123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794 |
- // Copyright (C) 2019-2023 Nicola Murino
- //
- // This program is free software: you can redistribute it and/or modify
- // it under the terms of the GNU Affero General Public License as published
- // by the Free Software Foundation, version 3.
- //
- // This program is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- // GNU Affero General Public License for more details.
- //
- // You should have received a copy of the GNU Affero General Public License
- // along with this program. If not, see <https://www.gnu.org/licenses/>.
- package httpd
- import (
- "context"
- "crypto/tls"
- "crypto/x509"
- "errors"
- "fmt"
- "log"
- "net"
- "net/http"
- "net/url"
- "path/filepath"
- "strings"
- "time"
- "github.com/go-chi/chi/v5"
- "github.com/go-chi/chi/v5/middleware"
- "github.com/go-chi/jwtauth/v5"
- "github.com/go-chi/render"
- "github.com/lestrrat-go/jwx/v2/jwa"
- "github.com/rs/cors"
- "github.com/rs/xid"
- "github.com/sftpgo/sdk"
- "github.com/unrolled/secure"
- "github.com/drakkan/sftpgo/v2/internal/acme"
- "github.com/drakkan/sftpgo/v2/internal/common"
- "github.com/drakkan/sftpgo/v2/internal/dataprovider"
- "github.com/drakkan/sftpgo/v2/internal/logger"
- "github.com/drakkan/sftpgo/v2/internal/mfa"
- "github.com/drakkan/sftpgo/v2/internal/smtp"
- "github.com/drakkan/sftpgo/v2/internal/util"
- "github.com/drakkan/sftpgo/v2/internal/version"
- )
- var (
- compressor = middleware.NewCompressor(5)
- xForwardedProto = http.CanonicalHeaderKey("X-Forwarded-Proto")
- )
- type httpdServer struct {
- binding Binding
- staticFilesPath string
- openAPIPath string
- enableWebAdmin bool
- enableWebClient bool
- enableRESTAPI bool
- renderOpenAPI bool
- isShared int
- router *chi.Mux
- tokenAuth *jwtauth.JWTAuth
- signingPassphrase string
- cors CorsConfig
- }
- func newHttpdServer(b Binding, staticFilesPath, signingPassphrase string, cors CorsConfig,
- openAPIPath string,
- ) *httpdServer {
- if openAPIPath == "" {
- b.RenderOpenAPI = false
- }
- return &httpdServer{
- binding: b,
- staticFilesPath: staticFilesPath,
- openAPIPath: openAPIPath,
- enableWebAdmin: b.EnableWebAdmin,
- enableWebClient: b.EnableWebClient,
- enableRESTAPI: b.EnableRESTAPI,
- renderOpenAPI: b.RenderOpenAPI,
- signingPassphrase: signingPassphrase,
- cors: cors,
- }
- }
- func (s *httpdServer) setShared(value int) {
- s.isShared = value
- }
- func (s *httpdServer) listenAndServe() error {
- s.initializeRouter()
- httpServer := &http.Server{
- Handler: s.router,
- ReadHeaderTimeout: 30 * time.Second,
- ReadTimeout: 60 * time.Second,
- WriteTimeout: 60 * time.Second,
- IdleTimeout: 60 * time.Second,
- MaxHeaderBytes: 1 << 16, // 64KB
- ErrorLog: log.New(&logger.StdLoggerWrapper{Sender: logSender}, "", 0),
- }
- if certMgr != nil && s.binding.EnableHTTPS {
- certID := common.DefaultTLSKeyPaidID
- if getConfigPath(s.binding.CertificateFile, "") != "" && getConfigPath(s.binding.CertificateKeyFile, "") != "" {
- certID = s.binding.GetAddress()
- }
- config := &tls.Config{
- GetCertificate: certMgr.GetCertificateFunc(certID),
- MinVersion: util.GetTLSVersion(s.binding.MinTLSVersion),
- NextProtos: util.GetALPNProtocols(s.binding.Protocols),
- CipherSuites: util.GetTLSCiphersFromNames(s.binding.TLSCipherSuites),
- }
- httpServer.TLSConfig = config
- logger.Debug(logSender, "", "configured TLS cipher suites for binding %q: %v, certID: %v",
- s.binding.GetAddress(), httpServer.TLSConfig.CipherSuites, certID)
- if s.binding.ClientAuthType == 1 {
- httpServer.TLSConfig.ClientCAs = certMgr.GetRootCAs()
- httpServer.TLSConfig.ClientAuth = tls.RequireAndVerifyClientCert
- httpServer.TLSConfig.VerifyConnection = s.verifyTLSConnection
- }
- return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, true, logSender)
- }
- return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, false, logSender)
- }
- func (s *httpdServer) verifyTLSConnection(state tls.ConnectionState) error {
- if certMgr != nil {
- var clientCrt *x509.Certificate
- var clientCrtName string
- if len(state.PeerCertificates) > 0 {
- clientCrt = state.PeerCertificates[0]
- clientCrtName = clientCrt.Subject.String()
- }
- if len(state.VerifiedChains) == 0 {
- logger.Warn(logSender, "", "TLS connection cannot be verified: unable to get verification chain")
- return errors.New("TLS connection cannot be verified: unable to get verification chain")
- }
- for _, verifiedChain := range state.VerifiedChains {
- var caCrt *x509.Certificate
- if len(verifiedChain) > 0 {
- caCrt = verifiedChain[len(verifiedChain)-1]
- }
- if certMgr.IsRevoked(clientCrt, caCrt) {
- logger.Debug(logSender, "", "tls handshake error, client certificate %q has been revoked", clientCrtName)
- return common.ErrCrtRevoked
- }
- }
- }
- return nil
- }
- func (s *httpdServer) refreshCookie(next http.Handler) http.Handler {
- return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- s.checkCookieExpiration(w, r)
- next.ServeHTTP(w, r)
- })
- }
- func (s *httpdServer) renderClientLoginPage(w http.ResponseWriter, r *http.Request, error, ip string) {
- data := loginPage{
- commonBasePage: getCommonBasePage(r),
- Title: util.I18nLoginTitle,
- CurrentURL: webClientLoginPath,
- Error: error,
- CSRFToken: createCSRFToken(ip),
- Branding: s.binding.Branding.WebClient,
- FormDisabled: s.binding.isWebClientLoginFormDisabled(),
- }
- if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
- data.CurrentURL += "?next=" + url.QueryEscape(next)
- }
- if s.binding.showAdminLoginURL() {
- data.AltLoginURL = webAdminLoginPath
- data.AltLoginName = s.binding.Branding.WebAdmin.ShortName
- }
- if smtp.IsEnabled() && !data.FormDisabled {
- data.ForgotPwdURL = webClientForgotPwdPath
- }
- if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
- data.OpenIDLoginURL = webClientOIDCLoginPath
- }
- renderClientTemplate(w, templateClientLogin, data)
- }
- func (s *httpdServer) handleWebClientLogout(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- c := jwtTokenClaims{}
- c.removeCookie(w, r, webBaseClientPath)
- s.logoutOIDCUser(w, r)
- http.Redirect(w, r, webClientLoginPath, http.StatusFound)
- }
- func (s *httpdServer) handleWebClientChangePwdPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- if err := r.ParseForm(); err != nil {
- s.renderClientChangePasswordPage(w, r, util.I18nErrorInvalidForm)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
- return
- }
- err := doChangeUserPassword(r, strings.TrimSpace(r.Form.Get("current_password")),
- strings.TrimSpace(r.Form.Get("new_password1")), strings.TrimSpace(r.Form.Get("new_password2")))
- if err != nil {
- s.renderClientChangePasswordPage(w, r, getI18NErrorString(err, util.I18nErrorChangePwdGeneric))
- return
- }
- s.handleWebClientLogout(w, r)
- }
- func (s *httpdServer) handleClientWebLogin(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- if !dataprovider.HasAdmin() {
- http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
- return
- }
- s.renderClientLoginPage(w, r, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
- }
- func (s *httpdServer) handleWebClientLoginPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := r.ParseForm(); err != nil {
- s.renderClientLoginPage(w, r, util.I18nErrorInvalidForm, ipAddr)
- return
- }
- protocol := common.ProtocolHTTP
- username := strings.TrimSpace(r.Form.Get("username"))
- password := strings.TrimSpace(r.Form.Get("password"))
- if username == "" || password == "" {
- updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
- dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
- s.renderClientLoginPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
- dataprovider.LoginMethodPassword, ipAddr, err)
- s.renderClientLoginPage(w, r, util.I18nErrorInvalidCSRF, ipAddr)
- return
- }
- if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
- updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
- dataprovider.LoginMethodPassword, ipAddr, err)
- s.renderClientLoginPage(w, r, util.I18nError403Message, ipAddr)
- return
- }
- user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
- if err != nil {
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
- s.renderClientLoginPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
- return
- }
- connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
- if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
- s.renderClientLoginPage(w, r, getI18NErrorString(err, util.I18nError403Message), ipAddr)
- return
- }
- defer user.CloseFs() //nolint:errcheck
- err = user.CheckFsRoot(connectionID)
- if err != nil {
- logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
- s.renderClientLoginPage(w, r, getI18NErrorString(err, util.I18nErrorFsGeneric), ipAddr)
- return
- }
- s.loginUser(w, r, &user, connectionID, ipAddr, false, s.renderClientLoginPage)
- }
- func (s *httpdServer) handleWebClientPasswordResetPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- err := r.ParseForm()
- if err != nil {
- s.renderClientResetPwdPage(w, r, util.I18nErrorInvalidForm, ipAddr)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
- return
- }
- newPassword := strings.TrimSpace(r.Form.Get("password"))
- confirmPassword := strings.TrimSpace(r.Form.Get("confirm_password"))
- if newPassword != confirmPassword {
- s.renderClientResetPwdPage(w, r, util.I18nErrorChangePwdNoMatch, ipAddr)
- return
- }
- _, user, err := handleResetPassword(r, strings.TrimSpace(r.Form.Get("code")),
- newPassword, false)
- if err != nil {
- s.renderClientResetPwdPage(w, r, getI18NErrorString(err, util.I18nErrorChangePwdGeneric), ipAddr)
- return
- }
- connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
- if err := checkHTTPClientUser(user, r, connectionID, true); err != nil {
- s.renderClientResetPwdPage(w, r, getI18NErrorString(err, util.I18nErrorDirList403), ipAddr)
- return
- }
- defer user.CloseFs() //nolint:errcheck
- err = user.CheckFsRoot(connectionID)
- if err != nil {
- logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
- s.renderClientResetPwdPage(w, r, util.I18nErrorLoginAfterReset, ipAddr)
- return
- }
- s.loginUser(w, r, user, connectionID, ipAddr, false, s.renderClientResetPwdPage)
- }
- func (s *httpdServer) handleWebClientTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- claims, err := getTokenClaims(r)
- if err != nil {
- s.renderNotFoundPage(w, r, nil)
- return
- }
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := r.ParseForm(); err != nil {
- s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidForm, ipAddr)
- return
- }
- username := claims.Username
- recoveryCode := strings.TrimSpace(r.Form.Get("recovery_code"))
- if username == "" || recoveryCode == "" {
- s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidCSRF, ipAddr)
- return
- }
- user, userMerged, err := dataprovider.GetUserVariants(username, "")
- if err != nil {
- if errors.Is(err, util.ErrNotFound) {
- handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
- }
- s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
- return
- }
- if !userMerged.Filters.TOTPConfig.Enabled || !util.Contains(userMerged.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
- s.renderClientTwoFactorPage(w, r, "Two factory authentication is not enabled", ipAddr)
- return
- }
- for idx, code := range user.Filters.RecoveryCodes {
- if err := code.Secret.Decrypt(); err != nil {
- s.renderClientInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
- return
- }
- if code.Secret.GetPayload() == recoveryCode {
- if code.Used {
- s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
- return
- }
- user.Filters.RecoveryCodes[idx].Used = true
- err = dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, ipAddr, user.Role)
- if err != nil {
- logger.Warn(logSender, "", "unable to set the recovery code %q as used: %v", recoveryCode, err)
- s.renderClientInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
- return
- }
- connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
- s.loginUser(w, r, &userMerged, connectionID, ipAddr, true,
- s.renderClientTwoFactorRecoveryPage)
- return
- }
- }
- handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
- s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
- }
- func (s *httpdServer) handleWebClientTwoFactorPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- claims, err := getTokenClaims(r)
- if err != nil {
- s.renderNotFoundPage(w, r, nil)
- return
- }
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := r.ParseForm(); err != nil {
- s.renderClientTwoFactorPage(w, r, util.I18nErrorInvalidForm, ipAddr)
- return
- }
- username := claims.Username
- passcode := strings.TrimSpace(r.Form.Get("passcode"))
- if username == "" || passcode == "" {
- updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
- dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
- s.renderClientTwoFactorPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
- dataprovider.LoginMethodPassword, ipAddr, err)
- s.renderClientTwoFactorPage(w, r, util.I18nErrorInvalidCSRF, ipAddr)
- return
- }
- user, err := dataprovider.GetUserWithGroupSettings(username, "")
- if err != nil {
- updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
- dataprovider.LoginMethodPassword, ipAddr, err)
- s.renderClientTwoFactorPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
- return
- }
- if !user.Filters.TOTPConfig.Enabled || !util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
- s.renderClientTwoFactorPage(w, r, util.I18n2FADisabled, ipAddr)
- return
- }
- err = user.Filters.TOTPConfig.Secret.Decrypt()
- if err != nil {
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
- s.renderClientInternalServerErrorPage(w, r, err)
- return
- }
- match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
- user.Filters.TOTPConfig.Secret.GetPayload())
- if !match || err != nil {
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
- s.renderClientTwoFactorPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
- return
- }
- connectionID := fmt.Sprintf("%s_%s", getProtocolFromRequest(r), xid.New().String())
- s.loginUser(w, r, &user, connectionID, ipAddr, true, s.renderClientTwoFactorPage)
- }
- func (s *httpdServer) handleWebAdminTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- claims, err := getTokenClaims(r)
- if err != nil {
- s.renderNotFoundPage(w, r, nil)
- return
- }
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := r.ParseForm(); err != nil {
- s.renderTwoFactorRecoveryPage(w, r, err.Error(), ipAddr)
- return
- }
- username := claims.Username
- recoveryCode := strings.TrimSpace(r.Form.Get("recovery_code"))
- if username == "" || recoveryCode == "" {
- s.renderTwoFactorRecoveryPage(w, r, "Invalid credentials", ipAddr)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderTwoFactorRecoveryPage(w, r, err.Error(), ipAddr)
- return
- }
- admin, err := dataprovider.AdminExists(username)
- if err != nil {
- if errors.Is(err, util.ErrNotFound) {
- handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
- }
- s.renderTwoFactorRecoveryPage(w, r, "Invalid credentials", ipAddr)
- return
- }
- if !admin.Filters.TOTPConfig.Enabled {
- s.renderTwoFactorRecoveryPage(w, r, "Two factory authentication is not enabled", ipAddr)
- return
- }
- for idx, code := range admin.Filters.RecoveryCodes {
- if err := code.Secret.Decrypt(); err != nil {
- s.renderInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
- return
- }
- if code.Secret.GetPayload() == recoveryCode {
- if code.Used {
- s.renderTwoFactorRecoveryPage(w, r, "This recovery code was already used", ipAddr)
- return
- }
- admin.Filters.RecoveryCodes[idx].Used = true
- err = dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, ipAddr, admin.Role)
- if err != nil {
- logger.Warn(logSender, "", "unable to set the recovery code %q as used: %v", recoveryCode, err)
- s.renderInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
- return
- }
- s.loginAdmin(w, r, &admin, true, s.renderTwoFactorRecoveryPage, ipAddr)
- return
- }
- }
- handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
- s.renderTwoFactorRecoveryPage(w, r, "Invalid recovery code", ipAddr)
- }
- func (s *httpdServer) handleWebAdminTwoFactorPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- claims, err := getTokenClaims(r)
- if err != nil {
- s.renderNotFoundPage(w, r, nil)
- return
- }
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := r.ParseForm(); err != nil {
- s.renderTwoFactorPage(w, r, err.Error(), ipAddr)
- return
- }
- username := claims.Username
- passcode := strings.TrimSpace(r.Form.Get("passcode"))
- if username == "" || passcode == "" {
- s.renderTwoFactorPage(w, r, "Invalid credentials", ipAddr)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- err = handleDefenderEventLoginFailed(ipAddr, err)
- s.renderTwoFactorPage(w, r, err.Error(), ipAddr)
- return
- }
- admin, err := dataprovider.AdminExists(username)
- if err != nil {
- if errors.Is(err, util.ErrNotFound) {
- handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
- }
- s.renderTwoFactorPage(w, r, "Invalid credentials", ipAddr)
- return
- }
- if !admin.Filters.TOTPConfig.Enabled {
- s.renderTwoFactorPage(w, r, "Two factory authentication is not enabled", ipAddr)
- return
- }
- err = admin.Filters.TOTPConfig.Secret.Decrypt()
- if err != nil {
- s.renderInternalServerErrorPage(w, r, err)
- return
- }
- match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
- admin.Filters.TOTPConfig.Secret.GetPayload())
- if !match || err != nil {
- handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
- s.renderTwoFactorPage(w, r, "Invalid authentication code", ipAddr)
- return
- }
- s.loginAdmin(w, r, &admin, true, s.renderTwoFactorPage, ipAddr)
- }
- func (s *httpdServer) handleWebAdminLoginPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := r.ParseForm(); err != nil {
- s.renderAdminLoginPage(w, r, err.Error(), ipAddr)
- return
- }
- username := strings.TrimSpace(r.Form.Get("username"))
- password := strings.TrimSpace(r.Form.Get("password"))
- if username == "" || password == "" {
- s.renderAdminLoginPage(w, r, "Invalid credentials", ipAddr)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderAdminLoginPage(w, r, err.Error(), ipAddr)
- return
- }
- admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
- if err != nil {
- err = handleDefenderEventLoginFailed(ipAddr, err)
- s.renderAdminLoginPage(w, r, err.Error(), ipAddr)
- return
- }
- s.loginAdmin(w, r, &admin, false, s.renderAdminLoginPage, ipAddr)
- }
- func (s *httpdServer) renderAdminLoginPage(w http.ResponseWriter, r *http.Request, error, ip string) {
- data := loginPage{
- commonBasePage: getCommonBasePage(r),
- Title: util.I18nLoginTitle,
- CurrentURL: webAdminLoginPath,
- Error: error,
- CSRFToken: createCSRFToken(ip),
- Branding: s.binding.Branding.WebAdmin,
- FormDisabled: s.binding.isWebAdminLoginFormDisabled(),
- }
- if s.binding.showClientLoginURL() {
- data.AltLoginURL = webClientLoginPath
- data.AltLoginName = s.binding.Branding.WebClient.ShortName
- }
- if smtp.IsEnabled() && !data.FormDisabled {
- data.ForgotPwdURL = webAdminForgotPwdPath
- }
- if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
- data.OpenIDLoginURL = webAdminOIDCLoginPath
- }
- renderAdminTemplate(w, templateLogin, data)
- }
- func (s *httpdServer) handleWebAdminLogin(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- if !dataprovider.HasAdmin() {
- http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
- return
- }
- s.renderAdminLoginPage(w, r, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
- }
- func (s *httpdServer) handleWebAdminLogout(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- c := jwtTokenClaims{}
- c.removeCookie(w, r, webBaseAdminPath)
- s.logoutOIDCUser(w, r)
- http.Redirect(w, r, webAdminLoginPath, http.StatusFound)
- }
- func (s *httpdServer) handleWebAdminChangePwdPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- err := r.ParseForm()
- if err != nil {
- s.renderChangePasswordPage(w, r, err.Error())
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
- s.renderForbiddenPage(w, r, err.Error())
- return
- }
- err = doChangeAdminPassword(r, strings.TrimSpace(r.Form.Get("current_password")),
- strings.TrimSpace(r.Form.Get("new_password1")), strings.TrimSpace(r.Form.Get("new_password2")))
- if err != nil {
- s.renderChangePasswordPage(w, r, err.Error())
- return
- }
- s.handleWebAdminLogout(w, r)
- }
- func (s *httpdServer) handleWebAdminPasswordResetPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- err := r.ParseForm()
- if err != nil {
- s.renderResetPwdPage(w, r, err.Error(), ipAddr)
- return
- }
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderForbiddenPage(w, r, err.Error())
- return
- }
- admin, _, err := handleResetPassword(r, strings.TrimSpace(r.Form.Get("code")),
- strings.TrimSpace(r.Form.Get("password")), true)
- if err != nil {
- if e, ok := err.(*util.ValidationError); ok {
- s.renderResetPwdPage(w, r, e.GetErrorString(), ipAddr)
- return
- }
- s.renderResetPwdPage(w, r, err.Error(), ipAddr)
- return
- }
- s.loginAdmin(w, r, admin, false, s.renderResetPwdPage, ipAddr)
- }
- func (s *httpdServer) handleWebAdminSetupPost(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- if dataprovider.HasAdmin() {
- s.renderBadRequestPage(w, r, errors.New("an admin user already exists"))
- return
- }
- err := r.ParseForm()
- if err != nil {
- s.renderAdminSetupPage(w, r, "", err.Error())
- return
- }
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
- s.renderForbiddenPage(w, r, err.Error())
- return
- }
- username := strings.TrimSpace(r.Form.Get("username"))
- password := strings.TrimSpace(r.Form.Get("password"))
- confirmPassword := strings.TrimSpace(r.Form.Get("confirm_password"))
- installCode := strings.TrimSpace(r.Form.Get("install_code"))
- if installationCode != "" && installCode != resolveInstallationCode() {
- s.renderAdminSetupPage(w, r, username, fmt.Sprintf("%v mismatch", installationCodeHint))
- return
- }
- if username == "" {
- s.renderAdminSetupPage(w, r, username, "Please set a username")
- return
- }
- if password == "" {
- s.renderAdminSetupPage(w, r, username, "Please set a password")
- return
- }
- if password != confirmPassword {
- s.renderAdminSetupPage(w, r, username, "Passwords mismatch")
- return
- }
- admin := dataprovider.Admin{
- Username: username,
- Password: password,
- Status: 1,
- Permissions: []string{dataprovider.PermAdminAny},
- }
- err = dataprovider.AddAdmin(&admin, username, ipAddr, "")
- if err != nil {
- s.renderAdminSetupPage(w, r, username, err.Error())
- return
- }
- s.loginAdmin(w, r, &admin, false, nil, ipAddr)
- }
- func (s *httpdServer) loginUser(
- w http.ResponseWriter, r *http.Request, user *dataprovider.User, connectionID, ipAddr string,
- isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, r *http.Request, error, ip string),
- ) {
- c := jwtTokenClaims{
- Username: user.Username,
- Permissions: user.Filters.WebClient,
- Signature: user.GetSignature(),
- Role: user.Role,
- MustSetTwoFactorAuth: user.MustSetSecondFactor(),
- MustChangePassword: user.MustChangePassword(),
- RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
- }
- audience := tokenAudienceWebClient
- if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) &&
- user.CanManageMFA() && !isSecondFactorAuth {
- audience = tokenAudienceWebClientPartial
- }
- err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
- if err != nil {
- logger.Warn(logSender, connectionID, "unable to set user login cookie %v", err)
- updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
- errorFunc(w, r, util.I18nError500Message, ipAddr)
- return
- }
- if isSecondFactorAuth {
- invalidateToken(r)
- }
- if audience == tokenAudienceWebClientPartial {
- redirectPath := webClientTwoFactorPath
- if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
- redirectPath += "?next=" + url.QueryEscape(next)
- }
- http.Redirect(w, r, redirectPath, http.StatusFound)
- return
- }
- updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, err)
- dataprovider.UpdateLastLogin(user)
- if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
- http.Redirect(w, r, next, http.StatusFound)
- return
- }
- http.Redirect(w, r, webClientFilesPath, http.StatusFound)
- }
- func (s *httpdServer) loginAdmin(
- w http.ResponseWriter, r *http.Request, admin *dataprovider.Admin,
- isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, r *http.Request, error, ip string),
- ipAddr string,
- ) {
- c := jwtTokenClaims{
- Username: admin.Username,
- Permissions: admin.Permissions,
- Role: admin.Role,
- Signature: admin.GetSignature(),
- HideUserPageSections: admin.Filters.Preferences.HideUserPageSections,
- }
- audience := tokenAudienceWebAdmin
- if admin.Filters.TOTPConfig.Enabled && admin.CanManageMFA() && !isSecondFactorAuth {
- audience = tokenAudienceWebAdminPartial
- }
- err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
- if err != nil {
- logger.Warn(logSender, "", "unable to set admin login cookie %v", err)
- if errorFunc == nil {
- s.renderAdminSetupPage(w, r, admin.Username, err.Error())
- return
- }
- errorFunc(w, r, err.Error(), ipAddr)
- return
- }
- if isSecondFactorAuth {
- invalidateToken(r)
- }
- if audience == tokenAudienceWebAdminPartial {
- http.Redirect(w, r, webAdminTwoFactorPath, http.StatusFound)
- return
- }
- dataprovider.UpdateAdminLastLogin(admin)
- http.Redirect(w, r, webUsersPath, http.StatusFound)
- }
- func (s *httpdServer) logout(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- invalidateToken(r)
- sendAPIResponse(w, r, nil, "Your token has been invalidated", http.StatusOK)
- }
- func (s *httpdServer) getUserToken(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- username, password, ok := r.BasicAuth()
- protocol := common.ProtocolHTTP
- if !ok {
- updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
- dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
- w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
- sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
- return
- }
- if username == "" || password == "" {
- updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
- dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
- w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
- sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
- return
- }
- if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
- updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
- dataprovider.LoginMethodPassword, ipAddr, err)
- sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
- return
- }
- user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
- if err != nil {
- w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
- sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
- http.StatusUnauthorized)
- return
- }
- connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
- if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
- sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
- return
- }
- if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
- passcode := r.Header.Get(otpHeaderCode)
- if passcode == "" {
- logger.Debug(logSender, "", "TOTP enabled for user %q and not passcode provided, authentication refused", user.Username)
- w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
- sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
- http.StatusUnauthorized)
- return
- }
- err = user.Filters.TOTPConfig.Secret.Decrypt()
- if err != nil {
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
- sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err), http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
- return
- }
- match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
- user.Filters.TOTPConfig.Secret.GetPayload())
- if !match || err != nil {
- logger.Debug(logSender, "invalid passcode for user %q, match? %v, err: %v", user.Username, match, err)
- w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
- sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
- http.StatusUnauthorized)
- return
- }
- }
- defer user.CloseFs() //nolint:errcheck
- err = user.CheckFsRoot(connectionID)
- if err != nil {
- logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
- sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
- return
- }
- s.generateAndSendUserToken(w, r, ipAddr, user)
- }
- func (s *httpdServer) generateAndSendUserToken(w http.ResponseWriter, r *http.Request, ipAddr string, user dataprovider.User) {
- c := jwtTokenClaims{
- Username: user.Username,
- Permissions: user.Filters.WebClient,
- Signature: user.GetSignature(),
- Role: user.Role,
- MustSetTwoFactorAuth: user.MustSetSecondFactor(),
- MustChangePassword: user.MustChangePassword(),
- RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
- }
- resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPIUser, ipAddr)
- if err != nil {
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
- sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
- return
- }
- updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
- dataprovider.UpdateLastLogin(&user)
- render.JSON(w, r, resp)
- }
- func (s *httpdServer) getToken(w http.ResponseWriter, r *http.Request) {
- username, password, ok := r.BasicAuth()
- if !ok {
- w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
- sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
- return
- }
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
- if err != nil {
- err = handleDefenderEventLoginFailed(ipAddr, err)
- w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
- sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
- return
- }
- if admin.Filters.TOTPConfig.Enabled {
- passcode := r.Header.Get(otpHeaderCode)
- if passcode == "" {
- logger.Debug(logSender, "", "TOTP enabled for admin %q and not passcode provided, authentication refused", admin.Username)
- w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
- err = handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials)
- sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
- return
- }
- err = admin.Filters.TOTPConfig.Secret.Decrypt()
- if err != nil {
- sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err),
- http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
- return
- }
- match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
- admin.Filters.TOTPConfig.Secret.GetPayload())
- if !match || err != nil {
- logger.Debug(logSender, "invalid passcode for admin %q, match? %v, err: %v", admin.Username, match, err)
- w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
- err = handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials)
- sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized),
- http.StatusUnauthorized)
- return
- }
- }
- s.generateAndSendToken(w, r, admin, ipAddr)
- }
- func (s *httpdServer) generateAndSendToken(w http.ResponseWriter, r *http.Request, admin dataprovider.Admin, ip string) {
- c := jwtTokenClaims{
- Username: admin.Username,
- Permissions: admin.Permissions,
- Role: admin.Role,
- Signature: admin.GetSignature(),
- }
- resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPI, ip)
- if err != nil {
- sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
- return
- }
- dataprovider.UpdateAdminLastLogin(&admin)
- render.JSON(w, r, resp)
- }
- func (s *httpdServer) checkCookieExpiration(w http.ResponseWriter, r *http.Request) {
- if _, ok := r.Context().Value(oidcTokenKey).(string); ok {
- return
- }
- token, claims, err := jwtauth.FromContext(r.Context())
- if err != nil {
- return
- }
- tokenClaims := jwtTokenClaims{}
- tokenClaims.Decode(claims)
- if tokenClaims.Username == "" || tokenClaims.Signature == "" {
- return
- }
- if time.Until(token.Expiration()) > tokenRefreshThreshold {
- return
- }
- if util.Contains(token.Audience(), tokenAudienceWebClient) {
- s.refreshClientToken(w, r, tokenClaims)
- } else {
- s.refreshAdminToken(w, r, tokenClaims)
- }
- }
- func (s *httpdServer) refreshClientToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
- user, err := dataprovider.GetUserWithGroupSettings(tokenClaims.Username, "")
- if err != nil {
- return
- }
- if user.GetSignature() != tokenClaims.Signature {
- logger.Debug(logSender, "", "signature mismatch for user %q, unable to refresh cookie", user.Username)
- return
- }
- if err := checkHTTPClientUser(&user, r, xid.New().String(), true); err != nil {
- logger.Debug(logSender, "", "unable to refresh cookie for user %q: %v", user.Username, err)
- return
- }
- tokenClaims.Permissions = user.Filters.WebClient
- tokenClaims.Role = user.Role
- logger.Debug(logSender, "", "cookie refreshed for user %q", user.Username)
- tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebClient, util.GetIPFromRemoteAddress(r.RemoteAddr)) //nolint:errcheck
- }
- func (s *httpdServer) refreshAdminToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
- admin, err := dataprovider.AdminExists(tokenClaims.Username)
- if err != nil {
- return
- }
- if admin.Status != 1 {
- logger.Debug(logSender, "", "admin %q is disabled, unable to refresh cookie", admin.Username)
- return
- }
- if admin.GetSignature() != tokenClaims.Signature {
- logger.Debug(logSender, "", "signature mismatch for admin %q, unable to refresh cookie", admin.Username)
- return
- }
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- if !admin.CanLoginFromIP(ipAddr) {
- logger.Debug(logSender, "", "admin %q cannot login from %v, unable to refresh cookie", admin.Username, r.RemoteAddr)
- return
- }
- tokenClaims.Permissions = admin.Permissions
- tokenClaims.Role = admin.Role
- tokenClaims.HideUserPageSections = admin.Filters.Preferences.HideUserPageSections
- logger.Debug(logSender, "", "cookie refreshed for admin %q", admin.Username)
- tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebAdmin, ipAddr) //nolint:errcheck
- }
- func (s *httpdServer) updateContextFromCookie(r *http.Request) *http.Request {
- token, _, err := jwtauth.FromContext(r.Context())
- if token == nil || err != nil {
- _, err = r.Cookie(jwtCookieKey)
- if err != nil {
- return r
- }
- token, err = jwtauth.VerifyRequest(s.tokenAuth, r, jwtauth.TokenFromCookie)
- ctx := jwtauth.NewContext(r.Context(), token, err)
- return r.WithContext(ctx)
- }
- return r
- }
- func (s *httpdServer) parseHeaders(next http.Handler) http.Handler {
- return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- var ip net.IP
- isUnixSocket := filepath.IsAbs(s.binding.Address)
- if !isUnixSocket {
- ip = net.ParseIP(ipAddr)
- }
- areHeadersAllowed := false
- if isUnixSocket || ip != nil {
- for _, allow := range s.binding.allowHeadersFrom {
- if allow(ip) {
- parsedIP := util.GetRealIP(r, s.binding.ClientIPProxyHeader, s.binding.ClientIPHeaderDepth)
- if parsedIP != "" {
- ipAddr = parsedIP
- r.RemoteAddr = ipAddr
- }
- if forwardedProto := r.Header.Get(xForwardedProto); forwardedProto != "" {
- ctx := context.WithValue(r.Context(), forwardedProtoKey, forwardedProto)
- r = r.WithContext(ctx)
- }
- areHeadersAllowed = true
- break
- }
- }
- }
- if !areHeadersAllowed {
- for idx := range s.binding.Security.proxyHeaders {
- r.Header.Del(s.binding.Security.proxyHeaders[idx])
- }
- }
- next.ServeHTTP(w, r)
- })
- }
- func (s *httpdServer) checkConnection(next http.Handler) http.Handler {
- return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
- common.Connections.AddClientConnection(ipAddr)
- defer common.Connections.RemoveClientConnection(ipAddr)
- if err := common.Connections.IsNewConnectionAllowed(ipAddr, common.ProtocolHTTP); err != nil {
- logger.Log(logger.LevelDebug, common.ProtocolHTTP, "", "connection not allowed from ip %q: %v", ipAddr, err)
- s.sendForbiddenResponse(w, r, util.NewI18nError(err, util.I18nErrorConnectionForbidden))
- return
- }
- if common.IsBanned(ipAddr, common.ProtocolHTTP) {
- s.sendForbiddenResponse(w, r, util.NewI18nError(
- util.NewGenericError("your IP address is blocked"),
- util.I18nErrorIPForbidden),
- )
- return
- }
- if delay, err := common.LimitRate(common.ProtocolHTTP, ipAddr); err != nil {
- delay += 499999999 * time.Nanosecond
- w.Header().Set("Retry-After", fmt.Sprintf("%.0f", delay.Seconds()))
- w.Header().Set("X-Retry-In", delay.String())
- s.sendTooManyRequestResponse(w, r, err)
- return
- }
- next.ServeHTTP(w, r)
- })
- }
- func (s *httpdServer) sendTooManyRequestResponse(w http.ResponseWriter, r *http.Request, err error) {
- if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
- r = s.updateContextFromCookie(r)
- if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
- s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
- util.NewI18nError(errors.New(http.StatusText(http.StatusTooManyRequests)), util.I18nError429Message), "")
- return
- }
- s.renderMessagePage(w, r, http.StatusText(http.StatusTooManyRequests), "Rate limit exceeded", http.StatusTooManyRequests,
- err, "")
- return
- }
- sendAPIResponse(w, r, err, http.StatusText(http.StatusTooManyRequests), http.StatusTooManyRequests)
- }
- func (s *httpdServer) sendForbiddenResponse(w http.ResponseWriter, r *http.Request, err error) {
- if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
- r = s.updateContextFromCookie(r)
- if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
- s.renderClientForbiddenPage(w, r, err)
- return
- }
- s.renderForbiddenPage(w, r, err.Error())
- return
- }
- sendAPIResponse(w, r, err, "", http.StatusForbidden)
- }
- func (s *httpdServer) badHostHandler(w http.ResponseWriter, r *http.Request) {
- host := r.Host
- for _, header := range s.binding.Security.HostsProxyHeaders {
- if h := r.Header.Get(header); h != "" {
- host = h
- break
- }
- }
- s.sendForbiddenResponse(w, r, util.NewI18nError(
- util.NewGenericError(fmt.Sprintf("The host %q is not allowed", host)),
- util.I18nErrorConnectionForbidden,
- ))
- }
- func (s *httpdServer) notFoundHandler(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
- r = s.updateContextFromCookie(r)
- if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
- s.renderClientNotFoundPage(w, r, nil)
- return
- }
- s.renderNotFoundPage(w, r, nil)
- return
- }
- sendAPIResponse(w, r, nil, http.StatusText(http.StatusNotFound), http.StatusNotFound)
- }
- func (s *httpdServer) redirectToWebPath(w http.ResponseWriter, r *http.Request, webPath string) {
- if dataprovider.HasAdmin() {
- http.Redirect(w, r, webPath, http.StatusFound)
- return
- }
- if s.enableWebAdmin {
- http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
- }
- }
- // The StripSlashes causes infinite redirects at the root path if used with http.FileServer.
- // We also don't strip paths with more than one trailing slash, see #1434
- func (s *httpdServer) mustStripSlash(r *http.Request) bool {
- var urlPath string
- rctx := chi.RouteContext(r.Context())
- if rctx != nil && rctx.RoutePath != "" {
- urlPath = rctx.RoutePath
- } else {
- urlPath = r.URL.Path
- }
- return !strings.HasSuffix(urlPath, "//") && !strings.HasPrefix(urlPath, webOpenAPIPath) &&
- !strings.HasPrefix(urlPath, webStaticFilesPath) && !strings.HasPrefix(urlPath, acmeChallengeURI)
- }
- func (s *httpdServer) initializeRouter() {
- var hasHTTPSRedirect bool
- s.tokenAuth = jwtauth.New(jwa.HS256.String(), getSigningKey(s.signingPassphrase), nil)
- s.router = chi.NewRouter()
- s.router.Use(middleware.RequestID)
- s.router.Use(s.parseHeaders)
- s.router.Use(logger.NewStructuredLogger(logger.GetLogger()))
- s.router.Use(middleware.Recoverer)
- s.router.Use(s.checkConnection)
- if s.binding.Security.Enabled {
- secureMiddleware := secure.New(secure.Options{
- AllowedHosts: s.binding.Security.AllowedHosts,
- AllowedHostsAreRegex: s.binding.Security.AllowedHostsAreRegex,
- HostsProxyHeaders: s.binding.Security.HostsProxyHeaders,
- SSLProxyHeaders: s.binding.Security.getHTTPSProxyHeaders(),
- STSSeconds: s.binding.Security.STSSeconds,
- STSIncludeSubdomains: s.binding.Security.STSIncludeSubdomains,
- STSPreload: s.binding.Security.STSPreload,
- ContentTypeNosniff: s.binding.Security.ContentTypeNosniff,
- ContentSecurityPolicy: s.binding.Security.ContentSecurityPolicy,
- PermissionsPolicy: s.binding.Security.PermissionsPolicy,
- CrossOriginOpenerPolicy: s.binding.Security.CrossOriginOpenerPolicy,
- ExpectCTHeader: s.binding.Security.ExpectCTHeader,
- })
- secureMiddleware.SetBadHostHandler(http.HandlerFunc(s.badHostHandler))
- s.router.Use(secureMiddleware.Handler)
- if s.binding.Security.HTTPSRedirect {
- s.router.Use(s.binding.Security.redirectHandler)
- hasHTTPSRedirect = true
- }
- }
- if s.cors.Enabled {
- c := cors.New(cors.Options{
- AllowedOrigins: util.RemoveDuplicates(s.cors.AllowedOrigins, true),
- AllowedMethods: util.RemoveDuplicates(s.cors.AllowedMethods, true),
- AllowedHeaders: util.RemoveDuplicates(s.cors.AllowedHeaders, true),
- ExposedHeaders: util.RemoveDuplicates(s.cors.ExposedHeaders, true),
- MaxAge: s.cors.MaxAge,
- AllowCredentials: s.cors.AllowCredentials,
- OptionsPassthrough: s.cors.OptionsPassthrough,
- OptionsSuccessStatus: s.cors.OptionsSuccessStatus,
- AllowPrivateNetwork: s.cors.AllowPrivateNetwork,
- })
- s.router.Use(c.Handler)
- }
- s.router.Use(middleware.GetHead)
- s.router.Use(middleware.Maybe(middleware.StripSlashes, s.mustStripSlash))
- s.router.NotFound(s.notFoundHandler)
- s.router.Get(healthzPath, func(w http.ResponseWriter, r *http.Request) {
- render.PlainText(w, r, "ok")
- })
- s.router.Get(robotsTxtPath, func(w http.ResponseWriter, r *http.Request) {
- render.PlainText(w, r, "User-agent: *\nDisallow: /")
- })
- if hasHTTPSRedirect {
- if p := acme.GetHTTP01WebRoot(); p != "" {
- serveStaticDir(s.router, acmeChallengeURI, p, true)
- }
- }
- if s.enableRESTAPI {
- // share API available to external users
- s.router.Get(sharesPath+"/{id}", s.downloadFromShare) //nolint:goconst
- s.router.Post(sharesPath+"/{id}", s.uploadFilesToShare)
- s.router.Post(sharesPath+"/{id}/{name}", s.uploadFileToShare)
- s.router.With(compressor.Handler).Get(sharesPath+"/{id}/dirs", s.readBrowsableShareContents)
- s.router.Get(sharesPath+"/{id}/files", s.downloadBrowsableSharedFile)
- s.router.Get(tokenPath, s.getToken)
- s.router.Post(adminPath+"/{username}/forgot-password", forgotAdminPassword)
- s.router.Post(adminPath+"/{username}/reset-password", resetAdminPassword)
- s.router.Post(userPath+"/{username}/forgot-password", forgotUserPassword)
- s.router.Post(userPath+"/{username}/reset-password", resetUserPassword)
- s.router.Group(func(router chi.Router) {
- router.Use(checkNodeToken(s.tokenAuth))
- router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeAdmin))
- router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
- router.Use(jwtAuthenticatorAPI)
- router.Get(versionPath, func(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- render.JSON(w, r, version.Get())
- })
- router.With(forbidAPIKeyAuthentication).Get(logoutPath, s.logout)
- router.With(forbidAPIKeyAuthentication).Get(adminProfilePath, getAdminProfile)
- router.With(forbidAPIKeyAuthentication).Put(adminProfilePath, updateAdminProfile)
- router.With(forbidAPIKeyAuthentication).Put(adminPwdPath, changeAdminPassword)
- // admin TOTP APIs
- router.With(forbidAPIKeyAuthentication).Get(adminTOTPConfigsPath, getTOTPConfigs)
- router.With(forbidAPIKeyAuthentication).Post(adminTOTPGeneratePath, generateTOTPSecret)
- router.With(forbidAPIKeyAuthentication).Post(adminTOTPValidatePath, validateTOTPPasscode)
- router.With(forbidAPIKeyAuthentication).Post(adminTOTPSavePath, saveTOTPConfig)
- router.With(forbidAPIKeyAuthentication).Get(admin2FARecoveryCodesPath, getRecoveryCodes)
- router.With(forbidAPIKeyAuthentication).Post(admin2FARecoveryCodesPath, generateRecoveryCodes)
- router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus)).
- Get(serverStatusPath, func(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- render.JSON(w, r, getServicesStatus())
- })
- router.With(s.checkPerm(dataprovider.PermAdminViewConnections)).Get(activeConnectionsPath, getActiveConnections)
- router.With(s.checkPerm(dataprovider.PermAdminCloseConnections)).
- Delete(activeConnectionsPath+"/{connectionID}", handleCloseConnection)
- router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/users/scans", getUsersQuotaScans)
- router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/users/{username}/scan", startUserQuotaScan)
- router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/folders/scans", getFoldersQuotaScans)
- router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/folders/{name}/scan", startFolderQuotaScan)
- router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath, getUsers)
- router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(userPath, addUser)
- router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath+"/{username}", getUserByUsername) //nolint:goconst
- router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}", updateUser)
- router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers)).Delete(userPath+"/{username}", deleteUser)
- router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}/2fa/disable", disableUser2FA)
- router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Get(folderPath, getFolders)
- router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Get(folderPath+"/{name}", getFolderByName) //nolint:goconst
- router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Post(folderPath, addFolder)
- router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Put(folderPath+"/{name}", updateFolder)
- router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Delete(folderPath+"/{name}", deleteFolder)
- router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath, getGroups)
- router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath+"/{name}", getGroupByName)
- router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(groupPath, addGroup)
- router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Put(groupPath+"/{name}", updateGroup)
- router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Delete(groupPath+"/{name}", deleteGroup)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(dumpDataPath, dumpData)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(loadDataPath, loadData)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(loadDataPath, loadDataFromRequest)
- router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/usage",
- updateUserQuotaUsage)
- router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/transfer-usage",
- updateUserTransferQuotaUsage)
- router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/folders/{name}/usage",
- updateFolderQuotaUsage)
- router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts, getDefenderHosts)
- router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts+"/{id}", getDefenderHostByID)
- router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(defenderHosts+"/{id}", deleteDefenderHostByID)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath, getAdmins)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(adminPath, addAdmin)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath+"/{username}", getAdminByUsername)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}", updateAdmin)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Delete(adminPath+"/{username}", deleteAdmin)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}/2fa/disable", disableAdmin2FA)
- router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Get(retentionChecksPath, getRetentionChecks)
- router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Post(retentionBasePath+"/{username}/check",
- startRetentionCheck)
- router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Get(metadataChecksPath, getMetadataChecks)
- router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Post(metadataBasePath+"/{username}/check",
- startMetadataCheck)
- router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
- Get(fsEventsPath, searchFsEvents)
- router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
- Get(providerEventsPath, searchProviderEvents)
- router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
- Get(logEventsPath, searchLogEvents)
- router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
- Get(apiKeysPath, getAPIKeys)
- router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
- Post(apiKeysPath, addAPIKey)
- router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
- Get(apiKeysPath+"/{id}", getAPIKeyByID)
- router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
- Put(apiKeysPath+"/{id}", updateAPIKey)
- router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
- Delete(apiKeysPath+"/{id}", deleteAPIKey)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath, getEventActions)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath+"/{name}", getEventActionByName)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventActionsPath, addEventAction)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventActionsPath+"/{name}", updateEventAction)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventActionsPath+"/{name}", deleteEventAction)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath, getEventRules)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath+"/{name}", getEventRuleByName)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventRulesPath, addEventRule)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventRulesPath+"/{name}", updateEventRule)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventRulesPath+"/{name}", deleteEventRule)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventRulesPath+"/run/{name}", runOnDemandRule)
- router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Get(rolesPath, getRoles)
- router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(rolesPath, addRole)
- router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Get(rolesPath+"/{name}", getRoleByName)
- router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Put(rolesPath+"/{name}", updateRole)
- router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Delete(rolesPath+"/{name}", deleteRole)
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), compressor.Handler).Get(ipListsPath+"/{type}", getIPListEntries) //nolint:goconst
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(ipListsPath+"/{type}", addIPListEntry)
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Get(ipListsPath+"/{type}/{ipornet}", getIPListEntry) //nolint:goconst
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Put(ipListsPath+"/{type}/{ipornet}", updateIPListEntry)
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Delete(ipListsPath+"/{type}/{ipornet}", deleteIPListEntry)
- })
- s.router.Get(userTokenPath, s.getUserToken)
- s.router.Group(func(router chi.Router) {
- router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeUser))
- router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
- router.Use(jwtAuthenticatorAPIUser)
- router.With(forbidAPIKeyAuthentication).Get(userLogoutPath, s.logout)
- router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
- Put(userPwdPath, changeUserPassword)
- router.With(forbidAPIKeyAuthentication).Get(userProfilePath, getUserProfile)
- router.With(forbidAPIKeyAuthentication, s.checkAuthRequirements).Put(userProfilePath, updateUserProfile)
- // user TOTP APIs
- router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
- Get(userTOTPConfigsPath, getTOTPConfigs)
- router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
- Post(userTOTPGeneratePath, generateTOTPSecret)
- router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
- Post(userTOTPValidatePath, validateTOTPPasscode)
- router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
- Post(userTOTPSavePath, saveTOTPConfig)
- router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
- Get(user2FARecoveryCodesPath, getRecoveryCodes)
- router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
- Post(user2FARecoveryCodesPath, generateRecoveryCodes)
- router.With(s.checkAuthRequirements, compressor.Handler).Get(userDirsPath, readUserFolder)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
- Post(userDirsPath, createUserDir)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
- Patch(userDirsPath, renameUserFsEntry)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
- Delete(userDirsPath, deleteUserDir)
- router.With(s.checkAuthRequirements).Get(userFilesPath, getUserFile)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
- Post(userFilesPath, uploadUserFiles)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
- Patch(userFilesPath, renameUserFsEntry)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
- Delete(userFilesPath, deleteUserFile)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
- Post(userFileActionsPath+"/move", renameUserFsEntry)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
- Post(userFileActionsPath+"/copy", copyUserFsEntry)
- router.With(s.checkAuthRequirements).Post(userStreamZipPath, getUserFilesAsZipStream)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
- Get(userSharesPath, getShares)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
- Post(userSharesPath, addShare)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
- Get(userSharesPath+"/{id}", getShareByID)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
- Put(userSharesPath+"/{id}", updateShare)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
- Delete(userSharesPath+"/{id}", deleteShare)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
- Post(userUploadFilePath, uploadUserFile)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
- Patch(userFilesDirsMetadataPath, setFileDirMetadata)
- })
- if s.renderOpenAPI {
- s.router.Group(func(router chi.Router) {
- router.Use(compressor.Handler)
- serveStaticDir(router, webOpenAPIPath, s.openAPIPath, false)
- })
- }
- }
- if s.enableWebAdmin || s.enableWebClient {
- s.router.Group(func(router chi.Router) {
- router.Use(compressor.Handler)
- serveStaticDir(router, webStaticFilesPath, s.staticFilesPath, true)
- })
- if s.binding.OIDC.isEnabled() {
- s.router.Get(webOIDCRedirectPath, s.handleOIDCRedirect)
- }
- if s.enableWebClient {
- s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- s.redirectToWebPath(w, r, webClientLoginPath)
- })
- s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- s.redirectToWebPath(w, r, webClientLoginPath)
- })
- } else {
- s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- s.redirectToWebPath(w, r, webAdminLoginPath)
- })
- s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- s.redirectToWebPath(w, r, webAdminLoginPath)
- })
- }
- }
- s.setupWebClientRoutes()
- s.setupWebAdminRoutes()
- }
- func (s *httpdServer) setupWebClientRoutes() {
- if s.enableWebClient {
- s.router.Get(webBaseClientPath, func(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- http.Redirect(w, r, webClientLoginPath, http.StatusFound)
- })
- s.router.Get(webClientLoginPath, s.handleClientWebLogin)
- if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
- s.router.Get(webClientOIDCLoginPath, s.handleWebClientOIDCLogin)
- }
- if !s.binding.isWebClientLoginFormDisabled() {
- s.router.Post(webClientLoginPath, s.handleWebClientLoginPost)
- s.router.Get(webClientForgotPwdPath, s.handleWebClientForgotPwd)
- s.router.Post(webClientForgotPwdPath, s.handleWebClientForgotPwdPost)
- s.router.Get(webClientResetPwdPath, s.handleWebClientPasswordReset)
- s.router.Post(webClientResetPwdPath, s.handleWebClientPasswordResetPost)
- s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
- s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
- Get(webClientTwoFactorPath, s.handleWebClientTwoFactor)
- s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
- s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
- Post(webClientTwoFactorPath, s.handleWebClientTwoFactorPost)
- s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
- s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
- Get(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecovery)
- s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
- s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
- Post(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecoveryPost)
- }
- // share routes available to external users
- s.router.Get(webClientPubSharesPath+"/{id}/login", s.handleClientShareLoginGet)
- s.router.Post(webClientPubSharesPath+"/{id}/login", s.handleClientShareLoginPost)
- s.router.Get(webClientPubSharesPath+"/{id}", s.downloadFromShare)
- s.router.Post(webClientPubSharesPath+"/{id}/partial", s.handleClientSharePartialDownload)
- s.router.Get(webClientPubSharesPath+"/{id}/browse", s.handleShareGetFiles)
- s.router.Get(webClientPubSharesPath+"/{id}/download", s.handleClientSharedFile)
- s.router.Get(webClientPubSharesPath+"/{id}/upload", s.handleClientUploadToShare)
- s.router.With(compressor.Handler).Get(webClientPubSharesPath+"/{id}/dirs", s.handleShareGetDirContents)
- s.router.Post(webClientPubSharesPath+"/{id}", s.uploadFilesToShare)
- s.router.Post(webClientPubSharesPath+"/{id}/{name}", s.uploadFileToShare)
- s.router.Get(webClientPubSharesPath+"/{id}/viewpdf", s.handleShareViewPDF)
- s.router.Get(webClientPubSharesPath+"/{id}/getpdf", s.handleShareGetPDF)
- s.router.Group(func(router chi.Router) {
- if s.binding.OIDC.isEnabled() {
- router.Use(s.oidcTokenAuthenticator(tokenAudienceWebClient))
- }
- router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
- router.Use(jwtAuthenticatorWebClient)
- router.Get(webClientLogoutPath, s.handleWebClientLogout)
- router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientFilesPath, s.handleClientGetFiles)
- router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientViewPDFPath, s.handleClientViewPDF)
- router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientGetPDFPath, s.handleClientGetPDF)
- router.With(s.checkAuthRequirements, s.refreshCookie, verifyCSRFHeader).Get(webClientFilePath, getUserFile)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
- Post(webClientFilePath, uploadUserFile)
- router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientEditFilePath, s.handleClientEditFile)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
- Delete(webClientFilesPath, deleteUserFile)
- router.With(s.checkAuthRequirements, compressor.Handler, s.refreshCookie).
- Get(webClientDirsPath, s.handleClientGetDirContents)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
- Post(webClientDirsPath, createUserDir)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
- Delete(webClientDirsPath, deleteUserDir)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
- Post(webClientFileActionsPath+"/move", renameUserFsEntry)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
- Post(webClientFileActionsPath+"/copy", copyUserFsEntry)
- router.With(s.checkAuthRequirements, s.refreshCookie).
- Post(webClientDownloadZipPath, s.handleWebClientDownloadZip)
- router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientPingPath, s.handleClientPing)
- router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientProfilePath,
- s.handleClientGetProfile)
- router.With(s.checkAuthRequirements).Post(webClientProfilePath, s.handleWebClientProfilePost)
- router.With(s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
- Get(webChangeClientPwdPath, s.handleWebClientChangePwd)
- router.With(s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
- Post(webChangeClientPwdPath, s.handleWebClientChangePwdPost)
- router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), s.refreshCookie).
- Get(webClientMFAPath, s.handleWebClientMFA)
- router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), s.refreshCookie).
- Get(webClientMFAPath+"/qrcode", getQRCode)
- router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
- Post(webClientTOTPGeneratePath, generateTOTPSecret)
- router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
- Post(webClientTOTPValidatePath, validateTOTPPasscode)
- router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
- Post(webClientTOTPSavePath, saveTOTPConfig)
- router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader, s.refreshCookie).
- Get(webClientRecoveryCodesPath, getRecoveryCodes)
- router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
- Post(webClientRecoveryCodesPath, generateRecoveryCodes)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
- Get(webClientSharesPath, s.handleClientGetShares)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
- Get(webClientSharePath, s.handleClientAddShareGet)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
- Post(webClientSharePath, s.handleClientAddSharePost)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
- Get(webClientSharePath+"/{id}", s.handleClientUpdateShareGet)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
- Post(webClientSharePath+"/{id}", s.handleClientUpdateSharePost)
- router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), verifyCSRFHeader).
- Delete(webClientSharePath+"/{id}", deleteShare)
- })
- }
- }
- func (s *httpdServer) setupWebAdminRoutes() {
- if s.enableWebAdmin {
- s.router.Get(webBaseAdminPath, func(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
- s.redirectToWebPath(w, r, webAdminLoginPath)
- })
- s.router.Get(webAdminLoginPath, s.handleWebAdminLogin)
- if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
- s.router.Get(webAdminOIDCLoginPath, s.handleWebAdminOIDCLogin)
- }
- s.router.Get(webOAuth2RedirectPath, s.handleOAuth2TokenRedirect)
- s.router.Get(webAdminSetupPath, s.handleWebAdminSetupGet)
- s.router.Post(webAdminSetupPath, s.handleWebAdminSetupPost)
- if !s.binding.isWebAdminLoginFormDisabled() {
- s.router.Post(webAdminLoginPath, s.handleWebAdminLoginPost)
- s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
- s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
- Get(webAdminTwoFactorPath, s.handleWebAdminTwoFactor)
- s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
- s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
- Post(webAdminTwoFactorPath, s.handleWebAdminTwoFactorPost)
- s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
- s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
- Get(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecovery)
- s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
- s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
- Post(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecoveryPost)
- s.router.Get(webAdminForgotPwdPath, s.handleWebAdminForgotPwd)
- s.router.Post(webAdminForgotPwdPath, s.handleWebAdminForgotPwdPost)
- s.router.Get(webAdminResetPwdPath, s.handleWebAdminPasswordReset)
- s.router.Post(webAdminResetPwdPath, s.handleWebAdminPasswordResetPost)
- }
- s.router.Group(func(router chi.Router) {
- if s.binding.OIDC.isEnabled() {
- router.Use(s.oidcTokenAuthenticator(tokenAudienceWebAdmin))
- }
- router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
- router.Use(jwtAuthenticatorWebAdmin)
- router.Get(webLogoutPath, s.handleWebAdminLogout)
- router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminProfilePath, s.handleWebAdminProfile)
- router.With(s.requireBuiltinLogin).Post(webAdminProfilePath, s.handleWebAdminProfilePost)
- router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webChangeAdminPwdPath, s.handleWebAdminChangePwd)
- router.With(s.requireBuiltinLogin).Post(webChangeAdminPwdPath, s.handleWebAdminChangePwdPost)
- router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminMFAPath, s.handleWebAdminMFA)
- router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminMFAPath+"/qrcode", getQRCode)
- router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPGeneratePath, generateTOTPSecret)
- router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPValidatePath, validateTOTPPasscode)
- router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPSavePath, saveTOTPConfig)
- router.With(verifyCSRFHeader, s.requireBuiltinLogin, s.refreshCookie).Get(webAdminRecoveryCodesPath,
- getRecoveryCodes)
- router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminRecoveryCodesPath, generateRecoveryCodes)
- router.With(s.checkPerm(dataprovider.PermAdminViewUsers), s.refreshCookie).
- Get(webUsersPath, s.handleGetWebUsers)
- router.With(s.checkPerm(dataprovider.PermAdminAddUsers), s.refreshCookie).
- Get(webUserPath, s.handleWebAddUserGet)
- router.With(s.checkPerm(dataprovider.PermAdminChangeUsers), s.refreshCookie).
- Get(webUserPath+"/{username}", s.handleWebUpdateUserGet)
- router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(webUserPath, s.handleWebAddUserPost)
- router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Post(webUserPath+"/{username}",
- s.handleWebUpdateUserPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
- Get(webGroupsPath, s.handleWebGetGroups)
- router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
- Get(webGroupPath, s.handleWebAddGroupGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath, s.handleWebAddGroupPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
- Get(webGroupPath+"/{name}", s.handleWebUpdateGroupGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath+"/{name}",
- s.handleWebUpdateGroupPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageGroups), verifyCSRFHeader).
- Delete(webGroupPath+"/{name}", deleteGroup)
- router.With(s.checkPerm(dataprovider.PermAdminViewConnections), s.refreshCookie).
- Get(webConnectionsPath, s.handleWebGetConnections)
- router.With(s.checkPerm(dataprovider.PermAdminManageFolders), s.refreshCookie).
- Get(webFoldersPath, s.handleWebGetFolders)
- router.With(s.checkPerm(dataprovider.PermAdminManageFolders), s.refreshCookie).
- Get(webFolderPath, s.handleWebAddFolderGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Post(webFolderPath, s.handleWebAddFolderPost)
- router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus), s.refreshCookie).
- Get(webStatusPath, s.handleWebGetStatus)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
- Get(webAdminsPath, s.handleGetWebAdmins)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
- Get(webAdminPath, s.handleWebAddAdminGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
- Get(webAdminPath+"/{username}", s.handleWebUpdateAdminGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath, s.handleWebAddAdminPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath+"/{username}",
- s.handleWebUpdateAdminPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), verifyCSRFHeader).
- Delete(webAdminPath+"/{username}", deleteAdmin)
- router.With(s.checkPerm(dataprovider.PermAdminCloseConnections), verifyCSRFHeader).
- Delete(webConnectionsPath+"/{connectionID}", handleCloseConnection)
- router.With(s.checkPerm(dataprovider.PermAdminManageFolders), s.refreshCookie).
- Get(webFolderPath+"/{name}", s.handleWebUpdateFolderGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Post(webFolderPath+"/{name}",
- s.handleWebUpdateFolderPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageFolders), verifyCSRFHeader).
- Delete(webFolderPath+"/{name}", deleteFolder)
- router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
- Post(webScanVFolderPath+"/{name}", startFolderQuotaScan)
- router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers), verifyCSRFHeader).
- Delete(webUserPath+"/{username}", deleteUser)
- router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
- Post(webQuotaScanPath+"/{username}", startUserQuotaScan)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webMaintenancePath, s.handleWebMaintenance)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webBackupPath, dumpData)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webRestorePath, s.handleWebRestore)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
- Get(webTemplateUser, s.handleWebTemplateUserGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateUser, s.handleWebTemplateUserPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
- Get(webTemplateFolder, s.handleWebTemplateFolderGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateFolder, s.handleWebTemplateFolderPost)
- router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderPath, s.handleWebDefenderPage)
- router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderHostsPath, getDefenderHosts)
- router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(webDefenderHostsPath+"/{id}",
- deleteDefenderHostByID)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
- Get(webAdminEventActionsPath, s.handleWebGetEventActions)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
- Get(webAdminEventActionPath, s.handleWebAddEventActionGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath,
- s.handleWebAddEventActionPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
- Get(webAdminEventActionPath+"/{name}", s.handleWebUpdateEventActionGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath+"/{name}",
- s.handleWebUpdateEventActionPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
- Delete(webAdminEventActionPath+"/{name}", deleteEventAction)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
- Get(webAdminEventRulesPath, s.handleWebGetEventRules)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
- Get(webAdminEventRulePath, s.handleWebAddEventRuleGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath,
- s.handleWebAddEventRulePost)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
- Get(webAdminEventRulePath+"/{name}", s.handleWebUpdateEventRuleGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath+"/{name}",
- s.handleWebUpdateEventRulePost)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
- Delete(webAdminEventRulePath+"/{name}", deleteEventRule)
- router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
- Post(webAdminEventRulePath+"/run/{name}", runOnDemandRule)
- router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
- Get(webAdminRolesPath, s.handleWebGetRoles)
- router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
- Get(webAdminRolePath, s.handleWebAddRoleGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(webAdminRolePath, s.handleWebAddRolePost)
- router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
- Get(webAdminRolePath+"/{name}", s.handleWebUpdateRoleGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(webAdminRolePath+"/{name}",
- s.handleWebUpdateRolePost)
- router.With(s.checkPerm(dataprovider.PermAdminManageRoles), verifyCSRFHeader).
- Delete(webAdminRolePath+"/{name}", deleteRole)
- router.With(s.checkPerm(dataprovider.PermAdminViewEvents), s.refreshCookie).Get(webEventsPath,
- s.handleWebGetEvents)
- router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
- Get(webEventsFsSearchPath, searchFsEvents)
- router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
- Get(webEventsProviderSearchPath, searchProviderEvents)
- router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
- Get(webEventsLogSearchPath, searchLogEvents)
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Get(webIPListsPath, s.handleWebIPListsPage)
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), compressor.Handler, s.refreshCookie).
- Get(webIPListsPath+"/{type}", getIPListEntries)
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), s.refreshCookie).Get(webIPListPath+"/{type}",
- s.handleWebAddIPListEntryGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(webIPListPath+"/{type}",
- s.handleWebAddIPListEntryPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), s.refreshCookie).Get(webIPListPath+"/{type}/{ipornet}",
- s.handleWebUpdateIPListEntryGet)
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(webIPListPath+"/{type}/{ipornet}",
- s.handleWebUpdateIPListEntryPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), verifyCSRFHeader).
- Delete(webIPListPath+"/{type}/{ipornet}", deleteIPListEntry)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).Get(webConfigsPath, s.handleWebConfigs)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webConfigsPath, s.handleWebConfigsPost)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem), verifyCSRFHeader, s.refreshCookie).
- Post(webConfigsPath+"/smtp/test", testSMTPConfig)
- router.With(s.checkPerm(dataprovider.PermAdminManageSystem), verifyCSRFHeader, s.refreshCookie).
- Post(webOAuth2TokenPath, handleSMTPOAuth2TokenRequestPost)
- })
- }
- }
|