middleware.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458
  1. package httpd
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/http"
  6. "runtime/debug"
  7. "strings"
  8. "time"
  9. "github.com/go-chi/chi/v5/middleware"
  10. "github.com/go-chi/jwtauth/v5"
  11. "github.com/lestrrat-go/jwx/jwt"
  12. "github.com/rs/xid"
  13. "github.com/drakkan/sftpgo/v2/common"
  14. "github.com/drakkan/sftpgo/v2/dataprovider"
  15. "github.com/drakkan/sftpgo/v2/logger"
  16. "github.com/drakkan/sftpgo/v2/sdk"
  17. "github.com/drakkan/sftpgo/v2/util"
  18. )
  19. var (
  20. forwardedProtoKey = &contextKey{"forwarded proto"}
  21. errInvalidToken = errors.New("invalid JWT token")
  22. )
  23. type contextKey struct {
  24. name string
  25. }
  26. func (k *contextKey) String() string {
  27. return "context value " + k.name
  28. }
  29. func validateJWTToken(w http.ResponseWriter, r *http.Request, audience tokenAudience) error {
  30. token, _, err := jwtauth.FromContext(r.Context())
  31. var redirectPath string
  32. if audience == tokenAudienceWebAdmin {
  33. redirectPath = webLoginPath
  34. } else {
  35. redirectPath = webClientLoginPath
  36. }
  37. isAPIToken := (audience == tokenAudienceAPI || audience == tokenAudienceAPIUser)
  38. if err != nil || token == nil {
  39. logger.Debug(logSender, "", "error getting jwt token: %v", err)
  40. if isAPIToken {
  41. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  42. } else {
  43. http.Redirect(w, r, redirectPath, http.StatusFound)
  44. }
  45. return errInvalidToken
  46. }
  47. err = jwt.Validate(token)
  48. if err != nil {
  49. logger.Debug(logSender, "", "error validating jwt token: %v", err)
  50. if isAPIToken {
  51. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  52. } else {
  53. http.Redirect(w, r, redirectPath, http.StatusFound)
  54. }
  55. return errInvalidToken
  56. }
  57. if isTokenInvalidated(r) {
  58. logger.Debug(logSender, "", "the token has been invalidated")
  59. if isAPIToken {
  60. sendAPIResponse(w, r, nil, "Your token is no longer valid", http.StatusUnauthorized)
  61. } else {
  62. http.Redirect(w, r, redirectPath, http.StatusFound)
  63. }
  64. return errInvalidToken
  65. }
  66. // a user with a partial token will be always redirected to the appropriate two factor auth page
  67. if err := checkPartialAuth(w, r, audience, token.Audience()); err != nil {
  68. return err
  69. }
  70. if !util.IsStringInSlice(audience, token.Audience()) {
  71. logger.Debug(logSender, "", "the token is not valid for audience %#v", audience)
  72. if isAPIToken {
  73. sendAPIResponse(w, r, nil, "Your token audience is not valid", http.StatusUnauthorized)
  74. } else {
  75. http.Redirect(w, r, redirectPath, http.StatusFound)
  76. }
  77. return errInvalidToken
  78. }
  79. return nil
  80. }
  81. func validateJWTPartialToken(w http.ResponseWriter, r *http.Request, audience tokenAudience) error {
  82. token, _, err := jwtauth.FromContext(r.Context())
  83. var notFoundFunc func(w http.ResponseWriter, r *http.Request, err error)
  84. if audience == tokenAudienceWebAdminPartial {
  85. notFoundFunc = renderNotFoundPage
  86. } else {
  87. notFoundFunc = renderClientNotFoundPage
  88. }
  89. if err != nil || token == nil || jwt.Validate(token) != nil {
  90. notFoundFunc(w, r, nil)
  91. return errInvalidToken
  92. }
  93. if isTokenInvalidated(r) {
  94. notFoundFunc(w, r, nil)
  95. return errInvalidToken
  96. }
  97. if !util.IsStringInSlice(audience, token.Audience()) {
  98. logger.Debug(logSender, "", "the token is not valid for audience %#v", audience)
  99. notFoundFunc(w, r, nil)
  100. return errInvalidToken
  101. }
  102. return nil
  103. }
  104. func jwtAuthenticatorPartial(audience tokenAudience) func(next http.Handler) http.Handler {
  105. return func(next http.Handler) http.Handler {
  106. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  107. if err := validateJWTPartialToken(w, r, audience); err != nil {
  108. return
  109. }
  110. // Token is authenticated, pass it through
  111. next.ServeHTTP(w, r)
  112. })
  113. }
  114. }
  115. func jwtAuthenticatorAPI(next http.Handler) http.Handler {
  116. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  117. if err := validateJWTToken(w, r, tokenAudienceAPI); err != nil {
  118. return
  119. }
  120. // Token is authenticated, pass it through
  121. next.ServeHTTP(w, r)
  122. })
  123. }
  124. func jwtAuthenticatorAPIUser(next http.Handler) http.Handler {
  125. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  126. if err := validateJWTToken(w, r, tokenAudienceAPIUser); err != nil {
  127. return
  128. }
  129. // Token is authenticated, pass it through
  130. next.ServeHTTP(w, r)
  131. })
  132. }
  133. func jwtAuthenticatorWebAdmin(next http.Handler) http.Handler {
  134. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  135. if err := validateJWTToken(w, r, tokenAudienceWebAdmin); err != nil {
  136. return
  137. }
  138. // Token is authenticated, pass it through
  139. next.ServeHTTP(w, r)
  140. })
  141. }
  142. func jwtAuthenticatorWebClient(next http.Handler) http.Handler {
  143. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  144. if err := validateJWTToken(w, r, tokenAudienceWebClient); err != nil {
  145. return
  146. }
  147. // Token is authenticated, pass it through
  148. next.ServeHTTP(w, r)
  149. })
  150. }
  151. func checkHTTPUserPerm(perm string) func(next http.Handler) http.Handler {
  152. return func(next http.Handler) http.Handler {
  153. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  154. _, claims, err := jwtauth.FromContext(r.Context())
  155. if err != nil {
  156. if isWebRequest(r) {
  157. renderClientBadRequestPage(w, r, err)
  158. } else {
  159. sendAPIResponse(w, r, err, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
  160. }
  161. return
  162. }
  163. tokenClaims := jwtTokenClaims{}
  164. tokenClaims.Decode(claims)
  165. // for web client perms are negated and not granted
  166. if tokenClaims.hasPerm(perm) {
  167. if isWebRequest(r) {
  168. renderClientForbiddenPage(w, r, "You don't have permission for this action")
  169. } else {
  170. sendAPIResponse(w, r, nil, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  171. }
  172. return
  173. }
  174. next.ServeHTTP(w, r)
  175. })
  176. }
  177. }
  178. func checkPerm(perm string) func(next http.Handler) http.Handler {
  179. return func(next http.Handler) http.Handler {
  180. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  181. _, claims, err := jwtauth.FromContext(r.Context())
  182. if err != nil {
  183. if isWebRequest(r) {
  184. renderBadRequestPage(w, r, err)
  185. } else {
  186. sendAPIResponse(w, r, err, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
  187. }
  188. return
  189. }
  190. tokenClaims := jwtTokenClaims{}
  191. tokenClaims.Decode(claims)
  192. if !tokenClaims.hasPerm(perm) {
  193. if isWebRequest(r) {
  194. renderForbiddenPage(w, r, "You don't have permission for this action")
  195. } else {
  196. sendAPIResponse(w, r, nil, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  197. }
  198. return
  199. }
  200. next.ServeHTTP(w, r)
  201. })
  202. }
  203. }
  204. func verifyCSRFHeader(next http.Handler) http.Handler {
  205. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  206. tokenString := r.Header.Get(csrfHeaderToken)
  207. token, err := jwtauth.VerifyToken(csrfTokenAuth, tokenString)
  208. if err != nil || token == nil {
  209. logger.Debug(logSender, "", "error validating CSRF header: %v", err)
  210. sendAPIResponse(w, r, err, "Invalid token", http.StatusForbidden)
  211. return
  212. }
  213. if !util.IsStringInSlice(tokenAudienceCSRF, token.Audience()) {
  214. logger.Debug(logSender, "", "error validating CSRF header audience")
  215. sendAPIResponse(w, r, errors.New("the token is not valid"), "", http.StatusForbidden)
  216. return
  217. }
  218. next.ServeHTTP(w, r)
  219. })
  220. }
  221. func checkAPIKeyAuth(tokenAuth *jwtauth.JWTAuth, scope dataprovider.APIKeyScope) func(next http.Handler) http.Handler {
  222. return func(next http.Handler) http.Handler {
  223. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  224. apiKey := r.Header.Get("X-SFTPGO-API-KEY")
  225. if apiKey == "" {
  226. next.ServeHTTP(w, r)
  227. return
  228. }
  229. keyParams := strings.SplitN(apiKey, ".", 3)
  230. if len(keyParams) < 2 {
  231. logger.Debug(logSender, "", "invalid api key %#v", apiKey)
  232. sendAPIResponse(w, r, errors.New("the provided api key is not valid"), "", http.StatusBadRequest)
  233. return
  234. }
  235. keyID := keyParams[0]
  236. key := keyParams[1]
  237. apiUser := ""
  238. if len(keyParams) > 2 {
  239. apiUser = keyParams[2]
  240. }
  241. k, err := dataprovider.APIKeyExists(keyID)
  242. if err != nil {
  243. logger.Debug(logSender, "invalid api key %#v: %v", apiKey, err)
  244. sendAPIResponse(w, r, errors.New("the provided api key is not valid"), "", http.StatusBadRequest)
  245. return
  246. }
  247. if err := k.Authenticate(key); err != nil {
  248. logger.Debug(logSender, "unable to authenticate api key %#v: %v", apiKey, err)
  249. sendAPIResponse(w, r, fmt.Errorf("the provided api key cannot be authenticated"), "", http.StatusUnauthorized)
  250. return
  251. }
  252. if scope == dataprovider.APIKeyScopeAdmin {
  253. if k.Admin != "" {
  254. apiUser = k.Admin
  255. }
  256. if err := authenticateAdminWithAPIKey(apiUser, keyID, tokenAuth, r); err != nil {
  257. logger.Debug(logSender, "", "unable to authenticate admin %#v associated with api key %#v: %v",
  258. apiUser, apiKey, err)
  259. sendAPIResponse(w, r, fmt.Errorf("the admin associated with the provided api key cannot be authenticated"),
  260. "", http.StatusUnauthorized)
  261. return
  262. }
  263. } else {
  264. if k.User != "" {
  265. apiUser = k.User
  266. }
  267. if err := authenticateUserWithAPIKey(apiUser, keyID, tokenAuth, r); err != nil {
  268. logger.Debug(logSender, "", "unable to authenticate user %#v associated with api key %#v: %v",
  269. apiUser, apiKey, err)
  270. code := http.StatusUnauthorized
  271. if errors.Is(err, common.ErrInternalFailure) {
  272. code = http.StatusInternalServerError
  273. }
  274. sendAPIResponse(w, r, errors.New("the user associated with the provided api key cannot be authenticated"),
  275. "", code)
  276. return
  277. }
  278. }
  279. dataprovider.UpdateAPIKeyLastUse(&k) //nolint:errcheck
  280. next.ServeHTTP(w, r)
  281. })
  282. }
  283. }
  284. func forbidAPIKeyAuthentication(next http.Handler) http.Handler {
  285. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  286. claims, err := getTokenClaims(r)
  287. if err != nil || claims.Username == "" {
  288. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  289. return
  290. }
  291. if claims.APIKeyID != "" {
  292. sendAPIResponse(w, r, nil, "API key authentication is not allowed", http.StatusForbidden)
  293. return
  294. }
  295. next.ServeHTTP(w, r)
  296. })
  297. }
  298. func recoverer(next http.Handler) http.Handler {
  299. fn := func(w http.ResponseWriter, r *http.Request) {
  300. defer func() {
  301. if rvr := recover(); rvr != nil {
  302. if rvr == http.ErrAbortHandler {
  303. panic(rvr)
  304. }
  305. logEntry := middleware.GetLogEntry(r)
  306. if logEntry != nil {
  307. logEntry.Panic(rvr, debug.Stack())
  308. } else {
  309. middleware.PrintPrettyStack(rvr)
  310. }
  311. w.WriteHeader(http.StatusInternalServerError)
  312. }
  313. }()
  314. next.ServeHTTP(w, r)
  315. }
  316. return http.HandlerFunc(fn)
  317. }
  318. func authenticateAdminWithAPIKey(username, keyID string, tokenAuth *jwtauth.JWTAuth, r *http.Request) error {
  319. if username == "" {
  320. return errors.New("the provided key is not associated with any admin and no username was provided")
  321. }
  322. admin, err := dataprovider.AdminExists(username)
  323. if err != nil {
  324. return err
  325. }
  326. if !admin.Filters.AllowAPIKeyAuth {
  327. return fmt.Errorf("API key authentication disabled for admin %#v", admin.Username)
  328. }
  329. if err := admin.CanLogin(util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  330. return err
  331. }
  332. c := jwtTokenClaims{
  333. Username: admin.Username,
  334. Permissions: admin.Permissions,
  335. Signature: admin.GetSignature(),
  336. APIKeyID: keyID,
  337. }
  338. resp, err := c.createTokenResponse(tokenAuth, tokenAudienceAPI)
  339. if err != nil {
  340. return err
  341. }
  342. r.Header.Set("Authorization", fmt.Sprintf("Bearer %v", resp["access_token"]))
  343. dataprovider.UpdateAdminLastLogin(&admin)
  344. return nil
  345. }
  346. func authenticateUserWithAPIKey(username, keyID string, tokenAuth *jwtauth.JWTAuth, r *http.Request) error {
  347. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  348. if username == "" {
  349. err := errors.New("the provided key is not associated with any user and no username was provided")
  350. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}}, ipAddr, err)
  351. return err
  352. }
  353. if err := common.Config.ExecutePostConnectHook(ipAddr, common.ProtocolHTTP); err != nil {
  354. return err
  355. }
  356. user, err := dataprovider.UserExists(username)
  357. if err != nil {
  358. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}}, ipAddr, err)
  359. return err
  360. }
  361. if !user.Filters.AllowAPIKeyAuth {
  362. err := fmt.Errorf("API key authentication disabled for user %#v", user.Username)
  363. updateLoginMetrics(&user, ipAddr, err)
  364. return err
  365. }
  366. if err := user.CheckLoginConditions(); err != nil {
  367. updateLoginMetrics(&user, ipAddr, err)
  368. return err
  369. }
  370. connectionID := fmt.Sprintf("%v_%v", common.ProtocolHTTP, xid.New().String())
  371. if err := checkHTTPClientUser(&user, r, connectionID); err != nil {
  372. updateLoginMetrics(&user, ipAddr, err)
  373. return err
  374. }
  375. lastLogin := util.GetTimeFromMsecSinceEpoch(user.LastLogin)
  376. diff := -time.Until(lastLogin)
  377. if diff < 0 || diff > 10*time.Minute {
  378. defer user.CloseFs() //nolint:errcheck
  379. err = user.CheckFsRoot(connectionID)
  380. if err != nil {
  381. updateLoginMetrics(&user, ipAddr, common.ErrInternalFailure)
  382. return common.ErrInternalFailure
  383. }
  384. }
  385. c := jwtTokenClaims{
  386. Username: user.Username,
  387. Permissions: user.Filters.WebClient,
  388. Signature: user.GetSignature(),
  389. APIKeyID: keyID,
  390. }
  391. resp, err := c.createTokenResponse(tokenAuth, tokenAudienceAPIUser)
  392. if err != nil {
  393. updateLoginMetrics(&user, ipAddr, common.ErrInternalFailure)
  394. return err
  395. }
  396. r.Header.Set("Authorization", fmt.Sprintf("Bearer %v", resp["access_token"]))
  397. dataprovider.UpdateLastLogin(&user)
  398. updateLoginMetrics(&user, ipAddr, nil)
  399. return nil
  400. }
  401. func checkPartialAuth(w http.ResponseWriter, r *http.Request, audience string, tokenAudience []string) error {
  402. if audience == tokenAudienceWebAdmin && util.IsStringInSlice(tokenAudienceWebAdminPartial, tokenAudience) {
  403. http.Redirect(w, r, webAdminTwoFactorPath, http.StatusFound)
  404. return errInvalidToken
  405. }
  406. if audience == tokenAudienceWebClient && util.IsStringInSlice(tokenAudienceWebClientPartial, tokenAudience) {
  407. http.Redirect(w, r, webClientTwoFactorPath, http.StatusFound)
  408. return errInvalidToken
  409. }
  410. return nil
  411. }