Files
imgproxy/security/signature.go
2025-09-05 00:46:25 +06:00

52 lines
1.1 KiB
Go

package security
import (
"crypto/hmac"
"crypto/sha256"
"encoding/base64"
"slices"
"github.com/imgproxy/imgproxy/v3/config"
)
func VerifySignature(signature, path string) error {
if len(config.Keys) == 0 || len(config.Salts) == 0 {
return nil
}
if slices.Contains(config.TrustedSignatures, signature) {
return nil
}
messageMAC, err := base64.RawURLEncoding.DecodeString(signature)
if err != nil {
return newSignatureError("Invalid signature encoding")
}
for i := 0; i < len(config.Keys); i++ {
if hmac.Equal(messageMAC, signatureFor(path, config.Keys[i], config.Salts[i], config.SignatureSize)) {
return nil
}
}
return newSignatureError("Invalid signature")
}
func signatureFor(str string, key, salt []byte, signatureSize int) []byte {
mac := hmac.New(sha256.New, key)
mac.Write(salt)
// It's supposed that path starts with '/'. However, if and input path comes with the
// leading slash split, let's re-add it here.
if str[0] != '/' {
mac.Write([]byte{'/'})
}
mac.Write([]byte(str))
expectedMAC := mac.Sum(nil)
if signatureSize < 32 {
return expectedMAC[:signatureSize]
}
return expectedMAC
}