server.go 83 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "context"
  17. "crypto/tls"
  18. "crypto/x509"
  19. "errors"
  20. "fmt"
  21. "log"
  22. "net"
  23. "net/http"
  24. "net/url"
  25. "path/filepath"
  26. "strings"
  27. "time"
  28. "github.com/go-chi/chi/v5"
  29. "github.com/go-chi/chi/v5/middleware"
  30. "github.com/go-chi/jwtauth/v5"
  31. "github.com/go-chi/render"
  32. "github.com/lestrrat-go/jwx/v2/jwa"
  33. "github.com/rs/cors"
  34. "github.com/rs/xid"
  35. "github.com/sftpgo/sdk"
  36. "github.com/unrolled/secure"
  37. "github.com/drakkan/sftpgo/v2/internal/acme"
  38. "github.com/drakkan/sftpgo/v2/internal/common"
  39. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  40. "github.com/drakkan/sftpgo/v2/internal/logger"
  41. "github.com/drakkan/sftpgo/v2/internal/mfa"
  42. "github.com/drakkan/sftpgo/v2/internal/smtp"
  43. "github.com/drakkan/sftpgo/v2/internal/util"
  44. "github.com/drakkan/sftpgo/v2/internal/version"
  45. )
  46. var (
  47. compressor = middleware.NewCompressor(5)
  48. xForwardedProto = http.CanonicalHeaderKey("X-Forwarded-Proto")
  49. )
  50. type httpdServer struct {
  51. binding Binding
  52. staticFilesPath string
  53. openAPIPath string
  54. enableWebAdmin bool
  55. enableWebClient bool
  56. enableRESTAPI bool
  57. renderOpenAPI bool
  58. isShared int
  59. router *chi.Mux
  60. tokenAuth *jwtauth.JWTAuth
  61. signingPassphrase string
  62. cors CorsConfig
  63. }
  64. func newHttpdServer(b Binding, staticFilesPath, signingPassphrase string, cors CorsConfig,
  65. openAPIPath string,
  66. ) *httpdServer {
  67. if openAPIPath == "" {
  68. b.RenderOpenAPI = false
  69. }
  70. return &httpdServer{
  71. binding: b,
  72. staticFilesPath: staticFilesPath,
  73. openAPIPath: openAPIPath,
  74. enableWebAdmin: b.EnableWebAdmin,
  75. enableWebClient: b.EnableWebClient,
  76. enableRESTAPI: b.EnableRESTAPI,
  77. renderOpenAPI: b.RenderOpenAPI,
  78. signingPassphrase: signingPassphrase,
  79. cors: cors,
  80. }
  81. }
  82. func (s *httpdServer) setShared(value int) {
  83. s.isShared = value
  84. }
  85. func (s *httpdServer) listenAndServe() error {
  86. s.initializeRouter()
  87. httpServer := &http.Server{
  88. Handler: s.router,
  89. ReadHeaderTimeout: 30 * time.Second,
  90. ReadTimeout: 60 * time.Second,
  91. WriteTimeout: 60 * time.Second,
  92. IdleTimeout: 60 * time.Second,
  93. MaxHeaderBytes: 1 << 16, // 64KB
  94. ErrorLog: log.New(&logger.StdLoggerWrapper{Sender: logSender}, "", 0),
  95. }
  96. if certMgr != nil && s.binding.EnableHTTPS {
  97. certID := common.DefaultTLSKeyPaidID
  98. if getConfigPath(s.binding.CertificateFile, "") != "" && getConfigPath(s.binding.CertificateKeyFile, "") != "" {
  99. certID = s.binding.GetAddress()
  100. }
  101. config := &tls.Config{
  102. GetCertificate: certMgr.GetCertificateFunc(certID),
  103. MinVersion: util.GetTLSVersion(s.binding.MinTLSVersion),
  104. NextProtos: util.GetALPNProtocols(s.binding.Protocols),
  105. CipherSuites: util.GetTLSCiphersFromNames(s.binding.TLSCipherSuites),
  106. }
  107. httpServer.TLSConfig = config
  108. logger.Debug(logSender, "", "configured TLS cipher suites for binding %q: %v, certID: %v",
  109. s.binding.GetAddress(), httpServer.TLSConfig.CipherSuites, certID)
  110. if s.binding.ClientAuthType == 1 {
  111. httpServer.TLSConfig.ClientCAs = certMgr.GetRootCAs()
  112. httpServer.TLSConfig.ClientAuth = tls.RequireAndVerifyClientCert
  113. httpServer.TLSConfig.VerifyConnection = s.verifyTLSConnection
  114. }
  115. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, true, logSender)
  116. }
  117. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, false, logSender)
  118. }
  119. func (s *httpdServer) verifyTLSConnection(state tls.ConnectionState) error {
  120. if certMgr != nil {
  121. var clientCrt *x509.Certificate
  122. var clientCrtName string
  123. if len(state.PeerCertificates) > 0 {
  124. clientCrt = state.PeerCertificates[0]
  125. clientCrtName = clientCrt.Subject.String()
  126. }
  127. if len(state.VerifiedChains) == 0 {
  128. logger.Warn(logSender, "", "TLS connection cannot be verified: unable to get verification chain")
  129. return errors.New("TLS connection cannot be verified: unable to get verification chain")
  130. }
  131. for _, verifiedChain := range state.VerifiedChains {
  132. var caCrt *x509.Certificate
  133. if len(verifiedChain) > 0 {
  134. caCrt = verifiedChain[len(verifiedChain)-1]
  135. }
  136. if certMgr.IsRevoked(clientCrt, caCrt) {
  137. logger.Debug(logSender, "", "tls handshake error, client certificate %q has been revoked", clientCrtName)
  138. return common.ErrCrtRevoked
  139. }
  140. }
  141. }
  142. return nil
  143. }
  144. func (s *httpdServer) refreshCookie(next http.Handler) http.Handler {
  145. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  146. s.checkCookieExpiration(w, r)
  147. next.ServeHTTP(w, r)
  148. })
  149. }
  150. func (s *httpdServer) renderClientLoginPage(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string) {
  151. data := clientLoginPage{
  152. commonBasePage: getCommonBasePage(r),
  153. Title: util.I18nLoginTitle,
  154. CurrentURL: webClientLoginPath,
  155. Error: err,
  156. CSRFToken: createCSRFToken(ip),
  157. Branding: s.binding.Branding.WebClient,
  158. FormDisabled: s.binding.isWebClientLoginFormDisabled(),
  159. }
  160. if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
  161. data.CurrentURL += "?next=" + url.QueryEscape(next)
  162. }
  163. if s.binding.showAdminLoginURL() {
  164. data.AltLoginURL = webAdminLoginPath
  165. data.AltLoginName = s.binding.Branding.WebAdmin.ShortName
  166. }
  167. if smtp.IsEnabled() && !data.FormDisabled {
  168. data.ForgotPwdURL = webClientForgotPwdPath
  169. }
  170. if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
  171. data.OpenIDLoginURL = webClientOIDCLoginPath
  172. }
  173. renderClientTemplate(w, templateClientLogin, data)
  174. }
  175. func (s *httpdServer) handleWebClientLogout(w http.ResponseWriter, r *http.Request) {
  176. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  177. c := jwtTokenClaims{}
  178. c.removeCookie(w, r, webBaseClientPath)
  179. s.logoutOIDCUser(w, r)
  180. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  181. }
  182. func (s *httpdServer) handleWebClientChangePwdPost(w http.ResponseWriter, r *http.Request) {
  183. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  184. if err := r.ParseForm(); err != nil {
  185. s.renderClientChangePasswordPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm))
  186. return
  187. }
  188. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  189. s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
  190. return
  191. }
  192. err := doChangeUserPassword(r, strings.TrimSpace(r.Form.Get("current_password")),
  193. strings.TrimSpace(r.Form.Get("new_password1")), strings.TrimSpace(r.Form.Get("new_password2")))
  194. if err != nil {
  195. s.renderClientChangePasswordPage(w, r, util.NewI18nError(err, util.I18nErrorChangePwdGeneric))
  196. return
  197. }
  198. s.handleWebClientLogout(w, r)
  199. }
  200. func (s *httpdServer) handleClientWebLogin(w http.ResponseWriter, r *http.Request) {
  201. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  202. if !dataprovider.HasAdmin() {
  203. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  204. return
  205. }
  206. msg := getFlashMessage(w, r)
  207. s.renderClientLoginPage(w, r, msg.getI18nError(), util.GetIPFromRemoteAddress(r.RemoteAddr))
  208. }
  209. func (s *httpdServer) handleWebClientLoginPost(w http.ResponseWriter, r *http.Request) {
  210. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  211. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  212. if err := r.ParseForm(); err != nil {
  213. s.renderClientLoginPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm), ipAddr)
  214. return
  215. }
  216. protocol := common.ProtocolHTTP
  217. username := strings.TrimSpace(r.Form.Get("username"))
  218. password := strings.TrimSpace(r.Form.Get("password"))
  219. if username == "" || password == "" {
  220. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  221. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  222. s.renderClientLoginPage(w, r,
  223. util.NewI18nError(dataprovider.ErrInvalidCredentials, util.I18nErrorInvalidCredentials), ipAddr)
  224. return
  225. }
  226. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  227. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  228. dataprovider.LoginMethodPassword, ipAddr, err)
  229. s.renderClientLoginPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF), ipAddr)
  230. return
  231. }
  232. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  233. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  234. dataprovider.LoginMethodPassword, ipAddr, err)
  235. s.renderClientLoginPage(w, r, util.NewI18nError(err, util.I18nError403Message), ipAddr)
  236. return
  237. }
  238. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  239. if err != nil {
  240. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  241. s.renderClientLoginPage(w, r,
  242. util.NewI18nError(dataprovider.ErrInvalidCredentials, util.I18nErrorInvalidCredentials), ipAddr)
  243. return
  244. }
  245. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  246. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  247. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  248. s.renderClientLoginPage(w, r, util.NewI18nError(err, util.I18nError403Message), ipAddr)
  249. return
  250. }
  251. defer user.CloseFs() //nolint:errcheck
  252. err = user.CheckFsRoot(connectionID)
  253. if err != nil {
  254. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  255. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  256. s.renderClientLoginPage(w, r, util.NewI18nError(err, util.I18nErrorFsGeneric), ipAddr)
  257. return
  258. }
  259. s.loginUser(w, r, &user, connectionID, ipAddr, false, s.renderClientLoginPage)
  260. }
  261. func (s *httpdServer) handleWebClientPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  262. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  263. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  264. err := r.ParseForm()
  265. if err != nil {
  266. s.renderClientResetPwdPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm), ipAddr)
  267. return
  268. }
  269. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  270. s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
  271. return
  272. }
  273. newPassword := strings.TrimSpace(r.Form.Get("password"))
  274. confirmPassword := strings.TrimSpace(r.Form.Get("confirm_password"))
  275. if newPassword != confirmPassword {
  276. s.renderClientResetPwdPage(w, r, util.NewI18nError(
  277. errors.New("the two password fields do not match"),
  278. util.I18nErrorChangePwdNoMatch), ipAddr)
  279. return
  280. }
  281. _, user, err := handleResetPassword(r, strings.TrimSpace(r.Form.Get("code")),
  282. newPassword, false)
  283. if err != nil {
  284. s.renderClientResetPwdPage(w, r, util.NewI18nError(err, util.I18nErrorChangePwdGeneric), ipAddr)
  285. return
  286. }
  287. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  288. if err := checkHTTPClientUser(user, r, connectionID, true); err != nil {
  289. s.renderClientResetPwdPage(w, r, util.NewI18nError(err, util.I18nErrorDirList403), ipAddr)
  290. return
  291. }
  292. defer user.CloseFs() //nolint:errcheck
  293. err = user.CheckFsRoot(connectionID)
  294. if err != nil {
  295. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  296. s.renderClientResetPwdPage(w, r, util.NewI18nError(err, util.I18nErrorLoginAfterReset), ipAddr)
  297. return
  298. }
  299. s.loginUser(w, r, user, connectionID, ipAddr, false, s.renderClientResetPwdPage)
  300. }
  301. func (s *httpdServer) handleWebClientTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  302. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  303. claims, err := getTokenClaims(r)
  304. if err != nil {
  305. s.renderNotFoundPage(w, r, nil)
  306. return
  307. }
  308. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  309. if err := r.ParseForm(); err != nil {
  310. s.renderClientTwoFactorRecoveryPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm), ipAddr)
  311. return
  312. }
  313. username := claims.Username
  314. recoveryCode := strings.TrimSpace(r.Form.Get("recovery_code"))
  315. if username == "" || recoveryCode == "" {
  316. s.renderClientTwoFactorRecoveryPage(w, r,
  317. util.NewI18nError(dataprovider.ErrInvalidCredentials, util.I18nErrorInvalidCredentials), ipAddr)
  318. return
  319. }
  320. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  321. s.renderClientTwoFactorRecoveryPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF), ipAddr)
  322. return
  323. }
  324. user, userMerged, err := dataprovider.GetUserVariants(username, "")
  325. if err != nil {
  326. if errors.Is(err, util.ErrNotFound) {
  327. handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
  328. }
  329. s.renderClientTwoFactorRecoveryPage(w, r,
  330. util.NewI18nError(dataprovider.ErrInvalidCredentials, util.I18nErrorInvalidCredentials), ipAddr)
  331. return
  332. }
  333. if !userMerged.Filters.TOTPConfig.Enabled || !util.Contains(userMerged.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  334. s.renderClientTwoFactorPage(w, r, util.NewI18nError(
  335. util.NewValidationError("two factory authentication is not enabled"), util.I18n2FADisabled), ipAddr)
  336. return
  337. }
  338. for idx, code := range user.Filters.RecoveryCodes {
  339. if err := code.Secret.Decrypt(); err != nil {
  340. s.renderClientInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  341. return
  342. }
  343. if code.Secret.GetPayload() == recoveryCode {
  344. if code.Used {
  345. s.renderClientTwoFactorRecoveryPage(w, r,
  346. util.NewI18nError(dataprovider.ErrInvalidCredentials, util.I18nErrorInvalidCredentials), ipAddr)
  347. return
  348. }
  349. user.Filters.RecoveryCodes[idx].Used = true
  350. err = dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, ipAddr, user.Role)
  351. if err != nil {
  352. logger.Warn(logSender, "", "unable to set the recovery code %q as used: %v", recoveryCode, err)
  353. s.renderClientInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  354. return
  355. }
  356. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  357. s.loginUser(w, r, &userMerged, connectionID, ipAddr, true,
  358. s.renderClientTwoFactorRecoveryPage)
  359. return
  360. }
  361. }
  362. handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
  363. s.renderClientTwoFactorRecoveryPage(w, r,
  364. util.NewI18nError(dataprovider.ErrInvalidCredentials, util.I18nErrorInvalidCredentials), ipAddr)
  365. }
  366. func (s *httpdServer) handleWebClientTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  367. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  368. claims, err := getTokenClaims(r)
  369. if err != nil {
  370. s.renderNotFoundPage(w, r, nil)
  371. return
  372. }
  373. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  374. if err := r.ParseForm(); err != nil {
  375. s.renderClientTwoFactorPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidForm), ipAddr)
  376. return
  377. }
  378. username := claims.Username
  379. passcode := strings.TrimSpace(r.Form.Get("passcode"))
  380. if username == "" || passcode == "" {
  381. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  382. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  383. s.renderClientTwoFactorPage(w, r,
  384. util.NewI18nError(dataprovider.ErrInvalidCredentials, util.I18nErrorInvalidCredentials), ipAddr)
  385. return
  386. }
  387. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  388. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  389. dataprovider.LoginMethodPassword, ipAddr, err)
  390. s.renderClientTwoFactorPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF), ipAddr)
  391. return
  392. }
  393. user, err := dataprovider.GetUserWithGroupSettings(username, "")
  394. if err != nil {
  395. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  396. dataprovider.LoginMethodPassword, ipAddr, err)
  397. s.renderClientTwoFactorPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCredentials), ipAddr)
  398. return
  399. }
  400. if !user.Filters.TOTPConfig.Enabled || !util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  401. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  402. s.renderClientTwoFactorPage(w, r, util.NewI18nError(common.ErrInternalFailure, util.I18n2FADisabled), ipAddr)
  403. return
  404. }
  405. err = user.Filters.TOTPConfig.Secret.Decrypt()
  406. if err != nil {
  407. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  408. s.renderClientInternalServerErrorPage(w, r, err)
  409. return
  410. }
  411. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  412. user.Filters.TOTPConfig.Secret.GetPayload())
  413. if !match || err != nil {
  414. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  415. s.renderClientTwoFactorPage(w, r,
  416. util.NewI18nError(dataprovider.ErrInvalidCredentials, util.I18nErrorInvalidCredentials), ipAddr)
  417. return
  418. }
  419. connectionID := fmt.Sprintf("%s_%s", getProtocolFromRequest(r), xid.New().String())
  420. s.loginUser(w, r, &user, connectionID, ipAddr, true, s.renderClientTwoFactorPage)
  421. }
  422. func (s *httpdServer) handleWebAdminTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  423. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  424. claims, err := getTokenClaims(r)
  425. if err != nil {
  426. s.renderNotFoundPage(w, r, nil)
  427. return
  428. }
  429. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  430. if err := r.ParseForm(); err != nil {
  431. s.renderTwoFactorRecoveryPage(w, r, err.Error(), ipAddr)
  432. return
  433. }
  434. username := claims.Username
  435. recoveryCode := strings.TrimSpace(r.Form.Get("recovery_code"))
  436. if username == "" || recoveryCode == "" {
  437. s.renderTwoFactorRecoveryPage(w, r, "Invalid credentials", ipAddr)
  438. return
  439. }
  440. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  441. s.renderTwoFactorRecoveryPage(w, r, err.Error(), ipAddr)
  442. return
  443. }
  444. admin, err := dataprovider.AdminExists(username)
  445. if err != nil {
  446. if errors.Is(err, util.ErrNotFound) {
  447. handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
  448. }
  449. s.renderTwoFactorRecoveryPage(w, r, "Invalid credentials", ipAddr)
  450. return
  451. }
  452. if !admin.Filters.TOTPConfig.Enabled {
  453. s.renderTwoFactorRecoveryPage(w, r, "Two factory authentication is not enabled", ipAddr)
  454. return
  455. }
  456. for idx, code := range admin.Filters.RecoveryCodes {
  457. if err := code.Secret.Decrypt(); err != nil {
  458. s.renderInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  459. return
  460. }
  461. if code.Secret.GetPayload() == recoveryCode {
  462. if code.Used {
  463. s.renderTwoFactorRecoveryPage(w, r, "This recovery code was already used", ipAddr)
  464. return
  465. }
  466. admin.Filters.RecoveryCodes[idx].Used = true
  467. err = dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, ipAddr, admin.Role)
  468. if err != nil {
  469. logger.Warn(logSender, "", "unable to set the recovery code %q as used: %v", recoveryCode, err)
  470. s.renderInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  471. return
  472. }
  473. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorRecoveryPage, ipAddr)
  474. return
  475. }
  476. }
  477. handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
  478. s.renderTwoFactorRecoveryPage(w, r, "Invalid recovery code", ipAddr)
  479. }
  480. func (s *httpdServer) handleWebAdminTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  481. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  482. claims, err := getTokenClaims(r)
  483. if err != nil {
  484. s.renderNotFoundPage(w, r, nil)
  485. return
  486. }
  487. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  488. if err := r.ParseForm(); err != nil {
  489. s.renderTwoFactorPage(w, r, err.Error(), ipAddr)
  490. return
  491. }
  492. username := claims.Username
  493. passcode := strings.TrimSpace(r.Form.Get("passcode"))
  494. if username == "" || passcode == "" {
  495. s.renderTwoFactorPage(w, r, "Invalid credentials", ipAddr)
  496. return
  497. }
  498. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  499. err = handleDefenderEventLoginFailed(ipAddr, err)
  500. s.renderTwoFactorPage(w, r, err.Error(), ipAddr)
  501. return
  502. }
  503. admin, err := dataprovider.AdminExists(username)
  504. if err != nil {
  505. if errors.Is(err, util.ErrNotFound) {
  506. handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
  507. }
  508. s.renderTwoFactorPage(w, r, "Invalid credentials", ipAddr)
  509. return
  510. }
  511. if !admin.Filters.TOTPConfig.Enabled {
  512. s.renderTwoFactorPage(w, r, "Two factory authentication is not enabled", ipAddr)
  513. return
  514. }
  515. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  516. if err != nil {
  517. s.renderInternalServerErrorPage(w, r, err)
  518. return
  519. }
  520. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  521. admin.Filters.TOTPConfig.Secret.GetPayload())
  522. if !match || err != nil {
  523. handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
  524. s.renderTwoFactorPage(w, r, "Invalid authentication code", ipAddr)
  525. return
  526. }
  527. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorPage, ipAddr)
  528. }
  529. func (s *httpdServer) handleWebAdminLoginPost(w http.ResponseWriter, r *http.Request) {
  530. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  531. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  532. if err := r.ParseForm(); err != nil {
  533. s.renderAdminLoginPage(w, r, err.Error(), ipAddr)
  534. return
  535. }
  536. username := strings.TrimSpace(r.Form.Get("username"))
  537. password := strings.TrimSpace(r.Form.Get("password"))
  538. if username == "" || password == "" {
  539. s.renderAdminLoginPage(w, r, "Invalid credentials", ipAddr)
  540. return
  541. }
  542. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  543. s.renderAdminLoginPage(w, r, err.Error(), ipAddr)
  544. return
  545. }
  546. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  547. if err != nil {
  548. err = handleDefenderEventLoginFailed(ipAddr, err)
  549. s.renderAdminLoginPage(w, r, err.Error(), ipAddr)
  550. return
  551. }
  552. s.loginAdmin(w, r, &admin, false, s.renderAdminLoginPage, ipAddr)
  553. }
  554. func (s *httpdServer) renderAdminLoginPage(w http.ResponseWriter, r *http.Request, error, ip string) {
  555. data := loginPage{
  556. commonBasePage: getCommonBasePage(r),
  557. Title: util.I18nLoginTitle,
  558. CurrentURL: webAdminLoginPath,
  559. Error: error,
  560. CSRFToken: createCSRFToken(ip),
  561. Branding: s.binding.Branding.WebAdmin,
  562. FormDisabled: s.binding.isWebAdminLoginFormDisabled(),
  563. }
  564. if s.binding.showClientLoginURL() {
  565. data.AltLoginURL = webClientLoginPath
  566. data.AltLoginName = s.binding.Branding.WebClient.ShortName
  567. }
  568. if smtp.IsEnabled() && !data.FormDisabled {
  569. data.ForgotPwdURL = webAdminForgotPwdPath
  570. }
  571. if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
  572. data.OpenIDLoginURL = webAdminOIDCLoginPath
  573. }
  574. renderAdminTemplate(w, templateLogin, data)
  575. }
  576. func (s *httpdServer) handleWebAdminLogin(w http.ResponseWriter, r *http.Request) {
  577. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  578. if !dataprovider.HasAdmin() {
  579. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  580. return
  581. }
  582. s.renderAdminLoginPage(w, r, getFlashMessage(w, r).ErrorString, util.GetIPFromRemoteAddress(r.RemoteAddr))
  583. }
  584. func (s *httpdServer) handleWebAdminLogout(w http.ResponseWriter, r *http.Request) {
  585. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  586. c := jwtTokenClaims{}
  587. c.removeCookie(w, r, webBaseAdminPath)
  588. s.logoutOIDCUser(w, r)
  589. http.Redirect(w, r, webAdminLoginPath, http.StatusFound)
  590. }
  591. func (s *httpdServer) handleWebAdminChangePwdPost(w http.ResponseWriter, r *http.Request) {
  592. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  593. err := r.ParseForm()
  594. if err != nil {
  595. s.renderChangePasswordPage(w, r, err.Error())
  596. return
  597. }
  598. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  599. s.renderForbiddenPage(w, r, err.Error())
  600. return
  601. }
  602. err = doChangeAdminPassword(r, strings.TrimSpace(r.Form.Get("current_password")),
  603. strings.TrimSpace(r.Form.Get("new_password1")), strings.TrimSpace(r.Form.Get("new_password2")))
  604. if err != nil {
  605. s.renderChangePasswordPage(w, r, err.Error())
  606. return
  607. }
  608. s.handleWebAdminLogout(w, r)
  609. }
  610. func (s *httpdServer) handleWebAdminPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  611. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  612. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  613. err := r.ParseForm()
  614. if err != nil {
  615. s.renderResetPwdPage(w, r, err.Error(), ipAddr)
  616. return
  617. }
  618. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  619. s.renderForbiddenPage(w, r, err.Error())
  620. return
  621. }
  622. admin, _, err := handleResetPassword(r, strings.TrimSpace(r.Form.Get("code")),
  623. strings.TrimSpace(r.Form.Get("password")), true)
  624. if err != nil {
  625. var e *util.ValidationError
  626. if errors.As(err, &e) {
  627. s.renderResetPwdPage(w, r, e.GetErrorString(), ipAddr)
  628. return
  629. }
  630. s.renderResetPwdPage(w, r, err.Error(), ipAddr)
  631. return
  632. }
  633. s.loginAdmin(w, r, admin, false, s.renderResetPwdPage, ipAddr)
  634. }
  635. func (s *httpdServer) handleWebAdminSetupPost(w http.ResponseWriter, r *http.Request) {
  636. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  637. if dataprovider.HasAdmin() {
  638. s.renderBadRequestPage(w, r, errors.New("an admin user already exists"))
  639. return
  640. }
  641. err := r.ParseForm()
  642. if err != nil {
  643. s.renderAdminSetupPage(w, r, "", err.Error())
  644. return
  645. }
  646. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  647. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  648. s.renderForbiddenPage(w, r, err.Error())
  649. return
  650. }
  651. username := strings.TrimSpace(r.Form.Get("username"))
  652. password := strings.TrimSpace(r.Form.Get("password"))
  653. confirmPassword := strings.TrimSpace(r.Form.Get("confirm_password"))
  654. installCode := strings.TrimSpace(r.Form.Get("install_code"))
  655. if installationCode != "" && installCode != resolveInstallationCode() {
  656. s.renderAdminSetupPage(w, r, username, fmt.Sprintf("%v mismatch", installationCodeHint))
  657. return
  658. }
  659. if username == "" {
  660. s.renderAdminSetupPage(w, r, username, "Please set a username")
  661. return
  662. }
  663. if password == "" {
  664. s.renderAdminSetupPage(w, r, username, "Please set a password")
  665. return
  666. }
  667. if password != confirmPassword {
  668. s.renderAdminSetupPage(w, r, username, "Passwords mismatch")
  669. return
  670. }
  671. admin := dataprovider.Admin{
  672. Username: username,
  673. Password: password,
  674. Status: 1,
  675. Permissions: []string{dataprovider.PermAdminAny},
  676. }
  677. err = dataprovider.AddAdmin(&admin, username, ipAddr, "")
  678. if err != nil {
  679. s.renderAdminSetupPage(w, r, username, err.Error())
  680. return
  681. }
  682. s.loginAdmin(w, r, &admin, false, nil, ipAddr)
  683. }
  684. func (s *httpdServer) loginUser(
  685. w http.ResponseWriter, r *http.Request, user *dataprovider.User, connectionID, ipAddr string,
  686. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, r *http.Request, err *util.I18nError, ip string),
  687. ) {
  688. c := jwtTokenClaims{
  689. Username: user.Username,
  690. Permissions: user.Filters.WebClient,
  691. Signature: user.GetSignature(),
  692. Role: user.Role,
  693. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  694. MustChangePassword: user.MustChangePassword(),
  695. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  696. }
  697. audience := tokenAudienceWebClient
  698. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) &&
  699. user.CanManageMFA() && !isSecondFactorAuth {
  700. audience = tokenAudienceWebClientPartial
  701. }
  702. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  703. if err != nil {
  704. logger.Warn(logSender, connectionID, "unable to set user login cookie %v", err)
  705. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  706. errorFunc(w, r, util.NewI18nError(err, util.I18nError500Message), ipAddr)
  707. return
  708. }
  709. if isSecondFactorAuth {
  710. invalidateToken(r)
  711. }
  712. if audience == tokenAudienceWebClientPartial {
  713. redirectPath := webClientTwoFactorPath
  714. if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
  715. redirectPath += "?next=" + url.QueryEscape(next)
  716. }
  717. http.Redirect(w, r, redirectPath, http.StatusFound)
  718. return
  719. }
  720. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, err)
  721. dataprovider.UpdateLastLogin(user)
  722. if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
  723. http.Redirect(w, r, next, http.StatusFound)
  724. return
  725. }
  726. http.Redirect(w, r, webClientFilesPath, http.StatusFound)
  727. }
  728. func (s *httpdServer) loginAdmin(
  729. w http.ResponseWriter, r *http.Request, admin *dataprovider.Admin,
  730. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, r *http.Request, error, ip string),
  731. ipAddr string,
  732. ) {
  733. c := jwtTokenClaims{
  734. Username: admin.Username,
  735. Permissions: admin.Permissions,
  736. Role: admin.Role,
  737. Signature: admin.GetSignature(),
  738. HideUserPageSections: admin.Filters.Preferences.HideUserPageSections,
  739. }
  740. audience := tokenAudienceWebAdmin
  741. if admin.Filters.TOTPConfig.Enabled && admin.CanManageMFA() && !isSecondFactorAuth {
  742. audience = tokenAudienceWebAdminPartial
  743. }
  744. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  745. if err != nil {
  746. logger.Warn(logSender, "", "unable to set admin login cookie %v", err)
  747. if errorFunc == nil {
  748. s.renderAdminSetupPage(w, r, admin.Username, err.Error())
  749. return
  750. }
  751. errorFunc(w, r, err.Error(), ipAddr)
  752. return
  753. }
  754. if isSecondFactorAuth {
  755. invalidateToken(r)
  756. }
  757. if audience == tokenAudienceWebAdminPartial {
  758. http.Redirect(w, r, webAdminTwoFactorPath, http.StatusFound)
  759. return
  760. }
  761. dataprovider.UpdateAdminLastLogin(admin)
  762. http.Redirect(w, r, webUsersPath, http.StatusFound)
  763. }
  764. func (s *httpdServer) logout(w http.ResponseWriter, r *http.Request) {
  765. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  766. invalidateToken(r)
  767. sendAPIResponse(w, r, nil, "Your token has been invalidated", http.StatusOK)
  768. }
  769. func (s *httpdServer) getUserToken(w http.ResponseWriter, r *http.Request) {
  770. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  771. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  772. username, password, ok := r.BasicAuth()
  773. protocol := common.ProtocolHTTP
  774. if !ok {
  775. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  776. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  777. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  778. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  779. return
  780. }
  781. if username == "" || password == "" {
  782. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  783. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  784. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  785. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  786. return
  787. }
  788. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  789. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  790. dataprovider.LoginMethodPassword, ipAddr, err)
  791. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  792. return
  793. }
  794. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  795. if err != nil {
  796. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  797. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  798. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  799. http.StatusUnauthorized)
  800. return
  801. }
  802. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  803. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  804. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  805. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  806. return
  807. }
  808. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  809. passcode := r.Header.Get(otpHeaderCode)
  810. if passcode == "" {
  811. logger.Debug(logSender, "", "TOTP enabled for user %q and not passcode provided, authentication refused", user.Username)
  812. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  813. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  814. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  815. http.StatusUnauthorized)
  816. return
  817. }
  818. err = user.Filters.TOTPConfig.Secret.Decrypt()
  819. if err != nil {
  820. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  821. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err), http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  822. return
  823. }
  824. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  825. user.Filters.TOTPConfig.Secret.GetPayload())
  826. if !match || err != nil {
  827. logger.Debug(logSender, "invalid passcode for user %q, match? %v, err: %v", user.Username, match, err)
  828. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  829. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  830. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  831. http.StatusUnauthorized)
  832. return
  833. }
  834. }
  835. defer user.CloseFs() //nolint:errcheck
  836. err = user.CheckFsRoot(connectionID)
  837. if err != nil {
  838. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  839. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  840. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  841. return
  842. }
  843. s.generateAndSendUserToken(w, r, ipAddr, user)
  844. }
  845. func (s *httpdServer) generateAndSendUserToken(w http.ResponseWriter, r *http.Request, ipAddr string, user dataprovider.User) {
  846. c := jwtTokenClaims{
  847. Username: user.Username,
  848. Permissions: user.Filters.WebClient,
  849. Signature: user.GetSignature(),
  850. Role: user.Role,
  851. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  852. MustChangePassword: user.MustChangePassword(),
  853. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  854. }
  855. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPIUser, ipAddr)
  856. if err != nil {
  857. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  858. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  859. return
  860. }
  861. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  862. dataprovider.UpdateLastLogin(&user)
  863. render.JSON(w, r, resp)
  864. }
  865. func (s *httpdServer) getToken(w http.ResponseWriter, r *http.Request) {
  866. username, password, ok := r.BasicAuth()
  867. if !ok {
  868. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  869. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  870. return
  871. }
  872. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  873. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  874. if err != nil {
  875. err = handleDefenderEventLoginFailed(ipAddr, err)
  876. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  877. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  878. return
  879. }
  880. if admin.Filters.TOTPConfig.Enabled {
  881. passcode := r.Header.Get(otpHeaderCode)
  882. if passcode == "" {
  883. logger.Debug(logSender, "", "TOTP enabled for admin %q and not passcode provided, authentication refused", admin.Username)
  884. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  885. err = handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials)
  886. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  887. return
  888. }
  889. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  890. if err != nil {
  891. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err),
  892. http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  893. return
  894. }
  895. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  896. admin.Filters.TOTPConfig.Secret.GetPayload())
  897. if !match || err != nil {
  898. logger.Debug(logSender, "invalid passcode for admin %q, match? %v, err: %v", admin.Username, match, err)
  899. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  900. err = handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials)
  901. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized),
  902. http.StatusUnauthorized)
  903. return
  904. }
  905. }
  906. s.generateAndSendToken(w, r, admin, ipAddr)
  907. }
  908. func (s *httpdServer) generateAndSendToken(w http.ResponseWriter, r *http.Request, admin dataprovider.Admin, ip string) {
  909. c := jwtTokenClaims{
  910. Username: admin.Username,
  911. Permissions: admin.Permissions,
  912. Role: admin.Role,
  913. Signature: admin.GetSignature(),
  914. }
  915. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPI, ip)
  916. if err != nil {
  917. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  918. return
  919. }
  920. dataprovider.UpdateAdminLastLogin(&admin)
  921. render.JSON(w, r, resp)
  922. }
  923. func (s *httpdServer) checkCookieExpiration(w http.ResponseWriter, r *http.Request) {
  924. if _, ok := r.Context().Value(oidcTokenKey).(string); ok {
  925. return
  926. }
  927. token, claims, err := jwtauth.FromContext(r.Context())
  928. if err != nil {
  929. return
  930. }
  931. tokenClaims := jwtTokenClaims{}
  932. tokenClaims.Decode(claims)
  933. if tokenClaims.Username == "" || tokenClaims.Signature == "" {
  934. return
  935. }
  936. if time.Until(token.Expiration()) > tokenRefreshThreshold {
  937. return
  938. }
  939. if util.Contains(token.Audience(), tokenAudienceWebClient) {
  940. s.refreshClientToken(w, r, tokenClaims)
  941. } else {
  942. s.refreshAdminToken(w, r, tokenClaims)
  943. }
  944. }
  945. func (s *httpdServer) refreshClientToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  946. user, err := dataprovider.GetUserWithGroupSettings(tokenClaims.Username, "")
  947. if err != nil {
  948. return
  949. }
  950. if user.GetSignature() != tokenClaims.Signature {
  951. logger.Debug(logSender, "", "signature mismatch for user %q, unable to refresh cookie", user.Username)
  952. return
  953. }
  954. if err := checkHTTPClientUser(&user, r, xid.New().String(), true); err != nil {
  955. logger.Debug(logSender, "", "unable to refresh cookie for user %q: %v", user.Username, err)
  956. return
  957. }
  958. tokenClaims.Permissions = user.Filters.WebClient
  959. tokenClaims.Role = user.Role
  960. logger.Debug(logSender, "", "cookie refreshed for user %q", user.Username)
  961. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebClient, util.GetIPFromRemoteAddress(r.RemoteAddr)) //nolint:errcheck
  962. }
  963. func (s *httpdServer) refreshAdminToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  964. admin, err := dataprovider.AdminExists(tokenClaims.Username)
  965. if err != nil {
  966. return
  967. }
  968. if admin.Status != 1 {
  969. logger.Debug(logSender, "", "admin %q is disabled, unable to refresh cookie", admin.Username)
  970. return
  971. }
  972. if admin.GetSignature() != tokenClaims.Signature {
  973. logger.Debug(logSender, "", "signature mismatch for admin %q, unable to refresh cookie", admin.Username)
  974. return
  975. }
  976. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  977. if !admin.CanLoginFromIP(ipAddr) {
  978. logger.Debug(logSender, "", "admin %q cannot login from %v, unable to refresh cookie", admin.Username, r.RemoteAddr)
  979. return
  980. }
  981. tokenClaims.Permissions = admin.Permissions
  982. tokenClaims.Role = admin.Role
  983. tokenClaims.HideUserPageSections = admin.Filters.Preferences.HideUserPageSections
  984. logger.Debug(logSender, "", "cookie refreshed for admin %q", admin.Username)
  985. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebAdmin, ipAddr) //nolint:errcheck
  986. }
  987. func (s *httpdServer) updateContextFromCookie(r *http.Request) *http.Request {
  988. token, _, err := jwtauth.FromContext(r.Context())
  989. if token == nil || err != nil {
  990. _, err = r.Cookie(jwtCookieKey)
  991. if err != nil {
  992. return r
  993. }
  994. token, err = jwtauth.VerifyRequest(s.tokenAuth, r, jwtauth.TokenFromCookie)
  995. ctx := jwtauth.NewContext(r.Context(), token, err)
  996. return r.WithContext(ctx)
  997. }
  998. return r
  999. }
  1000. func (s *httpdServer) parseHeaders(next http.Handler) http.Handler {
  1001. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  1002. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  1003. var ip net.IP
  1004. isUnixSocket := filepath.IsAbs(s.binding.Address)
  1005. if !isUnixSocket {
  1006. ip = net.ParseIP(ipAddr)
  1007. }
  1008. areHeadersAllowed := false
  1009. if isUnixSocket || ip != nil {
  1010. for _, allow := range s.binding.allowHeadersFrom {
  1011. if allow(ip) {
  1012. parsedIP := util.GetRealIP(r, s.binding.ClientIPProxyHeader, s.binding.ClientIPHeaderDepth)
  1013. if parsedIP != "" {
  1014. ipAddr = parsedIP
  1015. r.RemoteAddr = ipAddr
  1016. }
  1017. if forwardedProto := r.Header.Get(xForwardedProto); forwardedProto != "" {
  1018. ctx := context.WithValue(r.Context(), forwardedProtoKey, forwardedProto)
  1019. r = r.WithContext(ctx)
  1020. }
  1021. areHeadersAllowed = true
  1022. break
  1023. }
  1024. }
  1025. }
  1026. if !areHeadersAllowed {
  1027. for idx := range s.binding.Security.proxyHeaders {
  1028. r.Header.Del(s.binding.Security.proxyHeaders[idx])
  1029. }
  1030. }
  1031. next.ServeHTTP(w, r)
  1032. })
  1033. }
  1034. func (s *httpdServer) checkConnection(next http.Handler) http.Handler {
  1035. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  1036. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  1037. common.Connections.AddClientConnection(ipAddr)
  1038. defer common.Connections.RemoveClientConnection(ipAddr)
  1039. if err := common.Connections.IsNewConnectionAllowed(ipAddr, common.ProtocolHTTP); err != nil {
  1040. logger.Log(logger.LevelDebug, common.ProtocolHTTP, "", "connection not allowed from ip %q: %v", ipAddr, err)
  1041. s.sendForbiddenResponse(w, r, util.NewI18nError(err, util.I18nErrorConnectionForbidden))
  1042. return
  1043. }
  1044. if common.IsBanned(ipAddr, common.ProtocolHTTP) {
  1045. s.sendForbiddenResponse(w, r, util.NewI18nError(
  1046. util.NewGenericError("your IP address is blocked"),
  1047. util.I18nErrorIPForbidden),
  1048. )
  1049. return
  1050. }
  1051. if delay, err := common.LimitRate(common.ProtocolHTTP, ipAddr); err != nil {
  1052. delay += 499999999 * time.Nanosecond
  1053. w.Header().Set("Retry-After", fmt.Sprintf("%.0f", delay.Seconds()))
  1054. w.Header().Set("X-Retry-In", delay.String())
  1055. s.sendTooManyRequestResponse(w, r, err)
  1056. return
  1057. }
  1058. next.ServeHTTP(w, r)
  1059. })
  1060. }
  1061. func (s *httpdServer) sendTooManyRequestResponse(w http.ResponseWriter, r *http.Request, err error) {
  1062. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1063. r = s.updateContextFromCookie(r)
  1064. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1065. s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
  1066. util.NewI18nError(errors.New(http.StatusText(http.StatusTooManyRequests)), util.I18nError429Message), "")
  1067. return
  1068. }
  1069. s.renderMessagePage(w, r, http.StatusText(http.StatusTooManyRequests), "Rate limit exceeded", http.StatusTooManyRequests,
  1070. err, "")
  1071. return
  1072. }
  1073. sendAPIResponse(w, r, err, http.StatusText(http.StatusTooManyRequests), http.StatusTooManyRequests)
  1074. }
  1075. func (s *httpdServer) sendForbiddenResponse(w http.ResponseWriter, r *http.Request, err error) {
  1076. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1077. r = s.updateContextFromCookie(r)
  1078. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1079. s.renderClientForbiddenPage(w, r, err)
  1080. return
  1081. }
  1082. s.renderForbiddenPage(w, r, err.Error())
  1083. return
  1084. }
  1085. sendAPIResponse(w, r, err, "", http.StatusForbidden)
  1086. }
  1087. func (s *httpdServer) badHostHandler(w http.ResponseWriter, r *http.Request) {
  1088. host := r.Host
  1089. for _, header := range s.binding.Security.HostsProxyHeaders {
  1090. if h := r.Header.Get(header); h != "" {
  1091. host = h
  1092. break
  1093. }
  1094. }
  1095. s.sendForbiddenResponse(w, r, util.NewI18nError(
  1096. util.NewGenericError(fmt.Sprintf("The host %q is not allowed", host)),
  1097. util.I18nErrorConnectionForbidden,
  1098. ))
  1099. }
  1100. func (s *httpdServer) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  1101. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1102. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1103. r = s.updateContextFromCookie(r)
  1104. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1105. s.renderClientNotFoundPage(w, r, nil)
  1106. return
  1107. }
  1108. s.renderNotFoundPage(w, r, nil)
  1109. return
  1110. }
  1111. sendAPIResponse(w, r, nil, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  1112. }
  1113. func (s *httpdServer) redirectToWebPath(w http.ResponseWriter, r *http.Request, webPath string) {
  1114. if dataprovider.HasAdmin() {
  1115. http.Redirect(w, r, webPath, http.StatusFound)
  1116. return
  1117. }
  1118. if s.enableWebAdmin {
  1119. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  1120. }
  1121. }
  1122. // The StripSlashes causes infinite redirects at the root path if used with http.FileServer.
  1123. // We also don't strip paths with more than one trailing slash, see #1434
  1124. func (s *httpdServer) mustStripSlash(r *http.Request) bool {
  1125. var urlPath string
  1126. rctx := chi.RouteContext(r.Context())
  1127. if rctx != nil && rctx.RoutePath != "" {
  1128. urlPath = rctx.RoutePath
  1129. } else {
  1130. urlPath = r.URL.Path
  1131. }
  1132. return !strings.HasSuffix(urlPath, "//") && !strings.HasPrefix(urlPath, webOpenAPIPath) &&
  1133. !strings.HasPrefix(urlPath, webStaticFilesPath) && !strings.HasPrefix(urlPath, acmeChallengeURI)
  1134. }
  1135. func (s *httpdServer) initializeRouter() {
  1136. var hasHTTPSRedirect bool
  1137. s.tokenAuth = jwtauth.New(jwa.HS256.String(), getSigningKey(s.signingPassphrase), nil)
  1138. s.router = chi.NewRouter()
  1139. s.router.Use(middleware.RequestID)
  1140. s.router.Use(s.parseHeaders)
  1141. s.router.Use(logger.NewStructuredLogger(logger.GetLogger()))
  1142. s.router.Use(middleware.Recoverer)
  1143. s.router.Use(s.checkConnection)
  1144. if s.binding.Security.Enabled {
  1145. secureMiddleware := secure.New(secure.Options{
  1146. AllowedHosts: s.binding.Security.AllowedHosts,
  1147. AllowedHostsAreRegex: s.binding.Security.AllowedHostsAreRegex,
  1148. HostsProxyHeaders: s.binding.Security.HostsProxyHeaders,
  1149. SSLProxyHeaders: s.binding.Security.getHTTPSProxyHeaders(),
  1150. STSSeconds: s.binding.Security.STSSeconds,
  1151. STSIncludeSubdomains: s.binding.Security.STSIncludeSubdomains,
  1152. STSPreload: s.binding.Security.STSPreload,
  1153. ContentTypeNosniff: s.binding.Security.ContentTypeNosniff,
  1154. ContentSecurityPolicy: s.binding.Security.ContentSecurityPolicy,
  1155. PermissionsPolicy: s.binding.Security.PermissionsPolicy,
  1156. CrossOriginOpenerPolicy: s.binding.Security.CrossOriginOpenerPolicy,
  1157. ExpectCTHeader: s.binding.Security.ExpectCTHeader,
  1158. })
  1159. secureMiddleware.SetBadHostHandler(http.HandlerFunc(s.badHostHandler))
  1160. s.router.Use(secureMiddleware.Handler)
  1161. if s.binding.Security.HTTPSRedirect {
  1162. s.router.Use(s.binding.Security.redirectHandler)
  1163. hasHTTPSRedirect = true
  1164. }
  1165. }
  1166. if s.cors.Enabled {
  1167. c := cors.New(cors.Options{
  1168. AllowedOrigins: util.RemoveDuplicates(s.cors.AllowedOrigins, true),
  1169. AllowedMethods: util.RemoveDuplicates(s.cors.AllowedMethods, true),
  1170. AllowedHeaders: util.RemoveDuplicates(s.cors.AllowedHeaders, true),
  1171. ExposedHeaders: util.RemoveDuplicates(s.cors.ExposedHeaders, true),
  1172. MaxAge: s.cors.MaxAge,
  1173. AllowCredentials: s.cors.AllowCredentials,
  1174. OptionsPassthrough: s.cors.OptionsPassthrough,
  1175. OptionsSuccessStatus: s.cors.OptionsSuccessStatus,
  1176. AllowPrivateNetwork: s.cors.AllowPrivateNetwork,
  1177. })
  1178. s.router.Use(c.Handler)
  1179. }
  1180. s.router.Use(middleware.GetHead)
  1181. s.router.Use(middleware.Maybe(middleware.StripSlashes, s.mustStripSlash))
  1182. s.router.NotFound(s.notFoundHandler)
  1183. s.router.Get(healthzPath, func(w http.ResponseWriter, r *http.Request) {
  1184. render.PlainText(w, r, "ok")
  1185. })
  1186. s.router.Get(robotsTxtPath, func(w http.ResponseWriter, r *http.Request) {
  1187. render.PlainText(w, r, "User-agent: *\nDisallow: /")
  1188. })
  1189. if hasHTTPSRedirect {
  1190. if p := acme.GetHTTP01WebRoot(); p != "" {
  1191. serveStaticDir(s.router, acmeChallengeURI, p, true)
  1192. }
  1193. }
  1194. if s.enableRESTAPI {
  1195. // share API available to external users
  1196. s.router.Get(sharesPath+"/{id}", s.downloadFromShare) //nolint:goconst
  1197. s.router.Post(sharesPath+"/{id}", s.uploadFilesToShare)
  1198. s.router.Post(sharesPath+"/{id}/{name}", s.uploadFileToShare)
  1199. s.router.With(compressor.Handler).Get(sharesPath+"/{id}/dirs", s.readBrowsableShareContents)
  1200. s.router.Get(sharesPath+"/{id}/files", s.downloadBrowsableSharedFile)
  1201. s.router.Get(tokenPath, s.getToken)
  1202. s.router.Post(adminPath+"/{username}/forgot-password", forgotAdminPassword)
  1203. s.router.Post(adminPath+"/{username}/reset-password", resetAdminPassword)
  1204. s.router.Post(userPath+"/{username}/forgot-password", forgotUserPassword)
  1205. s.router.Post(userPath+"/{username}/reset-password", resetUserPassword)
  1206. s.router.Group(func(router chi.Router) {
  1207. router.Use(checkNodeToken(s.tokenAuth))
  1208. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeAdmin))
  1209. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1210. router.Use(jwtAuthenticatorAPI)
  1211. router.Get(versionPath, func(w http.ResponseWriter, r *http.Request) {
  1212. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1213. render.JSON(w, r, version.Get())
  1214. })
  1215. router.With(forbidAPIKeyAuthentication).Get(logoutPath, s.logout)
  1216. router.With(forbidAPIKeyAuthentication).Get(adminProfilePath, getAdminProfile)
  1217. router.With(forbidAPIKeyAuthentication).Put(adminProfilePath, updateAdminProfile)
  1218. router.With(forbidAPIKeyAuthentication).Put(adminPwdPath, changeAdminPassword)
  1219. // admin TOTP APIs
  1220. router.With(forbidAPIKeyAuthentication).Get(adminTOTPConfigsPath, getTOTPConfigs)
  1221. router.With(forbidAPIKeyAuthentication).Post(adminTOTPGeneratePath, generateTOTPSecret)
  1222. router.With(forbidAPIKeyAuthentication).Post(adminTOTPValidatePath, validateTOTPPasscode)
  1223. router.With(forbidAPIKeyAuthentication).Post(adminTOTPSavePath, saveTOTPConfig)
  1224. router.With(forbidAPIKeyAuthentication).Get(admin2FARecoveryCodesPath, getRecoveryCodes)
  1225. router.With(forbidAPIKeyAuthentication).Post(admin2FARecoveryCodesPath, generateRecoveryCodes)
  1226. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus)).
  1227. Get(serverStatusPath, func(w http.ResponseWriter, r *http.Request) {
  1228. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1229. render.JSON(w, r, getServicesStatus())
  1230. })
  1231. router.With(s.checkPerm(dataprovider.PermAdminViewConnections)).Get(activeConnectionsPath, getActiveConnections)
  1232. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections)).
  1233. Delete(activeConnectionsPath+"/{connectionID}", handleCloseConnection)
  1234. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/users/scans", getUsersQuotaScans)
  1235. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/users/{username}/scan", startUserQuotaScan)
  1236. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/folders/scans", getFoldersQuotaScans)
  1237. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/folders/{name}/scan", startFolderQuotaScan)
  1238. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath, getUsers)
  1239. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(userPath, addUser)
  1240. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath+"/{username}", getUserByUsername) //nolint:goconst
  1241. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}", updateUser)
  1242. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers)).Delete(userPath+"/{username}", deleteUser)
  1243. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}/2fa/disable", disableUser2FA)
  1244. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Get(folderPath, getFolders)
  1245. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Get(folderPath+"/{name}", getFolderByName) //nolint:goconst
  1246. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Post(folderPath, addFolder)
  1247. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Put(folderPath+"/{name}", updateFolder)
  1248. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Delete(folderPath+"/{name}", deleteFolder)
  1249. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath, getGroups)
  1250. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath+"/{name}", getGroupByName)
  1251. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(groupPath, addGroup)
  1252. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Put(groupPath+"/{name}", updateGroup)
  1253. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Delete(groupPath+"/{name}", deleteGroup)
  1254. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(dumpDataPath, dumpData)
  1255. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(loadDataPath, loadData)
  1256. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(loadDataPath, loadDataFromRequest)
  1257. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/usage",
  1258. updateUserQuotaUsage)
  1259. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/transfer-usage",
  1260. updateUserTransferQuotaUsage)
  1261. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/folders/{name}/usage",
  1262. updateFolderQuotaUsage)
  1263. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts, getDefenderHosts)
  1264. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts+"/{id}", getDefenderHostByID)
  1265. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(defenderHosts+"/{id}", deleteDefenderHostByID)
  1266. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath, getAdmins)
  1267. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(adminPath, addAdmin)
  1268. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath+"/{username}", getAdminByUsername)
  1269. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}", updateAdmin)
  1270. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Delete(adminPath+"/{username}", deleteAdmin)
  1271. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}/2fa/disable", disableAdmin2FA)
  1272. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Get(retentionChecksPath, getRetentionChecks)
  1273. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Post(retentionBasePath+"/{username}/check",
  1274. startRetentionCheck)
  1275. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Get(metadataChecksPath, getMetadataChecks)
  1276. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Post(metadataBasePath+"/{username}/check",
  1277. startMetadataCheck)
  1278. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1279. Get(fsEventsPath, searchFsEvents)
  1280. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1281. Get(providerEventsPath, searchProviderEvents)
  1282. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1283. Get(logEventsPath, searchLogEvents)
  1284. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1285. Get(apiKeysPath, getAPIKeys)
  1286. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1287. Post(apiKeysPath, addAPIKey)
  1288. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1289. Get(apiKeysPath+"/{id}", getAPIKeyByID)
  1290. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1291. Put(apiKeysPath+"/{id}", updateAPIKey)
  1292. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1293. Delete(apiKeysPath+"/{id}", deleteAPIKey)
  1294. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath, getEventActions)
  1295. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath+"/{name}", getEventActionByName)
  1296. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventActionsPath, addEventAction)
  1297. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventActionsPath+"/{name}", updateEventAction)
  1298. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventActionsPath+"/{name}", deleteEventAction)
  1299. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath, getEventRules)
  1300. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath+"/{name}", getEventRuleByName)
  1301. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventRulesPath, addEventRule)
  1302. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventRulesPath+"/{name}", updateEventRule)
  1303. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventRulesPath+"/{name}", deleteEventRule)
  1304. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventRulesPath+"/run/{name}", runOnDemandRule)
  1305. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Get(rolesPath, getRoles)
  1306. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(rolesPath, addRole)
  1307. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Get(rolesPath+"/{name}", getRoleByName)
  1308. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Put(rolesPath+"/{name}", updateRole)
  1309. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Delete(rolesPath+"/{name}", deleteRole)
  1310. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), compressor.Handler).Get(ipListsPath+"/{type}", getIPListEntries) //nolint:goconst
  1311. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(ipListsPath+"/{type}", addIPListEntry)
  1312. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Get(ipListsPath+"/{type}/{ipornet}", getIPListEntry) //nolint:goconst
  1313. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Put(ipListsPath+"/{type}/{ipornet}", updateIPListEntry)
  1314. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Delete(ipListsPath+"/{type}/{ipornet}", deleteIPListEntry)
  1315. })
  1316. s.router.Get(userTokenPath, s.getUserToken)
  1317. s.router.Group(func(router chi.Router) {
  1318. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeUser))
  1319. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1320. router.Use(jwtAuthenticatorAPIUser)
  1321. router.With(forbidAPIKeyAuthentication).Get(userLogoutPath, s.logout)
  1322. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1323. Put(userPwdPath, changeUserPassword)
  1324. router.With(forbidAPIKeyAuthentication).Get(userProfilePath, getUserProfile)
  1325. router.With(forbidAPIKeyAuthentication, s.checkAuthRequirements).Put(userProfilePath, updateUserProfile)
  1326. // user TOTP APIs
  1327. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1328. Get(userTOTPConfigsPath, getTOTPConfigs)
  1329. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1330. Post(userTOTPGeneratePath, generateTOTPSecret)
  1331. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1332. Post(userTOTPValidatePath, validateTOTPPasscode)
  1333. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1334. Post(userTOTPSavePath, saveTOTPConfig)
  1335. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1336. Get(user2FARecoveryCodesPath, getRecoveryCodes)
  1337. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1338. Post(user2FARecoveryCodesPath, generateRecoveryCodes)
  1339. router.With(s.checkAuthRequirements, compressor.Handler).Get(userDirsPath, readUserFolder)
  1340. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1341. Post(userDirsPath, createUserDir)
  1342. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1343. Patch(userDirsPath, renameUserFsEntry)
  1344. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1345. Delete(userDirsPath, deleteUserDir)
  1346. router.With(s.checkAuthRequirements).Get(userFilesPath, getUserFile)
  1347. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1348. Post(userFilesPath, uploadUserFiles)
  1349. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1350. Patch(userFilesPath, renameUserFsEntry)
  1351. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1352. Delete(userFilesPath, deleteUserFile)
  1353. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1354. Post(userFileActionsPath+"/move", renameUserFsEntry)
  1355. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1356. Post(userFileActionsPath+"/copy", copyUserFsEntry)
  1357. router.With(s.checkAuthRequirements).Post(userStreamZipPath, getUserFilesAsZipStream)
  1358. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1359. Get(userSharesPath, getShares)
  1360. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1361. Post(userSharesPath, addShare)
  1362. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1363. Get(userSharesPath+"/{id}", getShareByID)
  1364. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1365. Put(userSharesPath+"/{id}", updateShare)
  1366. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1367. Delete(userSharesPath+"/{id}", deleteShare)
  1368. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1369. Post(userUploadFilePath, uploadUserFile)
  1370. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1371. Patch(userFilesDirsMetadataPath, setFileDirMetadata)
  1372. })
  1373. if s.renderOpenAPI {
  1374. s.router.Group(func(router chi.Router) {
  1375. router.Use(compressor.Handler)
  1376. serveStaticDir(router, webOpenAPIPath, s.openAPIPath, false)
  1377. })
  1378. }
  1379. }
  1380. if s.enableWebAdmin || s.enableWebClient {
  1381. s.router.Group(func(router chi.Router) {
  1382. router.Use(compressor.Handler)
  1383. serveStaticDir(router, webStaticFilesPath, s.staticFilesPath, true)
  1384. })
  1385. if s.binding.OIDC.isEnabled() {
  1386. s.router.Get(webOIDCRedirectPath, s.handleOIDCRedirect)
  1387. }
  1388. if s.enableWebClient {
  1389. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1390. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1391. s.redirectToWebPath(w, r, webClientLoginPath)
  1392. })
  1393. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1394. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1395. s.redirectToWebPath(w, r, webClientLoginPath)
  1396. })
  1397. } else {
  1398. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1399. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1400. s.redirectToWebPath(w, r, webAdminLoginPath)
  1401. })
  1402. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1403. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1404. s.redirectToWebPath(w, r, webAdminLoginPath)
  1405. })
  1406. }
  1407. }
  1408. s.setupWebClientRoutes()
  1409. s.setupWebAdminRoutes()
  1410. }
  1411. func (s *httpdServer) setupWebClientRoutes() {
  1412. if s.enableWebClient {
  1413. s.router.Get(webBaseClientPath, func(w http.ResponseWriter, r *http.Request) {
  1414. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1415. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  1416. })
  1417. s.router.Get(webClientLoginPath, s.handleClientWebLogin)
  1418. if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
  1419. s.router.Get(webClientOIDCLoginPath, s.handleWebClientOIDCLogin)
  1420. }
  1421. if !s.binding.isWebClientLoginFormDisabled() {
  1422. s.router.Post(webClientLoginPath, s.handleWebClientLoginPost)
  1423. s.router.Get(webClientForgotPwdPath, s.handleWebClientForgotPwd)
  1424. s.router.Post(webClientForgotPwdPath, s.handleWebClientForgotPwdPost)
  1425. s.router.Get(webClientResetPwdPath, s.handleWebClientPasswordReset)
  1426. s.router.Post(webClientResetPwdPath, s.handleWebClientPasswordResetPost)
  1427. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1428. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1429. Get(webClientTwoFactorPath, s.handleWebClientTwoFactor)
  1430. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1431. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1432. Post(webClientTwoFactorPath, s.handleWebClientTwoFactorPost)
  1433. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1434. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1435. Get(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecovery)
  1436. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1437. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1438. Post(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecoveryPost)
  1439. }
  1440. // share routes available to external users
  1441. s.router.Get(webClientPubSharesPath+"/{id}/login", s.handleClientShareLoginGet)
  1442. s.router.Post(webClientPubSharesPath+"/{id}/login", s.handleClientShareLoginPost)
  1443. s.router.Get(webClientPubSharesPath+"/{id}", s.downloadFromShare)
  1444. s.router.Post(webClientPubSharesPath+"/{id}/partial", s.handleClientSharePartialDownload)
  1445. s.router.Get(webClientPubSharesPath+"/{id}/browse", s.handleShareGetFiles)
  1446. s.router.Get(webClientPubSharesPath+"/{id}/download", s.handleClientSharedFile)
  1447. s.router.Get(webClientPubSharesPath+"/{id}/upload", s.handleClientUploadToShare)
  1448. s.router.With(compressor.Handler).Get(webClientPubSharesPath+"/{id}/dirs", s.handleShareGetDirContents)
  1449. s.router.Post(webClientPubSharesPath+"/{id}", s.uploadFilesToShare)
  1450. s.router.Post(webClientPubSharesPath+"/{id}/{name}", s.uploadFileToShare)
  1451. s.router.Get(webClientPubSharesPath+"/{id}/viewpdf", s.handleShareViewPDF)
  1452. s.router.Get(webClientPubSharesPath+"/{id}/getpdf", s.handleShareGetPDF)
  1453. s.router.Group(func(router chi.Router) {
  1454. if s.binding.OIDC.isEnabled() {
  1455. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebClient))
  1456. }
  1457. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1458. router.Use(jwtAuthenticatorWebClient)
  1459. router.Get(webClientLogoutPath, s.handleWebClientLogout)
  1460. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientFilesPath, s.handleClientGetFiles)
  1461. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientViewPDFPath, s.handleClientViewPDF)
  1462. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientGetPDFPath, s.handleClientGetPDF)
  1463. router.With(s.checkAuthRequirements, s.refreshCookie, verifyCSRFHeader).Get(webClientFilePath, getUserFile)
  1464. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1465. Post(webClientFilePath, uploadUserFile)
  1466. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientEditFilePath, s.handleClientEditFile)
  1467. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1468. Delete(webClientFilesPath, deleteUserFile)
  1469. router.With(s.checkAuthRequirements, compressor.Handler, s.refreshCookie).
  1470. Get(webClientDirsPath, s.handleClientGetDirContents)
  1471. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1472. Post(webClientDirsPath, createUserDir)
  1473. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1474. Delete(webClientDirsPath, deleteUserDir)
  1475. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1476. Post(webClientFileActionsPath+"/move", renameUserFsEntry)
  1477. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1478. Post(webClientFileActionsPath+"/copy", copyUserFsEntry)
  1479. router.With(s.checkAuthRequirements, s.refreshCookie).
  1480. Post(webClientDownloadZipPath, s.handleWebClientDownloadZip)
  1481. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientPingPath, s.handleClientPing)
  1482. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientProfilePath,
  1483. s.handleClientGetProfile)
  1484. router.With(s.checkAuthRequirements).Post(webClientProfilePath, s.handleWebClientProfilePost)
  1485. router.With(s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1486. Get(webChangeClientPwdPath, s.handleWebClientChangePwd)
  1487. router.With(s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1488. Post(webChangeClientPwdPath, s.handleWebClientChangePwdPost)
  1489. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), s.refreshCookie).
  1490. Get(webClientMFAPath, s.handleWebClientMFA)
  1491. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), s.refreshCookie).
  1492. Get(webClientMFAPath+"/qrcode", getQRCode)
  1493. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1494. Post(webClientTOTPGeneratePath, generateTOTPSecret)
  1495. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1496. Post(webClientTOTPValidatePath, validateTOTPPasscode)
  1497. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1498. Post(webClientTOTPSavePath, saveTOTPConfig)
  1499. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader, s.refreshCookie).
  1500. Get(webClientRecoveryCodesPath, getRecoveryCodes)
  1501. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1502. Post(webClientRecoveryCodesPath, generateRecoveryCodes)
  1503. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1504. Get(webClientSharesPath, s.handleClientGetShares)
  1505. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1506. Get(webClientSharePath, s.handleClientAddShareGet)
  1507. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1508. Post(webClientSharePath, s.handleClientAddSharePost)
  1509. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1510. Get(webClientSharePath+"/{id}", s.handleClientUpdateShareGet)
  1511. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1512. Post(webClientSharePath+"/{id}", s.handleClientUpdateSharePost)
  1513. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), verifyCSRFHeader).
  1514. Delete(webClientSharePath+"/{id}", deleteShare)
  1515. })
  1516. }
  1517. }
  1518. func (s *httpdServer) setupWebAdminRoutes() {
  1519. if s.enableWebAdmin {
  1520. s.router.Get(webBaseAdminPath, func(w http.ResponseWriter, r *http.Request) {
  1521. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1522. s.redirectToWebPath(w, r, webAdminLoginPath)
  1523. })
  1524. s.router.Get(webAdminLoginPath, s.handleWebAdminLogin)
  1525. if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
  1526. s.router.Get(webAdminOIDCLoginPath, s.handleWebAdminOIDCLogin)
  1527. }
  1528. s.router.Get(webOAuth2RedirectPath, s.handleOAuth2TokenRedirect)
  1529. s.router.Get(webAdminSetupPath, s.handleWebAdminSetupGet)
  1530. s.router.Post(webAdminSetupPath, s.handleWebAdminSetupPost)
  1531. if !s.binding.isWebAdminLoginFormDisabled() {
  1532. s.router.Post(webAdminLoginPath, s.handleWebAdminLoginPost)
  1533. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1534. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1535. Get(webAdminTwoFactorPath, s.handleWebAdminTwoFactor)
  1536. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1537. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1538. Post(webAdminTwoFactorPath, s.handleWebAdminTwoFactorPost)
  1539. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1540. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1541. Get(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecovery)
  1542. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1543. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1544. Post(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecoveryPost)
  1545. s.router.Get(webAdminForgotPwdPath, s.handleWebAdminForgotPwd)
  1546. s.router.Post(webAdminForgotPwdPath, s.handleWebAdminForgotPwdPost)
  1547. s.router.Get(webAdminResetPwdPath, s.handleWebAdminPasswordReset)
  1548. s.router.Post(webAdminResetPwdPath, s.handleWebAdminPasswordResetPost)
  1549. }
  1550. s.router.Group(func(router chi.Router) {
  1551. if s.binding.OIDC.isEnabled() {
  1552. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebAdmin))
  1553. }
  1554. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1555. router.Use(jwtAuthenticatorWebAdmin)
  1556. router.Get(webLogoutPath, s.handleWebAdminLogout)
  1557. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminProfilePath, s.handleWebAdminProfile)
  1558. router.With(s.requireBuiltinLogin).Post(webAdminProfilePath, s.handleWebAdminProfilePost)
  1559. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webChangeAdminPwdPath, s.handleWebAdminChangePwd)
  1560. router.With(s.requireBuiltinLogin).Post(webChangeAdminPwdPath, s.handleWebAdminChangePwdPost)
  1561. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminMFAPath, s.handleWebAdminMFA)
  1562. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminMFAPath+"/qrcode", getQRCode)
  1563. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPGeneratePath, generateTOTPSecret)
  1564. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPValidatePath, validateTOTPPasscode)
  1565. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPSavePath, saveTOTPConfig)
  1566. router.With(verifyCSRFHeader, s.requireBuiltinLogin, s.refreshCookie).Get(webAdminRecoveryCodesPath,
  1567. getRecoveryCodes)
  1568. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminRecoveryCodesPath, generateRecoveryCodes)
  1569. router.With(s.checkPerm(dataprovider.PermAdminViewUsers), s.refreshCookie).
  1570. Get(webUsersPath, s.handleGetWebUsers)
  1571. router.With(s.checkPerm(dataprovider.PermAdminAddUsers), s.refreshCookie).
  1572. Get(webUserPath, s.handleWebAddUserGet)
  1573. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers), s.refreshCookie).
  1574. Get(webUserPath+"/{username}", s.handleWebUpdateUserGet)
  1575. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(webUserPath, s.handleWebAddUserPost)
  1576. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Post(webUserPath+"/{username}",
  1577. s.handleWebUpdateUserPost)
  1578. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1579. Get(webGroupsPath, s.handleWebGetGroups)
  1580. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1581. Get(webGroupPath, s.handleWebAddGroupGet)
  1582. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath, s.handleWebAddGroupPost)
  1583. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1584. Get(webGroupPath+"/{name}", s.handleWebUpdateGroupGet)
  1585. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath+"/{name}",
  1586. s.handleWebUpdateGroupPost)
  1587. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), verifyCSRFHeader).
  1588. Delete(webGroupPath+"/{name}", deleteGroup)
  1589. router.With(s.checkPerm(dataprovider.PermAdminViewConnections), s.refreshCookie).
  1590. Get(webConnectionsPath, s.handleWebGetConnections)
  1591. router.With(s.checkPerm(dataprovider.PermAdminManageFolders), s.refreshCookie).
  1592. Get(webFoldersPath, s.handleWebGetFolders)
  1593. router.With(s.checkPerm(dataprovider.PermAdminManageFolders), s.refreshCookie).
  1594. Get(webFolderPath, s.handleWebAddFolderGet)
  1595. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Post(webFolderPath, s.handleWebAddFolderPost)
  1596. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus), s.refreshCookie).
  1597. Get(webStatusPath, s.handleWebGetStatus)
  1598. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1599. Get(webAdminsPath, s.handleGetWebAdmins)
  1600. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1601. Get(webAdminPath, s.handleWebAddAdminGet)
  1602. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1603. Get(webAdminPath+"/{username}", s.handleWebUpdateAdminGet)
  1604. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath, s.handleWebAddAdminPost)
  1605. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath+"/{username}",
  1606. s.handleWebUpdateAdminPost)
  1607. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), verifyCSRFHeader).
  1608. Delete(webAdminPath+"/{username}", deleteAdmin)
  1609. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections), verifyCSRFHeader).
  1610. Delete(webConnectionsPath+"/{connectionID}", handleCloseConnection)
  1611. router.With(s.checkPerm(dataprovider.PermAdminManageFolders), s.refreshCookie).
  1612. Get(webFolderPath+"/{name}", s.handleWebUpdateFolderGet)
  1613. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Post(webFolderPath+"/{name}",
  1614. s.handleWebUpdateFolderPost)
  1615. router.With(s.checkPerm(dataprovider.PermAdminManageFolders), verifyCSRFHeader).
  1616. Delete(webFolderPath+"/{name}", deleteFolder)
  1617. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1618. Post(webScanVFolderPath+"/{name}", startFolderQuotaScan)
  1619. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers), verifyCSRFHeader).
  1620. Delete(webUserPath+"/{username}", deleteUser)
  1621. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1622. Post(webQuotaScanPath+"/{username}", startUserQuotaScan)
  1623. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webMaintenancePath, s.handleWebMaintenance)
  1624. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webBackupPath, dumpData)
  1625. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webRestorePath, s.handleWebRestore)
  1626. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1627. Get(webTemplateUser, s.handleWebTemplateUserGet)
  1628. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateUser, s.handleWebTemplateUserPost)
  1629. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1630. Get(webTemplateFolder, s.handleWebTemplateFolderGet)
  1631. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateFolder, s.handleWebTemplateFolderPost)
  1632. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderPath, s.handleWebDefenderPage)
  1633. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderHostsPath, getDefenderHosts)
  1634. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(webDefenderHostsPath+"/{id}",
  1635. deleteDefenderHostByID)
  1636. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1637. Get(webAdminEventActionsPath, s.handleWebGetEventActions)
  1638. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1639. Get(webAdminEventActionPath, s.handleWebAddEventActionGet)
  1640. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath,
  1641. s.handleWebAddEventActionPost)
  1642. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1643. Get(webAdminEventActionPath+"/{name}", s.handleWebUpdateEventActionGet)
  1644. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath+"/{name}",
  1645. s.handleWebUpdateEventActionPost)
  1646. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1647. Delete(webAdminEventActionPath+"/{name}", deleteEventAction)
  1648. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1649. Get(webAdminEventRulesPath, s.handleWebGetEventRules)
  1650. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1651. Get(webAdminEventRulePath, s.handleWebAddEventRuleGet)
  1652. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath,
  1653. s.handleWebAddEventRulePost)
  1654. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1655. Get(webAdminEventRulePath+"/{name}", s.handleWebUpdateEventRuleGet)
  1656. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath+"/{name}",
  1657. s.handleWebUpdateEventRulePost)
  1658. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1659. Delete(webAdminEventRulePath+"/{name}", deleteEventRule)
  1660. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1661. Post(webAdminEventRulePath+"/run/{name}", runOnDemandRule)
  1662. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
  1663. Get(webAdminRolesPath, s.handleWebGetRoles)
  1664. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
  1665. Get(webAdminRolePath, s.handleWebAddRoleGet)
  1666. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(webAdminRolePath, s.handleWebAddRolePost)
  1667. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
  1668. Get(webAdminRolePath+"/{name}", s.handleWebUpdateRoleGet)
  1669. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(webAdminRolePath+"/{name}",
  1670. s.handleWebUpdateRolePost)
  1671. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), verifyCSRFHeader).
  1672. Delete(webAdminRolePath+"/{name}", deleteRole)
  1673. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), s.refreshCookie).Get(webEventsPath,
  1674. s.handleWebGetEvents)
  1675. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
  1676. Get(webEventsFsSearchPath, searchFsEvents)
  1677. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
  1678. Get(webEventsProviderSearchPath, searchProviderEvents)
  1679. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
  1680. Get(webEventsLogSearchPath, searchLogEvents)
  1681. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Get(webIPListsPath, s.handleWebIPListsPage)
  1682. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), compressor.Handler, s.refreshCookie).
  1683. Get(webIPListsPath+"/{type}", getIPListEntries)
  1684. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), s.refreshCookie).Get(webIPListPath+"/{type}",
  1685. s.handleWebAddIPListEntryGet)
  1686. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(webIPListPath+"/{type}",
  1687. s.handleWebAddIPListEntryPost)
  1688. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), s.refreshCookie).Get(webIPListPath+"/{type}/{ipornet}",
  1689. s.handleWebUpdateIPListEntryGet)
  1690. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(webIPListPath+"/{type}/{ipornet}",
  1691. s.handleWebUpdateIPListEntryPost)
  1692. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), verifyCSRFHeader).
  1693. Delete(webIPListPath+"/{type}/{ipornet}", deleteIPListEntry)
  1694. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).Get(webConfigsPath, s.handleWebConfigs)
  1695. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webConfigsPath, s.handleWebConfigsPost)
  1696. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), verifyCSRFHeader, s.refreshCookie).
  1697. Post(webConfigsPath+"/smtp/test", testSMTPConfig)
  1698. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), verifyCSRFHeader, s.refreshCookie).
  1699. Post(webOAuth2TokenPath, handleSMTPOAuth2TokenRequestPost)
  1700. })
  1701. }
  1702. }