Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow using AWS_QUERYSTRING_AUTH & AWS_S3_CUSTOM_DOMAIN at the same time #839

Open
wants to merge 3 commits into
base: master
Choose a base branch
from

Conversation

cpoetter
Copy link

Hi,

I am currently trying to mock S3 in development with the help of https://github.com/adobe/S3Mock. Unfortunately I can't use signed URLs and a custom domain at the same time. This should fix that.

@terencehonles
Copy link
Contributor

I think this is related/fixed by #587? I'm not sure if you have tried using that @cpoetter

@nathando
Copy link

nathando commented May 3, 2020

hi, can someone try to merge this in. #587 only solved issue if we use CloudFront. If we want to use our own proxy solution like nginx this is important

@terencehonles
Copy link
Contributor

hi, can someone try to merge this in. #587 only solved issue if we use CloudFront. If we want to use our own proxy solution like nginx this is important

Looks like it's merged now

@rahulkp220
Copy link

Is this fixed yet?

@terencehonles
Copy link
Contributor

Is this fixed yet?

@rahulkp220 you can probably use this #587 (comment) from #587

@rahulkp220
Copy link

Ohkay, I will have a look at it.

@cjnething
Copy link

The suggestion to use #587 doesn't work for us, it would be great if this could be merged in 🙂

@terencehonles
Copy link
Contributor

terencehonles commented Jun 26, 2020

The suggestion to use #587 doesn't work for us, it would be great if this could be merged in

@cjnething there are merge conflicts and if it indeed doesn't work for the author, the author will need to update this PR so it can be considered (and to be clear, I would not be the person considering it as I only suggested a PR that I wrote may fix the issue. If these are independent issues the author will need to update and the maintainer(s) would need to approve this PR).

@terencehonles
Copy link
Contributor

terencehonles commented Jul 5, 2020

Based on the more detailed report in #165 (comment) I understand a little more what type of problem this is trying to fix (not sure if it's really the same problem others are running into), but if @cpoetter has a chance to update this PR I added some comments about the different states that need to be accounted for #165 (comment)

@cpoetter
Copy link
Author

cpoetter commented Jul 6, 2020

The merge conflict should be resolved ✅

@terencehonles
Copy link
Contributor

The merge conflict should be resolved

Just a heads up, there are two if self.custom_domain blocks (yours is the second). The first always returns therefore the one you added will do nothing, and you'll want to adjust the PR to fix that.

@kut
Copy link

kut commented Jan 29, 2021

Hey folks won't replacing the S3 URL with the custom URL after signing cause the signature to be invalid?

@terencehonles
Copy link
Contributor

The signature is not signing the whole URL but part of it. The part of it that's signed is not changing. I believe this PR still needs an update based on my last comment.

@rissson
Copy link

rissson commented May 17, 2021

@cpoetter are you still willing to work on this?

@dvail
Copy link

dvail commented Sep 18, 2021

Is this something that the maintainers would still want merged in? We have similar use cases, both with S3Mock and using nginx as a reverse proxy, and the fix in #165 (comment) seems to work for now.

I might be able to work a PR to get this into the main library though if it is something people still want.

Edit: Actually looking into this a bit more and it looks like this functionality will cause a possible breaking change if others are using a custom domain when AWS_CLOUDFRONT_KEY_ID is set, as the two code paths construct the URL in two different ways. A safer fix might be to introduce a new configuration setting, e.g. AWS_REVERSE_PROXY_URL, but that would be yet another option to maintain and complicate this code further.

@jschneier
Copy link
Owner

Is this something that the maintainers would still want merged in? We have similar use cases, both with S3Mock and using nginx as a reverse proxy, and the fix in #165 (comment) seems to work for now.

I might be able to work a PR to get this into the main library though if it is something people still want.

Edit: Actually looking into this a bit more and it looks like this functionality will cause a possible breaking change if others are using a custom domain when AWS_CLOUDFRONT_KEY_ID is set, as the two code paths construct the URL in two different ways. A safer fix might be to introduce a new configuration setting, e.g. AWS_REVERSE_PROXY_URL, but that would be yet another option to maintain and complicate this code further.

@dvail Yes, I will take something like this since it seems there is a fair amount of demand and I think it will ease integrating with other S3-compatible services.

That comment seems more elegant than this method, mind opening a fix?

@jschneier
Copy link
Owner

Hello, I'd still like to get this in and am thinking of something like the following which incorporates seemingly the best of the proposed solutions. However, I don't fully understand why Key is getting applied and then stripped off. If someone wants to take this patch and push it forwards a bit, I would be happy to merge.

diff --git a/storages/backends/s3boto3.py b/storages/backends/s3boto3.py
index 7231750..fb79c30 100644
--- a/storages/backends/s3boto3.py
+++ b/storages/backends/s3boto3.py
@@ -562,33 +562,53 @@ class S3Boto3Storage(CompressStorageMixin, BaseStorage):
         split_url = split_url._replace(query='&'.join(joined_qs))
         return split_url.geturl()
 
+    def _get_custom_domain_url(self, name, params, expire):
+        url = '{}//{}/{}{}'.format(
+            self.url_protocol,
+            self.custom_domain,
+            filepath_to_uri(name),
+            ('?' + urlencode(params)) if params else '',
+        )
+
+        if self.querystring_auth:
+            if self.cloudfront_signer:
+                expiration = datetime.utcnow() + timedelta(seconds=expire)
+                url = self.cloudfront_signer.generate_presigned_url(
+                    url,
+                    date_less_than=expiration
+                )
+            else:
+                # TODO
+                url = self.bucket.meta.client.generate_presigned_url(
+                    'get_object',
+                    Params=params,
+                    ExpiresIn=expire,
+                    HttpMethod=http_method
+                )
+
+        return url
+
     def url(self, name, parameters=None, expire=None, http_method=None):
-        # Preserve the trailing slash after normalizing the path.
         name = self._normalize_name(clean_name(name))
         params = parameters.copy() if parameters else {}
+
         if expire is None:
             expire = self.querystring_expire
 
         if self.custom_domain:
-            url = '{}//{}/{}{}'.format(
-                self.url_protocol,
-                self.custom_domain,
-                filepath_to_uri(name),
-                '?{}'.format(urlencode(params)) if params else '',
-            )
-
-            if self.querystring_auth and self.cloudfront_signer:
-                expiration = datetime.utcnow() + timedelta(seconds=expire)
-                return self.cloudfront_signer.generate_presigned_url(url, date_less_than=expiration)
-
-            return url
+            return self._get_custom_domain_url(name, params, expire)
 
         params['Bucket'] = self.bucket.name
         params['Key'] = name
-        url = self.bucket.meta.client.generate_presigned_url('get_object', Params=params,
-                                                             ExpiresIn=expire, HttpMethod=http_method)
+        url = self.bucket.meta.client.generate_presigned_url(
+            'get_object', Params=params,
+            ExpiresIn=expire,
+            HttpMethod=http_method
+        )
+
         if self.querystring_auth:
             return url
+
         return self._strip_signing_parameters(url)
 
     def get_available_name(self, name, max_length=None):

@jschneier
Copy link
Owner

Sorry folks this didn't make it into the most recent version still. It would be very helpful if someone could list out the configuration they want to have INCLUDING the DNS / domain mapping because the info here conflicts in several ways for me.

@dopry
Copy link

dopry commented Oct 26, 2023

this is my use case...

given

  • minio running in a local docker container
x-task: &task
  # docker stack deploy restart policy for tasks
  deploy:
    restart_policy:
      condition: on-failure
    replicas: 1
  # docker compose stand-alone restart policy for tasks
  restart: on-failure

x-task-ensure-bucket: &x-task-ensure-bucket
  <<: *task
  image: minio/mc
  entrypoint: |
    sh -c "
    mc config host add s3 http://s3:9000 dev password;
    mc mb --ignore-existing s3/$${BUCKET_NAME}"

volumes:
  s3-data:

services: 
  s3:
    image: minio/minio
    ports:
      - "9000:9000"
      - "9001:9001"
    volumes:
      - s3-data:/data
    environment:
      MINIO_ROOT_USER: dev
      MINIO_ROOT_PASSWORD: password
    command: server --console-address ":9001" /data

  ensure-s3-bucket:
    <<: *x-task-ensure-bucket
    environment:
      - BUCKET_NAME=example
    depends_on:
      - s3
  • AWS_S3_ENDPOINT_URL is http://localhost:9000 but could be any other s3 compatible object store.
  • host.docerk.internal is a hosts entry that points to my local docker server(127.0.01). It could be any a CNAME which points to the bucket directly, or a proxy.

Here is what my storage looks like.

class CustomStorage(S3Boto3Storage):
    bucket_name = 'example'
    custom_domain = 'host.docker.internal:9000/example'
    url_protocol = 'http'
    querystring_auth = True
    default_acl = "private"

In my test case I'm using minio running on docker locally)

With the configuration above I get urls in the form.https://host.docker.internal:9000/example/file.ext

I expect URLS in the form of http://host.docker.local:9000/example/file.ext?AWSAccessKeyId=KeyId&Signature=AValidSignature&Expires=1698331393

If I comment out custom_domain I get urls in the form. http://localhost:9000/example/file.ext?AWSAccessKeyId=KeyId&Signature=AValidSignature&Expires=1698331393

@amoralesc
Copy link

Commenting here to report that there is a current hack of replacing the endpoint URL after it has been generated, but only works with Signature Version 2. More info here #165 (comment).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet