Skip to content

Commit 6c852f2

Browse files
HDDS-892. Parse aws v2 headers without spaces in Ozone s3 gateway. Contributed by Elek Marton.
1 parent 019836b commit 6c852f2

File tree

2 files changed

+53
-35
lines changed

2 files changed

+53
-35
lines changed

hadoop-ozone/s3gateway/src/main/java/org/apache/hadoop/ozone/s3/header/AuthorizationHeaderV4.java

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -62,35 +62,37 @@ public AuthorizationHeaderV4(String header) throws OS3Exception {
6262
*/
6363
@SuppressWarnings("StringSplitter")
6464
public void parseAuthHeader() throws OS3Exception {
65-
String[] split = authHeader.split(" ");
66-
67-
if (split.length != 4) {
65+
int firstSep = authHeader.indexOf(' ');
66+
if (firstSep < 0) {
6867
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
6968
}
7069

71-
algorithm = split[0];
72-
credential = split[1];
73-
signedHeaders = split[2];
74-
signature = split[3];
70+
//split the value parts of the authorization header
71+
String[] split = authHeader.substring(firstSep + 1).trim().split(", *");
72+
73+
if (split.length != 3) {
74+
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
75+
}
7576

77+
algorithm = authHeader.substring(0, firstSep);
78+
credential = split[0];
79+
signedHeaders = split[1];
80+
signature = split[2];
7681

7782
if (credential.startsWith(CREDENTIAL)) {
78-
credential = credential.substring(CREDENTIAL.length(), credential
79-
.length() - 1);
83+
credential = credential.substring(CREDENTIAL.length());
8084
} else {
8185
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
8286
}
8387

8488
if (signedHeaders.startsWith(SIGNEDHEADERS)) {
85-
signedHeaders = signedHeaders.substring(SIGNEDHEADERS.length(),
86-
signedHeaders.length() - 1);
89+
signedHeaders = signedHeaders.substring(SIGNEDHEADERS.length());
8790
} else {
8891
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
8992
}
9093

9194
if (signature.startsWith(SIGNATURE)) {
92-
signature = signature.substring(SIGNATURE.length(), signature
93-
.length());
95+
signature = signature.substring(SIGNATURE.length());
9496
} else {
9597
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
9698
}

hadoop-ozone/s3gateway/src/test/java/org/apache/hadoop/ozone/s3/header/TestAuthorizationHeaderV4.java

Lines changed: 38 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -31,51 +31,67 @@
3131
public class TestAuthorizationHeaderV4 {
3232

3333
@Test
34-
public void testV4Header1() {
35-
try {
36-
String auth = "AWS4-HMAC-SHA256 " +
37-
"Credential=ozone/20130524/us-east-1/s3/aws4_request, " +
38-
"SignedHeaders=host;range;x-amz-date, " +
39-
"Signature=fe5f80f77d5fa3beca038a248ff027";
40-
AuthorizationHeaderV4 v4 = new AuthorizationHeaderV4(auth);
41-
assertEquals("AWS4-HMAC-SHA256", v4.getAlgorithm());
42-
assertEquals("ozone", v4.getAccessKeyID());
43-
assertEquals("20130524", v4.getDate());
44-
assertEquals("us-east-1", v4.getAwsRegion());
45-
assertEquals("aws4_request", v4.getAwsRequest());
46-
assertEquals("host;range;x-amz-date", v4.getSignedHeaders());
47-
assertEquals("fe5f80f77d5fa3beca038a248ff027", v4.getSignature());
48-
} catch (OS3Exception ex) {
49-
fail("testV4Header");
50-
}
51-
34+
public void testV4HeaderWellFormed() throws Exception {
35+
String auth = "AWS4-HMAC-SHA256 " +
36+
"Credential=ozone/20130524/us-east-1/s3/aws4_request, " +
37+
"SignedHeaders=host;range;x-amz-date, " +
38+
"Signature=fe5f80f77d5fa3beca038a248ff027";
39+
AuthorizationHeaderV4 v4 = new AuthorizationHeaderV4(auth);
40+
assertEquals("AWS4-HMAC-SHA256", v4.getAlgorithm());
41+
assertEquals("ozone", v4.getAccessKeyID());
42+
assertEquals("20130524", v4.getDate());
43+
assertEquals("us-east-1", v4.getAwsRegion());
44+
assertEquals("aws4_request", v4.getAwsRequest());
45+
assertEquals("host;range;x-amz-date", v4.getSignedHeaders());
46+
assertEquals("fe5f80f77d5fa3beca038a248ff027", v4.getSignature());
5247
}
5348

5449
@Test
55-
public void testV4Header2() {
50+
public void testV4HeaderMissingParts() {
5651
try {
5752
String auth = "AWS4-HMAC-SHA256 " +
5853
"Credential=ozone/20130524/us-east-1/s3/aws4_request, " +
5954
"SignedHeaders=host;range;x-amz-date,";
6055
AuthorizationHeaderV4 v4 = new AuthorizationHeaderV4(auth);
61-
fail("testV4Header2");
56+
fail("Exception is expected in case of malformed header");
6257
} catch (OS3Exception ex) {
6358
assertEquals("AuthorizationHeaderMalformed", ex.getCode());
6459
}
6560
}
6661

67-
6862
@Test
69-
public void testV4Header3() {
63+
public void testV4HeaderInvalidCredential() {
7064
try {
7165
String auth = "AWS4-HMAC-SHA256 " +
7266
"Credential=20130524/us-east-1/s3/aws4_request, " +
7367
"SignedHeaders=host;range;x-amz-date, " +
7468
"Signature=fe5f80f77d5fa3beca038a248ff027";
7569
AuthorizationHeaderV4 v4 = new AuthorizationHeaderV4(auth);
70+
fail("Exception is expected in case of malformed header");
7671
} catch (OS3Exception ex) {
7772
assertEquals("AuthorizationHeaderMalformed", ex.getCode());
7873
}
7974
}
8075

76+
@Test
77+
public void testV4HeaderWithoutSpace() throws OS3Exception {
78+
79+
String auth =
80+
"AWS4-HMAC-SHA256 Credential=ozone/20130524/us-east-1/s3/aws4_request,"
81+
+ "SignedHeaders=host;x-amz-content-sha256;x-amz-date,"
82+
+ "Signature"
83+
+ "=fe5f80f77d5fa3beca038a248ff027";
84+
AuthorizationHeaderV4 v4 = new AuthorizationHeaderV4(auth);
85+
86+
assertEquals("AWS4-HMAC-SHA256", v4.getAlgorithm());
87+
assertEquals("ozone", v4.getAccessKeyID());
88+
assertEquals("20130524", v4.getDate());
89+
assertEquals("us-east-1", v4.getAwsRegion());
90+
assertEquals("aws4_request", v4.getAwsRequest());
91+
assertEquals("host;x-amz-content-sha256;x-amz-date",
92+
v4.getSignedHeaders());
93+
assertEquals("fe5f80f77d5fa3beca038a248ff027", v4.getSignature());
94+
95+
}
96+
8197
}

0 commit comments

Comments
 (0)