use hmac::{Hmac, Mac}; use lru::LruCache; use parking_lot::Mutex; use percent_encoding::{percent_encode, AsciiSet, NON_ALPHANUMERIC}; use pyo3::prelude::*; use sha2::{Digest, Sha256}; use std::num::NonZeroUsize; use std::sync::LazyLock; use std::time::Instant; type HmacSha256 = Hmac; struct CacheEntry { key: Vec, created: Instant, } static SIGNING_KEY_CACHE: LazyLock>> = LazyLock::new(|| Mutex::new(LruCache::new(NonZeroUsize::new(256).unwrap()))); const CACHE_TTL_SECS: u64 = 60; const AWS_ENCODE_SET: &AsciiSet = &NON_ALPHANUMERIC .remove(b'-') .remove(b'_') .remove(b'.') .remove(b'~'); fn hmac_sha256(key: &[u8], msg: &[u8]) -> Vec { let mut mac = HmacSha256::new_from_slice(key).expect("HMAC key length is always valid"); mac.update(msg); mac.finalize().into_bytes().to_vec() } fn sha256_hex(data: &[u8]) -> String { let mut hasher = Sha256::new(); hasher.update(data); hex::encode(hasher.finalize()) } fn aws_uri_encode(input: &str) -> String { percent_encode(input.as_bytes(), AWS_ENCODE_SET).to_string() } fn derive_signing_key_cached( secret_key: &str, date_stamp: &str, region: &str, service: &str, ) -> Vec { let cache_key = ( secret_key.to_owned(), date_stamp.to_owned(), region.to_owned(), service.to_owned(), ); { let mut cache = SIGNING_KEY_CACHE.lock(); if let Some(entry) = cache.get(&cache_key) { if entry.created.elapsed().as_secs() < CACHE_TTL_SECS { return entry.key.clone(); } cache.pop(&cache_key); } } let k_date = hmac_sha256(format!("AWS4{}", secret_key).as_bytes(), date_stamp.as_bytes()); let k_region = hmac_sha256(&k_date, region.as_bytes()); let k_service = hmac_sha256(&k_region, service.as_bytes()); let k_signing = hmac_sha256(&k_service, b"aws4_request"); { let mut cache = SIGNING_KEY_CACHE.lock(); cache.put( cache_key, CacheEntry { key: k_signing.clone(), created: Instant::now(), }, ); } k_signing } fn constant_time_compare_inner(a: &[u8], b: &[u8]) -> bool { if a.len() != b.len() { return false; } let mut result: u8 = 0; for (x, y) in a.iter().zip(b.iter()) { result |= x ^ y; } result == 0 } #[pyfunction] pub fn verify_sigv4_signature( method: &str, canonical_uri: &str, query_params: Vec<(String, String)>, signed_headers_str: &str, header_values: Vec<(String, String)>, payload_hash: &str, amz_date: &str, date_stamp: &str, region: &str, service: &str, secret_key: &str, provided_signature: &str, ) -> bool { let mut sorted_params = query_params; sorted_params.sort_by(|a, b| a.0.cmp(&b.0).then_with(|| a.1.cmp(&b.1))); let canonical_query_string = sorted_params .iter() .map(|(k, v)| format!("{}={}", aws_uri_encode(k), aws_uri_encode(v))) .collect::>() .join("&"); let mut canonical_headers = String::new(); for (name, value) in &header_values { let lower_name = name.to_lowercase(); let normalized = value.split_whitespace().collect::>().join(" "); let final_value = if lower_name == "expect" && normalized.is_empty() { "100-continue" } else { &normalized }; canonical_headers.push_str(&lower_name); canonical_headers.push(':'); canonical_headers.push_str(final_value); canonical_headers.push('\n'); } let canonical_request = format!( "{}\n{}\n{}\n{}\n{}\n{}", method, canonical_uri, canonical_query_string, canonical_headers, signed_headers_str, payload_hash ); let credential_scope = format!("{}/{}/{}/aws4_request", date_stamp, region, service); let cr_hash = sha256_hex(canonical_request.as_bytes()); let string_to_sign = format!( "AWS4-HMAC-SHA256\n{}\n{}\n{}", amz_date, credential_scope, cr_hash ); let signing_key = derive_signing_key_cached(secret_key, date_stamp, region, service); let calculated = hmac_sha256(&signing_key, string_to_sign.as_bytes()); let calculated_hex = hex::encode(&calculated); constant_time_compare_inner(calculated_hex.as_bytes(), provided_signature.as_bytes()) } #[pyfunction] pub fn derive_signing_key( secret_key: &str, date_stamp: &str, region: &str, service: &str, ) -> Vec { derive_signing_key_cached(secret_key, date_stamp, region, service) } #[pyfunction] pub fn compute_signature(signing_key: &[u8], string_to_sign: &str) -> String { let sig = hmac_sha256(signing_key, string_to_sign.as_bytes()); hex::encode(sig) } #[pyfunction] pub fn build_string_to_sign( amz_date: &str, credential_scope: &str, canonical_request: &str, ) -> String { let cr_hash = sha256_hex(canonical_request.as_bytes()); format!( "AWS4-HMAC-SHA256\n{}\n{}\n{}", amz_date, credential_scope, cr_hash ) } #[pyfunction] pub fn constant_time_compare(a: &str, b: &str) -> bool { constant_time_compare_inner(a.as_bytes(), b.as_bytes()) } #[pyfunction] pub fn clear_signing_key_cache() { SIGNING_KEY_CACHE.lock().clear(); }