feat: init commit

This commit is contained in:
2023-09-03 16:31:31 +08:00
parent d959709164
commit 8ce5206dd2
8 changed files with 281 additions and 0 deletions

View File

@@ -6,5 +6,9 @@ edition = "2021"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies]
hex = "0.4.3"
hmac-sha256 = "1.1.7"
hmac-sm3 = "0.1.0"
sha256 = "1.4.0"
sm3 = "0.4.2"
zeroize = "1.6.0"

View File

@@ -1,3 +1,6 @@
mod v4;
// mod v4_algorithm;
fn main() {
println!("Hello, world!");
}

25
src/v4/access_keys.rs Normal file
View File

@@ -0,0 +1,25 @@
use zeroize::Zeroize;
pub struct AccessKey {
pub access_key_id: String,
pub access_key_secret: String,
}
impl Drop for AccessKey {
fn drop(&mut self) {
self.access_key_id.zeroize();
self.access_key_secret.zeroize();
}
}
pub struct DerivedAccessKey {
pub access_key_id: String,
pub derived_access_key_secret: Vec<u8>,
}
impl Drop for DerivedAccessKey {
fn drop(&mut self) {
self.access_key_id.zeroize();
self.derived_access_key_secret.zeroize();
}
}

60
src/v4/algorithm.rs Normal file
View File

@@ -0,0 +1,60 @@
use sm3::{Digest, Sm3};
use crate::v4::constants::{ACS4_HMAC_SHA256, ACS4_HMAC_SM3};
#[derive(Clone, Copy)]
pub enum SignAlgorithm {
Sha256,
Sm3,
}
impl SignAlgorithm {
pub fn digest(&self, messge: &[u8]) -> String {
inner_digest(self, messge)
}
pub fn hmac_sign(&self, message: &[u8], key: &[u8]) -> Vec<u8> {
inner_hmac_sign(self, message, key)
}
pub fn as_aliyun_name(&self) -> &'static str {
match self {
SignAlgorithm::Sha256 => ACS4_HMAC_SHA256,
SignAlgorithm::Sm3 => ACS4_HMAC_SM3,
}
}
}
fn inner_digest(sign_algorithm: &SignAlgorithm, message: &[u8]) -> String {
match sign_algorithm {
SignAlgorithm::Sha256 => sha256::digest(message),
SignAlgorithm::Sm3 => {
let mut sm3 = Sm3::new();
sm3.update(&message);
hex::encode(sm3.finalize().as_slice())
}
}
}
fn inner_hmac_sign(sign_algorithm: &SignAlgorithm, message: &[u8], key: &[u8]) -> Vec<u8> {
match sign_algorithm {
SignAlgorithm::Sha256 => {
let mut hsha256 = hmac_sha256::HMAC::new(key);
hsha256.update(message);
hsha256.finalize().to_vec()
}
SignAlgorithm::Sm3 => hmac_sm3::hmac_sm3(key, message)
}
}
#[test]
fn test_digest() {
assert_eq!(
"a591a6d40bf420404a011733cfb7b190d62c65bf0bcda32b57b277d9ad9f146e",
SignAlgorithm::Sha256.digest(b"Hello World")
);
assert_eq!(
"77015816143ee627f4fa410b6dad2bdb9fcbdf1e061a452a686b8711a484c5d7",
SignAlgorithm::Sm3.digest(b"Hello World")
);
}

127
src/v4/aliyun_util.rs Normal file
View File

@@ -0,0 +1,127 @@
use std::collections::BTreeMap;
use sm3::Digest;
use crate::v4::access_keys::DerivedAccessKey;
use crate::v4::algorithm::SignAlgorithm;
use crate::v4::common_util::{join_slices, percent_encode};
use crate::v4::constants::{ALIYUN_V4, ALIYUN_V4_REQUEST, HEADER_CONTENT_TYPE, HEADER_HOST, HEADER_X_ACS_PREFIX, REGION_CENTER};
fn get_authorization(sign_algorithm: SignAlgorithm,
access_key: &DerivedAccessKey,
date: &str, region: &str, product: &str,
pathname: &str,
method: &str,
query: &BTreeMap<String, String>,
headers: &BTreeMap<String, String>,
payload: &str) -> String {
let signature = get_signature(sign_algorithm, &access_key.derived_access_key_secret,
pathname, method, query, headers, payload);
let signed_headers_str = get_signed_headers(headers).iter().map(|(k, _)| k.as_str()).collect::<Vec<_>>().join(";");
let mut authorization = String::with_capacity(512);
authorization.push_str(sign_algorithm.as_aliyun_name());
authorization.push_str(" Credential=");
authorization.push_str(&access_key.access_key_id);
authorization.push('/');
authorization.push_str(date);
authorization.push('/');
authorization.push_str(region);
authorization.push('/');
authorization.push_str(product);
authorization.push_str("/aliyun_v4_request,SignedHeaders=");
authorization.push_str(&signed_headers_str);
authorization.push_str(",Signature=");
authorization.push_str(&signature);
authorization
}
fn get_signature(sign_algorithm: SignAlgorithm,
signing_key: &[u8],
pathname: &str,
method: &str,
query: &BTreeMap<String, String>,
headers: &BTreeMap<String, String>,
payload: &str) -> String {
let canonical_uri = if pathname.is_empty() { "/" } else { pathname };
let canonicalized_resource = build_canonicalized_resource(query);
let canonicalized_headers = build_canonicalized_headers(headers);
let signed_headers_str = get_signed_headers(headers).iter().map(|(k, _)| k.as_str()).collect::<Vec<_>>().join(";");
let mut string_to_sign = String::new();
string_to_sign.push_str(method);
string_to_sign.push('\n');
string_to_sign.push_str(canonical_uri);
string_to_sign.push('\n');
string_to_sign.push_str(&canonicalized_resource);
string_to_sign.push('\n');
string_to_sign.push_str(&canonicalized_headers);
string_to_sign.push('\n');
string_to_sign.push_str(&signed_headers_str);
string_to_sign.push('\n');
string_to_sign.push_str(payload);
let string_to_sign_digest_hex = sign_algorithm.digest(string_to_sign.as_bytes());
string_to_sign.push_str(sign_algorithm.as_aliyun_name());
string_to_sign.push('\n');
string_to_sign.push_str(&string_to_sign_digest_hex);
hex::encode(sign_algorithm.hmac_sign(string_to_sign.as_bytes(), signing_key))
}
fn get_signing_key(sign_algorithm: SignAlgorithm, secret: &str, date: &str, region: &str, product: &str) -> Vec<u8> {
let sc1 = join_slices(ALIYUN_V4.as_bytes(), secret.as_bytes());
let sc2 = sign_algorithm.hmac_sign(date.as_bytes(), &sc1);
let sc3 = sign_algorithm.hmac_sign(region.as_bytes(), &sc2);
let sc4 = sign_algorithm.hmac_sign(product.as_bytes(), &sc3);
sign_algorithm.hmac_sign(ALIYUN_V4_REQUEST.as_bytes(), &sc4)
}
fn get_region(product: &str, endpoint: &str) -> String {
if product.is_empty() || endpoint.is_empty() {
return REGION_CENTER.into();
}
let popcode = product.to_lowercase();
let mut region = endpoint.replace(popcode.as_str(), "");
region = region.replace("aliyuncs.com", "");
region = region.replace(".", "");
if region.is_empty() { REGION_CENTER.into() } else { region }
}
fn build_canonicalized_resource(query: &BTreeMap<String, String>) -> String {
let mut canonicalized_resources = Vec::with_capacity(query.len());
for (key, value) in query {
let mut resource = String::with_capacity(key.len() + 1 + value.len());
resource.push_str(&percent_encode(key));
if !value.is_empty() {
resource.push('=');
resource.push_str(&percent_encode(value));
}
canonicalized_resources.push(resource);
}
canonicalized_resources.join("&")
}
fn build_canonicalized_headers(headers: &BTreeMap<String, String>) -> String {
let mut canonicalized_headers = String::new();
let signed_headers = get_signed_headers(headers);
for (key, value) in &signed_headers {
canonicalized_headers.push_str(key);
canonicalized_headers.push(':');
canonicalized_headers.push_str(value);
canonicalized_headers.push('\n');
}
canonicalized_headers
}
fn get_signed_headers(headers: &BTreeMap<String, String>) -> Vec<(String, &String)> {
let mut signed_headers = Vec::with_capacity(headers.len());
for (key, value) in headers {
let lower_key = key.to_lowercase();
if lower_key.starts_with(HEADER_X_ACS_PREFIX) || (lower_key == HEADER_HOST) || (lower_key == HEADER_CONTENT_TYPE) {
signed_headers.push((lower_key, value));
}
}
signed_headers
}

39
src/v4/common_util.rs Normal file
View File

@@ -0,0 +1,39 @@
pub(crate) fn percent_encode(message: &str) -> String {
let mut encoded = String::with_capacity(message.len() + 16);
message.as_bytes().iter().for_each(|b| {
match b {
b if (b >= &b'a' && b <= &b'z')
|| (b >= &b'A' && b <= &b'Z')
|| (b >= &b'0' && b <= &b'9') => encoded.push(*b as char),
b'~' | b'_' | b'-' | b'.' => encoded.push(*b as char),
_ => encoded.push_str(&format!("%{:X}", b)),
}
});
encoded
}
#[inline]
pub(crate) fn join_slices(part1: &[u8], part2: &[u8]) -> Vec<u8> {
let mut joined = part1.to_vec();
joined.extend_from_slice(part2);
joined
}
#[test]
fn test_percent_encode() {
assert_eq!("0123456789", percent_encode("0123456789"));
assert_eq!("abcdefghijklmnopqrstuvwxyz", percent_encode("abcdefghijklmnopqrstuvwxyz"));
assert_eq!("ABCDEFGHIJKLMNOPQRSTUVWXYZ", percent_encode("ABCDEFGHIJKLMNOPQRSTUVWXYZ"));
assert_eq!("Hello%20World%21", percent_encode("Hello World!"));
assert_eq!("~%21%40%23%24%25%5E%26%2A%28%29_%2B-%3D", percent_encode("~!@#$%^&*()_+-="));
assert_eq!("%E8%BF%99%E6%98%AF%E4%B8%80%E4%B8%AA%E6%B5%8B%E8%AF%95", percent_encode("这是一个测试"));
assert_eq!("%F0%9F%98%84", percent_encode("😄"));
assert_eq!("%2C.%2F%3C%3E%3F%3B%27%3A%22%5B%5D%5C%7B%7D%7C", percent_encode(",./<>?;':\"[]\\{}|"));
assert_eq!("%21%27%28%29%2A-._~", percent_encode("!'()*-._~"));
assert_eq!("%21%23%24%26%27%28%29%2A%2B%2C-.%2F%3A%3B%3D%3F%40_~", percent_encode("!#$&'()*+,-./:;=?@_~"));
}
#[test]
fn test_join_slices() {
assert_eq!(&b"Hello World"[..], &join_slices(b"Hello", b" World")[..])
}

18
src/v4/constants.rs Normal file
View File

@@ -0,0 +1,18 @@
pub(crate) const ACS4_HMAC_SHA256: &str = "ACS4-HMAC-SHA256";
pub(crate) const ACS4_HMAC_SM3: &str = "ACS4-HMAC-SM3";
pub(crate) const REGION_CENTER: &str = "center";
pub(crate) const ALIYUN_V4: &str = "aliyun_v4";
pub(crate) const ALIYUN_V4_REQUEST: &str = "aliyun_v4_request";
pub(crate) const HEADER_X_ACS_PREFIX: &str = "x-acs-";
pub(crate) const HEADER_HOST: &str = "host";
pub(crate) const HEADER_ACCEPT: &str = "accept";
pub(crate) const HEADER_USER_AGENT: &str = "user-agent";
pub(crate) const HEADER_CONTENT_TYPE: &str = "content-type";
pub(crate) const HEADER_X_ASC_VERSION: &str = "x-acs-version";
pub(crate) const HEADER_X_ASC_ACTION: &str = "x-acs-action";
pub(crate) const HEADER_X_ASC_DATE: &str = "x-acs-date";
pub(crate) const HEADER_X_ASC_SIGNATURE_NONCE: &str = "x-acs-signature-nonce";
pub(crate) const CONTENT_TYPE_APPLICATION_JSON: &str = "application/json";

5
src/v4/mod.rs Normal file
View File

@@ -0,0 +1,5 @@
mod constants;
mod algorithm;
mod access_keys;
mod common_util;
mod aliyun_util;