smithy.go 2.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192
  1. package v4a
  2. import (
  3. "context"
  4. "fmt"
  5. "time"
  6. internalcontext "github.com/aws/aws-sdk-go-v2/internal/context"
  7. v4 "github.com/aws/aws-sdk-go-v2/aws/signer/v4"
  8. "github.com/aws/aws-sdk-go-v2/internal/sdk"
  9. "github.com/aws/smithy-go"
  10. "github.com/aws/smithy-go/auth"
  11. "github.com/aws/smithy-go/logging"
  12. smithyhttp "github.com/aws/smithy-go/transport/http"
  13. )
  14. // CredentialsAdapter adapts v4a.Credentials to smithy auth.Identity.
  15. type CredentialsAdapter struct {
  16. Credentials Credentials
  17. }
  18. var _ auth.Identity = (*CredentialsAdapter)(nil)
  19. // Expiration returns the time of expiration for the credentials.
  20. func (v *CredentialsAdapter) Expiration() time.Time {
  21. return v.Credentials.Expires
  22. }
  23. // CredentialsProviderAdapter adapts v4a.CredentialsProvider to
  24. // auth.IdentityResolver.
  25. type CredentialsProviderAdapter struct {
  26. Provider CredentialsProvider
  27. }
  28. var _ (auth.IdentityResolver) = (*CredentialsProviderAdapter)(nil)
  29. // GetIdentity retrieves v4a credentials using the underlying provider.
  30. func (v *CredentialsProviderAdapter) GetIdentity(ctx context.Context, _ smithy.Properties) (
  31. auth.Identity, error,
  32. ) {
  33. creds, err := v.Provider.RetrievePrivateKey(ctx)
  34. if err != nil {
  35. return nil, fmt.Errorf("get credentials: %w", err)
  36. }
  37. return &CredentialsAdapter{Credentials: creds}, nil
  38. }
  39. // SignerAdapter adapts v4a.HTTPSigner to smithy http.Signer.
  40. type SignerAdapter struct {
  41. Signer HTTPSigner
  42. Logger logging.Logger
  43. LogSigning bool
  44. }
  45. var _ (smithyhttp.Signer) = (*SignerAdapter)(nil)
  46. // SignRequest signs the request with the provided identity.
  47. func (v *SignerAdapter) SignRequest(ctx context.Context, r *smithyhttp.Request, identity auth.Identity, props smithy.Properties) error {
  48. ca, ok := identity.(*CredentialsAdapter)
  49. if !ok {
  50. return fmt.Errorf("unexpected identity type: %T", identity)
  51. }
  52. name, ok := smithyhttp.GetSigV4SigningName(&props)
  53. if !ok {
  54. return fmt.Errorf("sigv4a signing name is required")
  55. }
  56. regions, ok := smithyhttp.GetSigV4ASigningRegions(&props)
  57. if !ok {
  58. return fmt.Errorf("sigv4a signing region is required")
  59. }
  60. hash := v4.GetPayloadHash(ctx)
  61. signingTime := sdk.NowTime()
  62. if skew := internalcontext.GetAttemptSkewContext(ctx); skew != 0 {
  63. signingTime.Add(skew)
  64. }
  65. err := v.Signer.SignHTTP(ctx, ca.Credentials, r.Request, hash, name, regions, signingTime, func(o *SignerOptions) {
  66. o.DisableURIPathEscaping, _ = smithyhttp.GetDisableDoubleEncoding(&props)
  67. o.Logger = v.Logger
  68. o.LogSigning = v.LogSigning
  69. })
  70. if err != nil {
  71. return fmt.Errorf("sign http: %w", err)
  72. }
  73. return nil
  74. }