auth_utils.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "errors"
  17. "fmt"
  18. "net/http"
  19. "time"
  20. "github.com/go-chi/jwtauth/v5"
  21. "github.com/lestrrat-go/jwx/v2/jwt"
  22. "github.com/rs/xid"
  23. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  24. "github.com/drakkan/sftpgo/v2/internal/logger"
  25. "github.com/drakkan/sftpgo/v2/internal/util"
  26. )
  27. type tokenAudience = string
  28. const (
  29. tokenAudienceWebAdmin tokenAudience = "WebAdmin"
  30. tokenAudienceWebClient tokenAudience = "WebClient"
  31. tokenAudienceWebAdminPartial tokenAudience = "WebAdminPartial"
  32. tokenAudienceWebClientPartial tokenAudience = "WebClientPartial"
  33. tokenAudienceAPI tokenAudience = "API"
  34. tokenAudienceAPIUser tokenAudience = "APIUser"
  35. tokenAudienceCSRF tokenAudience = "CSRF"
  36. )
  37. type tokenValidation = int
  38. const (
  39. tokenValidationFull = iota
  40. tokenValidationNoIPMatch tokenValidation = iota
  41. )
  42. const (
  43. claimUsernameKey = "username"
  44. claimPermissionsKey = "permissions"
  45. claimRole = "role"
  46. claimAPIKey = "api_key"
  47. claimNodeID = "node_id"
  48. claimMustSetSecondFactorKey = "2fa_required"
  49. claimRequiredTwoFactorProtocols = "2fa_protos"
  50. claimHideUserPageSection = "hus"
  51. basicRealm = "Basic realm=\"SFTPGo\""
  52. jwtCookieKey = "jwt"
  53. )
  54. var (
  55. tokenDuration = 20 * time.Minute
  56. // csrf token duration is greater than normal token duration to reduce issues
  57. // with the login form
  58. csrfTokenDuration = 6 * time.Hour
  59. tokenRefreshThreshold = 10 * time.Minute
  60. tokenValidationMode = tokenValidationFull
  61. )
  62. type jwtTokenClaims struct {
  63. Username string
  64. Permissions []string
  65. Role string
  66. Signature string
  67. Audience []string
  68. APIKeyID string
  69. NodeID string
  70. MustSetTwoFactorAuth bool
  71. RequiredTwoFactorProtocols []string
  72. HideUserPageSections int
  73. }
  74. func (c *jwtTokenClaims) hasUserAudience() bool {
  75. for _, audience := range c.Audience {
  76. if audience == tokenAudienceWebClient || audience == tokenAudienceAPIUser {
  77. return true
  78. }
  79. }
  80. return false
  81. }
  82. func (c *jwtTokenClaims) asMap() map[string]any {
  83. claims := make(map[string]any)
  84. claims[claimUsernameKey] = c.Username
  85. claims[claimPermissionsKey] = c.Permissions
  86. if c.Role != "" {
  87. claims[claimRole] = c.Role
  88. }
  89. if c.APIKeyID != "" {
  90. claims[claimAPIKey] = c.APIKeyID
  91. }
  92. if c.NodeID != "" {
  93. claims[claimNodeID] = c.NodeID
  94. }
  95. claims[jwt.SubjectKey] = c.Signature
  96. if c.MustSetTwoFactorAuth {
  97. claims[claimMustSetSecondFactorKey] = c.MustSetTwoFactorAuth
  98. }
  99. if len(c.RequiredTwoFactorProtocols) > 0 {
  100. claims[claimRequiredTwoFactorProtocols] = c.RequiredTwoFactorProtocols
  101. }
  102. if c.HideUserPageSections > 0 {
  103. claims[claimHideUserPageSection] = c.HideUserPageSections
  104. }
  105. return claims
  106. }
  107. func (c *jwtTokenClaims) decodeSliceString(val any) []string {
  108. var result []string
  109. switch v := val.(type) {
  110. case []any:
  111. for _, elem := range v {
  112. switch elemValue := elem.(type) {
  113. case string:
  114. result = append(result, elemValue)
  115. }
  116. }
  117. }
  118. return result
  119. }
  120. func (c *jwtTokenClaims) Decode(token map[string]any) {
  121. c.Permissions = nil
  122. username := token[claimUsernameKey]
  123. switch v := username.(type) {
  124. case string:
  125. c.Username = v
  126. }
  127. signature := token[jwt.SubjectKey]
  128. switch v := signature.(type) {
  129. case string:
  130. c.Signature = v
  131. }
  132. audience := token[jwt.AudienceKey]
  133. switch v := audience.(type) {
  134. case []string:
  135. c.Audience = v
  136. }
  137. if val, ok := token[claimAPIKey]; ok {
  138. switch v := val.(type) {
  139. case string:
  140. c.APIKeyID = v
  141. }
  142. }
  143. if val, ok := token[claimNodeID]; ok {
  144. switch v := val.(type) {
  145. case string:
  146. c.NodeID = v
  147. }
  148. }
  149. if val, ok := token[claimRole]; ok {
  150. switch v := val.(type) {
  151. case string:
  152. c.Role = v
  153. }
  154. }
  155. permissions := token[claimPermissionsKey]
  156. c.Permissions = c.decodeSliceString(permissions)
  157. if val, ok := token[claimMustSetSecondFactorKey]; ok {
  158. switch v := val.(type) {
  159. case bool:
  160. c.MustSetTwoFactorAuth = v
  161. }
  162. }
  163. if val, ok := token[claimRequiredTwoFactorProtocols]; ok {
  164. c.RequiredTwoFactorProtocols = c.decodeSliceString(val)
  165. }
  166. if val, ok := token[claimHideUserPageSection]; ok {
  167. switch v := val.(type) {
  168. case float64:
  169. c.HideUserPageSections = int(v)
  170. }
  171. }
  172. }
  173. func (c *jwtTokenClaims) isCriticalPermRemoved(permissions []string) bool {
  174. if util.Contains(permissions, dataprovider.PermAdminAny) {
  175. return false
  176. }
  177. if (util.Contains(c.Permissions, dataprovider.PermAdminManageAdmins) ||
  178. util.Contains(c.Permissions, dataprovider.PermAdminAny)) &&
  179. !util.Contains(permissions, dataprovider.PermAdminManageAdmins) &&
  180. !util.Contains(permissions, dataprovider.PermAdminAny) {
  181. return true
  182. }
  183. return false
  184. }
  185. func (c *jwtTokenClaims) hasPerm(perm string) bool {
  186. if util.Contains(c.Permissions, dataprovider.PermAdminAny) {
  187. return true
  188. }
  189. return util.Contains(c.Permissions, perm)
  190. }
  191. func (c *jwtTokenClaims) createToken(tokenAuth *jwtauth.JWTAuth, audience tokenAudience, ip string) (jwt.Token, string, error) {
  192. claims := c.asMap()
  193. now := time.Now().UTC()
  194. claims[jwt.JwtIDKey] = xid.New().String()
  195. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  196. claims[jwt.ExpirationKey] = now.Add(tokenDuration)
  197. claims[jwt.AudienceKey] = []string{audience, ip}
  198. return tokenAuth.Encode(claims)
  199. }
  200. func (c *jwtTokenClaims) createTokenResponse(tokenAuth *jwtauth.JWTAuth, audience tokenAudience, ip string) (map[string]any, error) {
  201. token, tokenString, err := c.createToken(tokenAuth, audience, ip)
  202. if err != nil {
  203. return nil, err
  204. }
  205. response := make(map[string]any)
  206. response["access_token"] = tokenString
  207. response["expires_at"] = token.Expiration().Format(time.RFC3339)
  208. return response, nil
  209. }
  210. func (c *jwtTokenClaims) createAndSetCookie(w http.ResponseWriter, r *http.Request, tokenAuth *jwtauth.JWTAuth,
  211. audience tokenAudience, ip string,
  212. ) error {
  213. resp, err := c.createTokenResponse(tokenAuth, audience, ip)
  214. if err != nil {
  215. return err
  216. }
  217. var basePath string
  218. if audience == tokenAudienceWebAdmin || audience == tokenAudienceWebAdminPartial {
  219. basePath = webBaseAdminPath
  220. } else {
  221. basePath = webBaseClientPath
  222. }
  223. http.SetCookie(w, &http.Cookie{
  224. Name: jwtCookieKey,
  225. Value: resp["access_token"].(string),
  226. Path: basePath,
  227. Expires: time.Now().Add(tokenDuration),
  228. MaxAge: int(tokenDuration / time.Second),
  229. HttpOnly: true,
  230. Secure: isTLS(r),
  231. SameSite: http.SameSiteStrictMode,
  232. })
  233. return nil
  234. }
  235. func (c *jwtTokenClaims) removeCookie(w http.ResponseWriter, r *http.Request, cookiePath string) {
  236. http.SetCookie(w, &http.Cookie{
  237. Name: jwtCookieKey,
  238. Value: "",
  239. Path: cookiePath,
  240. Expires: time.Unix(0, 0),
  241. MaxAge: -1,
  242. HttpOnly: true,
  243. Secure: isTLS(r),
  244. SameSite: http.SameSiteStrictMode,
  245. })
  246. invalidateToken(r)
  247. }
  248. func tokenFromContext(r *http.Request) string {
  249. if token, ok := r.Context().Value(oidcGeneratedToken).(string); ok {
  250. return token
  251. }
  252. return ""
  253. }
  254. func isTLS(r *http.Request) bool {
  255. if r.TLS != nil {
  256. return true
  257. }
  258. if proto, ok := r.Context().Value(forwardedProtoKey).(string); ok {
  259. return proto == "https"
  260. }
  261. return false
  262. }
  263. func isTokenInvalidated(r *http.Request) bool {
  264. var findTokenFns []func(r *http.Request) string
  265. findTokenFns = append(findTokenFns, jwtauth.TokenFromHeader)
  266. findTokenFns = append(findTokenFns, jwtauth.TokenFromCookie)
  267. findTokenFns = append(findTokenFns, tokenFromContext)
  268. isTokenFound := false
  269. for _, fn := range findTokenFns {
  270. token := fn(r)
  271. if token != "" {
  272. isTokenFound = true
  273. if _, ok := invalidatedJWTTokens.Load(token); ok {
  274. return true
  275. }
  276. }
  277. }
  278. return !isTokenFound
  279. }
  280. func invalidateToken(r *http.Request) {
  281. tokenString := jwtauth.TokenFromHeader(r)
  282. if tokenString != "" {
  283. invalidatedJWTTokens.Store(tokenString, time.Now().Add(tokenDuration).UTC())
  284. }
  285. tokenString = jwtauth.TokenFromCookie(r)
  286. if tokenString != "" {
  287. invalidatedJWTTokens.Store(tokenString, time.Now().Add(tokenDuration).UTC())
  288. }
  289. }
  290. func getUserFromToken(r *http.Request) *dataprovider.User {
  291. user := &dataprovider.User{}
  292. _, claims, err := jwtauth.FromContext(r.Context())
  293. if err != nil {
  294. return user
  295. }
  296. tokenClaims := jwtTokenClaims{}
  297. tokenClaims.Decode(claims)
  298. user.Username = tokenClaims.Username
  299. user.Filters.WebClient = tokenClaims.Permissions
  300. user.Role = tokenClaims.Role
  301. return user
  302. }
  303. func getAdminFromToken(r *http.Request) *dataprovider.Admin {
  304. admin := &dataprovider.Admin{}
  305. _, claims, err := jwtauth.FromContext(r.Context())
  306. if err != nil {
  307. return admin
  308. }
  309. tokenClaims := jwtTokenClaims{}
  310. tokenClaims.Decode(claims)
  311. admin.Username = tokenClaims.Username
  312. admin.Permissions = tokenClaims.Permissions
  313. admin.Filters.Preferences.HideUserPageSections = tokenClaims.HideUserPageSections
  314. admin.Role = tokenClaims.Role
  315. return admin
  316. }
  317. func createCSRFToken(ip string) string {
  318. claims := make(map[string]any)
  319. now := time.Now().UTC()
  320. claims[jwt.JwtIDKey] = xid.New().String()
  321. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  322. claims[jwt.ExpirationKey] = now.Add(csrfTokenDuration)
  323. claims[jwt.AudienceKey] = []string{tokenAudienceCSRF, ip}
  324. _, tokenString, err := csrfTokenAuth.Encode(claims)
  325. if err != nil {
  326. logger.Debug(logSender, "", "unable to create CSRF token: %v", err)
  327. return ""
  328. }
  329. return tokenString
  330. }
  331. func verifyCSRFToken(tokenString, ip string) error {
  332. token, err := jwtauth.VerifyToken(csrfTokenAuth, tokenString)
  333. if err != nil || token == nil {
  334. logger.Debug(logSender, "", "error validating CSRF token %#v: %v", tokenString, err)
  335. return fmt.Errorf("unable to verify form token: %v", err)
  336. }
  337. if !util.Contains(token.Audience(), tokenAudienceCSRF) {
  338. logger.Debug(logSender, "", "error validating CSRF token audience")
  339. return errors.New("the form token is not valid")
  340. }
  341. if tokenValidationMode != tokenValidationNoIPMatch {
  342. if !util.Contains(token.Audience(), ip) {
  343. logger.Debug(logSender, "", "error validating CSRF token IP audience")
  344. return errors.New("the form token is not valid")
  345. }
  346. }
  347. return nil
  348. }