectError {
  121. body := rr.Body.String()
  122. assert.Contains(t, body, tt.expectedCode, "Expected error code not found in response")
  123. }
  124. })
  125. }
  126. }
  127. func TestParseSigV4Header(t *testing.T) {
  128. tests := []struct {
  129. name string
  130. authHeader string
  131. expectError bool
  132. validate func(*testing.T, *sigV4Components)
  133. }{
  134. {
  135. name: "Valid SigV4 header",
  136. authHeader: "AWS4-HMAC-SHA256 Credential=AKIAIOSFODNN7EXAMPLE/20231016/us-east-1/sts/aws4_request, " +
  137. "SignedHeaders=content-type;host;x-amz-date, Signature=abcd1234",
  138. expectError: false,
  139. validate: func(t *testing.T, sig *sigV4Components) {
  140. assert.Equal(t, "AKIAIOSFODNN7EXAMPLE", sig.AccessKeyID)
  141. assert.Equal(t, "20231016", sig.Date)
  142. assert.Equal(t, "us-east-1", sig.Region)
  143. assert.Equal(t, "sts", sig.Service)
  144. assert.Equal(t, "abcd1234", sig.Signature)
  145. assert.Equal(t, []string{"content-type", "host", "x-amz-date"}, sig.SignedHeaders)
  146. },
  147. },
  148. {
  149. name: "Missing algorithm prefix",
  150. authHeader: "Credential=AKIAIOSFODNN7EXAMPLE/20231016/us-east-1/sts/aws4_request",
  151. expectError: true,
  152. },
  153. {
  154. name: "Missing credential",
  155. authHeader: "AWS4-HMAC-SHA256 SignedHeaders=host, Signature=abcd1234",
  156. expectError: true,
  157. },
  158. {
  159. name: "Missing signature",
  160. authHeader: "AWS4-HMAC-SHA256 Credential=AKIAIOSFODNN7EXAMPLE/20231016/us-east-1/sts/aws4_request",
  161. expectError: true,
  162. },
  163. }
  164. for _, tt := range tests {
  165. t.Run(tt.name, func(t *testing.T) {
  166. sig, err := parseSigV4Header(tt.authHeader)
  167. if tt.expectError {
  168. assert.Error(t, err)
  169. } else {
  170. require.NoError(t, err)
  171. if tt.validate != nil {
  172. tt.validate(t, sig)
  173. }
  174. }
  175. })
  176. }
  177. }
  178. func TestCalculateSignature(t *testing.T) {
  179. creds := mockCredentials["AKIAIOSFODNN7EXAMPLE"]
  180. body := []byte("Action=GetCallerIdentity&Version=2011-06-15")
  181. req := httptest.NewRequest("POST", "/", bytes.NewReader(body))
  182. req.Header.Set("Content-Type", "application/x-www-form-urlencoded; charset=utf-8")
  183. req.Header.Set("Host", "sts.us-east-1.amazonaws.com")
  184. req.Header.Set("X-Amz-Date", "20231016T120000Z")
  185. sigV4 := &sigV4Components{
  186. AccessKeyID: creds.AccessKeyID,
  187. Date: "20231016",
  188. Region: "us-east-1",
  189. Service: "sts",
  190. CredentialScope: "20231016/us-east-1/sts/aws4_request",
  191. SignedHeaders: []string{"content-type", "host", "x-amz-date"},
  192. }
  193. signature, err := calculateSignature(req, body, creds, sigV4)
  194. require.NoError(t, err)
  195. assert.NotEmpty(t, signature)
  196. assert.Len(t, signature, 64) // SHA256 hex string length
  197. }
  198. func TestHMACFunctions(t *testing.T) {
  199. t.Run("hmacSHA256", func(t *testing.T) {
  200. key := []byte("test-key")
  201. data := "test-data"
  202. result := hmacSHA256(key, data)
  203. assert.NotNil(t, result)
  204. assert.Greater(t, len(result), 0)
  205. })
  206. t.Run("sha256Hash", func(t *testing.T) {
  207. data := []byte("test-data")
  208. result := sha256Hash(data)
  209. assert.NotEmpty(t, result)
  210. assert.Len(t, result, 64) // Hex encoded SHA256
  211. })
  212. t.Run("deriveSigningKey", func(t *testing.T) {
  213. secretKey := "test-secret"
  214. date := "20231016"
  215. region := "us-east-1"
  216. service := "sts"
  217. signingKey := deriveSigningKey(secretKey, date, region, service)
  218. assert.NotNil(t, signingKey)
  219. assert.Len(t, signingKey, 32) // SHA256 output length
  220. })
  221. }
  222. // Helper function to create a properly signed request
  223. func createSignedRequest(t *testing.T, method, path string, body []byte, creds AWSCredentials) *http.Request {
  224. req := httptest.NewRequest(method, path, bytes.NewReader(body))
  225. now := time.Now().UTC()
  226. dateStamp := now.Format("20060102")
  227. amzDate := now.Format("20060102T150405Z")
  228. req.Header.Set("Content-Type", "application/x-www-form-urlencoded; charset=utf-8")
  229. req.Header.Set("Host", "sts.us-east-1.amazonaws.com")
  230. req.Header.Set("X-Amz-Date", amzDate)
  231. if creds.SessionToken != "" {
  232. req.Header.Set("X-Amz-Security-Token", creds.SessionToken)
  233. }
  234. // Calculate canonical request
  235. canonicalURI := path
  236. if canonicalURI == "" {
  237. canonicalURI = "/"
  238. }
  239. canonicalHeaders := fmt.Sprintf("content-type:%s\nhost:%s\nx-amz-date:%s\n",
  240. req.Header.Get("Content-Type"),
  241. req.Header.Get("Host"),
  242. amzDate,
  243. )
  244. signedHeaders := "content-type;host;x-amz-date"
  245. if creds.SessionToken != "" {
  246. canonicalHeaders += fmt.Sprintf("x-amz-security-token:%s\n", creds.SessionToken)
  247. signedHeaders += ";x-amz-security-token"
  248. }
  249. payloadHash := sha256Hash(body)
  250. canonicalRequest := fmt.Sprintf("%s\n%s\n\n%s\n%s\n%s",
  251. method,
  252. canonicalURI,
  253. canonicalHeaders,
  254. signedHeaders,
  255. payloadHash,
  256. )
  257. // Create string to sign
  258. credentialScope := fmt.Sprintf("%s/%s/%s/aws4_request", dateStamp, "us-east-1", "sts")
  259. hashedCanonicalRequest := sha256Hash([]byte(canonicalRequest))
  260. stringToSign := fmt.Sprintf("AWS4-HMAC-SHA256\n%s\n%s\n%s",
  261. amzDate,
  262. credentialScope,
  263. hashedCanonicalRequest,
  264. )
  265. // Calculate signature
  266. signingKey := deriveSigningKey(creds.SecretAccessKey, dateStamp, "us-east-1", "sts")
  267. signature := hmacSHA256(signingKey, stringToSign)
  268. signatureHex := hex.EncodeToString(signature)
  269. // Build authorization header
  270. authorization := fmt.Sprintf("AWS4-HMAC-SHA256 Credential=%s/%s, SignedHeaders=%s, Signature=%s",
  271. creds.AccessKeyID,
  272. credentialScope,
  273. signedHeaders,
  274. signatureHex,
  275. )
  276. req.Header.Set("Authorization", authorization)
  277. return req
  278. }
  279. func sha256Hash(data []byte) string {
  280. hash := sha256.Sum256(data)
  281. return hex.EncodeToString(hash[:])
  282. }