server.go 72 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "context"
  17. "crypto/tls"
  18. "crypto/x509"
  19. "errors"
  20. "fmt"
  21. "log"
  22. "net"
  23. "net/http"
  24. "path/filepath"
  25. "strings"
  26. "time"
  27. "github.com/go-chi/chi/v5"
  28. "github.com/go-chi/chi/v5/middleware"
  29. "github.com/go-chi/jwtauth/v5"
  30. "github.com/go-chi/render"
  31. "github.com/lestrrat-go/jwx/v2/jwa"
  32. "github.com/rs/cors"
  33. "github.com/rs/xid"
  34. "github.com/sftpgo/sdk"
  35. "github.com/unrolled/secure"
  36. "github.com/drakkan/sftpgo/v2/internal/common"
  37. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  38. "github.com/drakkan/sftpgo/v2/internal/logger"
  39. "github.com/drakkan/sftpgo/v2/internal/mfa"
  40. "github.com/drakkan/sftpgo/v2/internal/smtp"
  41. "github.com/drakkan/sftpgo/v2/internal/util"
  42. "github.com/drakkan/sftpgo/v2/internal/version"
  43. )
  44. var (
  45. compressor = middleware.NewCompressor(5)
  46. xForwardedProto = http.CanonicalHeaderKey("X-Forwarded-Proto")
  47. )
  48. type httpdServer struct {
  49. binding Binding
  50. staticFilesPath string
  51. openAPIPath string
  52. enableWebAdmin bool
  53. enableWebClient bool
  54. enableRESTAPI bool
  55. renderOpenAPI bool
  56. isShared int
  57. router *chi.Mux
  58. tokenAuth *jwtauth.JWTAuth
  59. signingPassphrase string
  60. cors CorsConfig
  61. }
  62. func newHttpdServer(b Binding, staticFilesPath, signingPassphrase string, cors CorsConfig,
  63. openAPIPath string,
  64. ) *httpdServer {
  65. if openAPIPath == "" {
  66. b.RenderOpenAPI = false
  67. }
  68. return &httpdServer{
  69. binding: b,
  70. staticFilesPath: staticFilesPath,
  71. openAPIPath: openAPIPath,
  72. enableWebAdmin: b.EnableWebAdmin,
  73. enableWebClient: b.EnableWebClient,
  74. enableRESTAPI: b.EnableRESTAPI,
  75. renderOpenAPI: b.RenderOpenAPI,
  76. signingPassphrase: signingPassphrase,
  77. cors: cors,
  78. }
  79. }
  80. func (s *httpdServer) setShared(value int) {
  81. s.isShared = value
  82. }
  83. func (s *httpdServer) listenAndServe() error {
  84. s.initializeRouter()
  85. httpServer := &http.Server{
  86. Handler: s.router,
  87. ReadHeaderTimeout: 30 * time.Second,
  88. ReadTimeout: 60 * time.Second,
  89. WriteTimeout: 60 * time.Second,
  90. IdleTimeout: 60 * time.Second,
  91. MaxHeaderBytes: 1 << 18, // 256KB
  92. ErrorLog: log.New(&logger.StdLoggerWrapper{Sender: logSender}, "", 0),
  93. }
  94. if certMgr != nil && s.binding.EnableHTTPS {
  95. certID := common.DefaultTLSKeyPaidID
  96. if getConfigPath(s.binding.CertificateFile, "") != "" && getConfigPath(s.binding.CertificateKeyFile, "") != "" {
  97. certID = s.binding.GetAddress()
  98. }
  99. config := &tls.Config{
  100. GetCertificate: certMgr.GetCertificateFunc(certID),
  101. MinVersion: util.GetTLSVersion(s.binding.MinTLSVersion),
  102. NextProtos: []string{"http/1.1", "h2"},
  103. CipherSuites: util.GetTLSCiphersFromNames(s.binding.TLSCipherSuites),
  104. PreferServerCipherSuites: true,
  105. }
  106. httpServer.TLSConfig = config
  107. logger.Debug(logSender, "", "configured TLS cipher suites for binding %#v: %v, certID: %v",
  108. s.binding.GetAddress(), httpServer.TLSConfig.CipherSuites, certID)
  109. if s.binding.ClientAuthType == 1 {
  110. httpServer.TLSConfig.ClientCAs = certMgr.GetRootCAs()
  111. httpServer.TLSConfig.ClientAuth = tls.RequireAndVerifyClientCert
  112. httpServer.TLSConfig.VerifyConnection = s.verifyTLSConnection
  113. }
  114. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, true, logSender)
  115. }
  116. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, false, logSender)
  117. }
  118. func (s *httpdServer) verifyTLSConnection(state tls.ConnectionState) error {
  119. if certMgr != nil {
  120. var clientCrt *x509.Certificate
  121. var clientCrtName string
  122. if len(state.PeerCertificates) > 0 {
  123. clientCrt = state.PeerCertificates[0]
  124. clientCrtName = clientCrt.Subject.String()
  125. }
  126. if len(state.VerifiedChains) == 0 {
  127. logger.Warn(logSender, "", "TLS connection cannot be verified: unable to get verification chain")
  128. return errors.New("TLS connection cannot be verified: unable to get verification chain")
  129. }
  130. for _, verifiedChain := range state.VerifiedChains {
  131. var caCrt *x509.Certificate
  132. if len(verifiedChain) > 0 {
  133. caCrt = verifiedChain[len(verifiedChain)-1]
  134. }
  135. if certMgr.IsRevoked(clientCrt, caCrt) {
  136. logger.Debug(logSender, "", "tls handshake error, client certificate %#v has been revoked", clientCrtName)
  137. return common.ErrCrtRevoked
  138. }
  139. }
  140. }
  141. return nil
  142. }
  143. func (s *httpdServer) refreshCookie(next http.Handler) http.Handler {
  144. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  145. s.checkCookieExpiration(w, r)
  146. next.ServeHTTP(w, r)
  147. })
  148. }
  149. func (s *httpdServer) renderClientLoginPage(w http.ResponseWriter, error, ip string) {
  150. data := loginPage{
  151. CurrentURL: webClientLoginPath,
  152. Version: version.Get().Version,
  153. Error: error,
  154. CSRFToken: createCSRFToken(ip),
  155. StaticURL: webStaticFilesPath,
  156. Branding: s.binding.Branding.WebClient,
  157. FormDisabled: s.binding.isWebClientLoginFormDisabled(),
  158. }
  159. if s.binding.showAdminLoginURL() {
  160. data.AltLoginURL = webAdminLoginPath
  161. data.AltLoginName = s.binding.Branding.WebAdmin.ShortName
  162. }
  163. if smtp.IsEnabled() && !data.FormDisabled {
  164. data.ForgotPwdURL = webClientForgotPwdPath
  165. }
  166. if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
  167. data.OpenIDLoginURL = webClientOIDCLoginPath
  168. }
  169. renderClientTemplate(w, templateClientLogin, data)
  170. }
  171. func (s *httpdServer) handleWebClientLogout(w http.ResponseWriter, r *http.Request) {
  172. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  173. c := jwtTokenClaims{}
  174. c.removeCookie(w, r, webBaseClientPath)
  175. s.logoutOIDCUser(w, r)
  176. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  177. }
  178. func (s *httpdServer) handleWebClientChangePwdPost(w http.ResponseWriter, r *http.Request) {
  179. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  180. err := r.ParseForm()
  181. if err != nil {
  182. s.renderClientChangePasswordPage(w, r, err.Error())
  183. return
  184. }
  185. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  186. s.renderClientForbiddenPage(w, r, err.Error())
  187. return
  188. }
  189. err = doChangeUserPassword(r, r.Form.Get("current_password"), r.Form.Get("new_password1"),
  190. r.Form.Get("new_password2"))
  191. if err != nil {
  192. s.renderClientChangePasswordPage(w, r, err.Error())
  193. return
  194. }
  195. s.handleWebClientLogout(w, r)
  196. }
  197. func (s *httpdServer) handleClientWebLogin(w http.ResponseWriter, r *http.Request) {
  198. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  199. if !dataprovider.HasAdmin() {
  200. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  201. return
  202. }
  203. s.renderClientLoginPage(w, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
  204. }
  205. func (s *httpdServer) handleWebClientLoginPost(w http.ResponseWriter, r *http.Request) {
  206. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  207. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  208. if err := r.ParseForm(); err != nil {
  209. s.renderClientLoginPage(w, err.Error(), ipAddr)
  210. return
  211. }
  212. protocol := common.ProtocolHTTP
  213. username := r.Form.Get("username")
  214. password := r.Form.Get("password")
  215. if username == "" || password == "" {
  216. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  217. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  218. s.renderClientLoginPage(w, "Invalid credentials", ipAddr)
  219. return
  220. }
  221. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  222. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  223. dataprovider.LoginMethodPassword, ipAddr, err)
  224. s.renderClientLoginPage(w, err.Error(), ipAddr)
  225. return
  226. }
  227. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  228. s.renderClientLoginPage(w, fmt.Sprintf("access denied by post connect hook: %v", err), ipAddr)
  229. return
  230. }
  231. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  232. if err != nil {
  233. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  234. s.renderClientLoginPage(w, dataprovider.ErrInvalidCredentials.Error(), ipAddr)
  235. return
  236. }
  237. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  238. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  239. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  240. s.renderClientLoginPage(w, err.Error(), ipAddr)
  241. return
  242. }
  243. defer user.CloseFs() //nolint:errcheck
  244. err = user.CheckFsRoot(connectionID)
  245. if err != nil {
  246. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  247. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  248. s.renderClientLoginPage(w, err.Error(), ipAddr)
  249. return
  250. }
  251. s.loginUser(w, r, &user, connectionID, ipAddr, false, s.renderClientLoginPage)
  252. }
  253. func (s *httpdServer) handleWebClientPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  254. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  255. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  256. err := r.ParseForm()
  257. if err != nil {
  258. s.renderClientResetPwdPage(w, err.Error(), ipAddr)
  259. return
  260. }
  261. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  262. s.renderClientForbiddenPage(w, r, err.Error())
  263. return
  264. }
  265. _, user, err := handleResetPassword(r, r.Form.Get("code"), r.Form.Get("password"), false)
  266. if err != nil {
  267. s.renderClientResetPwdPage(w, err.Error(), ipAddr)
  268. return
  269. }
  270. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  271. if err := checkHTTPClientUser(user, r, connectionID, true); err != nil {
  272. s.renderClientResetPwdPage(w, fmt.Sprintf("Password reset successfully but unable to login: %v", err.Error()), ipAddr)
  273. return
  274. }
  275. defer user.CloseFs() //nolint:errcheck
  276. err = user.CheckFsRoot(connectionID)
  277. if err != nil {
  278. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  279. s.renderClientResetPwdPage(w, fmt.Sprintf("Password reset successfully but unable to login: %v", err.Error()), ipAddr)
  280. return
  281. }
  282. s.loginUser(w, r, user, connectionID, ipAddr, false, s.renderClientResetPwdPage)
  283. }
  284. func (s *httpdServer) handleWebClientTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  285. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  286. claims, err := getTokenClaims(r)
  287. if err != nil {
  288. s.renderNotFoundPage(w, r, nil)
  289. return
  290. }
  291. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  292. if err := r.ParseForm(); err != nil {
  293. s.renderClientTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  294. return
  295. }
  296. username := claims.Username
  297. recoveryCode := r.Form.Get("recovery_code")
  298. if username == "" || recoveryCode == "" {
  299. s.renderClientTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  300. return
  301. }
  302. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  303. s.renderClientTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  304. return
  305. }
  306. user, userMerged, err := dataprovider.GetUserVariants(username)
  307. if err != nil {
  308. s.renderClientTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  309. return
  310. }
  311. if !userMerged.Filters.TOTPConfig.Enabled || !util.Contains(userMerged.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  312. s.renderClientTwoFactorPage(w, "Two factory authentication is not enabled", ipAddr)
  313. return
  314. }
  315. for idx, code := range user.Filters.RecoveryCodes {
  316. if err := code.Secret.Decrypt(); err != nil {
  317. s.renderClientInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  318. return
  319. }
  320. if code.Secret.GetPayload() == recoveryCode {
  321. if code.Used {
  322. s.renderClientTwoFactorRecoveryPage(w, "This recovery code was already used", ipAddr)
  323. return
  324. }
  325. user.Filters.RecoveryCodes[idx].Used = true
  326. err = dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, ipAddr)
  327. if err != nil {
  328. logger.Warn(logSender, "", "unable to set the recovery code %#v as used: %v", recoveryCode, err)
  329. s.renderClientInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  330. return
  331. }
  332. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  333. s.loginUser(w, r, &userMerged, connectionID, ipAddr, true,
  334. s.renderClientTwoFactorRecoveryPage)
  335. return
  336. }
  337. }
  338. s.renderClientTwoFactorRecoveryPage(w, "Invalid recovery code", ipAddr)
  339. }
  340. func (s *httpdServer) handleWebClientTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  341. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  342. claims, err := getTokenClaims(r)
  343. if err != nil {
  344. s.renderNotFoundPage(w, r, nil)
  345. return
  346. }
  347. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  348. if err := r.ParseForm(); err != nil {
  349. s.renderClientTwoFactorPage(w, err.Error(), ipAddr)
  350. return
  351. }
  352. username := claims.Username
  353. passcode := r.Form.Get("passcode")
  354. if username == "" || passcode == "" {
  355. s.renderClientTwoFactorPage(w, "Invalid credentials", ipAddr)
  356. return
  357. }
  358. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  359. s.renderClientTwoFactorPage(w, err.Error(), ipAddr)
  360. return
  361. }
  362. user, err := dataprovider.GetUserWithGroupSettings(username)
  363. if err != nil {
  364. s.renderClientTwoFactorPage(w, "Invalid credentials", ipAddr)
  365. return
  366. }
  367. if !user.Filters.TOTPConfig.Enabled || !util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  368. s.renderClientTwoFactorPage(w, "Two factory authentication is not enabled", ipAddr)
  369. return
  370. }
  371. err = user.Filters.TOTPConfig.Secret.Decrypt()
  372. if err != nil {
  373. s.renderClientInternalServerErrorPage(w, r, err)
  374. return
  375. }
  376. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  377. user.Filters.TOTPConfig.Secret.GetPayload())
  378. if !match || err != nil {
  379. s.renderClientTwoFactorPage(w, "Invalid authentication code", ipAddr)
  380. return
  381. }
  382. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  383. s.loginUser(w, r, &user, connectionID, ipAddr, true, s.renderClientTwoFactorPage)
  384. }
  385. func (s *httpdServer) handleWebAdminTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  386. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  387. claims, err := getTokenClaims(r)
  388. if err != nil {
  389. s.renderNotFoundPage(w, r, nil)
  390. return
  391. }
  392. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  393. if err := r.ParseForm(); err != nil {
  394. s.renderTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  395. return
  396. }
  397. username := claims.Username
  398. recoveryCode := r.Form.Get("recovery_code")
  399. if username == "" || recoveryCode == "" {
  400. s.renderTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  401. return
  402. }
  403. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  404. s.renderTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  405. return
  406. }
  407. admin, err := dataprovider.AdminExists(username)
  408. if err != nil {
  409. s.renderTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  410. return
  411. }
  412. if !admin.Filters.TOTPConfig.Enabled {
  413. s.renderTwoFactorRecoveryPage(w, "Two factory authentication is not enabled", ipAddr)
  414. return
  415. }
  416. for idx, code := range admin.Filters.RecoveryCodes {
  417. if err := code.Secret.Decrypt(); err != nil {
  418. s.renderInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  419. return
  420. }
  421. if code.Secret.GetPayload() == recoveryCode {
  422. if code.Used {
  423. s.renderTwoFactorRecoveryPage(w, "This recovery code was already used", ipAddr)
  424. return
  425. }
  426. admin.Filters.RecoveryCodes[idx].Used = true
  427. err = dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, ipAddr)
  428. if err != nil {
  429. logger.Warn(logSender, "", "unable to set the recovery code %#v as used: %v", recoveryCode, err)
  430. s.renderInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  431. return
  432. }
  433. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorRecoveryPage, ipAddr)
  434. return
  435. }
  436. }
  437. s.renderTwoFactorRecoveryPage(w, "Invalid recovery code", ipAddr)
  438. }
  439. func (s *httpdServer) handleWebAdminTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  440. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  441. claims, err := getTokenClaims(r)
  442. if err != nil {
  443. s.renderNotFoundPage(w, r, nil)
  444. return
  445. }
  446. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  447. if err := r.ParseForm(); err != nil {
  448. s.renderTwoFactorPage(w, err.Error(), ipAddr)
  449. return
  450. }
  451. username := claims.Username
  452. passcode := r.Form.Get("passcode")
  453. if username == "" || passcode == "" {
  454. s.renderTwoFactorPage(w, "Invalid credentials", ipAddr)
  455. return
  456. }
  457. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  458. s.renderTwoFactorPage(w, err.Error(), ipAddr)
  459. return
  460. }
  461. admin, err := dataprovider.AdminExists(username)
  462. if err != nil {
  463. s.renderTwoFactorPage(w, "Invalid credentials", ipAddr)
  464. return
  465. }
  466. if !admin.Filters.TOTPConfig.Enabled {
  467. s.renderTwoFactorPage(w, "Two factory authentication is not enabled", ipAddr)
  468. return
  469. }
  470. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  471. if err != nil {
  472. s.renderInternalServerErrorPage(w, r, err)
  473. return
  474. }
  475. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  476. admin.Filters.TOTPConfig.Secret.GetPayload())
  477. if !match || err != nil {
  478. s.renderTwoFactorPage(w, "Invalid authentication code", ipAddr)
  479. return
  480. }
  481. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorPage, ipAddr)
  482. }
  483. func (s *httpdServer) handleWebAdminLoginPost(w http.ResponseWriter, r *http.Request) {
  484. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  485. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  486. if err := r.ParseForm(); err != nil {
  487. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  488. return
  489. }
  490. username := r.Form.Get("username")
  491. password := r.Form.Get("password")
  492. if username == "" || password == "" {
  493. s.renderAdminLoginPage(w, "Invalid credentials", ipAddr)
  494. return
  495. }
  496. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  497. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  498. return
  499. }
  500. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  501. if err != nil {
  502. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  503. return
  504. }
  505. s.loginAdmin(w, r, &admin, false, s.renderAdminLoginPage, ipAddr)
  506. }
  507. func (s *httpdServer) renderAdminLoginPage(w http.ResponseWriter, error, ip string) {
  508. data := loginPage{
  509. CurrentURL: webAdminLoginPath,
  510. Version: version.Get().Version,
  511. Error: error,
  512. CSRFToken: createCSRFToken(ip),
  513. StaticURL: webStaticFilesPath,
  514. Branding: s.binding.Branding.WebAdmin,
  515. FormDisabled: s.binding.isWebAdminLoginFormDisabled(),
  516. }
  517. if s.binding.showClientLoginURL() {
  518. data.AltLoginURL = webClientLoginPath
  519. data.AltLoginName = s.binding.Branding.WebClient.ShortName
  520. }
  521. if smtp.IsEnabled() && !data.FormDisabled {
  522. data.ForgotPwdURL = webAdminForgotPwdPath
  523. }
  524. if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
  525. data.OpenIDLoginURL = webAdminOIDCLoginPath
  526. }
  527. renderAdminTemplate(w, templateLogin, data)
  528. }
  529. func (s *httpdServer) handleWebAdminLogin(w http.ResponseWriter, r *http.Request) {
  530. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  531. if !dataprovider.HasAdmin() {
  532. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  533. return
  534. }
  535. s.renderAdminLoginPage(w, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
  536. }
  537. func (s *httpdServer) handleWebAdminLogout(w http.ResponseWriter, r *http.Request) {
  538. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  539. c := jwtTokenClaims{}
  540. c.removeCookie(w, r, webBaseAdminPath)
  541. s.logoutOIDCUser(w, r)
  542. http.Redirect(w, r, webAdminLoginPath, http.StatusFound)
  543. }
  544. func (s *httpdServer) handleWebAdminChangePwdPost(w http.ResponseWriter, r *http.Request) {
  545. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  546. err := r.ParseForm()
  547. if err != nil {
  548. s.renderChangePasswordPage(w, r, err.Error())
  549. return
  550. }
  551. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  552. s.renderForbiddenPage(w, r, err.Error())
  553. return
  554. }
  555. err = doChangeAdminPassword(r, r.Form.Get("current_password"), r.Form.Get("new_password1"),
  556. r.Form.Get("new_password2"))
  557. if err != nil {
  558. s.renderChangePasswordPage(w, r, err.Error())
  559. return
  560. }
  561. s.handleWebAdminLogout(w, r)
  562. }
  563. func (s *httpdServer) handleWebAdminPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  564. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  565. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  566. err := r.ParseForm()
  567. if err != nil {
  568. s.renderResetPwdPage(w, err.Error(), ipAddr)
  569. return
  570. }
  571. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  572. s.renderForbiddenPage(w, r, err.Error())
  573. return
  574. }
  575. admin, _, err := handleResetPassword(r, r.Form.Get("code"), r.Form.Get("password"), true)
  576. if err != nil {
  577. if e, ok := err.(*util.ValidationError); ok {
  578. s.renderResetPwdPage(w, e.GetErrorString(), ipAddr)
  579. return
  580. }
  581. s.renderResetPwdPage(w, err.Error(), ipAddr)
  582. return
  583. }
  584. s.loginAdmin(w, r, admin, false, s.renderResetPwdPage, ipAddr)
  585. }
  586. func (s *httpdServer) handleWebAdminSetupPost(w http.ResponseWriter, r *http.Request) {
  587. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  588. if dataprovider.HasAdmin() {
  589. s.renderBadRequestPage(w, r, errors.New("an admin user already exists"))
  590. return
  591. }
  592. err := r.ParseForm()
  593. if err != nil {
  594. s.renderAdminSetupPage(w, r, "", err.Error())
  595. return
  596. }
  597. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  598. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  599. s.renderForbiddenPage(w, r, err.Error())
  600. return
  601. }
  602. username := r.Form.Get("username")
  603. password := r.Form.Get("password")
  604. confirmPassword := r.Form.Get("confirm_password")
  605. installCode := r.Form.Get("install_code")
  606. if installationCode != "" && installCode != resolveInstallationCode() {
  607. s.renderAdminSetupPage(w, r, username, fmt.Sprintf("%v mismatch", installationCodeHint))
  608. return
  609. }
  610. if username == "" {
  611. s.renderAdminSetupPage(w, r, username, "Please set a username")
  612. return
  613. }
  614. if password == "" {
  615. s.renderAdminSetupPage(w, r, username, "Please set a password")
  616. return
  617. }
  618. if password != confirmPassword {
  619. s.renderAdminSetupPage(w, r, username, "Passwords mismatch")
  620. return
  621. }
  622. admin := dataprovider.Admin{
  623. Username: username,
  624. Password: password,
  625. Status: 1,
  626. Permissions: []string{dataprovider.PermAdminAny},
  627. }
  628. err = dataprovider.AddAdmin(&admin, username, ipAddr)
  629. if err != nil {
  630. s.renderAdminSetupPage(w, r, username, err.Error())
  631. return
  632. }
  633. s.loginAdmin(w, r, &admin, false, nil, ipAddr)
  634. }
  635. func (s *httpdServer) loginUser(
  636. w http.ResponseWriter, r *http.Request, user *dataprovider.User, connectionID, ipAddr string,
  637. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, error, ip string),
  638. ) {
  639. c := jwtTokenClaims{
  640. Username: user.Username,
  641. Permissions: user.Filters.WebClient,
  642. Signature: user.GetSignature(),
  643. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  644. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  645. }
  646. audience := tokenAudienceWebClient
  647. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) &&
  648. user.CanManageMFA() && !isSecondFactorAuth {
  649. audience = tokenAudienceWebClientPartial
  650. }
  651. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  652. if err != nil {
  653. logger.Warn(logSender, connectionID, "unable to set user login cookie %v", err)
  654. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  655. errorFunc(w, err.Error(), ipAddr)
  656. return
  657. }
  658. if isSecondFactorAuth {
  659. invalidateToken(r)
  660. }
  661. if audience == tokenAudienceWebClientPartial {
  662. http.Redirect(w, r, webClientTwoFactorPath, http.StatusFound)
  663. return
  664. }
  665. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, err)
  666. dataprovider.UpdateLastLogin(user)
  667. http.Redirect(w, r, webClientFilesPath, http.StatusFound)
  668. }
  669. func (s *httpdServer) loginAdmin(
  670. w http.ResponseWriter, r *http.Request, admin *dataprovider.Admin,
  671. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, error, ip string),
  672. ipAddr string,
  673. ) {
  674. c := jwtTokenClaims{
  675. Username: admin.Username,
  676. Permissions: admin.Permissions,
  677. Signature: admin.GetSignature(),
  678. HideUserPageSections: admin.Filters.Preferences.HideUserPageSections,
  679. }
  680. audience := tokenAudienceWebAdmin
  681. if admin.Filters.TOTPConfig.Enabled && admin.CanManageMFA() && !isSecondFactorAuth {
  682. audience = tokenAudienceWebAdminPartial
  683. }
  684. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  685. if err != nil {
  686. logger.Warn(logSender, "", "unable to set admin login cookie %v", err)
  687. if errorFunc == nil {
  688. s.renderAdminSetupPage(w, r, admin.Username, err.Error())
  689. return
  690. }
  691. errorFunc(w, err.Error(), ipAddr)
  692. return
  693. }
  694. if isSecondFactorAuth {
  695. invalidateToken(r)
  696. }
  697. if audience == tokenAudienceWebAdminPartial {
  698. http.Redirect(w, r, webAdminTwoFactorPath, http.StatusFound)
  699. return
  700. }
  701. dataprovider.UpdateAdminLastLogin(admin)
  702. http.Redirect(w, r, webUsersPath, http.StatusFound)
  703. }
  704. func (s *httpdServer) logout(w http.ResponseWriter, r *http.Request) {
  705. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  706. invalidateToken(r)
  707. sendAPIResponse(w, r, nil, "Your token has been invalidated", http.StatusOK)
  708. }
  709. func (s *httpdServer) getUserToken(w http.ResponseWriter, r *http.Request) {
  710. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  711. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  712. username, password, ok := r.BasicAuth()
  713. protocol := common.ProtocolHTTP
  714. if !ok {
  715. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  716. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  717. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  718. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  719. return
  720. }
  721. if username == "" || password == "" {
  722. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  723. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  724. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  725. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  726. return
  727. }
  728. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  729. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  730. return
  731. }
  732. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  733. if err != nil {
  734. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  735. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  736. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  737. http.StatusUnauthorized)
  738. return
  739. }
  740. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  741. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  742. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  743. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  744. return
  745. }
  746. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  747. passcode := r.Header.Get(otpHeaderCode)
  748. if passcode == "" {
  749. logger.Debug(logSender, "", "TOTP enabled for user %#v and not passcode provided, authentication refused", user.Username)
  750. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  751. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  752. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  753. http.StatusUnauthorized)
  754. return
  755. }
  756. err = user.Filters.TOTPConfig.Secret.Decrypt()
  757. if err != nil {
  758. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  759. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err), http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  760. return
  761. }
  762. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  763. user.Filters.TOTPConfig.Secret.GetPayload())
  764. if !match || err != nil {
  765. logger.Debug(logSender, "invalid passcode for user %#v, match? %v, err: %v", user.Username, match, err)
  766. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  767. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  768. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  769. http.StatusUnauthorized)
  770. return
  771. }
  772. }
  773. defer user.CloseFs() //nolint:errcheck
  774. err = user.CheckFsRoot(connectionID)
  775. if err != nil {
  776. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  777. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  778. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  779. return
  780. }
  781. s.generateAndSendUserToken(w, r, ipAddr, user)
  782. }
  783. func (s *httpdServer) generateAndSendUserToken(w http.ResponseWriter, r *http.Request, ipAddr string, user dataprovider.User) {
  784. c := jwtTokenClaims{
  785. Username: user.Username,
  786. Permissions: user.Filters.WebClient,
  787. Signature: user.GetSignature(),
  788. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  789. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  790. }
  791. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPIUser, ipAddr)
  792. if err != nil {
  793. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  794. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  795. return
  796. }
  797. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  798. dataprovider.UpdateLastLogin(&user)
  799. render.JSON(w, r, resp)
  800. }
  801. func (s *httpdServer) getToken(w http.ResponseWriter, r *http.Request) {
  802. username, password, ok := r.BasicAuth()
  803. if !ok {
  804. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  805. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  806. return
  807. }
  808. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  809. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  810. if err != nil {
  811. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  812. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  813. return
  814. }
  815. if admin.Filters.TOTPConfig.Enabled {
  816. passcode := r.Header.Get(otpHeaderCode)
  817. if passcode == "" {
  818. logger.Debug(logSender, "", "TOTP enabled for admin %#v and not passcode provided, authentication refused", admin.Username)
  819. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  820. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  821. return
  822. }
  823. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  824. if err != nil {
  825. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err),
  826. http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  827. return
  828. }
  829. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  830. admin.Filters.TOTPConfig.Secret.GetPayload())
  831. if !match || err != nil {
  832. logger.Debug(logSender, "invalid passcode for admin %#v, match? %v, err: %v", admin.Username, match, err)
  833. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  834. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  835. http.StatusUnauthorized)
  836. return
  837. }
  838. }
  839. s.generateAndSendToken(w, r, admin, ipAddr)
  840. }
  841. func (s *httpdServer) generateAndSendToken(w http.ResponseWriter, r *http.Request, admin dataprovider.Admin, ip string) {
  842. c := jwtTokenClaims{
  843. Username: admin.Username,
  844. Permissions: admin.Permissions,
  845. Signature: admin.GetSignature(),
  846. }
  847. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPI, ip)
  848. if err != nil {
  849. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  850. return
  851. }
  852. dataprovider.UpdateAdminLastLogin(&admin)
  853. render.JSON(w, r, resp)
  854. }
  855. func (s *httpdServer) checkCookieExpiration(w http.ResponseWriter, r *http.Request) {
  856. if _, ok := r.Context().Value(oidcTokenKey).(string); ok {
  857. return
  858. }
  859. token, claims, err := jwtauth.FromContext(r.Context())
  860. if err != nil {
  861. return
  862. }
  863. tokenClaims := jwtTokenClaims{}
  864. tokenClaims.Decode(claims)
  865. if tokenClaims.Username == "" || tokenClaims.Signature == "" {
  866. return
  867. }
  868. if time.Until(token.Expiration()) > tokenRefreshThreshold {
  869. return
  870. }
  871. if util.Contains(token.Audience(), tokenAudienceWebClient) {
  872. s.refreshClientToken(w, r, tokenClaims)
  873. } else {
  874. s.refreshAdminToken(w, r, tokenClaims)
  875. }
  876. }
  877. func (s *httpdServer) refreshClientToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  878. user, err := dataprovider.GetUserWithGroupSettings(tokenClaims.Username)
  879. if err != nil {
  880. return
  881. }
  882. if user.GetSignature() != tokenClaims.Signature {
  883. logger.Debug(logSender, "", "signature mismatch for user %#v, unable to refresh cookie", user.Username)
  884. return
  885. }
  886. if err := checkHTTPClientUser(&user, r, xid.New().String(), true); err != nil {
  887. logger.Debug(logSender, "", "unable to refresh cookie for user %#v: %v", user.Username, err)
  888. return
  889. }
  890. tokenClaims.Permissions = user.Filters.WebClient
  891. logger.Debug(logSender, "", "cookie refreshed for user %#v", user.Username)
  892. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebClient, util.GetIPFromRemoteAddress(r.RemoteAddr)) //nolint:errcheck
  893. }
  894. func (s *httpdServer) refreshAdminToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  895. admin, err := dataprovider.AdminExists(tokenClaims.Username)
  896. if err != nil {
  897. return
  898. }
  899. if admin.Status != 1 {
  900. logger.Debug(logSender, "", "admin %#v is disabled, unable to refresh cookie", admin.Username)
  901. return
  902. }
  903. if admin.GetSignature() != tokenClaims.Signature {
  904. logger.Debug(logSender, "", "signature mismatch for admin %#v, unable to refresh cookie", admin.Username)
  905. return
  906. }
  907. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  908. if !admin.CanLoginFromIP(ipAddr) {
  909. logger.Debug(logSender, "", "admin %#v cannot login from %v, unable to refresh cookie", admin.Username, r.RemoteAddr)
  910. return
  911. }
  912. tokenClaims.Permissions = admin.Permissions
  913. tokenClaims.HideUserPageSections = admin.Filters.Preferences.HideUserPageSections
  914. logger.Debug(logSender, "", "cookie refreshed for admin %#v", admin.Username)
  915. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebAdmin, ipAddr) //nolint:errcheck
  916. }
  917. func (s *httpdServer) updateContextFromCookie(r *http.Request) *http.Request {
  918. token, _, err := jwtauth.FromContext(r.Context())
  919. if token == nil || err != nil {
  920. _, err = r.Cookie(jwtCookieKey)
  921. if err != nil {
  922. return r
  923. }
  924. token, err = jwtauth.VerifyRequest(s.tokenAuth, r, jwtauth.TokenFromCookie)
  925. ctx := jwtauth.NewContext(r.Context(), token, err)
  926. return r.WithContext(ctx)
  927. }
  928. return r
  929. }
  930. func (s *httpdServer) checkConnection(next http.Handler) http.Handler {
  931. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  932. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  933. var ip net.IP
  934. isUnixSocket := filepath.IsAbs(s.binding.Address)
  935. if !isUnixSocket {
  936. ip = net.ParseIP(ipAddr)
  937. }
  938. areHeadersAllowed := false
  939. if isUnixSocket || ip != nil {
  940. for _, allow := range s.binding.allowHeadersFrom {
  941. if allow(ip) {
  942. parsedIP := util.GetRealIP(r, s.binding.ClientIPProxyHeader, s.binding.ClientIPHeaderDepth)
  943. if parsedIP != "" {
  944. ipAddr = parsedIP
  945. r.RemoteAddr = ipAddr
  946. }
  947. if forwardedProto := r.Header.Get(xForwardedProto); forwardedProto != "" {
  948. ctx := context.WithValue(r.Context(), forwardedProtoKey, forwardedProto)
  949. r = r.WithContext(ctx)
  950. }
  951. areHeadersAllowed = true
  952. break
  953. }
  954. }
  955. }
  956. if !areHeadersAllowed {
  957. for idx := range s.binding.Security.proxyHeaders {
  958. r.Header.Del(s.binding.Security.proxyHeaders[idx])
  959. }
  960. }
  961. common.Connections.AddClientConnection(ipAddr)
  962. defer common.Connections.RemoveClientConnection(ipAddr)
  963. if err := common.Connections.IsNewConnectionAllowed(ipAddr); err != nil {
  964. logger.Log(logger.LevelDebug, common.ProtocolHTTP, "", "connection not allowed from ip %q: %v", ipAddr, err)
  965. s.sendForbiddenResponse(w, r, err.Error())
  966. return
  967. }
  968. if common.IsBanned(ipAddr) {
  969. s.sendForbiddenResponse(w, r, "your IP address is banned")
  970. return
  971. }
  972. if delay, err := common.LimitRate(common.ProtocolHTTP, ipAddr); err != nil {
  973. delay += 499999999 * time.Nanosecond
  974. w.Header().Set("Retry-After", fmt.Sprintf("%.0f", delay.Seconds()))
  975. w.Header().Set("X-Retry-In", delay.String())
  976. s.sendTooManyRequestResponse(w, r, err)
  977. return
  978. }
  979. next.ServeHTTP(w, r)
  980. })
  981. }
  982. func (s *httpdServer) sendTooManyRequestResponse(w http.ResponseWriter, r *http.Request, err error) {
  983. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  984. r = s.updateContextFromCookie(r)
  985. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  986. s.renderClientMessagePage(w, r, http.StatusText(http.StatusTooManyRequests), "Rate limit exceeded",
  987. http.StatusTooManyRequests, err, "")
  988. return
  989. }
  990. s.renderMessagePage(w, r, http.StatusText(http.StatusTooManyRequests), "Rate limit exceeded", http.StatusTooManyRequests,
  991. err, "")
  992. return
  993. }
  994. sendAPIResponse(w, r, err, http.StatusText(http.StatusTooManyRequests), http.StatusTooManyRequests)
  995. }
  996. func (s *httpdServer) sendForbiddenResponse(w http.ResponseWriter, r *http.Request, message string) {
  997. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  998. r = s.updateContextFromCookie(r)
  999. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1000. s.renderClientForbiddenPage(w, r, message)
  1001. return
  1002. }
  1003. s.renderForbiddenPage(w, r, message)
  1004. return
  1005. }
  1006. sendAPIResponse(w, r, errors.New(message), message, http.StatusForbidden)
  1007. }
  1008. func (s *httpdServer) badHostHandler(w http.ResponseWriter, r *http.Request) {
  1009. host := r.Host
  1010. for _, header := range s.binding.Security.HostsProxyHeaders {
  1011. if h := r.Header.Get(header); h != "" {
  1012. host = h
  1013. break
  1014. }
  1015. }
  1016. s.sendForbiddenResponse(w, r, fmt.Sprintf("The host %#v is not allowed", host))
  1017. }
  1018. func (s *httpdServer) redirectToWebPath(w http.ResponseWriter, r *http.Request, webPath string) {
  1019. if dataprovider.HasAdmin() {
  1020. http.Redirect(w, r, webPath, http.StatusFound)
  1021. return
  1022. }
  1023. if s.enableWebAdmin {
  1024. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  1025. }
  1026. }
  1027. func (s *httpdServer) isStaticFileURL(r *http.Request) bool {
  1028. var urlPath string
  1029. rctx := chi.RouteContext(r.Context())
  1030. if rctx != nil && rctx.RoutePath != "" {
  1031. urlPath = rctx.RoutePath
  1032. } else {
  1033. urlPath = r.URL.Path
  1034. }
  1035. return !strings.HasPrefix(urlPath, webOpenAPIPath) && !strings.HasPrefix(urlPath, webStaticFilesPath)
  1036. }
  1037. func (s *httpdServer) initializeRouter() {
  1038. s.tokenAuth = jwtauth.New(jwa.HS256.String(), getSigningKey(s.signingPassphrase), nil)
  1039. s.router = chi.NewRouter()
  1040. s.router.Use(middleware.RequestID)
  1041. s.router.Use(s.checkConnection)
  1042. s.router.Use(logger.NewStructuredLogger(logger.GetLogger()))
  1043. s.router.Use(middleware.Recoverer)
  1044. if s.binding.Security.Enabled {
  1045. secureMiddleware := secure.New(secure.Options{
  1046. AllowedHosts: s.binding.Security.AllowedHosts,
  1047. AllowedHostsAreRegex: s.binding.Security.AllowedHostsAreRegex,
  1048. HostsProxyHeaders: s.binding.Security.HostsProxyHeaders,
  1049. SSLRedirect: s.binding.Security.HTTPSRedirect,
  1050. SSLHost: s.binding.Security.HTTPSHost,
  1051. SSLTemporaryRedirect: true,
  1052. SSLProxyHeaders: s.binding.Security.getHTTPSProxyHeaders(),
  1053. STSSeconds: s.binding.Security.STSSeconds,
  1054. STSIncludeSubdomains: s.binding.Security.STSIncludeSubdomains,
  1055. STSPreload: s.binding.Security.STSPreload,
  1056. ContentTypeNosniff: s.binding.Security.ContentTypeNosniff,
  1057. ContentSecurityPolicy: s.binding.Security.ContentSecurityPolicy,
  1058. PermissionsPolicy: s.binding.Security.PermissionsPolicy,
  1059. CrossOriginOpenerPolicy: s.binding.Security.CrossOriginOpenerPolicy,
  1060. ExpectCTHeader: s.binding.Security.ExpectCTHeader,
  1061. })
  1062. secureMiddleware.SetBadHostHandler(http.HandlerFunc(s.badHostHandler))
  1063. s.router.Use(secureMiddleware.Handler)
  1064. }
  1065. if s.cors.Enabled {
  1066. c := cors.New(cors.Options{
  1067. AllowedOrigins: util.RemoveDuplicates(s.cors.AllowedOrigins, true),
  1068. AllowedMethods: util.RemoveDuplicates(s.cors.AllowedMethods, true),
  1069. AllowedHeaders: util.RemoveDuplicates(s.cors.AllowedHeaders, true),
  1070. ExposedHeaders: util.RemoveDuplicates(s.cors.ExposedHeaders, true),
  1071. MaxAge: s.cors.MaxAge,
  1072. AllowCredentials: s.cors.AllowCredentials,
  1073. OptionsPassthrough: s.cors.OptionsPassthrough,
  1074. OptionsSuccessStatus: s.cors.OptionsSuccessStatus,
  1075. AllowPrivateNetwork: s.cors.AllowPrivateNetwork,
  1076. })
  1077. s.router.Use(c.Handler)
  1078. }
  1079. s.router.Use(middleware.GetHead)
  1080. // StripSlashes causes infinite redirects at the root path if used with http.FileServer
  1081. s.router.Use(middleware.Maybe(middleware.StripSlashes, s.isStaticFileURL))
  1082. s.router.NotFound(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  1083. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1084. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1085. r = s.updateContextFromCookie(r)
  1086. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1087. s.renderClientNotFoundPage(w, r, nil)
  1088. return
  1089. }
  1090. s.renderNotFoundPage(w, r, nil)
  1091. return
  1092. }
  1093. sendAPIResponse(w, r, nil, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  1094. }))
  1095. s.router.Get(healthzPath, func(w http.ResponseWriter, r *http.Request) {
  1096. render.PlainText(w, r, "ok")
  1097. })
  1098. s.router.Get(robotsTxtPath, func(w http.ResponseWriter, r *http.Request) {
  1099. render.PlainText(w, r, "User-agent: *\nDisallow: /")
  1100. })
  1101. if s.enableRESTAPI {
  1102. // share API exposed to external users
  1103. s.router.Get(sharesPath+"/{id}", s.downloadFromShare)
  1104. s.router.Post(sharesPath+"/{id}", s.uploadFilesToShare)
  1105. s.router.Post(sharesPath+"/{id}/{name}", s.uploadFileToShare)
  1106. s.router.With(compressor.Handler).Get(sharesPath+"/{id}/dirs", s.readBrowsableShareContents)
  1107. s.router.Get(sharesPath+"/{id}/files", s.downloadBrowsableSharedFile)
  1108. s.router.Get(tokenPath, s.getToken)
  1109. s.router.Post(adminPath+"/{username}/forgot-password", forgotAdminPassword)
  1110. s.router.Post(adminPath+"/{username}/reset-password", resetAdminPassword)
  1111. s.router.Post(userPath+"/{username}/forgot-password", forgotUserPassword)
  1112. s.router.Post(userPath+"/{username}/reset-password", resetUserPassword)
  1113. s.router.Group(func(router chi.Router) {
  1114. router.Use(checkNodeToken(s.tokenAuth))
  1115. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeAdmin))
  1116. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1117. router.Use(jwtAuthenticatorAPI)
  1118. router.Get(versionPath, func(w http.ResponseWriter, r *http.Request) {
  1119. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1120. render.JSON(w, r, version.Get())
  1121. })
  1122. router.With(forbidAPIKeyAuthentication).Get(logoutPath, s.logout)
  1123. router.With(forbidAPIKeyAuthentication).Get(adminProfilePath, getAdminProfile)
  1124. router.With(forbidAPIKeyAuthentication).Put(adminProfilePath, updateAdminProfile)
  1125. router.With(forbidAPIKeyAuthentication).Put(adminPwdPath, changeAdminPassword)
  1126. // admin TOTP APIs
  1127. router.With(forbidAPIKeyAuthentication).Get(adminTOTPConfigsPath, getTOTPConfigs)
  1128. router.With(forbidAPIKeyAuthentication).Post(adminTOTPGeneratePath, generateTOTPSecret)
  1129. router.With(forbidAPIKeyAuthentication).Post(adminTOTPValidatePath, validateTOTPPasscode)
  1130. router.With(forbidAPIKeyAuthentication).Post(adminTOTPSavePath, saveTOTPConfig)
  1131. router.With(forbidAPIKeyAuthentication).Get(admin2FARecoveryCodesPath, getRecoveryCodes)
  1132. router.With(forbidAPIKeyAuthentication).Post(admin2FARecoveryCodesPath, generateRecoveryCodes)
  1133. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus)).
  1134. Get(serverStatusPath, func(w http.ResponseWriter, r *http.Request) {
  1135. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1136. render.JSON(w, r, getServicesStatus())
  1137. })
  1138. router.With(s.checkPerm(dataprovider.PermAdminViewConnections)).Get(activeConnectionsPath, getActiveConnections)
  1139. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections)).
  1140. Delete(activeConnectionsPath+"/{connectionID}", handleCloseConnection)
  1141. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/users/scans", getUsersQuotaScans)
  1142. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/users/{username}/scan", startUserQuotaScan)
  1143. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/folders/scans", getFoldersQuotaScans)
  1144. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/folders/{name}/scan", startFolderQuotaScan)
  1145. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath, getUsers)
  1146. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(userPath, addUser)
  1147. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath+"/{username}", getUserByUsername)
  1148. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}", updateUser)
  1149. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers)).Delete(userPath+"/{username}", deleteUser)
  1150. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}/2fa/disable", disableUser2FA)
  1151. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(folderPath, getFolders)
  1152. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(folderPath+"/{name}", getFolderByName)
  1153. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(folderPath, addFolder)
  1154. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(folderPath+"/{name}", updateFolder)
  1155. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers)).Delete(folderPath+"/{name}", deleteFolder)
  1156. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath, getGroups)
  1157. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath+"/{name}", getGroupByName)
  1158. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(groupPath, addGroup)
  1159. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Put(groupPath+"/{name}", updateGroup)
  1160. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Delete(groupPath+"/{name}", deleteGroup)
  1161. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(dumpDataPath, dumpData)
  1162. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(loadDataPath, loadData)
  1163. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(loadDataPath, loadDataFromRequest)
  1164. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/usage",
  1165. updateUserQuotaUsage)
  1166. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/transfer-usage",
  1167. updateUserTransferQuotaUsage)
  1168. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/folders/{name}/usage",
  1169. updateFolderQuotaUsage)
  1170. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts, getDefenderHosts)
  1171. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts+"/{id}", getDefenderHostByID)
  1172. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(defenderHosts+"/{id}", deleteDefenderHostByID)
  1173. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath, getAdmins)
  1174. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(adminPath, addAdmin)
  1175. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath+"/{username}", getAdminByUsername)
  1176. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}", updateAdmin)
  1177. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Delete(adminPath+"/{username}", deleteAdmin)
  1178. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}/2fa/disable", disableAdmin2FA)
  1179. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Get(retentionChecksPath, getRetentionChecks)
  1180. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Post(retentionBasePath+"/{username}/check",
  1181. startRetentionCheck)
  1182. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Get(metadataChecksPath, getMetadataChecks)
  1183. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Post(metadataBasePath+"/{username}/check",
  1184. startMetadataCheck)
  1185. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1186. Get(fsEventsPath, searchFsEvents)
  1187. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1188. Get(providerEventsPath, searchProviderEvents)
  1189. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1190. Get(apiKeysPath, getAPIKeys)
  1191. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1192. Post(apiKeysPath, addAPIKey)
  1193. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1194. Get(apiKeysPath+"/{id}", getAPIKeyByID)
  1195. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1196. Put(apiKeysPath+"/{id}", updateAPIKey)
  1197. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1198. Delete(apiKeysPath+"/{id}", deleteAPIKey)
  1199. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath, getEventActions)
  1200. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath+"/{name}", getEventActionByName)
  1201. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventActionsPath, addEventAction)
  1202. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventActionsPath+"/{name}", updateEventAction)
  1203. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventActionsPath+"/{name}", deleteEventAction)
  1204. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath, getEventRules)
  1205. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath+"/{name}", getEventRuleByName)
  1206. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventRulesPath, addEventRule)
  1207. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventRulesPath+"/{name}", updateEventRule)
  1208. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventRulesPath+"/{name}", deleteEventRule)
  1209. })
  1210. s.router.Get(userTokenPath, s.getUserToken)
  1211. s.router.Group(func(router chi.Router) {
  1212. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeUser))
  1213. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1214. router.Use(jwtAuthenticatorAPIUser)
  1215. router.With(forbidAPIKeyAuthentication).Get(userLogoutPath, s.logout)
  1216. router.With(forbidAPIKeyAuthentication, s.checkSecondFactorRequirement,
  1217. s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).Put(userPwdPath, changeUserPassword)
  1218. router.With(forbidAPIKeyAuthentication).Get(userProfilePath, getUserProfile)
  1219. router.With(forbidAPIKeyAuthentication, s.checkSecondFactorRequirement).Put(userProfilePath, updateUserProfile)
  1220. // user TOTP APIs
  1221. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1222. Get(userTOTPConfigsPath, getTOTPConfigs)
  1223. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1224. Post(userTOTPGeneratePath, generateTOTPSecret)
  1225. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1226. Post(userTOTPValidatePath, validateTOTPPasscode)
  1227. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1228. Post(userTOTPSavePath, saveTOTPConfig)
  1229. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1230. Get(user2FARecoveryCodesPath, getRecoveryCodes)
  1231. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1232. Post(user2FARecoveryCodesPath, generateRecoveryCodes)
  1233. router.With(s.checkSecondFactorRequirement, compressor.Handler).Get(userDirsPath, readUserFolder)
  1234. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1235. Post(userDirsPath, createUserDir)
  1236. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1237. Patch(userDirsPath, renameUserDir)
  1238. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1239. Delete(userDirsPath, deleteUserDir)
  1240. router.With(s.checkSecondFactorRequirement).Get(userFilesPath, getUserFile)
  1241. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1242. Post(userFilesPath, uploadUserFiles)
  1243. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1244. Patch(userFilesPath, renameUserFile)
  1245. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1246. Delete(userFilesPath, deleteUserFile)
  1247. router.With(s.checkSecondFactorRequirement).Post(userStreamZipPath, getUserFilesAsZipStream)
  1248. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1249. Get(userSharesPath, getShares)
  1250. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1251. Post(userSharesPath, addShare)
  1252. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1253. Get(userSharesPath+"/{id}", getShareByID)
  1254. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1255. Put(userSharesPath+"/{id}", updateShare)
  1256. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1257. Delete(userSharesPath+"/{id}", deleteShare)
  1258. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1259. Post(userUploadFilePath, uploadUserFile)
  1260. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1261. Patch(userFilesDirsMetadataPath, setFileDirMetadata)
  1262. })
  1263. if s.renderOpenAPI {
  1264. s.router.Group(func(router chi.Router) {
  1265. router.Use(compressor.Handler)
  1266. serveStaticDir(router, webOpenAPIPath, s.openAPIPath)
  1267. })
  1268. }
  1269. }
  1270. if s.enableWebAdmin || s.enableWebClient {
  1271. s.router.Group(func(router chi.Router) {
  1272. router.Use(compressor.Handler)
  1273. serveStaticDir(router, webStaticFilesPath, s.staticFilesPath)
  1274. })
  1275. if s.binding.OIDC.isEnabled() {
  1276. s.router.Get(webOIDCRedirectPath, s.handleOIDCRedirect)
  1277. }
  1278. if s.enableWebClient {
  1279. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1280. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1281. s.redirectToWebPath(w, r, webClientLoginPath)
  1282. })
  1283. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1284. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1285. s.redirectToWebPath(w, r, webClientLoginPath)
  1286. })
  1287. } else {
  1288. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1289. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1290. s.redirectToWebPath(w, r, webAdminLoginPath)
  1291. })
  1292. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1293. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1294. s.redirectToWebPath(w, r, webAdminLoginPath)
  1295. })
  1296. }
  1297. }
  1298. s.setupWebClientRoutes()
  1299. s.setupWebAdminRoutes()
  1300. }
  1301. func (s *httpdServer) setupWebClientRoutes() {
  1302. if s.enableWebClient {
  1303. s.router.Get(webBaseClientPath, func(w http.ResponseWriter, r *http.Request) {
  1304. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1305. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  1306. })
  1307. s.router.Get(webClientLoginPath, s.handleClientWebLogin)
  1308. if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
  1309. s.router.Get(webClientOIDCLoginPath, s.handleWebClientOIDCLogin)
  1310. }
  1311. if !s.binding.isWebClientLoginFormDisabled() {
  1312. s.router.Post(webClientLoginPath, s.handleWebClientLoginPost)
  1313. s.router.Get(webClientForgotPwdPath, s.handleWebClientForgotPwd)
  1314. s.router.Post(webClientForgotPwdPath, s.handleWebClientForgotPwdPost)
  1315. s.router.Get(webClientResetPwdPath, s.handleWebClientPasswordReset)
  1316. s.router.Post(webClientResetPwdPath, s.handleWebClientPasswordResetPost)
  1317. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1318. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1319. Get(webClientTwoFactorPath, s.handleWebClientTwoFactor)
  1320. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1321. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1322. Post(webClientTwoFactorPath, s.handleWebClientTwoFactorPost)
  1323. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1324. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1325. Get(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecovery)
  1326. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1327. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1328. Post(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecoveryPost)
  1329. }
  1330. // share routes exposed to external users
  1331. s.router.Get(webClientPubSharesPath+"/{id}", s.downloadFromShare)
  1332. s.router.Get(webClientPubSharesPath+"/{id}/partial", s.handleClientSharePartialDownload)
  1333. s.router.Get(webClientPubSharesPath+"/{id}/browse", s.handleShareGetFiles)
  1334. s.router.Get(webClientPubSharesPath+"/{id}/upload", s.handleClientUploadToShare)
  1335. s.router.With(compressor.Handler).Get(webClientPubSharesPath+"/{id}/dirs", s.handleShareGetDirContents)
  1336. s.router.Post(webClientPubSharesPath+"/{id}", s.uploadFilesToShare)
  1337. s.router.Post(webClientPubSharesPath+"/{id}/{name}", s.uploadFileToShare)
  1338. s.router.Group(func(router chi.Router) {
  1339. if s.binding.OIDC.isEnabled() {
  1340. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebClient))
  1341. }
  1342. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1343. router.Use(jwtAuthenticatorWebClient)
  1344. router.Get(webClientLogoutPath, s.handleWebClientLogout)
  1345. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientFilesPath, s.handleClientGetFiles)
  1346. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientViewPDFPath, s.handleClientViewPDF)
  1347. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientGetPDFPath, s.handleClientGetPDF)
  1348. router.With(s.checkSecondFactorRequirement, s.refreshCookie, verifyCSRFHeader).Get(webClientFilePath, getUserFile)
  1349. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1350. Post(webClientFilePath, uploadUserFile)
  1351. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientEditFilePath, s.handleClientEditFile)
  1352. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1353. Patch(webClientFilesPath, renameUserFile)
  1354. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1355. Delete(webClientFilesPath, deleteUserFile)
  1356. router.With(s.checkSecondFactorRequirement, compressor.Handler, s.refreshCookie).
  1357. Get(webClientDirsPath, s.handleClientGetDirContents)
  1358. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1359. Post(webClientDirsPath, createUserDir)
  1360. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1361. Patch(webClientDirsPath, renameUserDir)
  1362. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1363. Delete(webClientDirsPath, deleteUserDir)
  1364. router.With(s.checkSecondFactorRequirement, s.refreshCookie).
  1365. Get(webClientDownloadZipPath, s.handleWebClientDownloadZip)
  1366. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientProfilePath,
  1367. s.handleClientGetProfile)
  1368. router.With(s.checkSecondFactorRequirement).Post(webClientProfilePath, s.handleWebClientProfilePost)
  1369. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1370. Get(webChangeClientPwdPath, s.handleWebClientChangePwd)
  1371. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1372. Post(webChangeClientPwdPath, s.handleWebClientChangePwdPost)
  1373. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), s.refreshCookie).
  1374. Get(webClientMFAPath, s.handleWebClientMFA)
  1375. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1376. Post(webClientTOTPGeneratePath, generateTOTPSecret)
  1377. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1378. Post(webClientTOTPValidatePath, validateTOTPPasscode)
  1379. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1380. Post(webClientTOTPSavePath, saveTOTPConfig)
  1381. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader, s.refreshCookie).
  1382. Get(webClientRecoveryCodesPath, getRecoveryCodes)
  1383. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1384. Post(webClientRecoveryCodesPath, generateRecoveryCodes)
  1385. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1386. Get(webClientSharesPath, s.handleClientGetShares)
  1387. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1388. Get(webClientSharePath, s.handleClientAddShareGet)
  1389. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1390. Post(webClientSharePath, s.handleClientAddSharePost)
  1391. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1392. Get(webClientSharePath+"/{id}", s.handleClientUpdateShareGet)
  1393. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1394. Post(webClientSharePath+"/{id}", s.handleClientUpdateSharePost)
  1395. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), verifyCSRFHeader).
  1396. Delete(webClientSharePath+"/{id}", deleteShare)
  1397. })
  1398. }
  1399. }
  1400. func (s *httpdServer) setupWebAdminRoutes() {
  1401. if s.enableWebAdmin {
  1402. s.router.Get(webBaseAdminPath, func(w http.ResponseWriter, r *http.Request) {
  1403. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1404. s.redirectToWebPath(w, r, webAdminLoginPath)
  1405. })
  1406. s.router.Get(webAdminLoginPath, s.handleWebAdminLogin)
  1407. if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
  1408. s.router.Get(webAdminOIDCLoginPath, s.handleWebAdminOIDCLogin)
  1409. }
  1410. s.router.Get(webAdminSetupPath, s.handleWebAdminSetupGet)
  1411. s.router.Post(webAdminSetupPath, s.handleWebAdminSetupPost)
  1412. if !s.binding.isWebAdminLoginFormDisabled() {
  1413. s.router.Post(webAdminLoginPath, s.handleWebAdminLoginPost)
  1414. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1415. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1416. Get(webAdminTwoFactorPath, s.handleWebAdminTwoFactor)
  1417. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1418. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1419. Post(webAdminTwoFactorPath, s.handleWebAdminTwoFactorPost)
  1420. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1421. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1422. Get(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecovery)
  1423. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1424. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1425. Post(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecoveryPost)
  1426. s.router.Get(webAdminForgotPwdPath, s.handleWebAdminForgotPwd)
  1427. s.router.Post(webAdminForgotPwdPath, s.handleWebAdminForgotPwdPost)
  1428. s.router.Get(webAdminResetPwdPath, s.handleWebAdminPasswordReset)
  1429. s.router.Post(webAdminResetPwdPath, s.handleWebAdminPasswordResetPost)
  1430. }
  1431. s.router.Group(func(router chi.Router) {
  1432. if s.binding.OIDC.isEnabled() {
  1433. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebAdmin))
  1434. }
  1435. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1436. router.Use(jwtAuthenticatorWebAdmin)
  1437. router.Get(webLogoutPath, s.handleWebAdminLogout)
  1438. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminProfilePath, s.handleWebAdminProfile)
  1439. router.With(s.requireBuiltinLogin).Post(webAdminProfilePath, s.handleWebAdminProfilePost)
  1440. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webChangeAdminPwdPath, s.handleWebAdminChangePwd)
  1441. router.With(s.requireBuiltinLogin).Post(webChangeAdminPwdPath, s.handleWebAdminChangePwdPost)
  1442. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminMFAPath, s.handleWebAdminMFA)
  1443. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPGeneratePath, generateTOTPSecret)
  1444. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPValidatePath, validateTOTPPasscode)
  1445. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPSavePath, saveTOTPConfig)
  1446. router.With(verifyCSRFHeader, s.requireBuiltinLogin, s.refreshCookie).Get(webAdminRecoveryCodesPath,
  1447. getRecoveryCodes)
  1448. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminRecoveryCodesPath, generateRecoveryCodes)
  1449. router.With(s.checkPerm(dataprovider.PermAdminViewUsers), s.refreshCookie).
  1450. Get(webUsersPath, s.handleGetWebUsers)
  1451. router.With(s.checkPerm(dataprovider.PermAdminAddUsers), s.refreshCookie).
  1452. Get(webUserPath, s.handleWebAddUserGet)
  1453. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers), s.refreshCookie).
  1454. Get(webUserPath+"/{username}", s.handleWebUpdateUserGet)
  1455. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(webUserPath, s.handleWebAddUserPost)
  1456. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Post(webUserPath+"/{username}",
  1457. s.handleWebUpdateUserPost)
  1458. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1459. Get(webGroupsPath, s.handleWebGetGroups)
  1460. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1461. Get(webGroupPath, s.handleWebAddGroupGet)
  1462. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath, s.handleWebAddGroupPost)
  1463. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1464. Get(webGroupPath+"/{name}", s.handleWebUpdateGroupGet)
  1465. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath+"/{name}",
  1466. s.handleWebUpdateGroupPost)
  1467. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), verifyCSRFHeader).
  1468. Delete(webGroupPath+"/{name}", deleteGroup)
  1469. router.With(s.checkPerm(dataprovider.PermAdminViewConnections), s.refreshCookie).
  1470. Get(webConnectionsPath, s.handleWebGetConnections)
  1471. router.With(s.checkPerm(dataprovider.PermAdminViewUsers), s.refreshCookie).
  1472. Get(webFoldersPath, s.handleWebGetFolders)
  1473. router.With(s.checkPerm(dataprovider.PermAdminAddUsers), s.refreshCookie).
  1474. Get(webFolderPath, s.handleWebAddFolderGet)
  1475. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(webFolderPath, s.handleWebAddFolderPost)
  1476. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus), s.refreshCookie).
  1477. Get(webStatusPath, s.handleWebGetStatus)
  1478. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1479. Get(webAdminsPath, s.handleGetWebAdmins)
  1480. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1481. Get(webAdminPath, s.handleWebAddAdminGet)
  1482. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1483. Get(webAdminPath+"/{username}", s.handleWebUpdateAdminGet)
  1484. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath, s.handleWebAddAdminPost)
  1485. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath+"/{username}",
  1486. s.handleWebUpdateAdminPost)
  1487. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), verifyCSRFHeader).
  1488. Delete(webAdminPath+"/{username}", deleteAdmin)
  1489. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections), verifyCSRFHeader).
  1490. Delete(webConnectionsPath+"/{connectionID}", handleCloseConnection)
  1491. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers), s.refreshCookie).
  1492. Get(webFolderPath+"/{name}", s.handleWebUpdateFolderGet)
  1493. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Post(webFolderPath+"/{name}",
  1494. s.handleWebUpdateFolderPost)
  1495. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers), verifyCSRFHeader).
  1496. Delete(webFolderPath+"/{name}", deleteFolder)
  1497. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1498. Post(webScanVFolderPath+"/{name}", startFolderQuotaScan)
  1499. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers), verifyCSRFHeader).
  1500. Delete(webUserPath+"/{username}", deleteUser)
  1501. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1502. Post(webQuotaScanPath+"/{username}", startUserQuotaScan)
  1503. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webMaintenancePath, s.handleWebMaintenance)
  1504. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webBackupPath, dumpData)
  1505. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webRestorePath, s.handleWebRestore)
  1506. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1507. Get(webTemplateUser, s.handleWebTemplateUserGet)
  1508. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateUser, s.handleWebTemplateUserPost)
  1509. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1510. Get(webTemplateFolder, s.handleWebTemplateFolderGet)
  1511. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateFolder, s.handleWebTemplateFolderPost)
  1512. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderPath, s.handleWebDefenderPage)
  1513. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderHostsPath, getDefenderHosts)
  1514. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(webDefenderHostsPath+"/{id}",
  1515. deleteDefenderHostByID)
  1516. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1517. Get(webAdminEventActionsPath, s.handleWebGetEventActions)
  1518. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1519. Get(webAdminEventActionPath, s.handleWebAddEventActionGet)
  1520. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath,
  1521. s.handleWebAddEventActionPost)
  1522. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1523. Get(webAdminEventActionPath+"/{name}", s.handleWebUpdateEventActionGet)
  1524. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath+"/{name}",
  1525. s.handleWebUpdateEventActionPost)
  1526. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1527. Delete(webAdminEventActionPath+"/{name}", deleteEventAction)
  1528. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1529. Get(webAdminEventRulesPath, s.handleWebGetEventRules)
  1530. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1531. Get(webAdminEventRulePath, s.handleWebAddEventRuleGet)
  1532. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath,
  1533. s.handleWebAddEventRulePost)
  1534. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1535. Get(webAdminEventRulePath+"/{name}", s.handleWebUpdateEventRuleGet)
  1536. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath+"/{name}",
  1537. s.handleWebUpdateEventRulePost)
  1538. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1539. Delete(webAdminEventRulePath+"/{name}", deleteEventRule)
  1540. })
  1541. }
  1542. }