|
|
@@ -13,83 +13,103 @@ import (
|
|
|
"os"
|
|
|
"strings"
|
|
|
|
|
|
- "github.com/syncthing/syncthing/lib/config"
|
|
|
- "github.com/syncthing/syncthing/lib/locations"
|
|
|
"github.com/syncthing/syncthing/lib/osutil"
|
|
|
"github.com/syncthing/syncthing/lib/rand"
|
|
|
"github.com/syncthing/syncthing/lib/sync"
|
|
|
)
|
|
|
|
|
|
-// csrfTokens is a list of valid tokens. It is sorted so that the most
|
|
|
-// recently used token is first in the list. New tokens are added to the front
|
|
|
-// of the list (as it is the most recently used at that time). The list is
|
|
|
-// pruned to a maximum of maxCsrfTokens, throwing away the least recently used
|
|
|
-// tokens.
|
|
|
-var csrfTokens []string
|
|
|
-var csrfMut = sync.NewMutex()
|
|
|
-
|
|
|
const maxCsrfTokens = 25
|
|
|
|
|
|
+type csrfManager struct {
|
|
|
+ // tokens is a list of valid tokens. It is sorted so that the most
|
|
|
+ // recently used token is first in the list. New tokens are added to the front
|
|
|
+ // of the list (as it is the most recently used at that time). The list is
|
|
|
+ // pruned to a maximum of maxCsrfTokens, throwing away the least recently used
|
|
|
+ // tokens.
|
|
|
+ tokens []string
|
|
|
+ tokensMut sync.Mutex
|
|
|
+
|
|
|
+ unique string
|
|
|
+ prefix string
|
|
|
+ apiKeyValidator apiKeyValidator
|
|
|
+ next http.Handler
|
|
|
+ saveLocation string
|
|
|
+}
|
|
|
+
|
|
|
+type apiKeyValidator interface {
|
|
|
+ IsValidAPIKey(key string) bool
|
|
|
+}
|
|
|
+
|
|
|
// Check for CSRF token on /rest/ URLs. If a correct one is not given, reject
|
|
|
// the request with 403. For / and /index.html, set a new CSRF cookie if none
|
|
|
// is currently set.
|
|
|
-func csrfMiddleware(unique string, prefix string, cfg config.GUIConfiguration, next http.Handler) http.Handler {
|
|
|
- loadCsrfTokens()
|
|
|
- return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
- // Allow requests carrying a valid API key
|
|
|
- if cfg.IsValidAPIKey(r.Header.Get("X-API-Key")) {
|
|
|
- // Set the access-control-allow-origin header for CORS requests
|
|
|
- // since a valid API key has been provided
|
|
|
- w.Header().Add("Access-Control-Allow-Origin", "*")
|
|
|
- next.ServeHTTP(w, r)
|
|
|
- return
|
|
|
- }
|
|
|
+func newCsrfManager(unique string, prefix string, apiKeyValidator apiKeyValidator, next http.Handler, saveLocation string) *csrfManager {
|
|
|
+ m := &csrfManager{
|
|
|
+ tokensMut: sync.NewMutex(),
|
|
|
+ unique: unique,
|
|
|
+ prefix: prefix,
|
|
|
+ apiKeyValidator: apiKeyValidator,
|
|
|
+ next: next,
|
|
|
+ saveLocation: saveLocation,
|
|
|
+ }
|
|
|
+ m.load()
|
|
|
+ return m
|
|
|
+}
|
|
|
|
|
|
- if strings.HasPrefix(r.URL.Path, "/rest/debug") {
|
|
|
- // Debugging functions are only available when explicitly
|
|
|
- // enabled, and can be accessed without a CSRF token
|
|
|
- next.ServeHTTP(w, r)
|
|
|
- return
|
|
|
- }
|
|
|
+func (m *csrfManager) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
|
+ // Allow requests carrying a valid API key
|
|
|
+ if m.apiKeyValidator.IsValidAPIKey(r.Header.Get("X-API-Key")) {
|
|
|
+ // Set the access-control-allow-origin header for CORS requests
|
|
|
+ // since a valid API key has been provided
|
|
|
+ w.Header().Add("Access-Control-Allow-Origin", "*")
|
|
|
+ m.next.ServeHTTP(w, r)
|
|
|
+ return
|
|
|
+ }
|
|
|
|
|
|
- // Allow requests for anything not under the protected path prefix,
|
|
|
- // and set a CSRF cookie if there isn't already a valid one.
|
|
|
- if !strings.HasPrefix(r.URL.Path, prefix) {
|
|
|
- cookie, err := r.Cookie("CSRF-Token-" + unique)
|
|
|
- if err != nil || !validCsrfToken(cookie.Value) {
|
|
|
- l.Debugln("new CSRF cookie in response to request for", r.URL)
|
|
|
- cookie = &http.Cookie{
|
|
|
- Name: "CSRF-Token-" + unique,
|
|
|
- Value: newCsrfToken(),
|
|
|
- }
|
|
|
- http.SetCookie(w, cookie)
|
|
|
+ if strings.HasPrefix(r.URL.Path, "/rest/debug") {
|
|
|
+ // Debugging functions are only available when explicitly
|
|
|
+ // enabled, and can be accessed without a CSRF token
|
|
|
+ m.next.ServeHTTP(w, r)
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ // Allow requests for anything not under the protected path prefix,
|
|
|
+ // and set a CSRF cookie if there isn't already a valid one.
|
|
|
+ if !strings.HasPrefix(r.URL.Path, m.prefix) {
|
|
|
+ cookie, err := r.Cookie("CSRF-Token-" + m.unique)
|
|
|
+ if err != nil || !m.validToken(cookie.Value) {
|
|
|
+ l.Debugln("new CSRF cookie in response to request for", r.URL)
|
|
|
+ cookie = &http.Cookie{
|
|
|
+ Name: "CSRF-Token-" + m.unique,
|
|
|
+ Value: m.newToken(),
|
|
|
}
|
|
|
- next.ServeHTTP(w, r)
|
|
|
- return
|
|
|
+ http.SetCookie(w, cookie)
|
|
|
}
|
|
|
+ m.next.ServeHTTP(w, r)
|
|
|
+ return
|
|
|
+ }
|
|
|
|
|
|
- // Verify the CSRF token
|
|
|
- token := r.Header.Get("X-CSRF-Token-" + unique)
|
|
|
- if !validCsrfToken(token) {
|
|
|
- http.Error(w, "CSRF Error", 403)
|
|
|
- return
|
|
|
- }
|
|
|
+ // Verify the CSRF token
|
|
|
+ token := r.Header.Get("X-CSRF-Token-" + m.unique)
|
|
|
+ if !m.validToken(token) {
|
|
|
+ http.Error(w, "CSRF Error", http.StatusForbidden)
|
|
|
+ return
|
|
|
+ }
|
|
|
|
|
|
- next.ServeHTTP(w, r)
|
|
|
- })
|
|
|
+ m.next.ServeHTTP(w, r)
|
|
|
}
|
|
|
|
|
|
-func validCsrfToken(token string) bool {
|
|
|
- csrfMut.Lock()
|
|
|
- defer csrfMut.Unlock()
|
|
|
- for i, t := range csrfTokens {
|
|
|
+func (m *csrfManager) validToken(token string) bool {
|
|
|
+ m.tokensMut.Lock()
|
|
|
+ defer m.tokensMut.Unlock()
|
|
|
+ for i, t := range m.tokens {
|
|
|
if t == token {
|
|
|
if i > 0 {
|
|
|
// Move this token to the head of the list. Copy the tokens at
|
|
|
// the front one step to the right and then replace the token
|
|
|
// at the head.
|
|
|
- copy(csrfTokens[1:], csrfTokens[:i+1])
|
|
|
- csrfTokens[0] = token
|
|
|
+ copy(m.tokens[1:], m.tokens[:i+1])
|
|
|
+ m.tokens[0] = token
|
|
|
}
|
|
|
return true
|
|
|
}
|
|
|
@@ -97,40 +117,47 @@ func validCsrfToken(token string) bool {
|
|
|
return false
|
|
|
}
|
|
|
|
|
|
-func newCsrfToken() string {
|
|
|
+func (m *csrfManager) newToken() string {
|
|
|
token := rand.String(32)
|
|
|
|
|
|
- csrfMut.Lock()
|
|
|
- csrfTokens = append([]string{token}, csrfTokens...)
|
|
|
- if len(csrfTokens) > maxCsrfTokens {
|
|
|
- csrfTokens = csrfTokens[:maxCsrfTokens]
|
|
|
+ m.tokensMut.Lock()
|
|
|
+ m.tokens = append([]string{token}, m.tokens...)
|
|
|
+ if len(m.tokens) > maxCsrfTokens {
|
|
|
+ m.tokens = m.tokens[:maxCsrfTokens]
|
|
|
}
|
|
|
- defer csrfMut.Unlock()
|
|
|
+ defer m.tokensMut.Unlock()
|
|
|
|
|
|
- saveCsrfTokens()
|
|
|
+ m.save()
|
|
|
|
|
|
return token
|
|
|
}
|
|
|
|
|
|
-func saveCsrfTokens() {
|
|
|
+func (m *csrfManager) save() {
|
|
|
// We're ignoring errors in here. It's not super critical and there's
|
|
|
// nothing relevant we can do about them anyway...
|
|
|
|
|
|
- name := locations.Get(locations.CsrfTokens)
|
|
|
- f, err := osutil.CreateAtomic(name)
|
|
|
+ if m.saveLocation == "" {
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ f, err := osutil.CreateAtomic(m.saveLocation)
|
|
|
if err != nil {
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- for _, t := range csrfTokens {
|
|
|
+ for _, t := range m.tokens {
|
|
|
fmt.Fprintln(f, t)
|
|
|
}
|
|
|
|
|
|
f.Close()
|
|
|
}
|
|
|
|
|
|
-func loadCsrfTokens() {
|
|
|
- f, err := os.Open(locations.Get(locations.CsrfTokens))
|
|
|
+func (m *csrfManager) load() {
|
|
|
+ if m.saveLocation == "" {
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ f, err := os.Open(m.saveLocation)
|
|
|
if err != nil {
|
|
|
return
|
|
|
}
|
|
|
@@ -138,6 +165,6 @@ func loadCsrfTokens() {
|
|
|
|
|
|
s := bufio.NewScanner(f)
|
|
|
for s.Scan() {
|
|
|
- csrfTokens = append(csrfTokens, s.Text())
|
|
|
+ m.tokens = append(m.tokens, s.Text())
|
|
|
}
|
|
|
}
|