open-vault/vendor/github.com/aws/aws-sdk-go/service/s3/sse.go

45 lines
1.1 KiB
Go
Raw Normal View History

2015-05-20 15:46:21 +00:00
package s3
import (
"crypto/md5"
"encoding/base64"
2015-06-29 22:05:44 +00:00
"github.com/aws/aws-sdk-go/aws/awserr"
2015-06-03 19:07:39 +00:00
"github.com/aws/aws-sdk-go/aws/awsutil"
2015-09-22 15:44:21 +00:00
"github.com/aws/aws-sdk-go/aws/request"
2015-05-20 15:46:21 +00:00
)
2015-06-29 22:05:44 +00:00
var errSSERequiresSSL = awserr.New("ConfigError", "cannot send SSE keys over HTTP.", nil)
2015-05-20 15:46:21 +00:00
2015-09-22 15:44:21 +00:00
func validateSSERequiresSSL(r *request.Request) {
2015-05-20 15:46:21 +00:00
if r.HTTPRequest.URL.Scheme != "https" {
2015-11-18 15:36:57 +00:00
p, _ := awsutil.ValuesAtPath(r.Params, "SSECustomerKey||CopySourceSSECustomerKey")
2015-05-20 15:46:21 +00:00
if len(p) > 0 {
r.Error = errSSERequiresSSL
}
}
}
2015-09-22 15:44:21 +00:00
func computeSSEKeys(r *request.Request) {
2015-05-20 15:46:21 +00:00
headers := []string{
"x-amz-server-side-encryption-customer-key",
"x-amz-copy-source-server-side-encryption-customer-key",
}
for _, h := range headers {
md5h := h + "-md5"
if key := r.HTTPRequest.Header.Get(h); key != "" {
// Base64-encode the value
b64v := base64.StdEncoding.EncodeToString([]byte(key))
r.HTTPRequest.Header.Set(h, b64v)
// Add MD5 if it wasn't computed
if r.HTTPRequest.Header.Get(md5h) == "" {
sum := md5.Sum([]byte(key))
b64sum := base64.StdEncoding.EncodeToString(sum[:])
r.HTTPRequest.Header.Set(md5h, b64sum)
}
}
}
}