auth_utils.go 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338
  1. package httpd
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/http"
  6. "time"
  7. "github.com/go-chi/jwtauth/v5"
  8. "github.com/lestrrat-go/jwx/jwt"
  9. "github.com/rs/xid"
  10. "github.com/drakkan/sftpgo/v2/dataprovider"
  11. "github.com/drakkan/sftpgo/v2/logger"
  12. "github.com/drakkan/sftpgo/v2/util"
  13. )
  14. type tokenAudience = string
  15. const (
  16. tokenAudienceWebAdmin tokenAudience = "WebAdmin"
  17. tokenAudienceWebClient tokenAudience = "WebClient"
  18. tokenAudienceWebAdminPartial tokenAudience = "WebAdminPartial"
  19. tokenAudienceWebClientPartial tokenAudience = "WebClientPartial"
  20. tokenAudienceAPI tokenAudience = "API"
  21. tokenAudienceAPIUser tokenAudience = "APIUser"
  22. tokenAudienceCSRF tokenAudience = "CSRF"
  23. )
  24. const (
  25. claimUsernameKey = "username"
  26. claimPermissionsKey = "permissions"
  27. claimAPIKey = "api_key"
  28. claimMustSetSecondFactorKey = "2fa_required"
  29. claimRequiredTwoFactorProtocols = "2fa_protocols"
  30. basicRealm = "Basic realm=\"SFTPGo\""
  31. jwtCookieKey = "jwt"
  32. )
  33. var (
  34. tokenDuration = 20 * time.Minute
  35. // csrf token duration is greater than normal token duration to reduce issues
  36. // with the login form
  37. csrfTokenDuration = 6 * time.Hour
  38. tokenRefreshThreshold = 10 * time.Minute
  39. )
  40. type jwtTokenClaims struct {
  41. Username string
  42. Permissions []string
  43. Signature string
  44. Audience []string
  45. APIKeyID string
  46. MustSetTwoFactorAuth bool
  47. RequiredTwoFactorProtocols []string
  48. }
  49. func (c *jwtTokenClaims) hasUserAudience() bool {
  50. for _, audience := range c.Audience {
  51. if audience == tokenAudienceWebClient || audience == tokenAudienceAPIUser {
  52. return true
  53. }
  54. }
  55. return false
  56. }
  57. func (c *jwtTokenClaims) asMap() map[string]any {
  58. claims := make(map[string]any)
  59. claims[claimUsernameKey] = c.Username
  60. claims[claimPermissionsKey] = c.Permissions
  61. if c.APIKeyID != "" {
  62. claims[claimAPIKey] = c.APIKeyID
  63. }
  64. claims[jwt.SubjectKey] = c.Signature
  65. claims[claimMustSetSecondFactorKey] = c.MustSetTwoFactorAuth
  66. claims[claimRequiredTwoFactorProtocols] = c.RequiredTwoFactorProtocols
  67. return claims
  68. }
  69. func (c *jwtTokenClaims) Decode(token map[string]any) {
  70. c.Permissions = nil
  71. username := token[claimUsernameKey]
  72. switch v := username.(type) {
  73. case string:
  74. c.Username = v
  75. }
  76. signature := token[jwt.SubjectKey]
  77. switch v := signature.(type) {
  78. case string:
  79. c.Signature = v
  80. }
  81. audience := token[jwt.AudienceKey]
  82. switch v := audience.(type) {
  83. case []string:
  84. c.Audience = v
  85. }
  86. if val, ok := token[claimAPIKey]; ok {
  87. switch v := val.(type) {
  88. case string:
  89. c.APIKeyID = v
  90. }
  91. }
  92. permissions := token[claimPermissionsKey]
  93. switch v := permissions.(type) {
  94. case []any:
  95. for _, elem := range v {
  96. switch elemValue := elem.(type) {
  97. case string:
  98. c.Permissions = append(c.Permissions, elemValue)
  99. }
  100. }
  101. }
  102. secondFactorRequired := token[claimMustSetSecondFactorKey]
  103. switch v := secondFactorRequired.(type) {
  104. case bool:
  105. c.MustSetTwoFactorAuth = v
  106. }
  107. secondFactorProtocols := token[claimRequiredTwoFactorProtocols]
  108. switch v := secondFactorProtocols.(type) {
  109. case []any:
  110. for _, elem := range v {
  111. switch elemValue := elem.(type) {
  112. case string:
  113. c.RequiredTwoFactorProtocols = append(c.RequiredTwoFactorProtocols, elemValue)
  114. }
  115. }
  116. }
  117. }
  118. func (c *jwtTokenClaims) isCriticalPermRemoved(permissions []string) bool {
  119. if util.Contains(permissions, dataprovider.PermAdminAny) {
  120. return false
  121. }
  122. if (util.Contains(c.Permissions, dataprovider.PermAdminManageAdmins) ||
  123. util.Contains(c.Permissions, dataprovider.PermAdminAny)) &&
  124. !util.Contains(permissions, dataprovider.PermAdminManageAdmins) &&
  125. !util.Contains(permissions, dataprovider.PermAdminAny) {
  126. return true
  127. }
  128. return false
  129. }
  130. func (c *jwtTokenClaims) hasPerm(perm string) bool {
  131. if util.Contains(c.Permissions, dataprovider.PermAdminAny) {
  132. return true
  133. }
  134. return util.Contains(c.Permissions, perm)
  135. }
  136. func (c *jwtTokenClaims) createToken(tokenAuth *jwtauth.JWTAuth, audience tokenAudience, ip string) (jwt.Token, string, error) {
  137. claims := c.asMap()
  138. now := time.Now().UTC()
  139. claims[jwt.JwtIDKey] = xid.New().String()
  140. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  141. claims[jwt.ExpirationKey] = now.Add(tokenDuration)
  142. claims[jwt.AudienceKey] = []string{audience, ip}
  143. return tokenAuth.Encode(claims)
  144. }
  145. func (c *jwtTokenClaims) createTokenResponse(tokenAuth *jwtauth.JWTAuth, audience tokenAudience, ip string) (map[string]any, error) {
  146. token, tokenString, err := c.createToken(tokenAuth, audience, ip)
  147. if err != nil {
  148. return nil, err
  149. }
  150. response := make(map[string]any)
  151. response["access_token"] = tokenString
  152. response["expires_at"] = token.Expiration().Format(time.RFC3339)
  153. return response, nil
  154. }
  155. func (c *jwtTokenClaims) createAndSetCookie(w http.ResponseWriter, r *http.Request, tokenAuth *jwtauth.JWTAuth,
  156. audience tokenAudience, ip string,
  157. ) error {
  158. resp, err := c.createTokenResponse(tokenAuth, audience, ip)
  159. if err != nil {
  160. return err
  161. }
  162. var basePath string
  163. if audience == tokenAudienceWebAdmin || audience == tokenAudienceWebAdminPartial {
  164. basePath = webBaseAdminPath
  165. } else {
  166. basePath = webBaseClientPath
  167. }
  168. http.SetCookie(w, &http.Cookie{
  169. Name: jwtCookieKey,
  170. Value: resp["access_token"].(string),
  171. Path: basePath,
  172. Expires: time.Now().Add(tokenDuration),
  173. MaxAge: int(tokenDuration / time.Second),
  174. HttpOnly: true,
  175. Secure: isTLS(r),
  176. SameSite: http.SameSiteStrictMode,
  177. })
  178. return nil
  179. }
  180. func (c *jwtTokenClaims) removeCookie(w http.ResponseWriter, r *http.Request, cookiePath string) {
  181. http.SetCookie(w, &http.Cookie{
  182. Name: jwtCookieKey,
  183. Value: "",
  184. Path: cookiePath,
  185. Expires: time.Unix(0, 0),
  186. MaxAge: -1,
  187. HttpOnly: true,
  188. Secure: isTLS(r),
  189. SameSite: http.SameSiteStrictMode,
  190. })
  191. invalidateToken(r)
  192. }
  193. func tokenFromContext(r *http.Request) string {
  194. if token, ok := r.Context().Value(oidcGeneratedToken).(string); ok {
  195. return token
  196. }
  197. return ""
  198. }
  199. func isTLS(r *http.Request) bool {
  200. if r.TLS != nil {
  201. return true
  202. }
  203. if proto, ok := r.Context().Value(forwardedProtoKey).(string); ok {
  204. return proto == "https"
  205. }
  206. return false
  207. }
  208. func isTokenInvalidated(r *http.Request) bool {
  209. var findTokenFns []func(r *http.Request) string
  210. findTokenFns = append(findTokenFns, jwtauth.TokenFromHeader)
  211. findTokenFns = append(findTokenFns, jwtauth.TokenFromCookie)
  212. findTokenFns = append(findTokenFns, tokenFromContext)
  213. isTokenFound := false
  214. for _, fn := range findTokenFns {
  215. token := fn(r)
  216. if token != "" {
  217. isTokenFound = true
  218. if _, ok := invalidatedJWTTokens.Load(token); ok {
  219. return true
  220. }
  221. }
  222. }
  223. return !isTokenFound
  224. }
  225. func invalidateToken(r *http.Request) {
  226. tokenString := jwtauth.TokenFromHeader(r)
  227. if tokenString != "" {
  228. invalidatedJWTTokens.Store(tokenString, time.Now().Add(tokenDuration).UTC())
  229. }
  230. tokenString = jwtauth.TokenFromCookie(r)
  231. if tokenString != "" {
  232. invalidatedJWTTokens.Store(tokenString, time.Now().Add(tokenDuration).UTC())
  233. }
  234. }
  235. func getUserFromToken(r *http.Request) *dataprovider.User {
  236. user := &dataprovider.User{}
  237. _, claims, err := jwtauth.FromContext(r.Context())
  238. if err != nil {
  239. return user
  240. }
  241. tokenClaims := jwtTokenClaims{}
  242. tokenClaims.Decode(claims)
  243. user.Username = tokenClaims.Username
  244. user.Filters.WebClient = tokenClaims.Permissions
  245. return user
  246. }
  247. func getAdminFromToken(r *http.Request) *dataprovider.Admin {
  248. admin := &dataprovider.Admin{}
  249. _, claims, err := jwtauth.FromContext(r.Context())
  250. if err != nil {
  251. return admin
  252. }
  253. tokenClaims := jwtTokenClaims{}
  254. tokenClaims.Decode(claims)
  255. admin.Username = tokenClaims.Username
  256. admin.Permissions = tokenClaims.Permissions
  257. return admin
  258. }
  259. func createCSRFToken(ip string) string {
  260. claims := make(map[string]any)
  261. now := time.Now().UTC()
  262. claims[jwt.JwtIDKey] = xid.New().String()
  263. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  264. claims[jwt.ExpirationKey] = now.Add(csrfTokenDuration)
  265. claims[jwt.AudienceKey] = []string{tokenAudienceCSRF, ip}
  266. _, tokenString, err := csrfTokenAuth.Encode(claims)
  267. if err != nil {
  268. logger.Debug(logSender, "", "unable to create CSRF token: %v", err)
  269. return ""
  270. }
  271. return tokenString
  272. }
  273. func verifyCSRFToken(tokenString, ip string) error {
  274. token, err := jwtauth.VerifyToken(csrfTokenAuth, tokenString)
  275. if err != nil || token == nil {
  276. logger.Debug(logSender, "", "error validating CSRF token %#v: %v", tokenString, err)
  277. return fmt.Errorf("unable to verify form token: %v", err)
  278. }
  279. if !util.Contains(token.Audience(), tokenAudienceCSRF) {
  280. logger.Debug(logSender, "", "error validating CSRF token audience")
  281. return errors.New("the form token is not valid")
  282. }
  283. if !util.Contains(token.Audience(), ip) {
  284. logger.Debug(logSender, "", "error validating CSRF token IP audience")
  285. return errors.New("the form token is not valid")
  286. }
  287. return nil
  288. }