server.go 80 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "context"
  17. "crypto/tls"
  18. "crypto/x509"
  19. "errors"
  20. "fmt"
  21. "log"
  22. "net"
  23. "net/http"
  24. "net/url"
  25. "path/filepath"
  26. "strings"
  27. "time"
  28. "github.com/go-chi/chi/v5"
  29. "github.com/go-chi/chi/v5/middleware"
  30. "github.com/go-chi/jwtauth/v5"
  31. "github.com/go-chi/render"
  32. "github.com/lestrrat-go/jwx/v2/jwa"
  33. "github.com/rs/cors"
  34. "github.com/rs/xid"
  35. "github.com/sftpgo/sdk"
  36. "github.com/unrolled/secure"
  37. "github.com/drakkan/sftpgo/v2/internal/acme"
  38. "github.com/drakkan/sftpgo/v2/internal/common"
  39. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  40. "github.com/drakkan/sftpgo/v2/internal/logger"
  41. "github.com/drakkan/sftpgo/v2/internal/mfa"
  42. "github.com/drakkan/sftpgo/v2/internal/smtp"
  43. "github.com/drakkan/sftpgo/v2/internal/util"
  44. "github.com/drakkan/sftpgo/v2/internal/version"
  45. )
  46. var (
  47. compressor = middleware.NewCompressor(5)
  48. xForwardedProto = http.CanonicalHeaderKey("X-Forwarded-Proto")
  49. )
  50. type httpdServer struct {
  51. binding Binding
  52. staticFilesPath string
  53. openAPIPath string
  54. enableWebAdmin bool
  55. enableWebClient bool
  56. enableRESTAPI bool
  57. renderOpenAPI bool
  58. isShared int
  59. router *chi.Mux
  60. tokenAuth *jwtauth.JWTAuth
  61. signingPassphrase string
  62. cors CorsConfig
  63. }
  64. func newHttpdServer(b Binding, staticFilesPath, signingPassphrase string, cors CorsConfig,
  65. openAPIPath string,
  66. ) *httpdServer {
  67. if openAPIPath == "" {
  68. b.RenderOpenAPI = false
  69. }
  70. return &httpdServer{
  71. binding: b,
  72. staticFilesPath: staticFilesPath,
  73. openAPIPath: openAPIPath,
  74. enableWebAdmin: b.EnableWebAdmin,
  75. enableWebClient: b.EnableWebClient,
  76. enableRESTAPI: b.EnableRESTAPI,
  77. renderOpenAPI: b.RenderOpenAPI,
  78. signingPassphrase: signingPassphrase,
  79. cors: cors,
  80. }
  81. }
  82. func (s *httpdServer) setShared(value int) {
  83. s.isShared = value
  84. }
  85. func (s *httpdServer) listenAndServe() error {
  86. s.initializeRouter()
  87. httpServer := &http.Server{
  88. Handler: s.router,
  89. ReadHeaderTimeout: 30 * time.Second,
  90. ReadTimeout: 60 * time.Second,
  91. WriteTimeout: 60 * time.Second,
  92. IdleTimeout: 60 * time.Second,
  93. MaxHeaderBytes: 1 << 18, // 256KB
  94. ErrorLog: log.New(&logger.StdLoggerWrapper{Sender: logSender}, "", 0),
  95. }
  96. if certMgr != nil && s.binding.EnableHTTPS {
  97. certID := common.DefaultTLSKeyPaidID
  98. if getConfigPath(s.binding.CertificateFile, "") != "" && getConfigPath(s.binding.CertificateKeyFile, "") != "" {
  99. certID = s.binding.GetAddress()
  100. }
  101. config := &tls.Config{
  102. GetCertificate: certMgr.GetCertificateFunc(certID),
  103. MinVersion: util.GetTLSVersion(s.binding.MinTLSVersion),
  104. NextProtos: []string{"http/1.1", "h2"},
  105. CipherSuites: util.GetTLSCiphersFromNames(s.binding.TLSCipherSuites),
  106. PreferServerCipherSuites: true,
  107. }
  108. httpServer.TLSConfig = config
  109. logger.Debug(logSender, "", "configured TLS cipher suites for binding %q: %v, certID: %v",
  110. s.binding.GetAddress(), httpServer.TLSConfig.CipherSuites, certID)
  111. if s.binding.ClientAuthType == 1 {
  112. httpServer.TLSConfig.ClientCAs = certMgr.GetRootCAs()
  113. httpServer.TLSConfig.ClientAuth = tls.RequireAndVerifyClientCert
  114. httpServer.TLSConfig.VerifyConnection = s.verifyTLSConnection
  115. }
  116. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, true, logSender)
  117. }
  118. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, false, logSender)
  119. }
  120. func (s *httpdServer) verifyTLSConnection(state tls.ConnectionState) error {
  121. if certMgr != nil {
  122. var clientCrt *x509.Certificate
  123. var clientCrtName string
  124. if len(state.PeerCertificates) > 0 {
  125. clientCrt = state.PeerCertificates[0]
  126. clientCrtName = clientCrt.Subject.String()
  127. }
  128. if len(state.VerifiedChains) == 0 {
  129. logger.Warn(logSender, "", "TLS connection cannot be verified: unable to get verification chain")
  130. return errors.New("TLS connection cannot be verified: unable to get verification chain")
  131. }
  132. for _, verifiedChain := range state.VerifiedChains {
  133. var caCrt *x509.Certificate
  134. if len(verifiedChain) > 0 {
  135. caCrt = verifiedChain[len(verifiedChain)-1]
  136. }
  137. if certMgr.IsRevoked(clientCrt, caCrt) {
  138. logger.Debug(logSender, "", "tls handshake error, client certificate %q has been revoked", clientCrtName)
  139. return common.ErrCrtRevoked
  140. }
  141. }
  142. }
  143. return nil
  144. }
  145. func (s *httpdServer) refreshCookie(next http.Handler) http.Handler {
  146. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  147. s.checkCookieExpiration(w, r)
  148. next.ServeHTTP(w, r)
  149. })
  150. }
  151. func (s *httpdServer) renderClientLoginPage(w http.ResponseWriter, r *http.Request, error, ip string) {
  152. data := loginPage{
  153. CurrentURL: webClientLoginPath,
  154. Version: version.Get().Version,
  155. Error: error,
  156. CSRFToken: createCSRFToken(ip),
  157. StaticURL: webStaticFilesPath,
  158. Branding: s.binding.Branding.WebClient,
  159. FormDisabled: s.binding.isWebClientLoginFormDisabled(),
  160. }
  161. if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
  162. data.CurrentURL += "?next=" + url.QueryEscape(next)
  163. }
  164. if s.binding.showAdminLoginURL() {
  165. data.AltLoginURL = webAdminLoginPath
  166. data.AltLoginName = s.binding.Branding.WebAdmin.ShortName
  167. }
  168. if smtp.IsEnabled() && !data.FormDisabled {
  169. data.ForgotPwdURL = webClientForgotPwdPath
  170. }
  171. if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
  172. data.OpenIDLoginURL = webClientOIDCLoginPath
  173. }
  174. renderClientTemplate(w, templateClientLogin, data)
  175. }
  176. func (s *httpdServer) handleWebClientLogout(w http.ResponseWriter, r *http.Request) {
  177. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  178. c := jwtTokenClaims{}
  179. c.removeCookie(w, r, webBaseClientPath)
  180. s.logoutOIDCUser(w, r)
  181. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  182. }
  183. func (s *httpdServer) handleWebClientChangePwdPost(w http.ResponseWriter, r *http.Request) {
  184. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  185. if err := r.ParseForm(); err != nil {
  186. s.renderClientChangePasswordPage(w, r, err.Error())
  187. return
  188. }
  189. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  190. s.renderClientForbiddenPage(w, r, err.Error())
  191. return
  192. }
  193. err := doChangeUserPassword(r, strings.TrimSpace(r.Form.Get("current_password")),
  194. strings.TrimSpace(r.Form.Get("new_password1")), strings.TrimSpace(r.Form.Get("new_password2")))
  195. if err != nil {
  196. s.renderClientChangePasswordPage(w, r, err.Error())
  197. return
  198. }
  199. s.handleWebClientLogout(w, r)
  200. }
  201. func (s *httpdServer) handleClientWebLogin(w http.ResponseWriter, r *http.Request) {
  202. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  203. if !dataprovider.HasAdmin() {
  204. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  205. return
  206. }
  207. s.renderClientLoginPage(w, r, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
  208. }
  209. func (s *httpdServer) handleWebClientLoginPost(w http.ResponseWriter, r *http.Request) {
  210. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  211. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  212. if err := r.ParseForm(); err != nil {
  213. s.renderClientLoginPage(w, r, err.Error(), ipAddr)
  214. return
  215. }
  216. protocol := common.ProtocolHTTP
  217. username := strings.TrimSpace(r.Form.Get("username"))
  218. password := strings.TrimSpace(r.Form.Get("password"))
  219. if username == "" || password == "" {
  220. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  221. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  222. s.renderClientLoginPage(w, r, "Invalid credentials", ipAddr)
  223. return
  224. }
  225. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  226. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  227. dataprovider.LoginMethodPassword, ipAddr, err)
  228. s.renderClientLoginPage(w, r, err.Error(), ipAddr)
  229. return
  230. }
  231. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  232. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  233. dataprovider.LoginMethodPassword, ipAddr, err)
  234. s.renderClientLoginPage(w, r, fmt.Sprintf("access denied: %v", err), ipAddr)
  235. return
  236. }
  237. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  238. if err != nil {
  239. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  240. s.renderClientLoginPage(w, r, dataprovider.ErrInvalidCredentials.Error(), ipAddr)
  241. return
  242. }
  243. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  244. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  245. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  246. s.renderClientLoginPage(w, r, err.Error(), ipAddr)
  247. return
  248. }
  249. defer user.CloseFs() //nolint:errcheck
  250. err = user.CheckFsRoot(connectionID)
  251. if err != nil {
  252. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  253. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  254. s.renderClientLoginPage(w, r, err.Error(), ipAddr)
  255. return
  256. }
  257. s.loginUser(w, r, &user, connectionID, ipAddr, false, s.renderClientLoginPage)
  258. }
  259. func (s *httpdServer) handleWebClientPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  260. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  261. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  262. err := r.ParseForm()
  263. if err != nil {
  264. s.renderClientResetPwdPage(w, r, err.Error(), ipAddr)
  265. return
  266. }
  267. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  268. s.renderClientForbiddenPage(w, r, err.Error())
  269. return
  270. }
  271. _, user, err := handleResetPassword(r, strings.TrimSpace(r.Form.Get("code")),
  272. strings.TrimSpace(r.Form.Get("password")), false)
  273. if err != nil {
  274. s.renderClientResetPwdPage(w, r, err.Error(), ipAddr)
  275. return
  276. }
  277. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  278. if err := checkHTTPClientUser(user, r, connectionID, true); err != nil {
  279. s.renderClientResetPwdPage(w, r, fmt.Sprintf("Password reset successfully but unable to login: %v", err.Error()), ipAddr)
  280. return
  281. }
  282. defer user.CloseFs() //nolint:errcheck
  283. err = user.CheckFsRoot(connectionID)
  284. if err != nil {
  285. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  286. s.renderClientResetPwdPage(w, r, fmt.Sprintf("Password reset successfully but unable to login: %s", err.Error()), ipAddr)
  287. return
  288. }
  289. s.loginUser(w, r, user, connectionID, ipAddr, false, s.renderClientResetPwdPage)
  290. }
  291. func (s *httpdServer) handleWebClientTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  292. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  293. claims, err := getTokenClaims(r)
  294. if err != nil {
  295. s.renderNotFoundPage(w, r, nil)
  296. return
  297. }
  298. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  299. if err := r.ParseForm(); err != nil {
  300. s.renderClientTwoFactorRecoveryPage(w, r, err.Error(), ipAddr)
  301. return
  302. }
  303. username := claims.Username
  304. recoveryCode := strings.TrimSpace(r.Form.Get("recovery_code"))
  305. if username == "" || recoveryCode == "" {
  306. s.renderClientTwoFactorRecoveryPage(w, r, "Invalid credentials", ipAddr)
  307. return
  308. }
  309. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  310. s.renderClientTwoFactorRecoveryPage(w, r, err.Error(), ipAddr)
  311. return
  312. }
  313. user, userMerged, err := dataprovider.GetUserVariants(username, "")
  314. if err != nil {
  315. if errors.Is(err, util.ErrNotFound) {
  316. handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
  317. }
  318. s.renderClientTwoFactorRecoveryPage(w, r, "Invalid credentials", ipAddr)
  319. return
  320. }
  321. if !userMerged.Filters.TOTPConfig.Enabled || !util.Contains(userMerged.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  322. s.renderClientTwoFactorPage(w, r, "Two factory authentication is not enabled", ipAddr)
  323. return
  324. }
  325. for idx, code := range user.Filters.RecoveryCodes {
  326. if err := code.Secret.Decrypt(); err != nil {
  327. s.renderClientInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  328. return
  329. }
  330. if code.Secret.GetPayload() == recoveryCode {
  331. if code.Used {
  332. s.renderClientTwoFactorRecoveryPage(w, r, "This recovery code was already used", ipAddr)
  333. return
  334. }
  335. user.Filters.RecoveryCodes[idx].Used = true
  336. err = dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, ipAddr, user.Role)
  337. if err != nil {
  338. logger.Warn(logSender, "", "unable to set the recovery code %q as used: %v", recoveryCode, err)
  339. s.renderClientInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  340. return
  341. }
  342. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  343. s.loginUser(w, r, &userMerged, connectionID, ipAddr, true,
  344. s.renderClientTwoFactorRecoveryPage)
  345. return
  346. }
  347. }
  348. handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
  349. s.renderClientTwoFactorRecoveryPage(w, r, "Invalid recovery code", ipAddr)
  350. }
  351. func (s *httpdServer) handleWebClientTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  352. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  353. claims, err := getTokenClaims(r)
  354. if err != nil {
  355. s.renderNotFoundPage(w, r, nil)
  356. return
  357. }
  358. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  359. if err := r.ParseForm(); err != nil {
  360. s.renderClientTwoFactorPage(w, r, err.Error(), ipAddr)
  361. return
  362. }
  363. username := claims.Username
  364. passcode := strings.TrimSpace(r.Form.Get("passcode"))
  365. if username == "" || passcode == "" {
  366. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  367. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  368. s.renderClientTwoFactorPage(w, r, "Invalid credentials", ipAddr)
  369. return
  370. }
  371. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  372. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  373. dataprovider.LoginMethodPassword, ipAddr, err)
  374. s.renderClientTwoFactorPage(w, r, err.Error(), ipAddr)
  375. return
  376. }
  377. user, err := dataprovider.GetUserWithGroupSettings(username, "")
  378. if err != nil {
  379. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  380. dataprovider.LoginMethodPassword, ipAddr, err)
  381. s.renderClientTwoFactorPage(w, r, "Invalid credentials", ipAddr)
  382. return
  383. }
  384. if !user.Filters.TOTPConfig.Enabled || !util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  385. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  386. s.renderClientTwoFactorPage(w, r, "Two factory authentication is not enabled", ipAddr)
  387. return
  388. }
  389. err = user.Filters.TOTPConfig.Secret.Decrypt()
  390. if err != nil {
  391. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  392. s.renderClientInternalServerErrorPage(w, r, err)
  393. return
  394. }
  395. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  396. user.Filters.TOTPConfig.Secret.GetPayload())
  397. if !match || err != nil {
  398. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  399. s.renderClientTwoFactorPage(w, r, "Invalid authentication code", ipAddr)
  400. return
  401. }
  402. connectionID := fmt.Sprintf("%s_%s", getProtocolFromRequest(r), xid.New().String())
  403. s.loginUser(w, r, &user, connectionID, ipAddr, true, s.renderClientTwoFactorPage)
  404. }
  405. func (s *httpdServer) handleWebAdminTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  406. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  407. claims, err := getTokenClaims(r)
  408. if err != nil {
  409. s.renderNotFoundPage(w, r, nil)
  410. return
  411. }
  412. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  413. if err := r.ParseForm(); err != nil {
  414. s.renderTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  415. return
  416. }
  417. username := claims.Username
  418. recoveryCode := strings.TrimSpace(r.Form.Get("recovery_code"))
  419. if username == "" || recoveryCode == "" {
  420. s.renderTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  421. return
  422. }
  423. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  424. s.renderTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  425. return
  426. }
  427. admin, err := dataprovider.AdminExists(username)
  428. if err != nil {
  429. if errors.Is(err, util.ErrNotFound) {
  430. handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
  431. }
  432. s.renderTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  433. return
  434. }
  435. if !admin.Filters.TOTPConfig.Enabled {
  436. s.renderTwoFactorRecoveryPage(w, "Two factory authentication is not enabled", ipAddr)
  437. return
  438. }
  439. for idx, code := range admin.Filters.RecoveryCodes {
  440. if err := code.Secret.Decrypt(); err != nil {
  441. s.renderInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  442. return
  443. }
  444. if code.Secret.GetPayload() == recoveryCode {
  445. if code.Used {
  446. s.renderTwoFactorRecoveryPage(w, "This recovery code was already used", ipAddr)
  447. return
  448. }
  449. admin.Filters.RecoveryCodes[idx].Used = true
  450. err = dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, ipAddr, admin.Role)
  451. if err != nil {
  452. logger.Warn(logSender, "", "unable to set the recovery code %q as used: %v", recoveryCode, err)
  453. s.renderInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  454. return
  455. }
  456. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorRecoveryPage, ipAddr)
  457. return
  458. }
  459. }
  460. handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
  461. s.renderTwoFactorRecoveryPage(w, "Invalid recovery code", ipAddr)
  462. }
  463. func (s *httpdServer) handleWebAdminTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  464. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  465. claims, err := getTokenClaims(r)
  466. if err != nil {
  467. s.renderNotFoundPage(w, r, nil)
  468. return
  469. }
  470. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  471. if err := r.ParseForm(); err != nil {
  472. s.renderTwoFactorPage(w, err.Error(), ipAddr)
  473. return
  474. }
  475. username := claims.Username
  476. passcode := strings.TrimSpace(r.Form.Get("passcode"))
  477. if username == "" || passcode == "" {
  478. s.renderTwoFactorPage(w, "Invalid credentials", ipAddr)
  479. return
  480. }
  481. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  482. err = handleDefenderEventLoginFailed(ipAddr, err)
  483. s.renderTwoFactorPage(w, err.Error(), ipAddr)
  484. return
  485. }
  486. admin, err := dataprovider.AdminExists(username)
  487. if err != nil {
  488. if errors.Is(err, util.ErrNotFound) {
  489. handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
  490. }
  491. s.renderTwoFactorPage(w, "Invalid credentials", ipAddr)
  492. return
  493. }
  494. if !admin.Filters.TOTPConfig.Enabled {
  495. s.renderTwoFactorPage(w, "Two factory authentication is not enabled", ipAddr)
  496. return
  497. }
  498. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  499. if err != nil {
  500. s.renderInternalServerErrorPage(w, r, err)
  501. return
  502. }
  503. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  504. admin.Filters.TOTPConfig.Secret.GetPayload())
  505. if !match || err != nil {
  506. handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
  507. s.renderTwoFactorPage(w, "Invalid authentication code", ipAddr)
  508. return
  509. }
  510. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorPage, ipAddr)
  511. }
  512. func (s *httpdServer) handleWebAdminLoginPost(w http.ResponseWriter, r *http.Request) {
  513. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  514. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  515. if err := r.ParseForm(); err != nil {
  516. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  517. return
  518. }
  519. username := strings.TrimSpace(r.Form.Get("username"))
  520. password := strings.TrimSpace(r.Form.Get("password"))
  521. if username == "" || password == "" {
  522. s.renderAdminLoginPage(w, "Invalid credentials", ipAddr)
  523. return
  524. }
  525. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  526. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  527. return
  528. }
  529. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  530. if err != nil {
  531. err = handleDefenderEventLoginFailed(ipAddr, err)
  532. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  533. return
  534. }
  535. s.loginAdmin(w, r, &admin, false, s.renderAdminLoginPage, ipAddr)
  536. }
  537. func (s *httpdServer) renderAdminLoginPage(w http.ResponseWriter, error, ip string) {
  538. data := loginPage{
  539. CurrentURL: webAdminLoginPath,
  540. Version: version.Get().Version,
  541. Error: error,
  542. CSRFToken: createCSRFToken(ip),
  543. StaticURL: webStaticFilesPath,
  544. Branding: s.binding.Branding.WebAdmin,
  545. FormDisabled: s.binding.isWebAdminLoginFormDisabled(),
  546. }
  547. if s.binding.showClientLoginURL() {
  548. data.AltLoginURL = webClientLoginPath
  549. data.AltLoginName = s.binding.Branding.WebClient.ShortName
  550. }
  551. if smtp.IsEnabled() && !data.FormDisabled {
  552. data.ForgotPwdURL = webAdminForgotPwdPath
  553. }
  554. if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
  555. data.OpenIDLoginURL = webAdminOIDCLoginPath
  556. }
  557. renderAdminTemplate(w, templateLogin, data)
  558. }
  559. func (s *httpdServer) handleWebAdminLogin(w http.ResponseWriter, r *http.Request) {
  560. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  561. if !dataprovider.HasAdmin() {
  562. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  563. return
  564. }
  565. s.renderAdminLoginPage(w, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
  566. }
  567. func (s *httpdServer) handleWebAdminLogout(w http.ResponseWriter, r *http.Request) {
  568. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  569. c := jwtTokenClaims{}
  570. c.removeCookie(w, r, webBaseAdminPath)
  571. s.logoutOIDCUser(w, r)
  572. http.Redirect(w, r, webAdminLoginPath, http.StatusFound)
  573. }
  574. func (s *httpdServer) handleWebAdminChangePwdPost(w http.ResponseWriter, r *http.Request) {
  575. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  576. err := r.ParseForm()
  577. if err != nil {
  578. s.renderChangePasswordPage(w, r, err.Error())
  579. return
  580. }
  581. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  582. s.renderForbiddenPage(w, r, err.Error())
  583. return
  584. }
  585. err = doChangeAdminPassword(r, strings.TrimSpace(r.Form.Get("current_password")),
  586. strings.TrimSpace(r.Form.Get("new_password1")), strings.TrimSpace(r.Form.Get("new_password2")))
  587. if err != nil {
  588. s.renderChangePasswordPage(w, r, err.Error())
  589. return
  590. }
  591. s.handleWebAdminLogout(w, r)
  592. }
  593. func (s *httpdServer) handleWebAdminPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  594. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  595. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  596. err := r.ParseForm()
  597. if err != nil {
  598. s.renderResetPwdPage(w, err.Error(), ipAddr)
  599. return
  600. }
  601. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  602. s.renderForbiddenPage(w, r, err.Error())
  603. return
  604. }
  605. admin, _, err := handleResetPassword(r, strings.TrimSpace(r.Form.Get("code")),
  606. strings.TrimSpace(r.Form.Get("password")), true)
  607. if err != nil {
  608. if e, ok := err.(*util.ValidationError); ok {
  609. s.renderResetPwdPage(w, e.GetErrorString(), ipAddr)
  610. return
  611. }
  612. s.renderResetPwdPage(w, err.Error(), ipAddr)
  613. return
  614. }
  615. s.loginAdmin(w, r, admin, false, s.renderResetPwdPage, ipAddr)
  616. }
  617. func (s *httpdServer) handleWebAdminSetupPost(w http.ResponseWriter, r *http.Request) {
  618. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  619. if dataprovider.HasAdmin() {
  620. s.renderBadRequestPage(w, r, errors.New("an admin user already exists"))
  621. return
  622. }
  623. err := r.ParseForm()
  624. if err != nil {
  625. s.renderAdminSetupPage(w, r, "", err.Error())
  626. return
  627. }
  628. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  629. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  630. s.renderForbiddenPage(w, r, err.Error())
  631. return
  632. }
  633. username := strings.TrimSpace(r.Form.Get("username"))
  634. password := strings.TrimSpace(r.Form.Get("password"))
  635. confirmPassword := strings.TrimSpace(r.Form.Get("confirm_password"))
  636. installCode := strings.TrimSpace(r.Form.Get("install_code"))
  637. if installationCode != "" && installCode != resolveInstallationCode() {
  638. s.renderAdminSetupPage(w, r, username, fmt.Sprintf("%v mismatch", installationCodeHint))
  639. return
  640. }
  641. if username == "" {
  642. s.renderAdminSetupPage(w, r, username, "Please set a username")
  643. return
  644. }
  645. if password == "" {
  646. s.renderAdminSetupPage(w, r, username, "Please set a password")
  647. return
  648. }
  649. if password != confirmPassword {
  650. s.renderAdminSetupPage(w, r, username, "Passwords mismatch")
  651. return
  652. }
  653. admin := dataprovider.Admin{
  654. Username: username,
  655. Password: password,
  656. Status: 1,
  657. Permissions: []string{dataprovider.PermAdminAny},
  658. }
  659. err = dataprovider.AddAdmin(&admin, username, ipAddr, "")
  660. if err != nil {
  661. s.renderAdminSetupPage(w, r, username, err.Error())
  662. return
  663. }
  664. s.loginAdmin(w, r, &admin, false, nil, ipAddr)
  665. }
  666. func (s *httpdServer) loginUser(
  667. w http.ResponseWriter, r *http.Request, user *dataprovider.User, connectionID, ipAddr string,
  668. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, r *http.Request, error, ip string),
  669. ) {
  670. c := jwtTokenClaims{
  671. Username: user.Username,
  672. Permissions: user.Filters.WebClient,
  673. Signature: user.GetSignature(),
  674. Role: user.Role,
  675. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  676. MustChangePassword: user.MustChangePassword(),
  677. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  678. }
  679. audience := tokenAudienceWebClient
  680. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) &&
  681. user.CanManageMFA() && !isSecondFactorAuth {
  682. audience = tokenAudienceWebClientPartial
  683. }
  684. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  685. if err != nil {
  686. logger.Warn(logSender, connectionID, "unable to set user login cookie %v", err)
  687. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  688. errorFunc(w, r, err.Error(), ipAddr)
  689. return
  690. }
  691. if isSecondFactorAuth {
  692. invalidateToken(r)
  693. }
  694. if audience == tokenAudienceWebClientPartial {
  695. redirectPath := webClientTwoFactorPath
  696. if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
  697. redirectPath += "?next=" + url.QueryEscape(next)
  698. }
  699. http.Redirect(w, r, redirectPath, http.StatusFound)
  700. return
  701. }
  702. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, err)
  703. dataprovider.UpdateLastLogin(user)
  704. if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
  705. http.Redirect(w, r, next, http.StatusFound)
  706. return
  707. }
  708. http.Redirect(w, r, webClientFilesPath, http.StatusFound)
  709. }
  710. func (s *httpdServer) loginAdmin(
  711. w http.ResponseWriter, r *http.Request, admin *dataprovider.Admin,
  712. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, error, ip string),
  713. ipAddr string,
  714. ) {
  715. c := jwtTokenClaims{
  716. Username: admin.Username,
  717. Permissions: admin.Permissions,
  718. Role: admin.Role,
  719. Signature: admin.GetSignature(),
  720. HideUserPageSections: admin.Filters.Preferences.HideUserPageSections,
  721. }
  722. audience := tokenAudienceWebAdmin
  723. if admin.Filters.TOTPConfig.Enabled && admin.CanManageMFA() && !isSecondFactorAuth {
  724. audience = tokenAudienceWebAdminPartial
  725. }
  726. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  727. if err != nil {
  728. logger.Warn(logSender, "", "unable to set admin login cookie %v", err)
  729. if errorFunc == nil {
  730. s.renderAdminSetupPage(w, r, admin.Username, err.Error())
  731. return
  732. }
  733. errorFunc(w, err.Error(), ipAddr)
  734. return
  735. }
  736. if isSecondFactorAuth {
  737. invalidateToken(r)
  738. }
  739. if audience == tokenAudienceWebAdminPartial {
  740. http.Redirect(w, r, webAdminTwoFactorPath, http.StatusFound)
  741. return
  742. }
  743. dataprovider.UpdateAdminLastLogin(admin)
  744. http.Redirect(w, r, webUsersPath, http.StatusFound)
  745. }
  746. func (s *httpdServer) logout(w http.ResponseWriter, r *http.Request) {
  747. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  748. invalidateToken(r)
  749. sendAPIResponse(w, r, nil, "Your token has been invalidated", http.StatusOK)
  750. }
  751. func (s *httpdServer) getUserToken(w http.ResponseWriter, r *http.Request) {
  752. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  753. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  754. username, password, ok := r.BasicAuth()
  755. protocol := common.ProtocolHTTP
  756. if !ok {
  757. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  758. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  759. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  760. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  761. return
  762. }
  763. if username == "" || password == "" {
  764. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  765. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  766. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  767. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  768. return
  769. }
  770. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  771. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  772. dataprovider.LoginMethodPassword, ipAddr, err)
  773. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  774. return
  775. }
  776. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  777. if err != nil {
  778. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  779. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  780. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  781. http.StatusUnauthorized)
  782. return
  783. }
  784. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  785. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  786. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  787. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  788. return
  789. }
  790. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  791. passcode := r.Header.Get(otpHeaderCode)
  792. if passcode == "" {
  793. logger.Debug(logSender, "", "TOTP enabled for user %q and not passcode provided, authentication refused", user.Username)
  794. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  795. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  796. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  797. http.StatusUnauthorized)
  798. return
  799. }
  800. err = user.Filters.TOTPConfig.Secret.Decrypt()
  801. if err != nil {
  802. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  803. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err), http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  804. return
  805. }
  806. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  807. user.Filters.TOTPConfig.Secret.GetPayload())
  808. if !match || err != nil {
  809. logger.Debug(logSender, "invalid passcode for user %q, match? %v, err: %v", user.Username, match, err)
  810. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  811. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  812. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  813. http.StatusUnauthorized)
  814. return
  815. }
  816. }
  817. defer user.CloseFs() //nolint:errcheck
  818. err = user.CheckFsRoot(connectionID)
  819. if err != nil {
  820. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  821. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  822. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  823. return
  824. }
  825. s.generateAndSendUserToken(w, r, ipAddr, user)
  826. }
  827. func (s *httpdServer) generateAndSendUserToken(w http.ResponseWriter, r *http.Request, ipAddr string, user dataprovider.User) {
  828. c := jwtTokenClaims{
  829. Username: user.Username,
  830. Permissions: user.Filters.WebClient,
  831. Signature: user.GetSignature(),
  832. Role: user.Role,
  833. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  834. MustChangePassword: user.MustChangePassword(),
  835. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  836. }
  837. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPIUser, ipAddr)
  838. if err != nil {
  839. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  840. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  841. return
  842. }
  843. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  844. dataprovider.UpdateLastLogin(&user)
  845. render.JSON(w, r, resp)
  846. }
  847. func (s *httpdServer) getToken(w http.ResponseWriter, r *http.Request) {
  848. username, password, ok := r.BasicAuth()
  849. if !ok {
  850. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  851. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  852. return
  853. }
  854. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  855. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  856. if err != nil {
  857. err = handleDefenderEventLoginFailed(ipAddr, err)
  858. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  859. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  860. return
  861. }
  862. if admin.Filters.TOTPConfig.Enabled {
  863. passcode := r.Header.Get(otpHeaderCode)
  864. if passcode == "" {
  865. logger.Debug(logSender, "", "TOTP enabled for admin %q and not passcode provided, authentication refused", admin.Username)
  866. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  867. err = handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials)
  868. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  869. return
  870. }
  871. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  872. if err != nil {
  873. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err),
  874. http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  875. return
  876. }
  877. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  878. admin.Filters.TOTPConfig.Secret.GetPayload())
  879. if !match || err != nil {
  880. logger.Debug(logSender, "invalid passcode for admin %q, match? %v, err: %v", admin.Username, match, err)
  881. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  882. err = handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials)
  883. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized),
  884. http.StatusUnauthorized)
  885. return
  886. }
  887. }
  888. s.generateAndSendToken(w, r, admin, ipAddr)
  889. }
  890. func (s *httpdServer) generateAndSendToken(w http.ResponseWriter, r *http.Request, admin dataprovider.Admin, ip string) {
  891. c := jwtTokenClaims{
  892. Username: admin.Username,
  893. Permissions: admin.Permissions,
  894. Role: admin.Role,
  895. Signature: admin.GetSignature(),
  896. }
  897. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPI, ip)
  898. if err != nil {
  899. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  900. return
  901. }
  902. dataprovider.UpdateAdminLastLogin(&admin)
  903. render.JSON(w, r, resp)
  904. }
  905. func (s *httpdServer) checkCookieExpiration(w http.ResponseWriter, r *http.Request) {
  906. if _, ok := r.Context().Value(oidcTokenKey).(string); ok {
  907. return
  908. }
  909. token, claims, err := jwtauth.FromContext(r.Context())
  910. if err != nil {
  911. return
  912. }
  913. tokenClaims := jwtTokenClaims{}
  914. tokenClaims.Decode(claims)
  915. if tokenClaims.Username == "" || tokenClaims.Signature == "" {
  916. return
  917. }
  918. if time.Until(token.Expiration()) > tokenRefreshThreshold {
  919. return
  920. }
  921. if util.Contains(token.Audience(), tokenAudienceWebClient) {
  922. s.refreshClientToken(w, r, tokenClaims)
  923. } else {
  924. s.refreshAdminToken(w, r, tokenClaims)
  925. }
  926. }
  927. func (s *httpdServer) refreshClientToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  928. user, err := dataprovider.GetUserWithGroupSettings(tokenClaims.Username, "")
  929. if err != nil {
  930. return
  931. }
  932. if user.GetSignature() != tokenClaims.Signature {
  933. logger.Debug(logSender, "", "signature mismatch for user %q, unable to refresh cookie", user.Username)
  934. return
  935. }
  936. if err := checkHTTPClientUser(&user, r, xid.New().String(), true); err != nil {
  937. logger.Debug(logSender, "", "unable to refresh cookie for user %q: %v", user.Username, err)
  938. return
  939. }
  940. tokenClaims.Permissions = user.Filters.WebClient
  941. tokenClaims.Role = user.Role
  942. logger.Debug(logSender, "", "cookie refreshed for user %q", user.Username)
  943. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebClient, util.GetIPFromRemoteAddress(r.RemoteAddr)) //nolint:errcheck
  944. }
  945. func (s *httpdServer) refreshAdminToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  946. admin, err := dataprovider.AdminExists(tokenClaims.Username)
  947. if err != nil {
  948. return
  949. }
  950. if admin.Status != 1 {
  951. logger.Debug(logSender, "", "admin %q is disabled, unable to refresh cookie", admin.Username)
  952. return
  953. }
  954. if admin.GetSignature() != tokenClaims.Signature {
  955. logger.Debug(logSender, "", "signature mismatch for admin %q, unable to refresh cookie", admin.Username)
  956. return
  957. }
  958. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  959. if !admin.CanLoginFromIP(ipAddr) {
  960. logger.Debug(logSender, "", "admin %q cannot login from %v, unable to refresh cookie", admin.Username, r.RemoteAddr)
  961. return
  962. }
  963. tokenClaims.Permissions = admin.Permissions
  964. tokenClaims.Role = admin.Role
  965. tokenClaims.HideUserPageSections = admin.Filters.Preferences.HideUserPageSections
  966. logger.Debug(logSender, "", "cookie refreshed for admin %q", admin.Username)
  967. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebAdmin, ipAddr) //nolint:errcheck
  968. }
  969. func (s *httpdServer) updateContextFromCookie(r *http.Request) *http.Request {
  970. token, _, err := jwtauth.FromContext(r.Context())
  971. if token == nil || err != nil {
  972. _, err = r.Cookie(jwtCookieKey)
  973. if err != nil {
  974. return r
  975. }
  976. token, err = jwtauth.VerifyRequest(s.tokenAuth, r, jwtauth.TokenFromCookie)
  977. ctx := jwtauth.NewContext(r.Context(), token, err)
  978. return r.WithContext(ctx)
  979. }
  980. return r
  981. }
  982. func (s *httpdServer) checkConnection(next http.Handler) http.Handler {
  983. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  984. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  985. var ip net.IP
  986. isUnixSocket := filepath.IsAbs(s.binding.Address)
  987. if !isUnixSocket {
  988. ip = net.ParseIP(ipAddr)
  989. }
  990. areHeadersAllowed := false
  991. if isUnixSocket || ip != nil {
  992. for _, allow := range s.binding.allowHeadersFrom {
  993. if allow(ip) {
  994. parsedIP := util.GetRealIP(r, s.binding.ClientIPProxyHeader, s.binding.ClientIPHeaderDepth)
  995. if parsedIP != "" {
  996. ipAddr = parsedIP
  997. r.RemoteAddr = ipAddr
  998. }
  999. if forwardedProto := r.Header.Get(xForwardedProto); forwardedProto != "" {
  1000. ctx := context.WithValue(r.Context(), forwardedProtoKey, forwardedProto)
  1001. r = r.WithContext(ctx)
  1002. }
  1003. areHeadersAllowed = true
  1004. break
  1005. }
  1006. }
  1007. }
  1008. if !areHeadersAllowed {
  1009. for idx := range s.binding.Security.proxyHeaders {
  1010. r.Header.Del(s.binding.Security.proxyHeaders[idx])
  1011. }
  1012. }
  1013. common.Connections.AddClientConnection(ipAddr)
  1014. defer common.Connections.RemoveClientConnection(ipAddr)
  1015. if err := common.Connections.IsNewConnectionAllowed(ipAddr, common.ProtocolHTTP); err != nil {
  1016. logger.Log(logger.LevelDebug, common.ProtocolHTTP, "", "connection not allowed from ip %q: %v", ipAddr, err)
  1017. s.sendForbiddenResponse(w, r, err.Error())
  1018. return
  1019. }
  1020. if common.IsBanned(ipAddr, common.ProtocolHTTP) {
  1021. s.sendForbiddenResponse(w, r, "your IP address is banned")
  1022. return
  1023. }
  1024. if delay, err := common.LimitRate(common.ProtocolHTTP, ipAddr); err != nil {
  1025. delay += 499999999 * time.Nanosecond
  1026. w.Header().Set("Retry-After", fmt.Sprintf("%.0f", delay.Seconds()))
  1027. w.Header().Set("X-Retry-In", delay.String())
  1028. s.sendTooManyRequestResponse(w, r, err)
  1029. return
  1030. }
  1031. next.ServeHTTP(w, r)
  1032. })
  1033. }
  1034. func (s *httpdServer) sendTooManyRequestResponse(w http.ResponseWriter, r *http.Request, err error) {
  1035. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1036. r = s.updateContextFromCookie(r)
  1037. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1038. s.renderClientMessagePage(w, r, http.StatusText(http.StatusTooManyRequests), "Rate limit exceeded",
  1039. http.StatusTooManyRequests, err, "")
  1040. return
  1041. }
  1042. s.renderMessagePage(w, r, http.StatusText(http.StatusTooManyRequests), "Rate limit exceeded", http.StatusTooManyRequests,
  1043. err, "")
  1044. return
  1045. }
  1046. sendAPIResponse(w, r, err, http.StatusText(http.StatusTooManyRequests), http.StatusTooManyRequests)
  1047. }
  1048. func (s *httpdServer) sendForbiddenResponse(w http.ResponseWriter, r *http.Request, message string) {
  1049. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1050. r = s.updateContextFromCookie(r)
  1051. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1052. s.renderClientForbiddenPage(w, r, message)
  1053. return
  1054. }
  1055. s.renderForbiddenPage(w, r, message)
  1056. return
  1057. }
  1058. sendAPIResponse(w, r, errors.New(message), message, http.StatusForbidden)
  1059. }
  1060. func (s *httpdServer) badHostHandler(w http.ResponseWriter, r *http.Request) {
  1061. host := r.Host
  1062. for _, header := range s.binding.Security.HostsProxyHeaders {
  1063. if h := r.Header.Get(header); h != "" {
  1064. host = h
  1065. break
  1066. }
  1067. }
  1068. s.sendForbiddenResponse(w, r, fmt.Sprintf("The host %q is not allowed", host))
  1069. }
  1070. func (s *httpdServer) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  1071. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1072. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1073. r = s.updateContextFromCookie(r)
  1074. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1075. s.renderClientNotFoundPage(w, r, nil)
  1076. return
  1077. }
  1078. s.renderNotFoundPage(w, r, nil)
  1079. return
  1080. }
  1081. sendAPIResponse(w, r, nil, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  1082. }
  1083. func (s *httpdServer) redirectToWebPath(w http.ResponseWriter, r *http.Request, webPath string) {
  1084. if dataprovider.HasAdmin() {
  1085. http.Redirect(w, r, webPath, http.StatusFound)
  1086. return
  1087. }
  1088. if s.enableWebAdmin {
  1089. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  1090. }
  1091. }
  1092. func (s *httpdServer) isStaticFileURL(r *http.Request) bool {
  1093. var urlPath string
  1094. rctx := chi.RouteContext(r.Context())
  1095. if rctx != nil && rctx.RoutePath != "" {
  1096. urlPath = rctx.RoutePath
  1097. } else {
  1098. urlPath = r.URL.Path
  1099. }
  1100. return !strings.HasPrefix(urlPath, webOpenAPIPath) && !strings.HasPrefix(urlPath, webStaticFilesPath)
  1101. }
  1102. func (s *httpdServer) initializeRouter() {
  1103. var hasHTTPSRedirect bool
  1104. s.tokenAuth = jwtauth.New(jwa.HS256.String(), getSigningKey(s.signingPassphrase), nil)
  1105. s.router = chi.NewRouter()
  1106. s.router.Use(middleware.RequestID)
  1107. s.router.Use(s.checkConnection)
  1108. s.router.Use(logger.NewStructuredLogger(logger.GetLogger()))
  1109. s.router.Use(middleware.Recoverer)
  1110. if s.binding.Security.Enabled {
  1111. secureMiddleware := secure.New(secure.Options{
  1112. AllowedHosts: s.binding.Security.AllowedHosts,
  1113. AllowedHostsAreRegex: s.binding.Security.AllowedHostsAreRegex,
  1114. HostsProxyHeaders: s.binding.Security.HostsProxyHeaders,
  1115. SSLProxyHeaders: s.binding.Security.getHTTPSProxyHeaders(),
  1116. STSSeconds: s.binding.Security.STSSeconds,
  1117. STSIncludeSubdomains: s.binding.Security.STSIncludeSubdomains,
  1118. STSPreload: s.binding.Security.STSPreload,
  1119. ContentTypeNosniff: s.binding.Security.ContentTypeNosniff,
  1120. ContentSecurityPolicy: s.binding.Security.ContentSecurityPolicy,
  1121. PermissionsPolicy: s.binding.Security.PermissionsPolicy,
  1122. CrossOriginOpenerPolicy: s.binding.Security.CrossOriginOpenerPolicy,
  1123. ExpectCTHeader: s.binding.Security.ExpectCTHeader,
  1124. })
  1125. secureMiddleware.SetBadHostHandler(http.HandlerFunc(s.badHostHandler))
  1126. s.router.Use(secureMiddleware.Handler)
  1127. if s.binding.Security.HTTPSRedirect {
  1128. s.router.Use(s.binding.Security.redirectHandler)
  1129. hasHTTPSRedirect = true
  1130. }
  1131. }
  1132. if s.cors.Enabled {
  1133. c := cors.New(cors.Options{
  1134. AllowedOrigins: util.RemoveDuplicates(s.cors.AllowedOrigins, true),
  1135. AllowedMethods: util.RemoveDuplicates(s.cors.AllowedMethods, true),
  1136. AllowedHeaders: util.RemoveDuplicates(s.cors.AllowedHeaders, true),
  1137. ExposedHeaders: util.RemoveDuplicates(s.cors.ExposedHeaders, true),
  1138. MaxAge: s.cors.MaxAge,
  1139. AllowCredentials: s.cors.AllowCredentials,
  1140. OptionsPassthrough: s.cors.OptionsPassthrough,
  1141. OptionsSuccessStatus: s.cors.OptionsSuccessStatus,
  1142. AllowPrivateNetwork: s.cors.AllowPrivateNetwork,
  1143. })
  1144. s.router.Use(c.Handler)
  1145. }
  1146. s.router.Use(middleware.GetHead)
  1147. // StripSlashes causes infinite redirects at the root path if used with http.FileServer
  1148. s.router.Use(middleware.Maybe(middleware.StripSlashes, s.isStaticFileURL))
  1149. s.router.NotFound(s.notFoundHandler)
  1150. s.router.Get(healthzPath, func(w http.ResponseWriter, r *http.Request) {
  1151. render.PlainText(w, r, "ok")
  1152. })
  1153. s.router.Get(robotsTxtPath, func(w http.ResponseWriter, r *http.Request) {
  1154. render.PlainText(w, r, "User-agent: *\nDisallow: /")
  1155. })
  1156. if hasHTTPSRedirect {
  1157. if p := acme.GetHTTP01WebRoot(); p != "" {
  1158. serveStaticDir(s.router, acmeChallengeURI, p)
  1159. }
  1160. }
  1161. if s.enableRESTAPI {
  1162. // share API available to external users
  1163. s.router.Get(sharesPath+"/{id}", s.downloadFromShare)
  1164. s.router.Post(sharesPath+"/{id}", s.uploadFilesToShare)
  1165. s.router.Post(sharesPath+"/{id}/{name}", s.uploadFileToShare)
  1166. s.router.With(compressor.Handler).Get(sharesPath+"/{id}/dirs", s.readBrowsableShareContents)
  1167. s.router.Get(sharesPath+"/{id}/files", s.downloadBrowsableSharedFile)
  1168. s.router.Get(tokenPath, s.getToken)
  1169. s.router.Post(adminPath+"/{username}/forgot-password", forgotAdminPassword)
  1170. s.router.Post(adminPath+"/{username}/reset-password", resetAdminPassword)
  1171. s.router.Post(userPath+"/{username}/forgot-password", forgotUserPassword)
  1172. s.router.Post(userPath+"/{username}/reset-password", resetUserPassword)
  1173. s.router.Group(func(router chi.Router) {
  1174. router.Use(checkNodeToken(s.tokenAuth))
  1175. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeAdmin))
  1176. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1177. router.Use(jwtAuthenticatorAPI)
  1178. router.Get(versionPath, func(w http.ResponseWriter, r *http.Request) {
  1179. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1180. render.JSON(w, r, version.Get())
  1181. })
  1182. router.With(forbidAPIKeyAuthentication).Get(logoutPath, s.logout)
  1183. router.With(forbidAPIKeyAuthentication).Get(adminProfilePath, getAdminProfile)
  1184. router.With(forbidAPIKeyAuthentication).Put(adminProfilePath, updateAdminProfile)
  1185. router.With(forbidAPIKeyAuthentication).Put(adminPwdPath, changeAdminPassword)
  1186. // admin TOTP APIs
  1187. router.With(forbidAPIKeyAuthentication).Get(adminTOTPConfigsPath, getTOTPConfigs)
  1188. router.With(forbidAPIKeyAuthentication).Post(adminTOTPGeneratePath, generateTOTPSecret)
  1189. router.With(forbidAPIKeyAuthentication).Post(adminTOTPValidatePath, validateTOTPPasscode)
  1190. router.With(forbidAPIKeyAuthentication).Post(adminTOTPSavePath, saveTOTPConfig)
  1191. router.With(forbidAPIKeyAuthentication).Get(admin2FARecoveryCodesPath, getRecoveryCodes)
  1192. router.With(forbidAPIKeyAuthentication).Post(admin2FARecoveryCodesPath, generateRecoveryCodes)
  1193. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus)).
  1194. Get(serverStatusPath, func(w http.ResponseWriter, r *http.Request) {
  1195. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1196. render.JSON(w, r, getServicesStatus())
  1197. })
  1198. router.With(s.checkPerm(dataprovider.PermAdminViewConnections)).Get(activeConnectionsPath, getActiveConnections)
  1199. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections)).
  1200. Delete(activeConnectionsPath+"/{connectionID}", handleCloseConnection)
  1201. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/users/scans", getUsersQuotaScans)
  1202. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/users/{username}/scan", startUserQuotaScan)
  1203. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/folders/scans", getFoldersQuotaScans)
  1204. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/folders/{name}/scan", startFolderQuotaScan)
  1205. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath, getUsers)
  1206. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(userPath, addUser)
  1207. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath+"/{username}", getUserByUsername)
  1208. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}", updateUser)
  1209. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers)).Delete(userPath+"/{username}", deleteUser)
  1210. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}/2fa/disable", disableUser2FA)
  1211. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(folderPath, getFolders)
  1212. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(folderPath+"/{name}", getFolderByName)
  1213. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(folderPath, addFolder)
  1214. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(folderPath+"/{name}", updateFolder)
  1215. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers)).Delete(folderPath+"/{name}", deleteFolder)
  1216. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath, getGroups)
  1217. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath+"/{name}", getGroupByName)
  1218. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(groupPath, addGroup)
  1219. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Put(groupPath+"/{name}", updateGroup)
  1220. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Delete(groupPath+"/{name}", deleteGroup)
  1221. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(dumpDataPath, dumpData)
  1222. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(loadDataPath, loadData)
  1223. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(loadDataPath, loadDataFromRequest)
  1224. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/usage",
  1225. updateUserQuotaUsage)
  1226. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/transfer-usage",
  1227. updateUserTransferQuotaUsage)
  1228. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/folders/{name}/usage",
  1229. updateFolderQuotaUsage)
  1230. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts, getDefenderHosts)
  1231. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts+"/{id}", getDefenderHostByID)
  1232. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(defenderHosts+"/{id}", deleteDefenderHostByID)
  1233. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath, getAdmins)
  1234. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(adminPath, addAdmin)
  1235. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath+"/{username}", getAdminByUsername)
  1236. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}", updateAdmin)
  1237. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Delete(adminPath+"/{username}", deleteAdmin)
  1238. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}/2fa/disable", disableAdmin2FA)
  1239. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Get(retentionChecksPath, getRetentionChecks)
  1240. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Post(retentionBasePath+"/{username}/check",
  1241. startRetentionCheck)
  1242. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Get(metadataChecksPath, getMetadataChecks)
  1243. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Post(metadataBasePath+"/{username}/check",
  1244. startMetadataCheck)
  1245. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1246. Get(fsEventsPath, searchFsEvents)
  1247. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1248. Get(providerEventsPath, searchProviderEvents)
  1249. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1250. Get(logEventsPath, searchLogEvents)
  1251. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1252. Get(apiKeysPath, getAPIKeys)
  1253. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1254. Post(apiKeysPath, addAPIKey)
  1255. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1256. Get(apiKeysPath+"/{id}", getAPIKeyByID)
  1257. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1258. Put(apiKeysPath+"/{id}", updateAPIKey)
  1259. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1260. Delete(apiKeysPath+"/{id}", deleteAPIKey)
  1261. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath, getEventActions)
  1262. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath+"/{name}", getEventActionByName)
  1263. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventActionsPath, addEventAction)
  1264. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventActionsPath+"/{name}", updateEventAction)
  1265. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventActionsPath+"/{name}", deleteEventAction)
  1266. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath, getEventRules)
  1267. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath+"/{name}", getEventRuleByName)
  1268. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventRulesPath, addEventRule)
  1269. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventRulesPath+"/{name}", updateEventRule)
  1270. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventRulesPath+"/{name}", deleteEventRule)
  1271. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventRulesPath+"/run/{name}", runOnDemandRule)
  1272. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Get(rolesPath, getRoles)
  1273. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(rolesPath, addRole)
  1274. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Get(rolesPath+"/{name}", getRoleByName)
  1275. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Put(rolesPath+"/{name}", updateRole)
  1276. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Delete(rolesPath+"/{name}", deleteRole)
  1277. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), compressor.Handler).Get(ipListsPath+"/{type}", getIPListEntries)
  1278. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(ipListsPath+"/{type}", addIPListEntry)
  1279. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Get(ipListsPath+"/{type}/{ipornet}", getIPListEntry)
  1280. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Put(ipListsPath+"/{type}/{ipornet}", updateIPListEntry)
  1281. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Delete(ipListsPath+"/{type}/{ipornet}", deleteIPListEntry)
  1282. })
  1283. s.router.Get(userTokenPath, s.getUserToken)
  1284. s.router.Group(func(router chi.Router) {
  1285. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeUser))
  1286. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1287. router.Use(jwtAuthenticatorAPIUser)
  1288. router.With(forbidAPIKeyAuthentication).Get(userLogoutPath, s.logout)
  1289. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1290. Put(userPwdPath, changeUserPassword)
  1291. router.With(forbidAPIKeyAuthentication).Get(userProfilePath, getUserProfile)
  1292. router.With(forbidAPIKeyAuthentication, s.checkAuthRequirements).Put(userProfilePath, updateUserProfile)
  1293. // user TOTP APIs
  1294. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1295. Get(userTOTPConfigsPath, getTOTPConfigs)
  1296. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1297. Post(userTOTPGeneratePath, generateTOTPSecret)
  1298. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1299. Post(userTOTPValidatePath, validateTOTPPasscode)
  1300. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1301. Post(userTOTPSavePath, saveTOTPConfig)
  1302. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1303. Get(user2FARecoveryCodesPath, getRecoveryCodes)
  1304. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1305. Post(user2FARecoveryCodesPath, generateRecoveryCodes)
  1306. router.With(s.checkAuthRequirements, compressor.Handler).Get(userDirsPath, readUserFolder)
  1307. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1308. Post(userDirsPath, createUserDir)
  1309. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1310. Patch(userDirsPath, renameUserFsEntry)
  1311. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1312. Delete(userDirsPath, deleteUserDir)
  1313. router.With(s.checkAuthRequirements).Get(userFilesPath, getUserFile)
  1314. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1315. Post(userFilesPath, uploadUserFiles)
  1316. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1317. Patch(userFilesPath, renameUserFsEntry)
  1318. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1319. Delete(userFilesPath, deleteUserFile)
  1320. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1321. Post(userFileActionsPath+"/move", renameUserFsEntry)
  1322. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1323. Post(userFileActionsPath+"/copy", copyUserFsEntry)
  1324. router.With(s.checkAuthRequirements).Post(userStreamZipPath, getUserFilesAsZipStream)
  1325. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1326. Get(userSharesPath, getShares)
  1327. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1328. Post(userSharesPath, addShare)
  1329. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1330. Get(userSharesPath+"/{id}", getShareByID)
  1331. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1332. Put(userSharesPath+"/{id}", updateShare)
  1333. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1334. Delete(userSharesPath+"/{id}", deleteShare)
  1335. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1336. Post(userUploadFilePath, uploadUserFile)
  1337. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1338. Patch(userFilesDirsMetadataPath, setFileDirMetadata)
  1339. })
  1340. if s.renderOpenAPI {
  1341. s.router.Group(func(router chi.Router) {
  1342. router.Use(compressor.Handler)
  1343. serveStaticDir(router, webOpenAPIPath, s.openAPIPath)
  1344. })
  1345. }
  1346. }
  1347. if s.enableWebAdmin || s.enableWebClient {
  1348. s.router.Group(func(router chi.Router) {
  1349. router.Use(compressor.Handler)
  1350. serveStaticDir(router, webStaticFilesPath, s.staticFilesPath)
  1351. })
  1352. if s.binding.OIDC.isEnabled() {
  1353. s.router.Get(webOIDCRedirectPath, s.handleOIDCRedirect)
  1354. }
  1355. if s.enableWebClient {
  1356. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1357. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1358. s.redirectToWebPath(w, r, webClientLoginPath)
  1359. })
  1360. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1361. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1362. s.redirectToWebPath(w, r, webClientLoginPath)
  1363. })
  1364. } else {
  1365. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1366. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1367. s.redirectToWebPath(w, r, webAdminLoginPath)
  1368. })
  1369. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1370. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1371. s.redirectToWebPath(w, r, webAdminLoginPath)
  1372. })
  1373. }
  1374. }
  1375. s.setupWebClientRoutes()
  1376. s.setupWebAdminRoutes()
  1377. }
  1378. func (s *httpdServer) setupWebClientRoutes() {
  1379. if s.enableWebClient {
  1380. s.router.Get(webBaseClientPath, func(w http.ResponseWriter, r *http.Request) {
  1381. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1382. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  1383. })
  1384. s.router.Get(webClientLoginPath, s.handleClientWebLogin)
  1385. if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
  1386. s.router.Get(webClientOIDCLoginPath, s.handleWebClientOIDCLogin)
  1387. }
  1388. if !s.binding.isWebClientLoginFormDisabled() {
  1389. s.router.Post(webClientLoginPath, s.handleWebClientLoginPost)
  1390. s.router.Get(webClientForgotPwdPath, s.handleWebClientForgotPwd)
  1391. s.router.Post(webClientForgotPwdPath, s.handleWebClientForgotPwdPost)
  1392. s.router.Get(webClientResetPwdPath, s.handleWebClientPasswordReset)
  1393. s.router.Post(webClientResetPwdPath, s.handleWebClientPasswordResetPost)
  1394. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1395. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1396. Get(webClientTwoFactorPath, s.handleWebClientTwoFactor)
  1397. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1398. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1399. Post(webClientTwoFactorPath, s.handleWebClientTwoFactorPost)
  1400. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1401. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1402. Get(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecovery)
  1403. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1404. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1405. Post(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecoveryPost)
  1406. }
  1407. // share routes available to external users
  1408. s.router.Get(webClientPubSharesPath+"/{id}/login", s.handleClientShareLoginGet)
  1409. s.router.Post(webClientPubSharesPath+"/{id}/login", s.handleClientShareLoginPost)
  1410. s.router.Get(webClientPubSharesPath+"/{id}", s.downloadFromShare)
  1411. s.router.Get(webClientPubSharesPath+"/{id}/partial", s.handleClientSharePartialDownload)
  1412. s.router.Get(webClientPubSharesPath+"/{id}/browse", s.handleShareGetFiles)
  1413. s.router.Get(webClientPubSharesPath+"/{id}/upload", s.handleClientUploadToShare)
  1414. s.router.With(compressor.Handler).Get(webClientPubSharesPath+"/{id}/dirs", s.handleShareGetDirContents)
  1415. s.router.Post(webClientPubSharesPath+"/{id}", s.uploadFilesToShare)
  1416. s.router.Post(webClientPubSharesPath+"/{id}/{name}", s.uploadFileToShare)
  1417. s.router.Group(func(router chi.Router) {
  1418. if s.binding.OIDC.isEnabled() {
  1419. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebClient))
  1420. }
  1421. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1422. router.Use(jwtAuthenticatorWebClient)
  1423. router.Get(webClientLogoutPath, s.handleWebClientLogout)
  1424. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientFilesPath, s.handleClientGetFiles)
  1425. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientViewPDFPath, s.handleClientViewPDF)
  1426. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientGetPDFPath, s.handleClientGetPDF)
  1427. router.With(s.checkAuthRequirements, s.refreshCookie, verifyCSRFHeader).Get(webClientFilePath, getUserFile)
  1428. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1429. Post(webClientFilePath, uploadUserFile)
  1430. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientEditFilePath, s.handleClientEditFile)
  1431. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1432. Delete(webClientFilesPath, deleteUserFile)
  1433. router.With(s.checkAuthRequirements, compressor.Handler, s.refreshCookie).
  1434. Get(webClientDirsPath, s.handleClientGetDirContents)
  1435. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1436. Post(webClientDirsPath, createUserDir)
  1437. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1438. Delete(webClientDirsPath, deleteUserDir)
  1439. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1440. Post(webClientFileActionsPath+"/move", renameUserFsEntry)
  1441. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1442. Post(webClientFileActionsPath+"/copy", copyUserFsEntry)
  1443. router.With(s.checkAuthRequirements, s.refreshCookie).
  1444. Get(webClientDownloadZipPath, s.handleWebClientDownloadZip)
  1445. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientProfilePath,
  1446. s.handleClientGetProfile)
  1447. router.With(s.checkAuthRequirements).Post(webClientProfilePath, s.handleWebClientProfilePost)
  1448. router.With(s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1449. Get(webChangeClientPwdPath, s.handleWebClientChangePwd)
  1450. router.With(s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1451. Post(webChangeClientPwdPath, s.handleWebClientChangePwdPost)
  1452. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), s.refreshCookie).
  1453. Get(webClientMFAPath, s.handleWebClientMFA)
  1454. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1455. Post(webClientTOTPGeneratePath, generateTOTPSecret)
  1456. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1457. Post(webClientTOTPValidatePath, validateTOTPPasscode)
  1458. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1459. Post(webClientTOTPSavePath, saveTOTPConfig)
  1460. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader, s.refreshCookie).
  1461. Get(webClientRecoveryCodesPath, getRecoveryCodes)
  1462. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1463. Post(webClientRecoveryCodesPath, generateRecoveryCodes)
  1464. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1465. Get(webClientSharesPath, s.handleClientGetShares)
  1466. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1467. Get(webClientSharePath, s.handleClientAddShareGet)
  1468. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1469. Post(webClientSharePath, s.handleClientAddSharePost)
  1470. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1471. Get(webClientSharePath+"/{id}", s.handleClientUpdateShareGet)
  1472. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1473. Post(webClientSharePath+"/{id}", s.handleClientUpdateSharePost)
  1474. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), verifyCSRFHeader).
  1475. Delete(webClientSharePath+"/{id}", deleteShare)
  1476. })
  1477. }
  1478. }
  1479. func (s *httpdServer) setupWebAdminRoutes() {
  1480. if s.enableWebAdmin {
  1481. s.router.Get(webBaseAdminPath, func(w http.ResponseWriter, r *http.Request) {
  1482. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1483. s.redirectToWebPath(w, r, webAdminLoginPath)
  1484. })
  1485. s.router.Get(webAdminLoginPath, s.handleWebAdminLogin)
  1486. if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
  1487. s.router.Get(webAdminOIDCLoginPath, s.handleWebAdminOIDCLogin)
  1488. }
  1489. s.router.Get(webOAuth2RedirectPath, s.handleOAuth2TokenRedirect)
  1490. s.router.Get(webAdminSetupPath, s.handleWebAdminSetupGet)
  1491. s.router.Post(webAdminSetupPath, s.handleWebAdminSetupPost)
  1492. if !s.binding.isWebAdminLoginFormDisabled() {
  1493. s.router.Post(webAdminLoginPath, s.handleWebAdminLoginPost)
  1494. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1495. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1496. Get(webAdminTwoFactorPath, s.handleWebAdminTwoFactor)
  1497. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1498. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1499. Post(webAdminTwoFactorPath, s.handleWebAdminTwoFactorPost)
  1500. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1501. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1502. Get(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecovery)
  1503. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1504. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1505. Post(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecoveryPost)
  1506. s.router.Get(webAdminForgotPwdPath, s.handleWebAdminForgotPwd)
  1507. s.router.Post(webAdminForgotPwdPath, s.handleWebAdminForgotPwdPost)
  1508. s.router.Get(webAdminResetPwdPath, s.handleWebAdminPasswordReset)
  1509. s.router.Post(webAdminResetPwdPath, s.handleWebAdminPasswordResetPost)
  1510. }
  1511. s.router.Group(func(router chi.Router) {
  1512. if s.binding.OIDC.isEnabled() {
  1513. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebAdmin))
  1514. }
  1515. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1516. router.Use(jwtAuthenticatorWebAdmin)
  1517. router.Get(webLogoutPath, s.handleWebAdminLogout)
  1518. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminProfilePath, s.handleWebAdminProfile)
  1519. router.With(s.requireBuiltinLogin).Post(webAdminProfilePath, s.handleWebAdminProfilePost)
  1520. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webChangeAdminPwdPath, s.handleWebAdminChangePwd)
  1521. router.With(s.requireBuiltinLogin).Post(webChangeAdminPwdPath, s.handleWebAdminChangePwdPost)
  1522. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminMFAPath, s.handleWebAdminMFA)
  1523. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPGeneratePath, generateTOTPSecret)
  1524. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPValidatePath, validateTOTPPasscode)
  1525. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPSavePath, saveTOTPConfig)
  1526. router.With(verifyCSRFHeader, s.requireBuiltinLogin, s.refreshCookie).Get(webAdminRecoveryCodesPath,
  1527. getRecoveryCodes)
  1528. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminRecoveryCodesPath, generateRecoveryCodes)
  1529. router.With(s.checkPerm(dataprovider.PermAdminViewUsers), s.refreshCookie).
  1530. Get(webUsersPath, s.handleGetWebUsers)
  1531. router.With(s.checkPerm(dataprovider.PermAdminAddUsers), s.refreshCookie).
  1532. Get(webUserPath, s.handleWebAddUserGet)
  1533. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers), s.refreshCookie).
  1534. Get(webUserPath+"/{username}", s.handleWebUpdateUserGet)
  1535. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(webUserPath, s.handleWebAddUserPost)
  1536. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Post(webUserPath+"/{username}",
  1537. s.handleWebUpdateUserPost)
  1538. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1539. Get(webGroupsPath, s.handleWebGetGroups)
  1540. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1541. Get(webGroupPath, s.handleWebAddGroupGet)
  1542. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath, s.handleWebAddGroupPost)
  1543. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1544. Get(webGroupPath+"/{name}", s.handleWebUpdateGroupGet)
  1545. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath+"/{name}",
  1546. s.handleWebUpdateGroupPost)
  1547. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), verifyCSRFHeader).
  1548. Delete(webGroupPath+"/{name}", deleteGroup)
  1549. router.With(s.checkPerm(dataprovider.PermAdminViewConnections), s.refreshCookie).
  1550. Get(webConnectionsPath, s.handleWebGetConnections)
  1551. router.With(s.checkPerm(dataprovider.PermAdminViewUsers), s.refreshCookie).
  1552. Get(webFoldersPath, s.handleWebGetFolders)
  1553. router.With(s.checkPerm(dataprovider.PermAdminAddUsers), s.refreshCookie).
  1554. Get(webFolderPath, s.handleWebAddFolderGet)
  1555. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(webFolderPath, s.handleWebAddFolderPost)
  1556. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus), s.refreshCookie).
  1557. Get(webStatusPath, s.handleWebGetStatus)
  1558. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1559. Get(webAdminsPath, s.handleGetWebAdmins)
  1560. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1561. Get(webAdminPath, s.handleWebAddAdminGet)
  1562. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1563. Get(webAdminPath+"/{username}", s.handleWebUpdateAdminGet)
  1564. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath, s.handleWebAddAdminPost)
  1565. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath+"/{username}",
  1566. s.handleWebUpdateAdminPost)
  1567. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), verifyCSRFHeader).
  1568. Delete(webAdminPath+"/{username}", deleteAdmin)
  1569. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections), verifyCSRFHeader).
  1570. Delete(webConnectionsPath+"/{connectionID}", handleCloseConnection)
  1571. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers), s.refreshCookie).
  1572. Get(webFolderPath+"/{name}", s.handleWebUpdateFolderGet)
  1573. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Post(webFolderPath+"/{name}",
  1574. s.handleWebUpdateFolderPost)
  1575. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers), verifyCSRFHeader).
  1576. Delete(webFolderPath+"/{name}", deleteFolder)
  1577. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1578. Post(webScanVFolderPath+"/{name}", startFolderQuotaScan)
  1579. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers), verifyCSRFHeader).
  1580. Delete(webUserPath+"/{username}", deleteUser)
  1581. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1582. Post(webQuotaScanPath+"/{username}", startUserQuotaScan)
  1583. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webMaintenancePath, s.handleWebMaintenance)
  1584. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webBackupPath, dumpData)
  1585. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webRestorePath, s.handleWebRestore)
  1586. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1587. Get(webTemplateUser, s.handleWebTemplateUserGet)
  1588. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateUser, s.handleWebTemplateUserPost)
  1589. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1590. Get(webTemplateFolder, s.handleWebTemplateFolderGet)
  1591. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateFolder, s.handleWebTemplateFolderPost)
  1592. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderPath, s.handleWebDefenderPage)
  1593. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderHostsPath, getDefenderHosts)
  1594. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(webDefenderHostsPath+"/{id}",
  1595. deleteDefenderHostByID)
  1596. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1597. Get(webAdminEventActionsPath, s.handleWebGetEventActions)
  1598. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1599. Get(webAdminEventActionPath, s.handleWebAddEventActionGet)
  1600. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath,
  1601. s.handleWebAddEventActionPost)
  1602. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1603. Get(webAdminEventActionPath+"/{name}", s.handleWebUpdateEventActionGet)
  1604. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath+"/{name}",
  1605. s.handleWebUpdateEventActionPost)
  1606. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1607. Delete(webAdminEventActionPath+"/{name}", deleteEventAction)
  1608. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1609. Get(webAdminEventRulesPath, s.handleWebGetEventRules)
  1610. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1611. Get(webAdminEventRulePath, s.handleWebAddEventRuleGet)
  1612. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath,
  1613. s.handleWebAddEventRulePost)
  1614. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1615. Get(webAdminEventRulePath+"/{name}", s.handleWebUpdateEventRuleGet)
  1616. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath+"/{name}",
  1617. s.handleWebUpdateEventRulePost)
  1618. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1619. Delete(webAdminEventRulePath+"/{name}", deleteEventRule)
  1620. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1621. Post(webAdminEventRulePath+"/run/{name}", runOnDemandRule)
  1622. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
  1623. Get(webAdminRolesPath, s.handleWebGetRoles)
  1624. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
  1625. Get(webAdminRolePath, s.handleWebAddRoleGet)
  1626. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(webAdminRolePath, s.handleWebAddRolePost)
  1627. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
  1628. Get(webAdminRolePath+"/{name}", s.handleWebUpdateRoleGet)
  1629. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(webAdminRolePath+"/{name}",
  1630. s.handleWebUpdateRolePost)
  1631. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), verifyCSRFHeader).
  1632. Delete(webAdminRolePath+"/{name}", deleteRole)
  1633. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), s.refreshCookie).Get(webEventsPath,
  1634. s.handleWebGetEvents)
  1635. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
  1636. Get(webEventsFsSearchPath, searchFsEvents)
  1637. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
  1638. Get(webEventsProviderSearchPath, searchProviderEvents)
  1639. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
  1640. Get(webEventsLogSearchPath, searchLogEvents)
  1641. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Get(webIPListsPath, s.handleWebIPListsPage)
  1642. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), compressor.Handler, s.refreshCookie).
  1643. Get(webIPListsPath+"/{type}", getIPListEntries)
  1644. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), s.refreshCookie).Get(webIPListPath+"/{type}",
  1645. s.handleWebAddIPListEntryGet)
  1646. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(webIPListPath+"/{type}",
  1647. s.handleWebAddIPListEntryPost)
  1648. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), s.refreshCookie).Get(webIPListPath+"/{type}/{ipornet}",
  1649. s.handleWebUpdateIPListEntryGet)
  1650. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(webIPListPath+"/{type}/{ipornet}",
  1651. s.handleWebUpdateIPListEntryPost)
  1652. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), verifyCSRFHeader).
  1653. Delete(webIPListPath+"/{type}/{ipornet}", deleteIPListEntry)
  1654. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).Get(webConfigsPath, s.handleWebConfigs)
  1655. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webConfigsPath, s.handleWebConfigsPost)
  1656. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), verifyCSRFHeader, s.refreshCookie).
  1657. Post(webConfigsPath+"/smtp/test", testSMTPConfig)
  1658. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), verifyCSRFHeader, s.refreshCookie).
  1659. Post(webOAuth2TokenPath, handleSMTPOAuth2TokenRequestPost)
  1660. })
  1661. }
  1662. }