auth_utils.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "errors"
  17. "fmt"
  18. "net/http"
  19. "time"
  20. "github.com/go-chi/jwtauth/v5"
  21. "github.com/lestrrat-go/jwx/v2/jwt"
  22. "github.com/rs/xid"
  23. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  24. "github.com/drakkan/sftpgo/v2/internal/logger"
  25. "github.com/drakkan/sftpgo/v2/internal/util"
  26. )
  27. type tokenAudience = string
  28. const (
  29. tokenAudienceWebAdmin tokenAudience = "WebAdmin"
  30. tokenAudienceWebClient tokenAudience = "WebClient"
  31. tokenAudienceWebShare tokenAudience = "WebShare"
  32. tokenAudienceWebAdminPartial tokenAudience = "WebAdminPartial"
  33. tokenAudienceWebClientPartial tokenAudience = "WebClientPartial"
  34. tokenAudienceAPI tokenAudience = "API"
  35. tokenAudienceAPIUser tokenAudience = "APIUser"
  36. tokenAudienceCSRF tokenAudience = "CSRF"
  37. tokenAudienceOAuth2 tokenAudience = "OAuth2"
  38. )
  39. type tokenValidation = int
  40. const (
  41. tokenValidationFull = iota
  42. tokenValidationNoIPMatch tokenValidation = iota
  43. )
  44. const (
  45. claimUsernameKey = "username"
  46. claimPermissionsKey = "permissions"
  47. claimRole = "role"
  48. claimAPIKey = "api_key"
  49. claimNodeID = "node_id"
  50. claimMustChangePasswordKey = "chpwd"
  51. claimMustSetSecondFactorKey = "2fa_required"
  52. claimRequiredTwoFactorProtocols = "2fa_protos"
  53. claimHideUserPageSection = "hus"
  54. basicRealm = "Basic realm=\"SFTPGo\""
  55. jwtCookieKey = "jwt"
  56. )
  57. var (
  58. tokenDuration = 20 * time.Minute
  59. shareTokenDuration = 12 * time.Hour
  60. // csrf token duration is greater than normal token duration to reduce issues
  61. // with the login form
  62. csrfTokenDuration = 6 * time.Hour
  63. tokenRefreshThreshold = 10 * time.Minute
  64. tokenValidationMode = tokenValidationFull
  65. )
  66. type jwtTokenClaims struct {
  67. Username string
  68. Permissions []string
  69. Role string
  70. Signature string
  71. Audience []string
  72. APIKeyID string
  73. NodeID string
  74. MustSetTwoFactorAuth bool
  75. MustChangePassword bool
  76. RequiredTwoFactorProtocols []string
  77. HideUserPageSections int
  78. }
  79. func (c *jwtTokenClaims) hasUserAudience() bool {
  80. for _, audience := range c.Audience {
  81. if audience == tokenAudienceWebClient || audience == tokenAudienceAPIUser {
  82. return true
  83. }
  84. }
  85. return false
  86. }
  87. func (c *jwtTokenClaims) asMap() map[string]any {
  88. claims := make(map[string]any)
  89. claims[claimUsernameKey] = c.Username
  90. claims[claimPermissionsKey] = c.Permissions
  91. if c.Role != "" {
  92. claims[claimRole] = c.Role
  93. }
  94. if c.APIKeyID != "" {
  95. claims[claimAPIKey] = c.APIKeyID
  96. }
  97. if c.NodeID != "" {
  98. claims[claimNodeID] = c.NodeID
  99. }
  100. claims[jwt.SubjectKey] = c.Signature
  101. if c.MustChangePassword {
  102. claims[claimMustChangePasswordKey] = c.MustChangePassword
  103. }
  104. if c.MustSetTwoFactorAuth {
  105. claims[claimMustSetSecondFactorKey] = c.MustSetTwoFactorAuth
  106. }
  107. if len(c.RequiredTwoFactorProtocols) > 0 {
  108. claims[claimRequiredTwoFactorProtocols] = c.RequiredTwoFactorProtocols
  109. }
  110. if c.HideUserPageSections > 0 {
  111. claims[claimHideUserPageSection] = c.HideUserPageSections
  112. }
  113. return claims
  114. }
  115. func (c *jwtTokenClaims) decodeSliceString(val any) []string {
  116. switch v := val.(type) {
  117. case []any:
  118. result := make([]string, 0, len(v))
  119. for _, elem := range v {
  120. switch elemValue := elem.(type) {
  121. case string:
  122. result = append(result, elemValue)
  123. }
  124. }
  125. return result
  126. case []string:
  127. return v
  128. default:
  129. return nil
  130. }
  131. }
  132. func (c *jwtTokenClaims) decodeBoolean(val any) bool {
  133. switch v := val.(type) {
  134. case bool:
  135. return v
  136. default:
  137. return false
  138. }
  139. }
  140. func (c *jwtTokenClaims) decodeString(val any) string {
  141. switch v := val.(type) {
  142. case string:
  143. return v
  144. default:
  145. return ""
  146. }
  147. }
  148. func (c *jwtTokenClaims) Decode(token map[string]any) {
  149. c.Permissions = nil
  150. c.Username = c.decodeString(token[claimUsernameKey])
  151. c.Signature = c.decodeString(token[jwt.SubjectKey])
  152. audience := token[jwt.AudienceKey]
  153. switch v := audience.(type) {
  154. case []string:
  155. c.Audience = v
  156. }
  157. if val, ok := token[claimAPIKey]; ok {
  158. c.APIKeyID = c.decodeString(val)
  159. }
  160. if val, ok := token[claimNodeID]; ok {
  161. c.NodeID = c.decodeString(val)
  162. }
  163. if val, ok := token[claimRole]; ok {
  164. c.Role = c.decodeString(val)
  165. }
  166. permissions := token[claimPermissionsKey]
  167. c.Permissions = c.decodeSliceString(permissions)
  168. if val, ok := token[claimMustChangePasswordKey]; ok {
  169. c.MustChangePassword = c.decodeBoolean(val)
  170. }
  171. if val, ok := token[claimMustSetSecondFactorKey]; ok {
  172. c.MustSetTwoFactorAuth = c.decodeBoolean(val)
  173. }
  174. if val, ok := token[claimRequiredTwoFactorProtocols]; ok {
  175. c.RequiredTwoFactorProtocols = c.decodeSliceString(val)
  176. }
  177. if val, ok := token[claimHideUserPageSection]; ok {
  178. switch v := val.(type) {
  179. case float64:
  180. c.HideUserPageSections = int(v)
  181. }
  182. }
  183. }
  184. func (c *jwtTokenClaims) isCriticalPermRemoved(permissions []string) bool {
  185. if util.Contains(permissions, dataprovider.PermAdminAny) {
  186. return false
  187. }
  188. if (util.Contains(c.Permissions, dataprovider.PermAdminManageAdmins) ||
  189. util.Contains(c.Permissions, dataprovider.PermAdminAny)) &&
  190. !util.Contains(permissions, dataprovider.PermAdminManageAdmins) &&
  191. !util.Contains(permissions, dataprovider.PermAdminAny) {
  192. return true
  193. }
  194. return false
  195. }
  196. func (c *jwtTokenClaims) hasPerm(perm string) bool {
  197. if util.Contains(c.Permissions, dataprovider.PermAdminAny) {
  198. return true
  199. }
  200. return util.Contains(c.Permissions, perm)
  201. }
  202. func (c *jwtTokenClaims) createToken(tokenAuth *jwtauth.JWTAuth, audience tokenAudience, ip string) (jwt.Token, string, error) {
  203. claims := c.asMap()
  204. now := time.Now().UTC()
  205. claims[jwt.JwtIDKey] = xid.New().String()
  206. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  207. claims[jwt.ExpirationKey] = now.Add(tokenDuration)
  208. claims[jwt.AudienceKey] = []string{audience, ip}
  209. return tokenAuth.Encode(claims)
  210. }
  211. func (c *jwtTokenClaims) createTokenResponse(tokenAuth *jwtauth.JWTAuth, audience tokenAudience, ip string) (map[string]any, error) {
  212. token, tokenString, err := c.createToken(tokenAuth, audience, ip)
  213. if err != nil {
  214. return nil, err
  215. }
  216. response := make(map[string]any)
  217. response["access_token"] = tokenString
  218. response["expires_at"] = token.Expiration().Format(time.RFC3339)
  219. return response, nil
  220. }
  221. func (c *jwtTokenClaims) createAndSetCookie(w http.ResponseWriter, r *http.Request, tokenAuth *jwtauth.JWTAuth,
  222. audience tokenAudience, ip string,
  223. ) error {
  224. resp, err := c.createTokenResponse(tokenAuth, audience, ip)
  225. if err != nil {
  226. return err
  227. }
  228. var basePath string
  229. if audience == tokenAudienceWebAdmin || audience == tokenAudienceWebAdminPartial {
  230. basePath = webBaseAdminPath
  231. } else {
  232. basePath = webBaseClientPath
  233. }
  234. duration := tokenDuration
  235. if audience == tokenAudienceWebShare {
  236. duration = shareTokenDuration
  237. }
  238. http.SetCookie(w, &http.Cookie{
  239. Name: jwtCookieKey,
  240. Value: resp["access_token"].(string),
  241. Path: basePath,
  242. Expires: time.Now().Add(duration),
  243. MaxAge: int(duration / time.Second),
  244. HttpOnly: true,
  245. Secure: isTLS(r),
  246. SameSite: http.SameSiteStrictMode,
  247. })
  248. return nil
  249. }
  250. func (c *jwtTokenClaims) removeCookie(w http.ResponseWriter, r *http.Request, cookiePath string) {
  251. http.SetCookie(w, &http.Cookie{
  252. Name: jwtCookieKey,
  253. Value: "",
  254. Path: cookiePath,
  255. Expires: time.Unix(0, 0),
  256. MaxAge: -1,
  257. HttpOnly: true,
  258. Secure: isTLS(r),
  259. SameSite: http.SameSiteStrictMode,
  260. })
  261. w.Header().Add("Cache-Control", `no-cache="Set-Cookie"`)
  262. invalidateToken(r)
  263. }
  264. func tokenFromContext(r *http.Request) string {
  265. if token, ok := r.Context().Value(oidcGeneratedToken).(string); ok {
  266. return token
  267. }
  268. return ""
  269. }
  270. func isTLS(r *http.Request) bool {
  271. if r.TLS != nil {
  272. return true
  273. }
  274. if proto, ok := r.Context().Value(forwardedProtoKey).(string); ok {
  275. return proto == "https"
  276. }
  277. return false
  278. }
  279. func isTokenInvalidated(r *http.Request) bool {
  280. var findTokenFns []func(r *http.Request) string
  281. findTokenFns = append(findTokenFns, jwtauth.TokenFromHeader)
  282. findTokenFns = append(findTokenFns, jwtauth.TokenFromCookie)
  283. findTokenFns = append(findTokenFns, tokenFromContext)
  284. isTokenFound := false
  285. for _, fn := range findTokenFns {
  286. token := fn(r)
  287. if token != "" {
  288. isTokenFound = true
  289. if invalidatedJWTTokens.Get(token) {
  290. return true
  291. }
  292. }
  293. }
  294. return !isTokenFound
  295. }
  296. func invalidateToken(r *http.Request) {
  297. tokenString := jwtauth.TokenFromHeader(r)
  298. if tokenString != "" {
  299. invalidatedJWTTokens.Add(tokenString, time.Now().Add(tokenDuration).UTC())
  300. }
  301. tokenString = jwtauth.TokenFromCookie(r)
  302. if tokenString != "" {
  303. invalidatedJWTTokens.Add(tokenString, time.Now().Add(tokenDuration).UTC())
  304. }
  305. }
  306. func getUserFromToken(r *http.Request) *dataprovider.User {
  307. user := &dataprovider.User{}
  308. _, claims, err := jwtauth.FromContext(r.Context())
  309. if err != nil {
  310. return user
  311. }
  312. tokenClaims := jwtTokenClaims{}
  313. tokenClaims.Decode(claims)
  314. user.Username = tokenClaims.Username
  315. user.Filters.WebClient = tokenClaims.Permissions
  316. user.Role = tokenClaims.Role
  317. return user
  318. }
  319. func getAdminFromToken(r *http.Request) *dataprovider.Admin {
  320. admin := &dataprovider.Admin{}
  321. _, claims, err := jwtauth.FromContext(r.Context())
  322. if err != nil {
  323. return admin
  324. }
  325. tokenClaims := jwtTokenClaims{}
  326. tokenClaims.Decode(claims)
  327. admin.Username = tokenClaims.Username
  328. admin.Permissions = tokenClaims.Permissions
  329. admin.Filters.Preferences.HideUserPageSections = tokenClaims.HideUserPageSections
  330. admin.Role = tokenClaims.Role
  331. return admin
  332. }
  333. func createCSRFToken(ip string) string {
  334. claims := make(map[string]any)
  335. now := time.Now().UTC()
  336. claims[jwt.JwtIDKey] = xid.New().String()
  337. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  338. claims[jwt.ExpirationKey] = now.Add(csrfTokenDuration)
  339. claims[jwt.AudienceKey] = []string{tokenAudienceCSRF, ip}
  340. _, tokenString, err := csrfTokenAuth.Encode(claims)
  341. if err != nil {
  342. logger.Debug(logSender, "", "unable to create CSRF token: %v", err)
  343. return ""
  344. }
  345. return tokenString
  346. }
  347. func verifyCSRFToken(tokenString, ip string) error {
  348. token, err := jwtauth.VerifyToken(csrfTokenAuth, tokenString)
  349. if err != nil || token == nil {
  350. logger.Debug(logSender, "", "error validating CSRF token %q: %v", tokenString, err)
  351. return fmt.Errorf("unable to verify form token: %v", err)
  352. }
  353. if !util.Contains(token.Audience(), tokenAudienceCSRF) {
  354. logger.Debug(logSender, "", "error validating CSRF token audience")
  355. return errors.New("the form token is not valid")
  356. }
  357. if tokenValidationMode != tokenValidationNoIPMatch {
  358. if !util.Contains(token.Audience(), ip) {
  359. logger.Debug(logSender, "", "error validating CSRF token IP audience")
  360. return errors.New("the form token is not valid")
  361. }
  362. }
  363. return nil
  364. }
  365. func createOAuth2Token(state, ip string) string {
  366. claims := make(map[string]any)
  367. now := time.Now().UTC()
  368. claims[jwt.JwtIDKey] = state
  369. claims[jwt.NotBeforeKey] = now.Add(-30 * time.Second)
  370. claims[jwt.ExpirationKey] = now.Add(3 * time.Minute)
  371. claims[jwt.AudienceKey] = []string{tokenAudienceOAuth2, ip}
  372. _, tokenString, err := csrfTokenAuth.Encode(claims)
  373. if err != nil {
  374. logger.Debug(logSender, "", "unable to create OAuth2 token: %v", err)
  375. return ""
  376. }
  377. return tokenString
  378. }
  379. func verifyOAuth2Token(tokenString, ip string) (string, error) {
  380. token, err := jwtauth.VerifyToken(csrfTokenAuth, tokenString)
  381. if err != nil || token == nil {
  382. logger.Debug(logSender, "", "error validating OAuth2 token %q: %v", tokenString, err)
  383. return "", fmt.Errorf("unable to verify OAuth2 state: %v", err)
  384. }
  385. if !util.Contains(token.Audience(), tokenAudienceOAuth2) {
  386. logger.Debug(logSender, "", "error validating OAuth2 token audience")
  387. return "", errors.New("invalid OAuth2 state")
  388. }
  389. if tokenValidationMode != tokenValidationNoIPMatch {
  390. if !util.Contains(token.Audience(), ip) {
  391. logger.Debug(logSender, "", "error validating OAuth2 token IP audience")
  392. return "", errors.New("invalid OAuth2 state")
  393. }
  394. }
  395. if val, ok := token.Get(jwt.JwtIDKey); ok {
  396. if state, ok := val.(string); ok {
  397. return state, nil
  398. }
  399. }
  400. logger.Debug(logSender, "", "jti not found in OAuth2 token")
  401. return "", errors.New("invalid OAuth2 state")
  402. }