From 979d85b046f0592ce1d6c8ae72d408158f5abe3e Mon Sep 17 00:00:00 2001 From: Marina Biryukova Date: Tue, 29 Oct 2024 16:26:01 +0300 Subject: [PATCH] [#505] authmate: Add flag for headers in generate-presigned-url cmd Signed-off-by: Marina Biryukova --- api/auth/presign.go | 6 +++- .../modules/generate-presigned-url.go | 29 ++++++++++++++++++- 2 files changed, 33 insertions(+), 2 deletions(-) diff --git a/api/auth/presign.go b/api/auth/presign.go index ea34ba15..df66d507 100644 --- a/api/auth/presign.go +++ b/api/auth/presign.go @@ -23,6 +23,7 @@ type PresignData struct { Region string Lifetime time.Duration SignTime time.Time + Headers map[string]string } // PresignRequest forms pre-signed request to access objects without aws credentials. @@ -34,7 +35,10 @@ func PresignRequest(creds *credentials.Credentials, reqData RequestData, presign } req.Header.Set(AmzDate, presignData.SignTime.Format("20060102T150405Z")) - req.Header.Set(ContentTypeHdr, "text/plain") + + for k, v := range presignData.Headers { + req.Header.Set(k, v) + } signer := v4.NewSigner(creds) signer.DisableURIPathEscaping = true diff --git a/cmd/s3-authmate/modules/generate-presigned-url.go b/cmd/s3-authmate/modules/generate-presigned-url.go index d25a01c5..764187cf 100644 --- a/cmd/s3-authmate/modules/generate-presigned-url.go +++ b/cmd/s3-authmate/modules/generate-presigned-url.go @@ -4,6 +4,7 @@ import ( "encoding/json" "fmt" "os" + "strings" "time" "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/auth" @@ -21,7 +22,7 @@ var generatePresignedURLCmd = &cobra.Command{ You provide profile to load using --profile flag or explicitly provide credentials and region using --aws-access-key-id, --aws-secret-access-key, --region. Note to override credentials you must provide both access key and secret key.`, - Example: `frostfs-s3-authmate generate-presigned-url --method put --bucket my-bucket --object my-object --endpoint http://localhost:8084 --lifetime 12h --region ru --aws-access-key-id ETaA2CadPcA7bAkLsML2PbTudXY8uRt2PDjCCwkvRv9s0FDCxWDXYc1SA1vKv8KbyCNsLY2AmAjJ92Vz5rgvsFCy --aws-secret-access-key c2d65ef2980f03f4f495bdebedeeae760496697880d61d106bb9a4e5cd2e0607`, + Example: `frostfs-s3-authmate generate-presigned-url --method put --bucket my-bucket --object my-object --endpoint http://localhost:8084 --lifetime 12h --region ru --aws-access-key-id ETaA2CadPcA7bAkLsML2PbTudXY8uRt2PDjCCwkvRv9s0FDCxWDXYc1SA1vKv8KbyCNsLY2AmAjJ92Vz5rgvsFCy --aws-secret-access-key c2d65ef2980f03f4f495bdebedeeae760496697880d61d106bb9a4e5cd2e0607 --header 'Content-Type: text/plain'`, RunE: runGeneratePresignedURLCmd, } @@ -36,6 +37,7 @@ const ( regionFlag = "region" awsAccessKeyIDFlag = "aws-access-key-id" awsSecretAccessKeyFlag = "aws-secret-access-key" + headerFlag = "header" ) func initGeneratePresignedURLCmd() { @@ -48,6 +50,7 @@ func initGeneratePresignedURLCmd() { generatePresignedURLCmd.Flags().String(regionFlag, "", "AWS region to use in signature (default is taken from ~/.aws/config)") generatePresignedURLCmd.Flags().String(awsAccessKeyIDFlag, "", "AWS access key id to sign the URL (default is taken from ~/.aws/credentials)") generatePresignedURLCmd.Flags().String(awsSecretAccessKeyFlag, "", "AWS secret access key to sign the URL (default is taken from ~/.aws/credentials)") + generatePresignedURLCmd.Flags().StringSlice(headerFlag, nil, "Header in form of 'Key: value' to use in presigned URL (use flags repeatedly for multiple headers or separate them by comma)") _ = generatePresignedURLCmd.MarkFlagRequired(endpointFlag) _ = generatePresignedURLCmd.MarkFlagRequired(bucketFlag) @@ -92,6 +95,12 @@ func runGeneratePresignedURLCmd(*cobra.Command, []string) error { SignTime: time.Now().UTC(), } + headers, err := parseHeaders() + if err != nil { + return wrapPreparationError(fmt.Errorf("failed to parse headers: %s", err)) + } + presignData.Headers = headers + req, err := auth.PresignRequest(sess.Config.Credentials, reqData, presignData) if err != nil { return wrapBusinessLogicError(err) @@ -110,3 +119,21 @@ func runGeneratePresignedURLCmd(*cobra.Command, []string) error { } return nil } + +func parseHeaders() (map[string]string, error) { + headers := viper.GetStringSlice(headerFlag) + if len(headers) == 0 { + return nil, nil + } + + result := make(map[string]string, len(headers)) + for _, header := range headers { + k, v, found := strings.Cut(header, ":") + if !found { + return nil, fmt.Errorf("invalid header format: %s", header) + } + result[strings.Trim(k, " ")] = strings.Trim(v, " ") + } + + return result, nil +}