auth_utils.go 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224
  1. package httpd
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/http"
  6. "time"
  7. "github.com/go-chi/jwtauth"
  8. "github.com/lestrrat-go/jwx/jwt"
  9. "github.com/rs/xid"
  10. "github.com/drakkan/sftpgo/dataprovider"
  11. "github.com/drakkan/sftpgo/logger"
  12. "github.com/drakkan/sftpgo/utils"
  13. )
  14. type tokenAudience = string
  15. const (
  16. tokenAudienceWeb tokenAudience = "Web"
  17. tokenAudienceAPI tokenAudience = "API"
  18. tokenAudienceCSRF tokenAudience = "CSRF"
  19. )
  20. const (
  21. claimUsernameKey = "username"
  22. claimPermissionsKey = "permissions"
  23. basicRealm = "Basic realm=\"SFTPGo\""
  24. )
  25. var (
  26. tokenDuration = 10 * time.Minute
  27. tokenRefreshMin = 5 * time.Minute
  28. )
  29. type jwtTokenClaims struct {
  30. Username string
  31. Permissions []string
  32. Signature string
  33. }
  34. func (c *jwtTokenClaims) asMap() map[string]interface{} {
  35. claims := make(map[string]interface{})
  36. claims[claimUsernameKey] = c.Username
  37. claims[claimPermissionsKey] = c.Permissions
  38. claims[jwt.SubjectKey] = c.Signature
  39. return claims
  40. }
  41. func (c *jwtTokenClaims) Decode(token map[string]interface{}) {
  42. username := token[claimUsernameKey]
  43. switch v := username.(type) {
  44. case string:
  45. c.Username = v
  46. }
  47. signature := token[jwt.SubjectKey]
  48. switch v := signature.(type) {
  49. case string:
  50. c.Signature = v
  51. }
  52. permissions := token[claimPermissionsKey]
  53. switch v := permissions.(type) {
  54. case []interface{}:
  55. for _, elem := range v {
  56. switch elemValue := elem.(type) {
  57. case string:
  58. c.Permissions = append(c.Permissions, elemValue)
  59. }
  60. }
  61. }
  62. }
  63. func (c *jwtTokenClaims) isCriticalPermRemoved(permissions []string) bool {
  64. if utils.IsStringInSlice(dataprovider.PermAdminAny, permissions) {
  65. return false
  66. }
  67. if (utils.IsStringInSlice(dataprovider.PermAdminManageAdmins, c.Permissions) ||
  68. utils.IsStringInSlice(dataprovider.PermAdminAny, c.Permissions)) &&
  69. !utils.IsStringInSlice(dataprovider.PermAdminManageAdmins, permissions) &&
  70. !utils.IsStringInSlice(dataprovider.PermAdminAny, permissions) {
  71. return true
  72. }
  73. return false
  74. }
  75. func (c *jwtTokenClaims) hasPerm(perm string) bool {
  76. if utils.IsStringInSlice(dataprovider.PermAdminAny, c.Permissions) {
  77. return true
  78. }
  79. return utils.IsStringInSlice(perm, c.Permissions)
  80. }
  81. func (c *jwtTokenClaims) createTokenResponse(tokenAuth *jwtauth.JWTAuth, audience tokenAudience) (map[string]interface{}, error) {
  82. claims := c.asMap()
  83. now := time.Now().UTC()
  84. claims[jwt.JwtIDKey] = xid.New().String()
  85. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  86. claims[jwt.ExpirationKey] = now.Add(tokenDuration)
  87. claims[jwt.AudienceKey] = audience
  88. token, tokenString, err := tokenAuth.Encode(claims)
  89. if err != nil {
  90. return nil, err
  91. }
  92. response := make(map[string]interface{})
  93. response["access_token"] = tokenString
  94. response["expires_at"] = token.Expiration().Format(time.RFC3339)
  95. return response, nil
  96. }
  97. func (c *jwtTokenClaims) createAndSetCookie(w http.ResponseWriter, r *http.Request, tokenAuth *jwtauth.JWTAuth) error {
  98. resp, err := c.createTokenResponse(tokenAuth, tokenAudienceWeb)
  99. if err != nil {
  100. return err
  101. }
  102. http.SetCookie(w, &http.Cookie{
  103. Name: "jwt",
  104. Value: resp["access_token"].(string),
  105. Path: webBasePath,
  106. Expires: time.Now().Add(tokenDuration),
  107. HttpOnly: true,
  108. Secure: r.TLS != nil,
  109. })
  110. return nil
  111. }
  112. func (c *jwtTokenClaims) removeCookie(w http.ResponseWriter, r *http.Request) {
  113. http.SetCookie(w, &http.Cookie{
  114. Name: "jwt",
  115. Value: "",
  116. Path: webBasePath,
  117. MaxAge: -1,
  118. HttpOnly: true,
  119. Secure: r.TLS != nil,
  120. })
  121. invalidateToken(r)
  122. }
  123. func isTokenInvalidated(r *http.Request) bool {
  124. isTokenFound := false
  125. token := jwtauth.TokenFromHeader(r)
  126. if token != "" {
  127. isTokenFound = true
  128. if _, ok := invalidatedJWTTokens.Load(token); ok {
  129. return true
  130. }
  131. }
  132. token = jwtauth.TokenFromCookie(r)
  133. if token != "" {
  134. isTokenFound = true
  135. if _, ok := invalidatedJWTTokens.Load(token); ok {
  136. return true
  137. }
  138. }
  139. return !isTokenFound
  140. }
  141. func invalidateToken(r *http.Request) {
  142. tokenString := jwtauth.TokenFromHeader(r)
  143. if tokenString != "" {
  144. invalidatedJWTTokens.Store(tokenString, time.Now().UTC().Add(tokenDuration))
  145. }
  146. tokenString = jwtauth.TokenFromCookie(r)
  147. if tokenString != "" {
  148. invalidatedJWTTokens.Store(tokenString, time.Now().UTC().Add(tokenDuration))
  149. }
  150. }
  151. func getAdminFromToken(r *http.Request) *dataprovider.Admin {
  152. admin := &dataprovider.Admin{}
  153. _, claims, err := jwtauth.FromContext(r.Context())
  154. if err != nil {
  155. return admin
  156. }
  157. tokenClaims := jwtTokenClaims{}
  158. tokenClaims.Decode(claims)
  159. admin.Username = tokenClaims.Username
  160. admin.Permissions = tokenClaims.Permissions
  161. return admin
  162. }
  163. func createCSRFToken() string {
  164. claims := make(map[string]interface{})
  165. now := time.Now().UTC()
  166. claims[jwt.JwtIDKey] = xid.New().String()
  167. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  168. claims[jwt.ExpirationKey] = now.Add(tokenDuration)
  169. claims[jwt.AudienceKey] = tokenAudienceCSRF
  170. _, tokenString, err := csrfTokenAuth.Encode(claims)
  171. if err != nil {
  172. logger.Debug(logSender, "", "unable to create CSRF token: %v", err)
  173. return ""
  174. }
  175. return tokenString
  176. }
  177. func verifyCSRFToken(tokenString string) error {
  178. token, err := jwtauth.VerifyToken(csrfTokenAuth, tokenString)
  179. if err != nil || token == nil {
  180. logger.Debug(logSender, "", "error validating CSRF: %v", err)
  181. return fmt.Errorf("Unable to verify form token: %v", err)
  182. }
  183. if !utils.IsStringInSlice(tokenAudienceCSRF, token.Audience()) {
  184. logger.Debug(logSender, "", "error validating CSRF token audience")
  185. return errors.New("The form token is not valid")
  186. }
  187. return nil
  188. }