server.go 68 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589
  1. package httpd
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "crypto/x509"
  6. "errors"
  7. "fmt"
  8. "log"
  9. "net"
  10. "net/http"
  11. "strings"
  12. "time"
  13. "github.com/go-chi/chi/v5"
  14. "github.com/go-chi/chi/v5/middleware"
  15. "github.com/go-chi/jwtauth/v5"
  16. "github.com/go-chi/render"
  17. "github.com/lestrrat-go/jwx/jwa"
  18. "github.com/rs/cors"
  19. "github.com/rs/xid"
  20. "github.com/sftpgo/sdk"
  21. "github.com/unrolled/secure"
  22. "github.com/drakkan/sftpgo/v2/common"
  23. "github.com/drakkan/sftpgo/v2/dataprovider"
  24. "github.com/drakkan/sftpgo/v2/logger"
  25. "github.com/drakkan/sftpgo/v2/mfa"
  26. "github.com/drakkan/sftpgo/v2/smtp"
  27. "github.com/drakkan/sftpgo/v2/util"
  28. "github.com/drakkan/sftpgo/v2/version"
  29. )
  30. var (
  31. compressor = middleware.NewCompressor(5)
  32. xForwardedProto = http.CanonicalHeaderKey("X-Forwarded-Proto")
  33. )
  34. type httpdServer struct {
  35. binding Binding
  36. staticFilesPath string
  37. openAPIPath string
  38. enableWebAdmin bool
  39. enableWebClient bool
  40. renderOpenAPI bool
  41. router *chi.Mux
  42. tokenAuth *jwtauth.JWTAuth
  43. signingPassphrase string
  44. cors CorsConfig
  45. }
  46. func newHttpdServer(b Binding, staticFilesPath, signingPassphrase string, cors CorsConfig,
  47. openAPIPath string,
  48. ) *httpdServer {
  49. if openAPIPath == "" {
  50. b.RenderOpenAPI = false
  51. }
  52. return &httpdServer{
  53. binding: b,
  54. staticFilesPath: staticFilesPath,
  55. openAPIPath: openAPIPath,
  56. enableWebAdmin: b.EnableWebAdmin,
  57. enableWebClient: b.EnableWebClient,
  58. renderOpenAPI: b.RenderOpenAPI,
  59. signingPassphrase: signingPassphrase,
  60. cors: cors,
  61. }
  62. }
  63. func (s *httpdServer) listenAndServe() error {
  64. s.initializeRouter()
  65. httpServer := &http.Server{
  66. Handler: s.router,
  67. ReadHeaderTimeout: 30 * time.Second,
  68. ReadTimeout: 60 * time.Second,
  69. WriteTimeout: 60 * time.Second,
  70. IdleTimeout: 60 * time.Second,
  71. MaxHeaderBytes: 1 << 16, // 64KB
  72. ErrorLog: log.New(&logger.StdLoggerWrapper{Sender: logSender}, "", 0),
  73. }
  74. if certMgr != nil && s.binding.EnableHTTPS {
  75. config := &tls.Config{
  76. GetCertificate: certMgr.GetCertificateFunc(),
  77. MinVersion: util.GetTLSVersion(s.binding.MinTLSVersion),
  78. NextProtos: []string{"http/1.1", "h2"},
  79. CipherSuites: util.GetTLSCiphersFromNames(s.binding.TLSCipherSuites),
  80. PreferServerCipherSuites: true,
  81. }
  82. logger.Debug(logSender, "", "configured TLS cipher suites for binding %#v: %v", s.binding.GetAddress(),
  83. config.CipherSuites)
  84. httpServer.TLSConfig = config
  85. if s.binding.ClientAuthType == 1 {
  86. httpServer.TLSConfig.ClientCAs = certMgr.GetRootCAs()
  87. httpServer.TLSConfig.ClientAuth = tls.RequireAndVerifyClientCert
  88. httpServer.TLSConfig.VerifyConnection = s.verifyTLSConnection
  89. }
  90. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, true, logSender)
  91. }
  92. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, false, logSender)
  93. }
  94. func (s *httpdServer) verifyTLSConnection(state tls.ConnectionState) error {
  95. if certMgr != nil {
  96. var clientCrt *x509.Certificate
  97. var clientCrtName string
  98. if len(state.PeerCertificates) > 0 {
  99. clientCrt = state.PeerCertificates[0]
  100. clientCrtName = clientCrt.Subject.String()
  101. }
  102. if len(state.VerifiedChains) == 0 {
  103. logger.Warn(logSender, "", "TLS connection cannot be verified: unable to get verification chain")
  104. return errors.New("TLS connection cannot be verified: unable to get verification chain")
  105. }
  106. for _, verifiedChain := range state.VerifiedChains {
  107. var caCrt *x509.Certificate
  108. if len(verifiedChain) > 0 {
  109. caCrt = verifiedChain[len(verifiedChain)-1]
  110. }
  111. if certMgr.IsRevoked(clientCrt, caCrt) {
  112. logger.Debug(logSender, "", "tls handshake error, client certificate %#v has been revoked", clientCrtName)
  113. return common.ErrCrtRevoked
  114. }
  115. }
  116. }
  117. return nil
  118. }
  119. func (s *httpdServer) refreshCookie(next http.Handler) http.Handler {
  120. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  121. s.checkCookieExpiration(w, r)
  122. next.ServeHTTP(w, r)
  123. })
  124. }
  125. func (s *httpdServer) renderClientLoginPage(w http.ResponseWriter, error, ip string) {
  126. data := loginPage{
  127. CurrentURL: webClientLoginPath,
  128. Version: version.Get().Version,
  129. Error: error,
  130. CSRFToken: createCSRFToken(ip),
  131. StaticURL: webStaticFilesPath,
  132. Branding: s.binding.Branding.WebClient,
  133. }
  134. if s.binding.showAdminLoginURL() {
  135. data.AltLoginURL = webAdminLoginPath
  136. data.AltLoginName = s.binding.Branding.WebAdmin.ShortName
  137. }
  138. if smtp.IsEnabled() {
  139. data.ForgotPwdURL = webClientForgotPwdPath
  140. }
  141. if s.binding.OIDC.isEnabled() {
  142. data.OpenIDLoginURL = webClientOIDCLoginPath
  143. }
  144. renderClientTemplate(w, templateClientLogin, data)
  145. }
  146. func (s *httpdServer) handleWebClientLogout(w http.ResponseWriter, r *http.Request) {
  147. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  148. c := jwtTokenClaims{}
  149. c.removeCookie(w, r, webBaseClientPath)
  150. s.logoutOIDCUser(w, r)
  151. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  152. }
  153. func (s *httpdServer) handleWebClientChangePwdPost(w http.ResponseWriter, r *http.Request) {
  154. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  155. err := r.ParseForm()
  156. if err != nil {
  157. s.renderClientChangePasswordPage(w, r, err.Error())
  158. return
  159. }
  160. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  161. s.renderClientForbiddenPage(w, r, err.Error())
  162. return
  163. }
  164. err = doChangeUserPassword(r, r.Form.Get("current_password"), r.Form.Get("new_password1"),
  165. r.Form.Get("new_password2"))
  166. if err != nil {
  167. s.renderClientChangePasswordPage(w, r, err.Error())
  168. return
  169. }
  170. s.handleWebClientLogout(w, r)
  171. }
  172. func (s *httpdServer) handleClientWebLogin(w http.ResponseWriter, r *http.Request) {
  173. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  174. if !dataprovider.HasAdmin() {
  175. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  176. return
  177. }
  178. s.renderClientLoginPage(w, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
  179. }
  180. func (s *httpdServer) handleWebClientLoginPost(w http.ResponseWriter, r *http.Request) {
  181. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  182. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  183. if err := r.ParseForm(); err != nil {
  184. s.renderClientLoginPage(w, err.Error(), ipAddr)
  185. return
  186. }
  187. protocol := common.ProtocolHTTP
  188. username := r.Form.Get("username")
  189. password := r.Form.Get("password")
  190. if username == "" || password == "" {
  191. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  192. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  193. s.renderClientLoginPage(w, "Invalid credentials", ipAddr)
  194. return
  195. }
  196. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  197. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  198. dataprovider.LoginMethodPassword, ipAddr, err)
  199. s.renderClientLoginPage(w, err.Error(), ipAddr)
  200. return
  201. }
  202. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  203. s.renderClientLoginPage(w, fmt.Sprintf("access denied by post connect hook: %v", err), ipAddr)
  204. return
  205. }
  206. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  207. if err != nil {
  208. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  209. s.renderClientLoginPage(w, dataprovider.ErrInvalidCredentials.Error(), ipAddr)
  210. return
  211. }
  212. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  213. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  214. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  215. s.renderClientLoginPage(w, err.Error(), ipAddr)
  216. return
  217. }
  218. defer user.CloseFs() //nolint:errcheck
  219. err = user.CheckFsRoot(connectionID)
  220. if err != nil {
  221. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  222. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  223. s.renderClientLoginPage(w, err.Error(), ipAddr)
  224. return
  225. }
  226. s.loginUser(w, r, &user, connectionID, ipAddr, false, s.renderClientLoginPage)
  227. }
  228. func (s *httpdServer) handleWebClientPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  229. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  230. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  231. err := r.ParseForm()
  232. if err != nil {
  233. s.renderClientResetPwdPage(w, err.Error(), ipAddr)
  234. return
  235. }
  236. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  237. s.renderClientForbiddenPage(w, r, err.Error())
  238. return
  239. }
  240. _, user, err := handleResetPassword(r, r.Form.Get("code"), r.Form.Get("password"), false)
  241. if err != nil {
  242. s.renderClientResetPwdPage(w, err.Error(), ipAddr)
  243. return
  244. }
  245. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  246. if err := checkHTTPClientUser(user, r, connectionID, true); err != nil {
  247. s.renderClientResetPwdPage(w, fmt.Sprintf("Password reset successfully but unable to login: %v", err.Error()), ipAddr)
  248. return
  249. }
  250. defer user.CloseFs() //nolint:errcheck
  251. err = user.CheckFsRoot(connectionID)
  252. if err != nil {
  253. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  254. s.renderClientResetPwdPage(w, fmt.Sprintf("Password reset successfully but unable to login: %v", err.Error()), ipAddr)
  255. return
  256. }
  257. s.loginUser(w, r, user, connectionID, ipAddr, false, s.renderClientResetPwdPage)
  258. }
  259. func (s *httpdServer) handleWebClientTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  260. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  261. claims, err := getTokenClaims(r)
  262. if err != nil {
  263. s.renderNotFoundPage(w, r, nil)
  264. return
  265. }
  266. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  267. if err := r.ParseForm(); err != nil {
  268. s.renderClientTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  269. return
  270. }
  271. username := claims.Username
  272. recoveryCode := r.Form.Get("recovery_code")
  273. if username == "" || recoveryCode == "" {
  274. s.renderClientTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  275. return
  276. }
  277. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  278. s.renderClientTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  279. return
  280. }
  281. user, userMerged, err := dataprovider.GetUserVariants(username)
  282. if err != nil {
  283. s.renderClientTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  284. return
  285. }
  286. if !userMerged.Filters.TOTPConfig.Enabled || !util.Contains(userMerged.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  287. s.renderClientTwoFactorPage(w, "Two factory authentication is not enabled", ipAddr)
  288. return
  289. }
  290. for idx, code := range user.Filters.RecoveryCodes {
  291. if err := code.Secret.Decrypt(); err != nil {
  292. s.renderClientInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  293. return
  294. }
  295. if code.Secret.GetPayload() == recoveryCode {
  296. if code.Used {
  297. s.renderClientTwoFactorRecoveryPage(w, "This recovery code was already used", ipAddr)
  298. return
  299. }
  300. user.Filters.RecoveryCodes[idx].Used = true
  301. err = dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, ipAddr)
  302. if err != nil {
  303. logger.Warn(logSender, "", "unable to set the recovery code %#v as used: %v", recoveryCode, err)
  304. s.renderClientInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  305. return
  306. }
  307. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  308. s.loginUser(w, r, &userMerged, connectionID, ipAddr, true,
  309. s.renderClientTwoFactorRecoveryPage)
  310. return
  311. }
  312. }
  313. s.renderClientTwoFactorRecoveryPage(w, "Invalid recovery code", ipAddr)
  314. }
  315. func (s *httpdServer) handleWebClientTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  316. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  317. claims, err := getTokenClaims(r)
  318. if err != nil {
  319. s.renderNotFoundPage(w, r, nil)
  320. return
  321. }
  322. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  323. if err := r.ParseForm(); err != nil {
  324. s.renderClientTwoFactorPage(w, err.Error(), ipAddr)
  325. return
  326. }
  327. username := claims.Username
  328. passcode := r.Form.Get("passcode")
  329. if username == "" || passcode == "" {
  330. s.renderClientTwoFactorPage(w, "Invalid credentials", ipAddr)
  331. return
  332. }
  333. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  334. s.renderClientTwoFactorPage(w, err.Error(), ipAddr)
  335. return
  336. }
  337. user, err := dataprovider.GetUserWithGroupSettings(username)
  338. if err != nil {
  339. s.renderClientTwoFactorPage(w, "Invalid credentials", ipAddr)
  340. return
  341. }
  342. if !user.Filters.TOTPConfig.Enabled || !util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  343. s.renderClientTwoFactorPage(w, "Two factory authentication is not enabled", ipAddr)
  344. return
  345. }
  346. err = user.Filters.TOTPConfig.Secret.Decrypt()
  347. if err != nil {
  348. s.renderClientInternalServerErrorPage(w, r, err)
  349. return
  350. }
  351. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  352. user.Filters.TOTPConfig.Secret.GetPayload())
  353. if !match || err != nil {
  354. s.renderClientTwoFactorPage(w, "Invalid authentication code", ipAddr)
  355. return
  356. }
  357. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  358. s.loginUser(w, r, &user, connectionID, ipAddr, true, s.renderClientTwoFactorPage)
  359. }
  360. func (s *httpdServer) handleWebAdminTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  361. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  362. claims, err := getTokenClaims(r)
  363. if err != nil {
  364. s.renderNotFoundPage(w, r, nil)
  365. return
  366. }
  367. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  368. if err := r.ParseForm(); err != nil {
  369. s.renderTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  370. return
  371. }
  372. username := claims.Username
  373. recoveryCode := r.Form.Get("recovery_code")
  374. if username == "" || recoveryCode == "" {
  375. s.renderTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  376. return
  377. }
  378. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  379. s.renderTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  380. return
  381. }
  382. admin, err := dataprovider.AdminExists(username)
  383. if err != nil {
  384. s.renderTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  385. return
  386. }
  387. if !admin.Filters.TOTPConfig.Enabled {
  388. s.renderTwoFactorRecoveryPage(w, "Two factory authentication is not enabled", ipAddr)
  389. return
  390. }
  391. for idx, code := range admin.Filters.RecoveryCodes {
  392. if err := code.Secret.Decrypt(); err != nil {
  393. s.renderInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  394. return
  395. }
  396. if code.Secret.GetPayload() == recoveryCode {
  397. if code.Used {
  398. s.renderTwoFactorRecoveryPage(w, "This recovery code was already used", ipAddr)
  399. return
  400. }
  401. admin.Filters.RecoveryCodes[idx].Used = true
  402. err = dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, ipAddr)
  403. if err != nil {
  404. logger.Warn(logSender, "", "unable to set the recovery code %#v as used: %v", recoveryCode, err)
  405. s.renderInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  406. return
  407. }
  408. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorRecoveryPage, ipAddr)
  409. return
  410. }
  411. }
  412. s.renderTwoFactorRecoveryPage(w, "Invalid recovery code", ipAddr)
  413. }
  414. func (s *httpdServer) handleWebAdminTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  415. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  416. claims, err := getTokenClaims(r)
  417. if err != nil {
  418. s.renderNotFoundPage(w, r, nil)
  419. return
  420. }
  421. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  422. if err := r.ParseForm(); err != nil {
  423. s.renderTwoFactorPage(w, err.Error(), ipAddr)
  424. return
  425. }
  426. username := claims.Username
  427. passcode := r.Form.Get("passcode")
  428. if username == "" || passcode == "" {
  429. s.renderTwoFactorPage(w, "Invalid credentials", ipAddr)
  430. return
  431. }
  432. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  433. s.renderTwoFactorPage(w, err.Error(), ipAddr)
  434. return
  435. }
  436. admin, err := dataprovider.AdminExists(username)
  437. if err != nil {
  438. s.renderTwoFactorPage(w, "Invalid credentials", ipAddr)
  439. return
  440. }
  441. if !admin.Filters.TOTPConfig.Enabled {
  442. s.renderTwoFactorPage(w, "Two factory authentication is not enabled", ipAddr)
  443. return
  444. }
  445. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  446. if err != nil {
  447. s.renderInternalServerErrorPage(w, r, err)
  448. return
  449. }
  450. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  451. admin.Filters.TOTPConfig.Secret.GetPayload())
  452. if !match || err != nil {
  453. s.renderTwoFactorPage(w, "Invalid authentication code", ipAddr)
  454. return
  455. }
  456. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorPage, ipAddr)
  457. }
  458. func (s *httpdServer) handleWebAdminLoginPost(w http.ResponseWriter, r *http.Request) {
  459. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  460. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  461. if err := r.ParseForm(); err != nil {
  462. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  463. return
  464. }
  465. username := r.Form.Get("username")
  466. password := r.Form.Get("password")
  467. if username == "" || password == "" {
  468. s.renderAdminLoginPage(w, "Invalid credentials", ipAddr)
  469. return
  470. }
  471. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  472. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  473. return
  474. }
  475. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  476. if err != nil {
  477. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  478. return
  479. }
  480. s.loginAdmin(w, r, &admin, false, s.renderAdminLoginPage, ipAddr)
  481. }
  482. func (s *httpdServer) renderAdminLoginPage(w http.ResponseWriter, error, ip string) {
  483. data := loginPage{
  484. CurrentURL: webAdminLoginPath,
  485. Version: version.Get().Version,
  486. Error: error,
  487. CSRFToken: createCSRFToken(ip),
  488. StaticURL: webStaticFilesPath,
  489. Branding: s.binding.Branding.WebAdmin,
  490. }
  491. if s.binding.showClientLoginURL() {
  492. data.AltLoginURL = webClientLoginPath
  493. data.AltLoginName = s.binding.Branding.WebClient.ShortName
  494. }
  495. if smtp.IsEnabled() {
  496. data.ForgotPwdURL = webAdminForgotPwdPath
  497. }
  498. if s.binding.OIDC.hasRoles() {
  499. data.OpenIDLoginURL = webAdminOIDCLoginPath
  500. }
  501. renderAdminTemplate(w, templateLogin, data)
  502. }
  503. func (s *httpdServer) handleWebAdminLogin(w http.ResponseWriter, r *http.Request) {
  504. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  505. if !dataprovider.HasAdmin() {
  506. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  507. return
  508. }
  509. s.renderAdminLoginPage(w, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
  510. }
  511. func (s *httpdServer) handleWebAdminLogout(w http.ResponseWriter, r *http.Request) {
  512. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  513. c := jwtTokenClaims{}
  514. c.removeCookie(w, r, webBaseAdminPath)
  515. s.logoutOIDCUser(w, r)
  516. http.Redirect(w, r, webAdminLoginPath, http.StatusFound)
  517. }
  518. func (s *httpdServer) handleWebAdminChangePwdPost(w http.ResponseWriter, r *http.Request) {
  519. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  520. err := r.ParseForm()
  521. if err != nil {
  522. s.renderChangePasswordPage(w, r, err.Error())
  523. return
  524. }
  525. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  526. s.renderForbiddenPage(w, r, err.Error())
  527. return
  528. }
  529. err = doChangeAdminPassword(r, r.Form.Get("current_password"), r.Form.Get("new_password1"),
  530. r.Form.Get("new_password2"))
  531. if err != nil {
  532. s.renderChangePasswordPage(w, r, err.Error())
  533. return
  534. }
  535. s.handleWebAdminLogout(w, r)
  536. }
  537. func (s *httpdServer) handleWebAdminPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  538. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  539. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  540. err := r.ParseForm()
  541. if err != nil {
  542. s.renderResetPwdPage(w, err.Error(), ipAddr)
  543. return
  544. }
  545. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  546. s.renderForbiddenPage(w, r, err.Error())
  547. return
  548. }
  549. admin, _, err := handleResetPassword(r, r.Form.Get("code"), r.Form.Get("password"), true)
  550. if err != nil {
  551. if e, ok := err.(*util.ValidationError); ok {
  552. s.renderResetPwdPage(w, e.GetErrorString(), ipAddr)
  553. return
  554. }
  555. s.renderResetPwdPage(w, err.Error(), ipAddr)
  556. return
  557. }
  558. s.loginAdmin(w, r, admin, false, s.renderResetPwdPage, ipAddr)
  559. }
  560. func (s *httpdServer) handleWebAdminSetupPost(w http.ResponseWriter, r *http.Request) {
  561. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  562. if dataprovider.HasAdmin() {
  563. s.renderBadRequestPage(w, r, errors.New("an admin user already exists"))
  564. return
  565. }
  566. err := r.ParseForm()
  567. if err != nil {
  568. s.renderAdminSetupPage(w, r, "", err.Error())
  569. return
  570. }
  571. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  572. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  573. s.renderForbiddenPage(w, r, err.Error())
  574. return
  575. }
  576. username := r.Form.Get("username")
  577. password := r.Form.Get("password")
  578. confirmPassword := r.Form.Get("confirm_password")
  579. installCode := r.Form.Get("install_code")
  580. if installationCode != "" && installCode != resolveInstallationCode() {
  581. s.renderAdminSetupPage(w, r, username, fmt.Sprintf("%v mismatch", installationCodeHint))
  582. return
  583. }
  584. if username == "" {
  585. s.renderAdminSetupPage(w, r, username, "Please set a username")
  586. return
  587. }
  588. if password == "" {
  589. s.renderAdminSetupPage(w, r, username, "Please set a password")
  590. return
  591. }
  592. if password != confirmPassword {
  593. s.renderAdminSetupPage(w, r, username, "Passwords mismatch")
  594. return
  595. }
  596. admin := dataprovider.Admin{
  597. Username: username,
  598. Password: password,
  599. Status: 1,
  600. Permissions: []string{dataprovider.PermAdminAny},
  601. }
  602. err = dataprovider.AddAdmin(&admin, username, ipAddr)
  603. if err != nil {
  604. s.renderAdminSetupPage(w, r, username, err.Error())
  605. return
  606. }
  607. s.loginAdmin(w, r, &admin, false, nil, ipAddr)
  608. }
  609. func (s *httpdServer) loginUser(
  610. w http.ResponseWriter, r *http.Request, user *dataprovider.User, connectionID, ipAddr string,
  611. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, error, ip string),
  612. ) {
  613. c := jwtTokenClaims{
  614. Username: user.Username,
  615. Permissions: user.Filters.WebClient,
  616. Signature: user.GetSignature(),
  617. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  618. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  619. }
  620. audience := tokenAudienceWebClient
  621. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) &&
  622. user.CanManageMFA() && !isSecondFactorAuth {
  623. audience = tokenAudienceWebClientPartial
  624. }
  625. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  626. if err != nil {
  627. logger.Warn(logSender, connectionID, "unable to set user login cookie %v", err)
  628. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  629. errorFunc(w, err.Error(), ipAddr)
  630. return
  631. }
  632. if isSecondFactorAuth {
  633. invalidateToken(r)
  634. }
  635. if audience == tokenAudienceWebClientPartial {
  636. http.Redirect(w, r, webClientTwoFactorPath, http.StatusFound)
  637. return
  638. }
  639. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, err)
  640. dataprovider.UpdateLastLogin(user)
  641. http.Redirect(w, r, webClientFilesPath, http.StatusFound)
  642. }
  643. func (s *httpdServer) loginAdmin(
  644. w http.ResponseWriter, r *http.Request, admin *dataprovider.Admin,
  645. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, error, ip string),
  646. ipAddr string,
  647. ) {
  648. c := jwtTokenClaims{
  649. Username: admin.Username,
  650. Permissions: admin.Permissions,
  651. Signature: admin.GetSignature(),
  652. }
  653. audience := tokenAudienceWebAdmin
  654. if admin.Filters.TOTPConfig.Enabled && admin.CanManageMFA() && !isSecondFactorAuth {
  655. audience = tokenAudienceWebAdminPartial
  656. }
  657. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  658. if err != nil {
  659. logger.Warn(logSender, "", "unable to set admin login cookie %v", err)
  660. if errorFunc == nil {
  661. s.renderAdminSetupPage(w, r, admin.Username, err.Error())
  662. return
  663. }
  664. errorFunc(w, err.Error(), ipAddr)
  665. return
  666. }
  667. if isSecondFactorAuth {
  668. invalidateToken(r)
  669. }
  670. if audience == tokenAudienceWebAdminPartial {
  671. http.Redirect(w, r, webAdminTwoFactorPath, http.StatusFound)
  672. return
  673. }
  674. dataprovider.UpdateAdminLastLogin(admin)
  675. http.Redirect(w, r, webUsersPath, http.StatusFound)
  676. }
  677. func (s *httpdServer) logout(w http.ResponseWriter, r *http.Request) {
  678. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  679. invalidateToken(r)
  680. sendAPIResponse(w, r, nil, "Your token has been invalidated", http.StatusOK)
  681. }
  682. func (s *httpdServer) getUserToken(w http.ResponseWriter, r *http.Request) {
  683. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  684. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  685. username, password, ok := r.BasicAuth()
  686. protocol := common.ProtocolHTTP
  687. if !ok {
  688. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  689. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  690. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  691. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  692. return
  693. }
  694. if username == "" || password == "" {
  695. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  696. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  697. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  698. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  699. return
  700. }
  701. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  702. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  703. return
  704. }
  705. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  706. if err != nil {
  707. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  708. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  709. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  710. http.StatusUnauthorized)
  711. return
  712. }
  713. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  714. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  715. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  716. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  717. return
  718. }
  719. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  720. passcode := r.Header.Get(otpHeaderCode)
  721. if passcode == "" {
  722. logger.Debug(logSender, "", "TOTP enabled for user %#v and not passcode provided, authentication refused", user.Username)
  723. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  724. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  725. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  726. http.StatusUnauthorized)
  727. return
  728. }
  729. err = user.Filters.TOTPConfig.Secret.Decrypt()
  730. if err != nil {
  731. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  732. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err), http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  733. return
  734. }
  735. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  736. user.Filters.TOTPConfig.Secret.GetPayload())
  737. if !match || err != nil {
  738. logger.Debug(logSender, "invalid passcode for user %#v, match? %v, err: %v", user.Username, match, err)
  739. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  740. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  741. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  742. http.StatusUnauthorized)
  743. return
  744. }
  745. }
  746. defer user.CloseFs() //nolint:errcheck
  747. err = user.CheckFsRoot(connectionID)
  748. if err != nil {
  749. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  750. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  751. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  752. return
  753. }
  754. s.generateAndSendUserToken(w, r, ipAddr, user)
  755. }
  756. func (s *httpdServer) generateAndSendUserToken(w http.ResponseWriter, r *http.Request, ipAddr string, user dataprovider.User) {
  757. c := jwtTokenClaims{
  758. Username: user.Username,
  759. Permissions: user.Filters.WebClient,
  760. Signature: user.GetSignature(),
  761. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  762. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  763. }
  764. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPIUser, ipAddr)
  765. if err != nil {
  766. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  767. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  768. return
  769. }
  770. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  771. dataprovider.UpdateLastLogin(&user)
  772. render.JSON(w, r, resp)
  773. }
  774. func (s *httpdServer) getToken(w http.ResponseWriter, r *http.Request) {
  775. username, password, ok := r.BasicAuth()
  776. if !ok {
  777. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  778. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  779. return
  780. }
  781. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  782. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  783. if err != nil {
  784. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  785. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  786. return
  787. }
  788. if admin.Filters.TOTPConfig.Enabled {
  789. passcode := r.Header.Get(otpHeaderCode)
  790. if passcode == "" {
  791. logger.Debug(logSender, "", "TOTP enabled for admin %#v and not passcode provided, authentication refused", admin.Username)
  792. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  793. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  794. return
  795. }
  796. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  797. if err != nil {
  798. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err),
  799. http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  800. return
  801. }
  802. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  803. admin.Filters.TOTPConfig.Secret.GetPayload())
  804. if !match || err != nil {
  805. logger.Debug(logSender, "invalid passcode for admin %#v, match? %v, err: %v", admin.Username, match, err)
  806. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  807. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  808. http.StatusUnauthorized)
  809. return
  810. }
  811. }
  812. s.generateAndSendToken(w, r, admin, ipAddr)
  813. }
  814. func (s *httpdServer) generateAndSendToken(w http.ResponseWriter, r *http.Request, admin dataprovider.Admin, ip string) {
  815. c := jwtTokenClaims{
  816. Username: admin.Username,
  817. Permissions: admin.Permissions,
  818. Signature: admin.GetSignature(),
  819. }
  820. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPI, ip)
  821. if err != nil {
  822. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  823. return
  824. }
  825. dataprovider.UpdateAdminLastLogin(&admin)
  826. render.JSON(w, r, resp)
  827. }
  828. func (s *httpdServer) checkCookieExpiration(w http.ResponseWriter, r *http.Request) {
  829. if _, ok := r.Context().Value(oidcTokenKey).(string); ok {
  830. return
  831. }
  832. token, claims, err := jwtauth.FromContext(r.Context())
  833. if err != nil {
  834. return
  835. }
  836. tokenClaims := jwtTokenClaims{}
  837. tokenClaims.Decode(claims)
  838. if tokenClaims.Username == "" || tokenClaims.Signature == "" {
  839. return
  840. }
  841. if time.Until(token.Expiration()) > tokenRefreshThreshold {
  842. return
  843. }
  844. if util.Contains(token.Audience(), tokenAudienceWebClient) {
  845. s.refreshClientToken(w, r, tokenClaims)
  846. } else {
  847. s.refreshAdminToken(w, r, tokenClaims)
  848. }
  849. }
  850. func (s *httpdServer) refreshClientToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  851. user, err := dataprovider.GetUserWithGroupSettings(tokenClaims.Username)
  852. if err != nil {
  853. return
  854. }
  855. if user.GetSignature() != tokenClaims.Signature {
  856. logger.Debug(logSender, "", "signature mismatch for user %#v, unable to refresh cookie", user.Username)
  857. return
  858. }
  859. if err := checkHTTPClientUser(&user, r, xid.New().String(), true); err != nil {
  860. logger.Debug(logSender, "", "unable to refresh cookie for user %#v: %v", user.Username, err)
  861. return
  862. }
  863. tokenClaims.Permissions = user.Filters.WebClient
  864. logger.Debug(logSender, "", "cookie refreshed for user %#v", user.Username)
  865. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebClient, util.GetIPFromRemoteAddress(r.RemoteAddr)) //nolint:errcheck
  866. }
  867. func (s *httpdServer) refreshAdminToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  868. admin, err := dataprovider.AdminExists(tokenClaims.Username)
  869. if err != nil {
  870. return
  871. }
  872. if admin.Status != 1 {
  873. logger.Debug(logSender, "", "admin %#v is disabled, unable to refresh cookie", admin.Username)
  874. return
  875. }
  876. if admin.GetSignature() != tokenClaims.Signature {
  877. logger.Debug(logSender, "", "signature mismatch for admin %#v, unable to refresh cookie", admin.Username)
  878. return
  879. }
  880. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  881. if !admin.CanLoginFromIP(ipAddr) {
  882. logger.Debug(logSender, "", "admin %#v cannot login from %v, unable to refresh cookie", admin.Username, r.RemoteAddr)
  883. return
  884. }
  885. tokenClaims.Permissions = admin.Permissions
  886. logger.Debug(logSender, "", "cookie refreshed for admin %#v", admin.Username)
  887. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebAdmin, ipAddr) //nolint:errcheck
  888. }
  889. func (s *httpdServer) updateContextFromCookie(r *http.Request) *http.Request {
  890. token, _, err := jwtauth.FromContext(r.Context())
  891. if token == nil || err != nil {
  892. _, err = r.Cookie(jwtCookieKey)
  893. if err != nil {
  894. return r
  895. }
  896. token, err = jwtauth.VerifyRequest(s.tokenAuth, r, jwtauth.TokenFromCookie)
  897. ctx := jwtauth.NewContext(r.Context(), token, err)
  898. return r.WithContext(ctx)
  899. }
  900. return r
  901. }
  902. func (s *httpdServer) checkConnection(next http.Handler) http.Handler {
  903. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  904. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  905. ip := net.ParseIP(ipAddr)
  906. areHeadersAllowed := false
  907. if ip != nil {
  908. for _, allow := range s.binding.allowHeadersFrom {
  909. if allow(ip) {
  910. parsedIP := util.GetRealIP(r)
  911. if parsedIP != "" {
  912. ipAddr = parsedIP
  913. r.RemoteAddr = ipAddr
  914. }
  915. if forwardedProto := r.Header.Get(xForwardedProto); forwardedProto != "" {
  916. ctx := context.WithValue(r.Context(), forwardedProtoKey, forwardedProto)
  917. r = r.WithContext(ctx)
  918. }
  919. areHeadersAllowed = true
  920. break
  921. }
  922. }
  923. }
  924. if !areHeadersAllowed {
  925. for idx := range s.binding.Security.proxyHeaders {
  926. r.Header.Del(s.binding.Security.proxyHeaders[idx])
  927. }
  928. }
  929. common.Connections.AddClientConnection(ipAddr)
  930. defer common.Connections.RemoveClientConnection(ipAddr)
  931. if !common.Connections.IsNewConnectionAllowed(ipAddr) {
  932. logger.Log(logger.LevelDebug, common.ProtocolHTTP, "", fmt.Sprintf("connection not allowed from ip %#v", ipAddr))
  933. s.sendForbiddenResponse(w, r, "connection not allowed from your ip")
  934. return
  935. }
  936. if common.IsBanned(ipAddr) {
  937. s.sendForbiddenResponse(w, r, "your IP address is banned")
  938. return
  939. }
  940. if delay, err := common.LimitRate(common.ProtocolHTTP, ipAddr); err != nil {
  941. delay += 499999999 * time.Nanosecond
  942. w.Header().Set("Retry-After", fmt.Sprintf("%.0f", delay.Seconds()))
  943. w.Header().Set("X-Retry-In", delay.String())
  944. s.sendTooManyRequestResponse(w, r, err)
  945. return
  946. }
  947. next.ServeHTTP(w, r)
  948. })
  949. }
  950. func (s *httpdServer) sendTooManyRequestResponse(w http.ResponseWriter, r *http.Request, err error) {
  951. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  952. r = s.updateContextFromCookie(r)
  953. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  954. s.renderClientMessagePage(w, r, http.StatusText(http.StatusTooManyRequests), "Rate limit exceeded",
  955. http.StatusTooManyRequests, err, "")
  956. return
  957. }
  958. s.renderMessagePage(w, r, http.StatusText(http.StatusTooManyRequests), "Rate limit exceeded", http.StatusTooManyRequests,
  959. err, "")
  960. return
  961. }
  962. sendAPIResponse(w, r, err, http.StatusText(http.StatusTooManyRequests), http.StatusTooManyRequests)
  963. }
  964. func (s *httpdServer) sendForbiddenResponse(w http.ResponseWriter, r *http.Request, message string) {
  965. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  966. r = s.updateContextFromCookie(r)
  967. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  968. s.renderClientForbiddenPage(w, r, message)
  969. return
  970. }
  971. s.renderForbiddenPage(w, r, message)
  972. return
  973. }
  974. sendAPIResponse(w, r, errors.New(message), message, http.StatusForbidden)
  975. }
  976. func (s *httpdServer) badHostHandler(w http.ResponseWriter, r *http.Request) {
  977. host := r.Host
  978. for _, header := range s.binding.Security.HostsProxyHeaders {
  979. if h := r.Header.Get(header); h != "" {
  980. host = h
  981. break
  982. }
  983. }
  984. s.sendForbiddenResponse(w, r, fmt.Sprintf("The host %#v is not allowed", host))
  985. }
  986. func (s *httpdServer) redirectToWebPath(w http.ResponseWriter, r *http.Request, webPath string) {
  987. if dataprovider.HasAdmin() {
  988. http.Redirect(w, r, webPath, http.StatusFound)
  989. return
  990. }
  991. if s.enableWebAdmin {
  992. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  993. }
  994. }
  995. func (s *httpdServer) isStaticFileURL(r *http.Request) bool {
  996. var urlPath string
  997. rctx := chi.RouteContext(r.Context())
  998. if rctx != nil && rctx.RoutePath != "" {
  999. urlPath = rctx.RoutePath
  1000. } else {
  1001. urlPath = r.URL.Path
  1002. }
  1003. return !strings.HasPrefix(urlPath, webOpenAPIPath) && !strings.HasPrefix(urlPath, webStaticFilesPath)
  1004. }
  1005. func (s *httpdServer) initializeRouter() {
  1006. s.tokenAuth = jwtauth.New(jwa.HS256.String(), getSigningKey(s.signingPassphrase), nil)
  1007. s.router = chi.NewRouter()
  1008. s.router.Use(middleware.RequestID)
  1009. s.router.Use(s.checkConnection)
  1010. s.router.Use(logger.NewStructuredLogger(logger.GetLogger()))
  1011. s.router.Use(middleware.Recoverer)
  1012. if s.binding.Security.Enabled {
  1013. secureMiddleware := secure.New(secure.Options{
  1014. AllowedHosts: s.binding.Security.AllowedHosts,
  1015. AllowedHostsAreRegex: s.binding.Security.AllowedHostsAreRegex,
  1016. HostsProxyHeaders: s.binding.Security.HostsProxyHeaders,
  1017. SSLRedirect: s.binding.Security.HTTPSRedirect,
  1018. SSLHost: s.binding.Security.HTTPSHost,
  1019. SSLTemporaryRedirect: true,
  1020. SSLProxyHeaders: s.binding.Security.getHTTPSProxyHeaders(),
  1021. STSSeconds: s.binding.Security.STSSeconds,
  1022. STSIncludeSubdomains: s.binding.Security.STSIncludeSubdomains,
  1023. STSPreload: s.binding.Security.STSPreload,
  1024. ContentTypeNosniff: s.binding.Security.ContentTypeNosniff,
  1025. ContentSecurityPolicy: s.binding.Security.ContentSecurityPolicy,
  1026. PermissionsPolicy: s.binding.Security.PermissionsPolicy,
  1027. CrossOriginOpenerPolicy: s.binding.Security.CrossOriginOpenerPolicy,
  1028. ExpectCTHeader: s.binding.Security.ExpectCTHeader,
  1029. })
  1030. secureMiddleware.SetBadHostHandler(http.HandlerFunc(s.badHostHandler))
  1031. s.router.Use(secureMiddleware.Handler)
  1032. }
  1033. if s.cors.Enabled {
  1034. c := cors.New(cors.Options{
  1035. AllowedOrigins: s.cors.AllowedOrigins,
  1036. AllowedMethods: s.cors.AllowedMethods,
  1037. AllowedHeaders: s.cors.AllowedHeaders,
  1038. ExposedHeaders: s.cors.ExposedHeaders,
  1039. MaxAge: s.cors.MaxAge,
  1040. AllowCredentials: s.cors.AllowCredentials,
  1041. })
  1042. s.router.Use(c.Handler)
  1043. }
  1044. s.router.Use(middleware.GetHead)
  1045. // StripSlashes causes infinite redirects at the root path if used with http.FileServer
  1046. s.router.Use(middleware.Maybe(middleware.StripSlashes, s.isStaticFileURL))
  1047. s.router.NotFound(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  1048. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1049. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1050. r = s.updateContextFromCookie(r)
  1051. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1052. s.renderClientNotFoundPage(w, r, nil)
  1053. return
  1054. }
  1055. s.renderNotFoundPage(w, r, nil)
  1056. return
  1057. }
  1058. sendAPIResponse(w, r, nil, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  1059. }))
  1060. s.router.Get(healthzPath, func(w http.ResponseWriter, r *http.Request) {
  1061. render.PlainText(w, r, "ok")
  1062. })
  1063. s.router.Get(robotsTxtPath, func(w http.ResponseWriter, r *http.Request) {
  1064. render.PlainText(w, r, "User-agent: *\nDisallow: /")
  1065. })
  1066. // share API exposed to external users
  1067. s.router.Get(sharesPath+"/{id}", s.downloadFromShare)
  1068. s.router.Post(sharesPath+"/{id}", s.uploadFilesToShare)
  1069. s.router.Post(sharesPath+"/{id}/{name}", s.uploadFileToShare)
  1070. s.router.With(compressor.Handler).Get(sharesPath+"/{id}/dirs", s.readBrowsableShareContents)
  1071. s.router.Get(sharesPath+"/{id}/files", s.downloadBrowsableSharedFile)
  1072. s.router.Get(tokenPath, s.getToken)
  1073. s.router.Post(adminPath+"/{username}/forgot-password", forgotAdminPassword)
  1074. s.router.Post(adminPath+"/{username}/reset-password", resetAdminPassword)
  1075. s.router.Post(userPath+"/{username}/forgot-password", forgotUserPassword)
  1076. s.router.Post(userPath+"/{username}/reset-password", resetUserPassword)
  1077. s.router.Group(func(router chi.Router) {
  1078. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeAdmin))
  1079. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1080. router.Use(jwtAuthenticatorAPI)
  1081. router.Get(versionPath, func(w http.ResponseWriter, r *http.Request) {
  1082. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1083. render.JSON(w, r, version.Get())
  1084. })
  1085. router.With(forbidAPIKeyAuthentication).Get(logoutPath, s.logout)
  1086. router.With(forbidAPIKeyAuthentication).Get(adminProfilePath, getAdminProfile)
  1087. router.With(forbidAPIKeyAuthentication).Put(adminProfilePath, updateAdminProfile)
  1088. router.With(forbidAPIKeyAuthentication).Put(adminPwdPath, changeAdminPassword)
  1089. // compatibility layer to remove in v2.2
  1090. router.With(forbidAPIKeyAuthentication).Put(adminPwdCompatPath, changeAdminPassword)
  1091. // admin TOTP APIs
  1092. router.With(forbidAPIKeyAuthentication).Get(adminTOTPConfigsPath, getTOTPConfigs)
  1093. router.With(forbidAPIKeyAuthentication).Post(adminTOTPGeneratePath, generateTOTPSecret)
  1094. router.With(forbidAPIKeyAuthentication).Post(adminTOTPValidatePath, validateTOTPPasscode)
  1095. router.With(forbidAPIKeyAuthentication).Post(adminTOTPSavePath, saveTOTPConfig)
  1096. router.With(forbidAPIKeyAuthentication).Get(admin2FARecoveryCodesPath, getRecoveryCodes)
  1097. router.With(forbidAPIKeyAuthentication).Post(admin2FARecoveryCodesPath, generateRecoveryCodes)
  1098. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus)).
  1099. Get(serverStatusPath, func(w http.ResponseWriter, r *http.Request) {
  1100. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1101. render.JSON(w, r, getServicesStatus())
  1102. })
  1103. router.With(s.checkPerm(dataprovider.PermAdminViewConnections)).
  1104. Get(activeConnectionsPath, func(w http.ResponseWriter, r *http.Request) {
  1105. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1106. render.JSON(w, r, common.Connections.GetStats())
  1107. })
  1108. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections)).
  1109. Delete(activeConnectionsPath+"/{connectionID}", handleCloseConnection)
  1110. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotaScanPath, getUsersQuotaScans)
  1111. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/users/scans", getUsersQuotaScans)
  1112. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotaScanPath, startUserQuotaScanCompat)
  1113. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/users/{username}/scan", startUserQuotaScan)
  1114. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotaScanVFolderPath, getFoldersQuotaScans)
  1115. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/folders/scans", getFoldersQuotaScans)
  1116. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotaScanVFolderPath, startFolderQuotaScanCompat)
  1117. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/folders/{name}/scan", startFolderQuotaScan)
  1118. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath, getUsers)
  1119. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(userPath, addUser)
  1120. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath+"/{username}", getUserByUsername)
  1121. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}", updateUser)
  1122. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers)).Delete(userPath+"/{username}", deleteUser)
  1123. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}/2fa/disable", disableUser2FA)
  1124. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(folderPath, getFolders)
  1125. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(folderPath+"/{name}", getFolderByName)
  1126. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(folderPath, addFolder)
  1127. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(folderPath+"/{name}", updateFolder)
  1128. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers)).Delete(folderPath+"/{name}", deleteFolder)
  1129. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath, getGroups)
  1130. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath+"/{name}", getGroupByName)
  1131. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(groupPath, addGroup)
  1132. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Put(groupPath+"/{name}", updateGroup)
  1133. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Delete(groupPath+"/{name}", deleteGroup)
  1134. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(dumpDataPath, dumpData)
  1135. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(loadDataPath, loadData)
  1136. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(loadDataPath, loadDataFromRequest)
  1137. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(updateUsedQuotaPath, updateUserQuotaUsageCompat)
  1138. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/usage",
  1139. updateUserQuotaUsage)
  1140. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/transfer-usage",
  1141. updateUserTransferQuotaUsage)
  1142. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(updateFolderUsedQuotaPath, updateFolderQuotaUsageCompat)
  1143. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/folders/{name}/usage",
  1144. updateFolderQuotaUsage)
  1145. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts, getDefenderHosts)
  1146. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts+"/{id}", getDefenderHostByID)
  1147. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(defenderHosts+"/{id}", deleteDefenderHostByID)
  1148. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderBanTime, getBanTime)
  1149. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderScore, getScore)
  1150. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Post(defenderUnban, unban)
  1151. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath, getAdmins)
  1152. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(adminPath, addAdmin)
  1153. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath+"/{username}", getAdminByUsername)
  1154. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}", updateAdmin)
  1155. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Delete(adminPath+"/{username}", deleteAdmin)
  1156. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}/2fa/disable", disableAdmin2FA)
  1157. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Get(retentionChecksPath, getRetentionChecks)
  1158. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Post(retentionBasePath+"/{username}/check",
  1159. startRetentionCheck)
  1160. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Get(metadataChecksPath, getMetadataChecks)
  1161. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Post(metadataBasePath+"/{username}/check",
  1162. startMetadataCheck)
  1163. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1164. Get(fsEventsPath, searchFsEvents)
  1165. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1166. Get(providerEventsPath, searchProviderEvents)
  1167. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1168. Get(apiKeysPath, getAPIKeys)
  1169. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1170. Post(apiKeysPath, addAPIKey)
  1171. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1172. Get(apiKeysPath+"/{id}", getAPIKeyByID)
  1173. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1174. Put(apiKeysPath+"/{id}", updateAPIKey)
  1175. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1176. Delete(apiKeysPath+"/{id}", deleteAPIKey)
  1177. })
  1178. s.router.Get(userTokenPath, s.getUserToken)
  1179. s.router.Group(func(router chi.Router) {
  1180. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeUser))
  1181. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1182. router.Use(jwtAuthenticatorAPIUser)
  1183. router.With(forbidAPIKeyAuthentication).Get(userLogoutPath, s.logout)
  1184. router.With(forbidAPIKeyAuthentication, s.checkSecondFactorRequirement,
  1185. s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).Put(userPwdPath, changeUserPassword)
  1186. router.With(forbidAPIKeyAuthentication, s.checkSecondFactorRequirement,
  1187. s.checkHTTPUserPerm(sdk.WebClientPubKeyChangeDisabled)).Get(userPublicKeysPath, getUserPublicKeys)
  1188. router.With(forbidAPIKeyAuthentication, s.checkSecondFactorRequirement,
  1189. s.checkHTTPUserPerm(sdk.WebClientPubKeyChangeDisabled)).Put(userPublicKeysPath, setUserPublicKeys)
  1190. router.With(forbidAPIKeyAuthentication).Get(userProfilePath, getUserProfile)
  1191. router.With(forbidAPIKeyAuthentication, s.checkSecondFactorRequirement).Put(userProfilePath, updateUserProfile)
  1192. // user TOTP APIs
  1193. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1194. Get(userTOTPConfigsPath, getTOTPConfigs)
  1195. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1196. Post(userTOTPGeneratePath, generateTOTPSecret)
  1197. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1198. Post(userTOTPValidatePath, validateTOTPPasscode)
  1199. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1200. Post(userTOTPSavePath, saveTOTPConfig)
  1201. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1202. Get(user2FARecoveryCodesPath, getRecoveryCodes)
  1203. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1204. Post(user2FARecoveryCodesPath, generateRecoveryCodes)
  1205. // compatibility layer to remove in v2.3
  1206. router.With(s.checkSecondFactorRequirement, compressor.Handler).Get(userFolderPath, readUserFolder)
  1207. router.With(s.checkSecondFactorRequirement).Get(userFilePath, getUserFile)
  1208. router.With(s.checkSecondFactorRequirement, compressor.Handler).Get(userDirsPath, readUserFolder)
  1209. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1210. Post(userDirsPath, createUserDir)
  1211. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1212. Patch(userDirsPath, renameUserDir)
  1213. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1214. Delete(userDirsPath, deleteUserDir)
  1215. router.With(s.checkSecondFactorRequirement).Get(userFilesPath, getUserFile)
  1216. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1217. Post(userFilesPath, uploadUserFiles)
  1218. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1219. Patch(userFilesPath, renameUserFile)
  1220. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1221. Delete(userFilesPath, deleteUserFile)
  1222. router.With(s.checkSecondFactorRequirement).Post(userStreamZipPath, getUserFilesAsZipStream)
  1223. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1224. Get(userSharesPath, getShares)
  1225. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1226. Post(userSharesPath, addShare)
  1227. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1228. Get(userSharesPath+"/{id}", getShareByID)
  1229. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1230. Put(userSharesPath+"/{id}", updateShare)
  1231. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1232. Delete(userSharesPath+"/{id}", deleteShare)
  1233. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1234. Post(userUploadFilePath, uploadUserFile)
  1235. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1236. Patch(userFilesDirsMetadataPath, setFileDirMetadata)
  1237. })
  1238. if s.renderOpenAPI {
  1239. s.router.Group(func(router chi.Router) {
  1240. router.Use(compressor.Handler)
  1241. fileServer(router, webOpenAPIPath, http.Dir(s.openAPIPath))
  1242. })
  1243. }
  1244. if s.enableWebAdmin || s.enableWebClient {
  1245. s.router.Group(func(router chi.Router) {
  1246. router.Use(compressor.Handler)
  1247. fileServer(router, webStaticFilesPath, http.Dir(s.staticFilesPath))
  1248. })
  1249. if s.binding.OIDC.isEnabled() {
  1250. s.router.Get(webOIDCRedirectPath, s.handleOIDCRedirect)
  1251. }
  1252. if s.enableWebClient {
  1253. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1254. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1255. s.redirectToWebPath(w, r, webClientLoginPath)
  1256. })
  1257. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1258. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1259. s.redirectToWebPath(w, r, webClientLoginPath)
  1260. })
  1261. } else {
  1262. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1263. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1264. s.redirectToWebPath(w, r, webAdminLoginPath)
  1265. })
  1266. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1267. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1268. s.redirectToWebPath(w, r, webAdminLoginPath)
  1269. })
  1270. }
  1271. }
  1272. s.setupWebClientRoutes()
  1273. s.setupWebAdminRoutes()
  1274. }
  1275. func (s *httpdServer) setupWebClientRoutes() {
  1276. if s.enableWebClient {
  1277. s.router.Get(webBaseClientPath, func(w http.ResponseWriter, r *http.Request) {
  1278. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1279. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  1280. })
  1281. s.router.Get(webClientLoginPath, s.handleClientWebLogin)
  1282. if s.binding.OIDC.isEnabled() {
  1283. s.router.Get(webClientOIDCLoginPath, s.handleWebClientOIDCLogin)
  1284. }
  1285. s.router.Post(webClientLoginPath, s.handleWebClientLoginPost)
  1286. s.router.Get(webClientForgotPwdPath, s.handleWebClientForgotPwd)
  1287. s.router.Post(webClientForgotPwdPath, s.handleWebClientForgotPwdPost)
  1288. s.router.Get(webClientResetPwdPath, s.handleWebClientPasswordReset)
  1289. s.router.Post(webClientResetPwdPath, s.handleWebClientPasswordResetPost)
  1290. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1291. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1292. Get(webClientTwoFactorPath, s.handleWebClientTwoFactor)
  1293. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1294. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1295. Post(webClientTwoFactorPath, s.handleWebClientTwoFactorPost)
  1296. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1297. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1298. Get(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecovery)
  1299. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1300. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1301. Post(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecoveryPost)
  1302. // share API exposed to external users
  1303. s.router.Get(webClientPubSharesPath+"/{id}", s.downloadFromShare)
  1304. s.router.Get(webClientPubSharesPath+"/{id}/browse", s.handleShareGetFiles)
  1305. s.router.Get(webClientPubSharesPath+"/{id}/upload", s.handleClientUploadToShare)
  1306. s.router.With(compressor.Handler).Get(webClientPubSharesPath+"/{id}/dirs", s.handleShareGetDirContents)
  1307. s.router.Post(webClientPubSharesPath+"/{id}", s.uploadFilesToShare)
  1308. s.router.Post(webClientPubSharesPath+"/{id}/{name}", s.uploadFileToShare)
  1309. s.router.Group(func(router chi.Router) {
  1310. if s.binding.OIDC.isEnabled() {
  1311. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebClient))
  1312. }
  1313. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1314. router.Use(jwtAuthenticatorWebClient)
  1315. router.Get(webClientLogoutPath, s.handleWebClientLogout)
  1316. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientFilesPath, s.handleClientGetFiles)
  1317. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientViewPDFPath, s.handleClientViewPDF)
  1318. router.With(s.checkSecondFactorRequirement, s.refreshCookie, verifyCSRFHeader).Get(webClientFilePath, getUserFile)
  1319. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1320. Post(webClientFilePath, uploadUserFile)
  1321. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientEditFilePath, s.handleClientEditFile)
  1322. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1323. Patch(webClientFilesPath, renameUserFile)
  1324. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1325. Delete(webClientFilesPath, deleteUserFile)
  1326. router.With(s.checkSecondFactorRequirement, compressor.Handler, s.refreshCookie).
  1327. Get(webClientDirsPath, s.handleClientGetDirContents)
  1328. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1329. Post(webClientDirsPath, createUserDir)
  1330. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1331. Patch(webClientDirsPath, renameUserDir)
  1332. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1333. Delete(webClientDirsPath, deleteUserDir)
  1334. router.With(s.checkSecondFactorRequirement, s.refreshCookie).
  1335. Get(webClientDownloadZipPath, s.handleWebClientDownloadZip)
  1336. router.With(s.checkSecondFactorRequirement, s.refreshCookie, s.requireBuiltinLogin).
  1337. Get(webClientProfilePath, s.handleClientGetProfile)
  1338. router.With(s.checkSecondFactorRequirement, s.requireBuiltinLogin).
  1339. Post(webClientProfilePath, s.handleWebClientProfilePost)
  1340. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1341. Get(webChangeClientPwdPath, s.handleWebClientChangePwd)
  1342. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1343. Post(webChangeClientPwdPath, s.handleWebClientChangePwdPost)
  1344. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), s.refreshCookie).
  1345. Get(webClientMFAPath, s.handleWebClientMFA)
  1346. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1347. Post(webClientTOTPGeneratePath, generateTOTPSecret)
  1348. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1349. Post(webClientTOTPValidatePath, validateTOTPPasscode)
  1350. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1351. Post(webClientTOTPSavePath, saveTOTPConfig)
  1352. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader, s.refreshCookie).
  1353. Get(webClientRecoveryCodesPath, getRecoveryCodes)
  1354. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1355. Post(webClientRecoveryCodesPath, generateRecoveryCodes)
  1356. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1357. Get(webClientSharesPath, s.handleClientGetShares)
  1358. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1359. Get(webClientSharePath, s.handleClientAddShareGet)
  1360. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1361. Post(webClientSharePath, s.handleClientAddSharePost)
  1362. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1363. Get(webClientSharePath+"/{id}", s.handleClientUpdateShareGet)
  1364. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1365. Post(webClientSharePath+"/{id}", s.handleClientUpdateSharePost)
  1366. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), verifyCSRFHeader).
  1367. Delete(webClientSharePath+"/{id}", deleteShare)
  1368. })
  1369. }
  1370. }
  1371. func (s *httpdServer) setupWebAdminRoutes() {
  1372. if s.enableWebAdmin {
  1373. s.router.Get(webBaseAdminPath, func(w http.ResponseWriter, r *http.Request) {
  1374. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1375. s.redirectToWebPath(w, r, webAdminLoginPath)
  1376. })
  1377. s.router.Get(webAdminLoginPath, s.handleWebAdminLogin)
  1378. if s.binding.OIDC.hasRoles() {
  1379. s.router.Get(webAdminOIDCLoginPath, s.handleWebAdminOIDCLogin)
  1380. }
  1381. s.router.Post(webAdminLoginPath, s.handleWebAdminLoginPost)
  1382. s.router.Get(webAdminSetupPath, s.handleWebAdminSetupGet)
  1383. s.router.Post(webAdminSetupPath, s.handleWebAdminSetupPost)
  1384. s.router.Get(webAdminForgotPwdPath, s.handleWebAdminForgotPwd)
  1385. s.router.Post(webAdminForgotPwdPath, s.handleWebAdminForgotPwdPost)
  1386. s.router.Get(webAdminResetPwdPath, s.handleWebAdminPasswordReset)
  1387. s.router.Post(webAdminResetPwdPath, s.handleWebAdminPasswordResetPost)
  1388. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1389. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1390. Get(webAdminTwoFactorPath, s.handleWebAdminTwoFactor)
  1391. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1392. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1393. Post(webAdminTwoFactorPath, s.handleWebAdminTwoFactorPost)
  1394. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1395. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1396. Get(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecovery)
  1397. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1398. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1399. Post(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecoveryPost)
  1400. s.router.Group(func(router chi.Router) {
  1401. if s.binding.OIDC.isEnabled() {
  1402. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebAdmin))
  1403. }
  1404. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1405. router.Use(jwtAuthenticatorWebAdmin)
  1406. router.Get(webLogoutPath, s.handleWebAdminLogout)
  1407. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminProfilePath, s.handleWebAdminProfile)
  1408. router.With(s.requireBuiltinLogin).Post(webAdminProfilePath, s.handleWebAdminProfilePost)
  1409. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webChangeAdminPwdPath, s.handleWebAdminChangePwd)
  1410. router.With(s.requireBuiltinLogin).Post(webChangeAdminPwdPath, s.handleWebAdminChangePwdPost)
  1411. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminMFAPath, s.handleWebAdminMFA)
  1412. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPGeneratePath, generateTOTPSecret)
  1413. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPValidatePath, validateTOTPPasscode)
  1414. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPSavePath, saveTOTPConfig)
  1415. router.With(verifyCSRFHeader, s.requireBuiltinLogin, s.refreshCookie).Get(webAdminRecoveryCodesPath, getRecoveryCodes)
  1416. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminRecoveryCodesPath, generateRecoveryCodes)
  1417. router.With(s.checkPerm(dataprovider.PermAdminViewUsers), s.refreshCookie).
  1418. Get(webUsersPath, s.handleGetWebUsers)
  1419. router.With(s.checkPerm(dataprovider.PermAdminAddUsers), s.refreshCookie).
  1420. Get(webUserPath, s.handleWebAddUserGet)
  1421. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers), s.refreshCookie).
  1422. Get(webUserPath+"/{username}", s.handleWebUpdateUserGet)
  1423. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(webUserPath, s.handleWebAddUserPost)
  1424. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Post(webUserPath+"/{username}",
  1425. s.handleWebUpdateUserPost)
  1426. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1427. Get(webGroupsPath, s.handleWebGetGroups)
  1428. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1429. Get(webGroupPath, s.handleWebAddGroupGet)
  1430. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath, s.handleWebAddGroupPost)
  1431. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1432. Get(webGroupPath+"/{name}", s.handleWebUpdateGroupGet)
  1433. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath+"/{name}",
  1434. s.handleWebUpdateGroupPost)
  1435. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), verifyCSRFHeader).
  1436. Delete(webGroupPath+"/{name}", deleteGroup)
  1437. router.With(s.checkPerm(dataprovider.PermAdminViewConnections), s.refreshCookie).
  1438. Get(webConnectionsPath, s.handleWebGetConnections)
  1439. router.With(s.checkPerm(dataprovider.PermAdminViewUsers), s.refreshCookie).
  1440. Get(webFoldersPath, s.handleWebGetFolders)
  1441. router.With(s.checkPerm(dataprovider.PermAdminAddUsers), s.refreshCookie).
  1442. Get(webFolderPath, s.handleWebAddFolderGet)
  1443. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(webFolderPath, s.handleWebAddFolderPost)
  1444. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus), s.refreshCookie).
  1445. Get(webStatusPath, s.handleWebGetStatus)
  1446. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1447. Get(webAdminsPath, s.handleGetWebAdmins)
  1448. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1449. Get(webAdminPath, s.handleWebAddAdminGet)
  1450. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1451. Get(webAdminPath+"/{username}", s.handleWebUpdateAdminGet)
  1452. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath, s.handleWebAddAdminPost)
  1453. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath+"/{username}",
  1454. s.handleWebUpdateAdminPost)
  1455. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), verifyCSRFHeader).
  1456. Delete(webAdminPath+"/{username}", deleteAdmin)
  1457. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections), verifyCSRFHeader).
  1458. Delete(webConnectionsPath+"/{connectionID}", handleCloseConnection)
  1459. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers), s.refreshCookie).
  1460. Get(webFolderPath+"/{name}", s.handleWebUpdateFolderGet)
  1461. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Post(webFolderPath+"/{name}",
  1462. s.handleWebUpdateFolderPost)
  1463. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers), verifyCSRFHeader).
  1464. Delete(webFolderPath+"/{name}", deleteFolder)
  1465. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1466. Post(webScanVFolderPath+"/{name}", startFolderQuotaScan)
  1467. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers), verifyCSRFHeader).
  1468. Delete(webUserPath+"/{username}", deleteUser)
  1469. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1470. Post(webQuotaScanPath+"/{username}", startUserQuotaScan)
  1471. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webMaintenancePath, s.handleWebMaintenance)
  1472. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webBackupPath, dumpData)
  1473. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webRestorePath, s.handleWebRestore)
  1474. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1475. Get(webTemplateUser, s.handleWebTemplateUserGet)
  1476. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateUser, s.handleWebTemplateUserPost)
  1477. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1478. Get(webTemplateFolder, s.handleWebTemplateFolderGet)
  1479. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateFolder, s.handleWebTemplateFolderPost)
  1480. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderPath, s.handleWebDefenderPage)
  1481. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderHostsPath, getDefenderHosts)
  1482. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(webDefenderHostsPath+"/{id}",
  1483. deleteDefenderHostByID)
  1484. })
  1485. }
  1486. }