middleware.go 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. package httpd
  2. import (
  3. "context"
  4. "net/http"
  5. "github.com/go-chi/jwtauth"
  6. "github.com/lestrrat-go/jwx/jwt"
  7. "github.com/drakkan/sftpgo/logger"
  8. "github.com/drakkan/sftpgo/utils"
  9. )
  10. type ctxKeyConnAddr int
  11. const connAddrKey ctxKeyConnAddr = 0
  12. func saveConnectionAddress(next http.Handler) http.Handler {
  13. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  14. ctx := context.WithValue(r.Context(), connAddrKey, r.RemoteAddr)
  15. next.ServeHTTP(w, r.WithContext(ctx))
  16. })
  17. }
  18. func jwtAuthenticator(next http.Handler) http.Handler {
  19. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  20. token, _, err := jwtauth.FromContext(r.Context())
  21. if err != nil {
  22. logger.Debug(logSender, "", "error getting jwt token: %v", err)
  23. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  24. return
  25. }
  26. err = jwt.Validate(token)
  27. if token == nil || err != nil {
  28. logger.Debug(logSender, "", "error validating jwt token: %v", err)
  29. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  30. return
  31. }
  32. if !utils.IsStringInSlice(tokenAudienceAPI, token.Audience()) {
  33. logger.Debug(logSender, "", "the token audience is not valid for API usage")
  34. sendAPIResponse(w, r, nil, "Your token audience is not valid", http.StatusUnauthorized)
  35. return
  36. }
  37. if isTokenInvalidated(r) {
  38. logger.Debug(logSender, "", "the token has been invalidated")
  39. sendAPIResponse(w, r, nil, "Your token is no longer valid", http.StatusUnauthorized)
  40. return
  41. }
  42. // Token is authenticated, pass it through
  43. next.ServeHTTP(w, r)
  44. })
  45. }
  46. func jwtAuthenticatorWeb(next http.Handler) http.Handler {
  47. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  48. token, _, err := jwtauth.FromContext(r.Context())
  49. if err != nil {
  50. logger.Debug(logSender, "", "error getting web jwt token: %v", err)
  51. http.Redirect(w, r, webLoginPath, http.StatusFound)
  52. return
  53. }
  54. err = jwt.Validate(token)
  55. if token == nil || err != nil {
  56. logger.Debug(logSender, "", "error validating web jwt token: %v", err)
  57. http.Redirect(w, r, webLoginPath, http.StatusFound)
  58. return
  59. }
  60. if !utils.IsStringInSlice(tokenAudienceWeb, token.Audience()) {
  61. logger.Debug(logSender, "", "the token audience is not valid for Web usage")
  62. http.Redirect(w, r, webLoginPath, http.StatusFound)
  63. return
  64. }
  65. if isTokenInvalidated(r) {
  66. logger.Debug(logSender, "", "the token has been invalidated")
  67. http.Redirect(w, r, webLoginPath, http.StatusFound)
  68. return
  69. }
  70. // Token is authenticated, pass it through
  71. next.ServeHTTP(w, r)
  72. })
  73. }
  74. func checkPerm(perm string) func(next http.Handler) http.Handler {
  75. return func(next http.Handler) http.Handler {
  76. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  77. _, claims, err := jwtauth.FromContext(r.Context())
  78. if err != nil {
  79. if isWebAdminRequest(r) {
  80. renderBadRequestPage(w, r, err)
  81. } else {
  82. sendAPIResponse(w, r, err, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
  83. }
  84. return
  85. }
  86. tokenClaims := jwtTokenClaims{}
  87. tokenClaims.Decode(claims)
  88. if !tokenClaims.hasPerm(perm) {
  89. if isWebAdminRequest(r) {
  90. renderForbiddenPage(w, r, "You don't have permission for this action")
  91. } else {
  92. sendAPIResponse(w, r, nil, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  93. }
  94. return
  95. }
  96. next.ServeHTTP(w, r)
  97. })
  98. }
  99. }