auth_utils.go 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "errors"
  17. "fmt"
  18. "net/http"
  19. "time"
  20. "github.com/go-chi/jwtauth/v5"
  21. "github.com/lestrrat-go/jwx/jwt"
  22. "github.com/rs/xid"
  23. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  24. "github.com/drakkan/sftpgo/v2/internal/logger"
  25. "github.com/drakkan/sftpgo/v2/internal/util"
  26. )
  27. type tokenAudience = string
  28. const (
  29. tokenAudienceWebAdmin tokenAudience = "WebAdmin"
  30. tokenAudienceWebClient tokenAudience = "WebClient"
  31. tokenAudienceWebAdminPartial tokenAudience = "WebAdminPartial"
  32. tokenAudienceWebClientPartial tokenAudience = "WebClientPartial"
  33. tokenAudienceAPI tokenAudience = "API"
  34. tokenAudienceAPIUser tokenAudience = "APIUser"
  35. tokenAudienceCSRF tokenAudience = "CSRF"
  36. )
  37. type tokenValidation = int
  38. const (
  39. tokenValidationFull = iota
  40. tokenValidationNoIPMatch tokenValidation = iota
  41. )
  42. const (
  43. claimUsernameKey = "username"
  44. claimPermissionsKey = "permissions"
  45. claimAPIKey = "api_key"
  46. claimMustSetSecondFactorKey = "2fa_required"
  47. claimRequiredTwoFactorProtocols = "2fa_protocols"
  48. basicRealm = "Basic realm=\"SFTPGo\""
  49. jwtCookieKey = "jwt"
  50. )
  51. var (
  52. tokenDuration = 20 * time.Minute
  53. // csrf token duration is greater than normal token duration to reduce issues
  54. // with the login form
  55. csrfTokenDuration = 6 * time.Hour
  56. tokenRefreshThreshold = 10 * time.Minute
  57. tokenValidationMode = tokenValidationFull
  58. )
  59. type jwtTokenClaims struct {
  60. Username string
  61. Permissions []string
  62. Signature string
  63. Audience []string
  64. APIKeyID string
  65. MustSetTwoFactorAuth bool
  66. RequiredTwoFactorProtocols []string
  67. }
  68. func (c *jwtTokenClaims) hasUserAudience() bool {
  69. for _, audience := range c.Audience {
  70. if audience == tokenAudienceWebClient || audience == tokenAudienceAPIUser {
  71. return true
  72. }
  73. }
  74. return false
  75. }
  76. func (c *jwtTokenClaims) asMap() map[string]any {
  77. claims := make(map[string]any)
  78. claims[claimUsernameKey] = c.Username
  79. claims[claimPermissionsKey] = c.Permissions
  80. if c.APIKeyID != "" {
  81. claims[claimAPIKey] = c.APIKeyID
  82. }
  83. claims[jwt.SubjectKey] = c.Signature
  84. claims[claimMustSetSecondFactorKey] = c.MustSetTwoFactorAuth
  85. claims[claimRequiredTwoFactorProtocols] = c.RequiredTwoFactorProtocols
  86. return claims
  87. }
  88. func (c *jwtTokenClaims) Decode(token map[string]any) {
  89. c.Permissions = nil
  90. username := token[claimUsernameKey]
  91. switch v := username.(type) {
  92. case string:
  93. c.Username = v
  94. }
  95. signature := token[jwt.SubjectKey]
  96. switch v := signature.(type) {
  97. case string:
  98. c.Signature = v
  99. }
  100. audience := token[jwt.AudienceKey]
  101. switch v := audience.(type) {
  102. case []string:
  103. c.Audience = v
  104. }
  105. if val, ok := token[claimAPIKey]; ok {
  106. switch v := val.(type) {
  107. case string:
  108. c.APIKeyID = v
  109. }
  110. }
  111. permissions := token[claimPermissionsKey]
  112. switch v := permissions.(type) {
  113. case []any:
  114. for _, elem := range v {
  115. switch elemValue := elem.(type) {
  116. case string:
  117. c.Permissions = append(c.Permissions, elemValue)
  118. }
  119. }
  120. }
  121. secondFactorRequired := token[claimMustSetSecondFactorKey]
  122. switch v := secondFactorRequired.(type) {
  123. case bool:
  124. c.MustSetTwoFactorAuth = v
  125. }
  126. secondFactorProtocols := token[claimRequiredTwoFactorProtocols]
  127. switch v := secondFactorProtocols.(type) {
  128. case []any:
  129. for _, elem := range v {
  130. switch elemValue := elem.(type) {
  131. case string:
  132. c.RequiredTwoFactorProtocols = append(c.RequiredTwoFactorProtocols, elemValue)
  133. }
  134. }
  135. }
  136. }
  137. func (c *jwtTokenClaims) isCriticalPermRemoved(permissions []string) bool {
  138. if util.Contains(permissions, dataprovider.PermAdminAny) {
  139. return false
  140. }
  141. if (util.Contains(c.Permissions, dataprovider.PermAdminManageAdmins) ||
  142. util.Contains(c.Permissions, dataprovider.PermAdminAny)) &&
  143. !util.Contains(permissions, dataprovider.PermAdminManageAdmins) &&
  144. !util.Contains(permissions, dataprovider.PermAdminAny) {
  145. return true
  146. }
  147. return false
  148. }
  149. func (c *jwtTokenClaims) hasPerm(perm string) bool {
  150. if util.Contains(c.Permissions, dataprovider.PermAdminAny) {
  151. return true
  152. }
  153. return util.Contains(c.Permissions, perm)
  154. }
  155. func (c *jwtTokenClaims) createToken(tokenAuth *jwtauth.JWTAuth, audience tokenAudience, ip string) (jwt.Token, string, error) {
  156. claims := c.asMap()
  157. now := time.Now().UTC()
  158. claims[jwt.JwtIDKey] = xid.New().String()
  159. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  160. claims[jwt.ExpirationKey] = now.Add(tokenDuration)
  161. claims[jwt.AudienceKey] = []string{audience, ip}
  162. return tokenAuth.Encode(claims)
  163. }
  164. func (c *jwtTokenClaims) createTokenResponse(tokenAuth *jwtauth.JWTAuth, audience tokenAudience, ip string) (map[string]any, error) {
  165. token, tokenString, err := c.createToken(tokenAuth, audience, ip)
  166. if err != nil {
  167. return nil, err
  168. }
  169. response := make(map[string]any)
  170. response["access_token"] = tokenString
  171. response["expires_at"] = token.Expiration().Format(time.RFC3339)
  172. return response, nil
  173. }
  174. func (c *jwtTokenClaims) createAndSetCookie(w http.ResponseWriter, r *http.Request, tokenAuth *jwtauth.JWTAuth,
  175. audience tokenAudience, ip string,
  176. ) error {
  177. resp, err := c.createTokenResponse(tokenAuth, audience, ip)
  178. if err != nil {
  179. return err
  180. }
  181. var basePath string
  182. if audience == tokenAudienceWebAdmin || audience == tokenAudienceWebAdminPartial {
  183. basePath = webBaseAdminPath
  184. } else {
  185. basePath = webBaseClientPath
  186. }
  187. http.SetCookie(w, &http.Cookie{
  188. Name: jwtCookieKey,
  189. Value: resp["access_token"].(string),
  190. Path: basePath,
  191. Expires: time.Now().Add(tokenDuration),
  192. MaxAge: int(tokenDuration / time.Second),
  193. HttpOnly: true,
  194. Secure: isTLS(r),
  195. SameSite: http.SameSiteStrictMode,
  196. })
  197. return nil
  198. }
  199. func (c *jwtTokenClaims) removeCookie(w http.ResponseWriter, r *http.Request, cookiePath string) {
  200. http.SetCookie(w, &http.Cookie{
  201. Name: jwtCookieKey,
  202. Value: "",
  203. Path: cookiePath,
  204. Expires: time.Unix(0, 0),
  205. MaxAge: -1,
  206. HttpOnly: true,
  207. Secure: isTLS(r),
  208. SameSite: http.SameSiteStrictMode,
  209. })
  210. invalidateToken(r)
  211. }
  212. func tokenFromContext(r *http.Request) string {
  213. if token, ok := r.Context().Value(oidcGeneratedToken).(string); ok {
  214. return token
  215. }
  216. return ""
  217. }
  218. func isTLS(r *http.Request) bool {
  219. if r.TLS != nil {
  220. return true
  221. }
  222. if proto, ok := r.Context().Value(forwardedProtoKey).(string); ok {
  223. return proto == "https"
  224. }
  225. return false
  226. }
  227. func isTokenInvalidated(r *http.Request) bool {
  228. var findTokenFns []func(r *http.Request) string
  229. findTokenFns = append(findTokenFns, jwtauth.TokenFromHeader)
  230. findTokenFns = append(findTokenFns, jwtauth.TokenFromCookie)
  231. findTokenFns = append(findTokenFns, tokenFromContext)
  232. isTokenFound := false
  233. for _, fn := range findTokenFns {
  234. token := fn(r)
  235. if token != "" {
  236. isTokenFound = true
  237. if _, ok := invalidatedJWTTokens.Load(token); ok {
  238. return true
  239. }
  240. }
  241. }
  242. return !isTokenFound
  243. }
  244. func invalidateToken(r *http.Request) {
  245. tokenString := jwtauth.TokenFromHeader(r)
  246. if tokenString != "" {
  247. invalidatedJWTTokens.Store(tokenString, time.Now().Add(tokenDuration).UTC())
  248. }
  249. tokenString = jwtauth.TokenFromCookie(r)
  250. if tokenString != "" {
  251. invalidatedJWTTokens.Store(tokenString, time.Now().Add(tokenDuration).UTC())
  252. }
  253. }
  254. func getUserFromToken(r *http.Request) *dataprovider.User {
  255. user := &dataprovider.User{}
  256. _, claims, err := jwtauth.FromContext(r.Context())
  257. if err != nil {
  258. return user
  259. }
  260. tokenClaims := jwtTokenClaims{}
  261. tokenClaims.Decode(claims)
  262. user.Username = tokenClaims.Username
  263. user.Filters.WebClient = tokenClaims.Permissions
  264. return user
  265. }
  266. func getAdminFromToken(r *http.Request) *dataprovider.Admin {
  267. admin := &dataprovider.Admin{}
  268. _, claims, err := jwtauth.FromContext(r.Context())
  269. if err != nil {
  270. return admin
  271. }
  272. tokenClaims := jwtTokenClaims{}
  273. tokenClaims.Decode(claims)
  274. admin.Username = tokenClaims.Username
  275. admin.Permissions = tokenClaims.Permissions
  276. return admin
  277. }
  278. func createCSRFToken(ip string) string {
  279. claims := make(map[string]any)
  280. now := time.Now().UTC()
  281. claims[jwt.JwtIDKey] = xid.New().String()
  282. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  283. claims[jwt.ExpirationKey] = now.Add(csrfTokenDuration)
  284. claims[jwt.AudienceKey] = []string{tokenAudienceCSRF, ip}
  285. _, tokenString, err := csrfTokenAuth.Encode(claims)
  286. if err != nil {
  287. logger.Debug(logSender, "", "unable to create CSRF token: %v", err)
  288. return ""
  289. }
  290. return tokenString
  291. }
  292. func verifyCSRFToken(tokenString, ip string) error {
  293. token, err := jwtauth.VerifyToken(csrfTokenAuth, tokenString)
  294. if err != nil || token == nil {
  295. logger.Debug(logSender, "", "error validating CSRF token %#v: %v", tokenString, err)
  296. return fmt.Errorf("unable to verify form token: %v", err)
  297. }
  298. if !util.Contains(token.Audience(), tokenAudienceCSRF) {
  299. logger.Debug(logSender, "", "error validating CSRF token audience")
  300. return errors.New("the form token is not valid")
  301. }
  302. if tokenValidationMode != tokenValidationNoIPMatch {
  303. if !util.Contains(token.Audience(), ip) {
  304. logger.Debug(logSender, "", "error validating CSRF token IP audience")
  305. return errors.New("the form token is not valid")
  306. }
  307. }
  308. return nil
  309. }