api_mfa.go 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241
  1. package httpd
  2. import (
  3. "fmt"
  4. "net/http"
  5. "strings"
  6. "github.com/go-chi/render"
  7. "github.com/drakkan/sftpgo/v2/dataprovider"
  8. "github.com/drakkan/sftpgo/v2/mfa"
  9. "github.com/drakkan/sftpgo/v2/sdk"
  10. "github.com/drakkan/sftpgo/v2/sdk/kms"
  11. "github.com/drakkan/sftpgo/v2/util"
  12. )
  13. type generateTOTPRequest struct {
  14. ConfigName string `json:"config_name"`
  15. }
  16. type generateTOTPResponse struct {
  17. ConfigName string `json:"config_name"`
  18. Issuer string `json:"issuer"`
  19. Secret string `json:"secret"`
  20. QRCode []byte `json:"qr_code"`
  21. }
  22. type validateTOTPRequest struct {
  23. ConfigName string `json:"config_name"`
  24. Passcode string `json:"passcode"`
  25. Secret string `json:"secret"`
  26. }
  27. type recoveryCode struct {
  28. Code string `json:"code"`
  29. Used bool `json:"used"`
  30. }
  31. func getTOTPConfigs(w http.ResponseWriter, r *http.Request) {
  32. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  33. render.JSON(w, r, mfa.GetAvailableTOTPConfigs())
  34. }
  35. func generateTOTPSecret(w http.ResponseWriter, r *http.Request) {
  36. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  37. claims, err := getTokenClaims(r)
  38. if err != nil || claims.Username == "" {
  39. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  40. return
  41. }
  42. var accountName string
  43. if claims.hasUserAudience() {
  44. accountName = fmt.Sprintf("User %#v", claims.Username)
  45. } else {
  46. accountName = fmt.Sprintf("Admin %#v", claims.Username)
  47. }
  48. var req generateTOTPRequest
  49. err = render.DecodeJSON(r.Body, &req)
  50. if err != nil {
  51. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  52. return
  53. }
  54. configName, issuer, secret, qrCode, err := mfa.GenerateTOTPSecret(req.ConfigName, accountName)
  55. if err != nil {
  56. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  57. return
  58. }
  59. render.JSON(w, r, generateTOTPResponse{
  60. ConfigName: configName,
  61. Issuer: issuer,
  62. Secret: secret,
  63. QRCode: qrCode,
  64. })
  65. }
  66. func saveTOTPConfig(w http.ResponseWriter, r *http.Request) {
  67. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  68. claims, err := getTokenClaims(r)
  69. if err != nil || claims.Username == "" {
  70. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  71. return
  72. }
  73. recoveryCodes := make([]sdk.RecoveryCode, 0, 12)
  74. for i := 0; i < 12; i++ {
  75. code := getNewRecoveryCode()
  76. recoveryCodes = append(recoveryCodes, sdk.RecoveryCode{Secret: kms.NewPlainSecret(code)})
  77. }
  78. if claims.hasUserAudience() {
  79. if err := saveUserTOTPConfig(claims.Username, r, recoveryCodes); err != nil {
  80. sendAPIResponse(w, r, err, "", getRespStatus(err))
  81. return
  82. }
  83. } else {
  84. if err := saveAdminTOTPConfig(claims.Username, r, recoveryCodes); err != nil {
  85. sendAPIResponse(w, r, err, "", getRespStatus(err))
  86. return
  87. }
  88. }
  89. sendAPIResponse(w, r, nil, "TOTP configuration saved", http.StatusOK)
  90. }
  91. func validateTOTPPasscode(w http.ResponseWriter, r *http.Request) {
  92. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  93. var req validateTOTPRequest
  94. err := render.DecodeJSON(r.Body, &req)
  95. if err != nil {
  96. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  97. return
  98. }
  99. match, err := mfa.ValidateTOTPPasscode(req.ConfigName, req.Passcode, req.Secret)
  100. if !match || err != nil {
  101. sendAPIResponse(w, r, err, "Invalid passcode", http.StatusBadRequest)
  102. return
  103. }
  104. sendAPIResponse(w, r, nil, "Passcode successfully validated", http.StatusOK)
  105. }
  106. func getRecoveryCodes(w http.ResponseWriter, r *http.Request) {
  107. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  108. claims, err := getTokenClaims(r)
  109. if err != nil || claims.Username == "" {
  110. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  111. return
  112. }
  113. recoveryCodes := make([]recoveryCode, 0, 12)
  114. var accountRecoveryCodes []sdk.RecoveryCode
  115. if claims.hasUserAudience() {
  116. user, err := dataprovider.UserExists(claims.Username)
  117. if err != nil {
  118. sendAPIResponse(w, r, err, "", getRespStatus(err))
  119. return
  120. }
  121. accountRecoveryCodes = user.Filters.RecoveryCodes
  122. } else {
  123. admin, err := dataprovider.AdminExists(claims.Username)
  124. if err != nil {
  125. sendAPIResponse(w, r, err, "", getRespStatus(err))
  126. return
  127. }
  128. accountRecoveryCodes = admin.Filters.RecoveryCodes
  129. }
  130. for _, code := range accountRecoveryCodes {
  131. if err := code.Secret.Decrypt(); err != nil {
  132. sendAPIResponse(w, r, err, "Unable to decrypt recovery codes", getRespStatus(err))
  133. return
  134. }
  135. recoveryCodes = append(recoveryCodes, recoveryCode{
  136. Code: code.Secret.GetPayload(),
  137. Used: code.Used,
  138. })
  139. }
  140. render.JSON(w, r, recoveryCodes)
  141. }
  142. func generateRecoveryCodes(w http.ResponseWriter, r *http.Request) {
  143. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  144. claims, err := getTokenClaims(r)
  145. if err != nil || claims.Username == "" {
  146. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  147. return
  148. }
  149. recoveryCodes := make([]string, 0, 12)
  150. accountRecoveryCodes := make([]sdk.RecoveryCode, 0, 12)
  151. for i := 0; i < 12; i++ {
  152. code := getNewRecoveryCode()
  153. recoveryCodes = append(recoveryCodes, code)
  154. accountRecoveryCodes = append(accountRecoveryCodes, sdk.RecoveryCode{Secret: kms.NewPlainSecret(code)})
  155. }
  156. if claims.hasUserAudience() {
  157. user, err := dataprovider.UserExists(claims.Username)
  158. if err != nil {
  159. sendAPIResponse(w, r, err, "", getRespStatus(err))
  160. return
  161. }
  162. user.Filters.RecoveryCodes = accountRecoveryCodes
  163. if err := dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  164. sendAPIResponse(w, r, err, "", getRespStatus(err))
  165. return
  166. }
  167. } else {
  168. admin, err := dataprovider.AdminExists(claims.Username)
  169. if err != nil {
  170. sendAPIResponse(w, r, err, "", getRespStatus(err))
  171. return
  172. }
  173. admin.Filters.RecoveryCodes = accountRecoveryCodes
  174. if err := dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  175. sendAPIResponse(w, r, err, "", getRespStatus(err))
  176. return
  177. }
  178. }
  179. render.JSON(w, r, recoveryCodes)
  180. }
  181. func getNewRecoveryCode() string {
  182. return fmt.Sprintf("RC-%v", strings.ToUpper(util.GenerateUniqueID()))
  183. }
  184. func saveUserTOTPConfig(username string, r *http.Request, recoveryCodes []sdk.RecoveryCode) error {
  185. user, err := dataprovider.UserExists(username)
  186. if err != nil {
  187. return err
  188. }
  189. currentTOTPSecret := user.Filters.TOTPConfig.Secret
  190. user.Filters.TOTPConfig.Secret = nil
  191. err = render.DecodeJSON(r.Body, &user.Filters.TOTPConfig)
  192. if err != nil {
  193. return util.NewValidationError(fmt.Sprintf("unable to decode JSON body: %v", err))
  194. }
  195. if user.Filters.TOTPConfig.Secret == nil || !user.Filters.TOTPConfig.Secret.IsPlain() {
  196. user.Filters.TOTPConfig.Secret = currentTOTPSecret
  197. }
  198. if user.CountUnusedRecoveryCodes() < 5 && user.Filters.TOTPConfig.Enabled {
  199. user.Filters.RecoveryCodes = recoveryCodes
  200. }
  201. return dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr))
  202. }
  203. func saveAdminTOTPConfig(username string, r *http.Request, recoveryCodes []sdk.RecoveryCode) error {
  204. admin, err := dataprovider.AdminExists(username)
  205. if err != nil {
  206. return err
  207. }
  208. currentTOTPSecret := admin.Filters.TOTPConfig.Secret
  209. admin.Filters.TOTPConfig.Secret = nil
  210. err = render.DecodeJSON(r.Body, &admin.Filters.TOTPConfig)
  211. if err != nil {
  212. return util.NewValidationError(fmt.Sprintf("unable to decode JSON body: %v", err))
  213. }
  214. if admin.CountUnusedRecoveryCodes() < 5 && admin.Filters.TOTPConfig.Enabled {
  215. admin.Filters.RecoveryCodes = recoveryCodes
  216. }
  217. if admin.Filters.TOTPConfig.Secret == nil || !admin.Filters.TOTPConfig.Secret.IsPlain() {
  218. admin.Filters.TOTPConfig.Secret = currentTOTPSecret
  219. }
  220. return dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr))
  221. }