auth_utils.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259
  1. package httpd
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/http"
  6. "time"
  7. "github.com/go-chi/jwtauth/v5"
  8. "github.com/lestrrat-go/jwx/jwt"
  9. "github.com/rs/xid"
  10. "github.com/drakkan/sftpgo/v2/dataprovider"
  11. "github.com/drakkan/sftpgo/v2/logger"
  12. "github.com/drakkan/sftpgo/v2/utils"
  13. )
  14. type tokenAudience = string
  15. const (
  16. tokenAudienceWebAdmin tokenAudience = "WebAdmin"
  17. tokenAudienceWebClient tokenAudience = "WebClient"
  18. tokenAudienceAPI tokenAudience = "API"
  19. tokenAudienceAPIUser tokenAudience = "APIUser"
  20. tokenAudienceCSRF tokenAudience = "CSRF"
  21. )
  22. const (
  23. claimUsernameKey = "username"
  24. claimPermissionsKey = "permissions"
  25. basicRealm = "Basic realm=\"SFTPGo\""
  26. )
  27. var (
  28. tokenDuration = 15 * time.Minute
  29. tokenRefreshMin = 10 * time.Minute
  30. )
  31. type jwtTokenClaims struct {
  32. Username string
  33. Permissions []string
  34. Signature string
  35. }
  36. func (c *jwtTokenClaims) asMap() map[string]interface{} {
  37. claims := make(map[string]interface{})
  38. claims[claimUsernameKey] = c.Username
  39. claims[claimPermissionsKey] = c.Permissions
  40. claims[jwt.SubjectKey] = c.Signature
  41. return claims
  42. }
  43. func (c *jwtTokenClaims) Decode(token map[string]interface{}) {
  44. username := token[claimUsernameKey]
  45. switch v := username.(type) {
  46. case string:
  47. c.Username = v
  48. }
  49. signature := token[jwt.SubjectKey]
  50. switch v := signature.(type) {
  51. case string:
  52. c.Signature = v
  53. }
  54. permissions := token[claimPermissionsKey]
  55. switch v := permissions.(type) {
  56. case []interface{}:
  57. for _, elem := range v {
  58. switch elemValue := elem.(type) {
  59. case string:
  60. c.Permissions = append(c.Permissions, elemValue)
  61. }
  62. }
  63. }
  64. }
  65. func (c *jwtTokenClaims) isCriticalPermRemoved(permissions []string) bool {
  66. if utils.IsStringInSlice(dataprovider.PermAdminAny, permissions) {
  67. return false
  68. }
  69. if (utils.IsStringInSlice(dataprovider.PermAdminManageAdmins, c.Permissions) ||
  70. utils.IsStringInSlice(dataprovider.PermAdminAny, c.Permissions)) &&
  71. !utils.IsStringInSlice(dataprovider.PermAdminManageAdmins, permissions) &&
  72. !utils.IsStringInSlice(dataprovider.PermAdminAny, permissions) {
  73. return true
  74. }
  75. return false
  76. }
  77. func (c *jwtTokenClaims) hasPerm(perm string) bool {
  78. if utils.IsStringInSlice(dataprovider.PermAdminAny, c.Permissions) {
  79. return true
  80. }
  81. return utils.IsStringInSlice(perm, c.Permissions)
  82. }
  83. func (c *jwtTokenClaims) createTokenResponse(tokenAuth *jwtauth.JWTAuth, audience tokenAudience) (map[string]interface{}, error) {
  84. claims := c.asMap()
  85. now := time.Now().UTC()
  86. claims[jwt.JwtIDKey] = xid.New().String()
  87. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  88. claims[jwt.ExpirationKey] = now.Add(tokenDuration)
  89. claims[jwt.AudienceKey] = audience
  90. token, tokenString, err := tokenAuth.Encode(claims)
  91. if err != nil {
  92. return nil, err
  93. }
  94. response := make(map[string]interface{})
  95. response["access_token"] = tokenString
  96. response["expires_at"] = token.Expiration().Format(time.RFC3339)
  97. return response, nil
  98. }
  99. func (c *jwtTokenClaims) createAndSetCookie(w http.ResponseWriter, r *http.Request, tokenAuth *jwtauth.JWTAuth, audience tokenAudience) error {
  100. resp, err := c.createTokenResponse(tokenAuth, audience)
  101. if err != nil {
  102. return err
  103. }
  104. var basePath string
  105. if audience == tokenAudienceWebAdmin {
  106. basePath = webBaseAdminPath
  107. } else {
  108. basePath = webBaseClientPath
  109. }
  110. http.SetCookie(w, &http.Cookie{
  111. Name: "jwt",
  112. Value: resp["access_token"].(string),
  113. Path: basePath,
  114. Expires: time.Now().Add(tokenDuration),
  115. MaxAge: int(tokenDuration / time.Second),
  116. HttpOnly: true,
  117. Secure: isTLS(r),
  118. SameSite: http.SameSiteStrictMode,
  119. })
  120. return nil
  121. }
  122. func (c *jwtTokenClaims) removeCookie(w http.ResponseWriter, r *http.Request, cookiePath string) {
  123. http.SetCookie(w, &http.Cookie{
  124. Name: "jwt",
  125. Value: "",
  126. Path: cookiePath,
  127. Expires: time.Unix(0, 0),
  128. MaxAge: -1,
  129. HttpOnly: true,
  130. Secure: isTLS(r),
  131. SameSite: http.SameSiteStrictMode,
  132. })
  133. invalidateToken(r)
  134. }
  135. func isTLS(r *http.Request) bool {
  136. if r.TLS != nil {
  137. return true
  138. }
  139. if proto, ok := r.Context().Value(forwardedProtoKey).(string); ok {
  140. return proto == "https"
  141. }
  142. return false
  143. }
  144. func isTokenInvalidated(r *http.Request) bool {
  145. isTokenFound := false
  146. token := jwtauth.TokenFromHeader(r)
  147. if token != "" {
  148. isTokenFound = true
  149. if _, ok := invalidatedJWTTokens.Load(token); ok {
  150. return true
  151. }
  152. }
  153. token = jwtauth.TokenFromCookie(r)
  154. if token != "" {
  155. isTokenFound = true
  156. if _, ok := invalidatedJWTTokens.Load(token); ok {
  157. return true
  158. }
  159. }
  160. return !isTokenFound
  161. }
  162. func invalidateToken(r *http.Request) {
  163. tokenString := jwtauth.TokenFromHeader(r)
  164. if tokenString != "" {
  165. invalidatedJWTTokens.Store(tokenString, time.Now().UTC().Add(tokenDuration))
  166. }
  167. tokenString = jwtauth.TokenFromCookie(r)
  168. if tokenString != "" {
  169. invalidatedJWTTokens.Store(tokenString, time.Now().UTC().Add(tokenDuration))
  170. }
  171. }
  172. func getUserFromToken(r *http.Request) *dataprovider.User {
  173. user := &dataprovider.User{}
  174. _, claims, err := jwtauth.FromContext(r.Context())
  175. if err != nil {
  176. return user
  177. }
  178. tokenClaims := jwtTokenClaims{}
  179. tokenClaims.Decode(claims)
  180. user.Username = tokenClaims.Username
  181. user.Filters.WebClient = tokenClaims.Permissions
  182. return user
  183. }
  184. func getAdminFromToken(r *http.Request) *dataprovider.Admin {
  185. admin := &dataprovider.Admin{}
  186. _, claims, err := jwtauth.FromContext(r.Context())
  187. if err != nil {
  188. return admin
  189. }
  190. tokenClaims := jwtTokenClaims{}
  191. tokenClaims.Decode(claims)
  192. admin.Username = tokenClaims.Username
  193. admin.Permissions = tokenClaims.Permissions
  194. return admin
  195. }
  196. func createCSRFToken() string {
  197. claims := make(map[string]interface{})
  198. now := time.Now().UTC()
  199. claims[jwt.JwtIDKey] = xid.New().String()
  200. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  201. claims[jwt.ExpirationKey] = now.Add(tokenDuration)
  202. claims[jwt.AudienceKey] = tokenAudienceCSRF
  203. _, tokenString, err := csrfTokenAuth.Encode(claims)
  204. if err != nil {
  205. logger.Debug(logSender, "", "unable to create CSRF token: %v", err)
  206. return ""
  207. }
  208. return tokenString
  209. }
  210. func verifyCSRFToken(tokenString string) error {
  211. token, err := jwtauth.VerifyToken(csrfTokenAuth, tokenString)
  212. if err != nil || token == nil {
  213. logger.Debug(logSender, "", "error validating CSRF token %#v: %v", tokenString, err)
  214. return fmt.Errorf("unable to verify form token: %v", err)
  215. }
  216. if !utils.IsStringInSlice(tokenAudienceCSRF, token.Audience()) {
  217. logger.Debug(logSender, "", "error validating CSRF token audience")
  218. return errors.New("the form token is not valid")
  219. }
  220. return nil
  221. }