server.go 82 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "context"
  17. "crypto/tls"
  18. "crypto/x509"
  19. "errors"
  20. "fmt"
  21. "log"
  22. "net"
  23. "net/http"
  24. "net/url"
  25. "path/filepath"
  26. "strings"
  27. "time"
  28. "github.com/go-chi/chi/v5"
  29. "github.com/go-chi/chi/v5/middleware"
  30. "github.com/go-chi/jwtauth/v5"
  31. "github.com/go-chi/render"
  32. "github.com/lestrrat-go/jwx/v2/jwa"
  33. "github.com/rs/cors"
  34. "github.com/rs/xid"
  35. "github.com/sftpgo/sdk"
  36. "github.com/unrolled/secure"
  37. "github.com/drakkan/sftpgo/v2/internal/acme"
  38. "github.com/drakkan/sftpgo/v2/internal/common"
  39. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  40. "github.com/drakkan/sftpgo/v2/internal/logger"
  41. "github.com/drakkan/sftpgo/v2/internal/mfa"
  42. "github.com/drakkan/sftpgo/v2/internal/smtp"
  43. "github.com/drakkan/sftpgo/v2/internal/util"
  44. "github.com/drakkan/sftpgo/v2/internal/version"
  45. )
  46. var (
  47. compressor = middleware.NewCompressor(5)
  48. xForwardedProto = http.CanonicalHeaderKey("X-Forwarded-Proto")
  49. )
  50. type httpdServer struct {
  51. binding Binding
  52. staticFilesPath string
  53. openAPIPath string
  54. enableWebAdmin bool
  55. enableWebClient bool
  56. enableRESTAPI bool
  57. renderOpenAPI bool
  58. isShared int
  59. router *chi.Mux
  60. tokenAuth *jwtauth.JWTAuth
  61. signingPassphrase string
  62. cors CorsConfig
  63. }
  64. func newHttpdServer(b Binding, staticFilesPath, signingPassphrase string, cors CorsConfig,
  65. openAPIPath string,
  66. ) *httpdServer {
  67. if openAPIPath == "" {
  68. b.RenderOpenAPI = false
  69. }
  70. return &httpdServer{
  71. binding: b,
  72. staticFilesPath: staticFilesPath,
  73. openAPIPath: openAPIPath,
  74. enableWebAdmin: b.EnableWebAdmin,
  75. enableWebClient: b.EnableWebClient,
  76. enableRESTAPI: b.EnableRESTAPI,
  77. renderOpenAPI: b.RenderOpenAPI,
  78. signingPassphrase: signingPassphrase,
  79. cors: cors,
  80. }
  81. }
  82. func (s *httpdServer) setShared(value int) {
  83. s.isShared = value
  84. }
  85. func (s *httpdServer) listenAndServe() error {
  86. s.initializeRouter()
  87. httpServer := &http.Server{
  88. Handler: s.router,
  89. ReadHeaderTimeout: 30 * time.Second,
  90. ReadTimeout: 60 * time.Second,
  91. WriteTimeout: 60 * time.Second,
  92. IdleTimeout: 60 * time.Second,
  93. MaxHeaderBytes: 1 << 16, // 64KB
  94. ErrorLog: log.New(&logger.StdLoggerWrapper{Sender: logSender}, "", 0),
  95. }
  96. if certMgr != nil && s.binding.EnableHTTPS {
  97. certID := common.DefaultTLSKeyPaidID
  98. if getConfigPath(s.binding.CertificateFile, "") != "" && getConfigPath(s.binding.CertificateKeyFile, "") != "" {
  99. certID = s.binding.GetAddress()
  100. }
  101. config := &tls.Config{
  102. GetCertificate: certMgr.GetCertificateFunc(certID),
  103. MinVersion: util.GetTLSVersion(s.binding.MinTLSVersion),
  104. NextProtos: util.GetALPNProtocols(s.binding.Protocols),
  105. CipherSuites: util.GetTLSCiphersFromNames(s.binding.TLSCipherSuites),
  106. }
  107. httpServer.TLSConfig = config
  108. logger.Debug(logSender, "", "configured TLS cipher suites for binding %q: %v, certID: %v",
  109. s.binding.GetAddress(), httpServer.TLSConfig.CipherSuites, certID)
  110. if s.binding.ClientAuthType == 1 {
  111. httpServer.TLSConfig.ClientCAs = certMgr.GetRootCAs()
  112. httpServer.TLSConfig.ClientAuth = tls.RequireAndVerifyClientCert
  113. httpServer.TLSConfig.VerifyConnection = s.verifyTLSConnection
  114. }
  115. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, true, logSender)
  116. }
  117. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, false, logSender)
  118. }
  119. func (s *httpdServer) verifyTLSConnection(state tls.ConnectionState) error {
  120. if certMgr != nil {
  121. var clientCrt *x509.Certificate
  122. var clientCrtName string
  123. if len(state.PeerCertificates) > 0 {
  124. clientCrt = state.PeerCertificates[0]
  125. clientCrtName = clientCrt.Subject.String()
  126. }
  127. if len(state.VerifiedChains) == 0 {
  128. logger.Warn(logSender, "", "TLS connection cannot be verified: unable to get verification chain")
  129. return errors.New("TLS connection cannot be verified: unable to get verification chain")
  130. }
  131. for _, verifiedChain := range state.VerifiedChains {
  132. var caCrt *x509.Certificate
  133. if len(verifiedChain) > 0 {
  134. caCrt = verifiedChain[len(verifiedChain)-1]
  135. }
  136. if certMgr.IsRevoked(clientCrt, caCrt) {
  137. logger.Debug(logSender, "", "tls handshake error, client certificate %q has been revoked", clientCrtName)
  138. return common.ErrCrtRevoked
  139. }
  140. }
  141. }
  142. return nil
  143. }
  144. func (s *httpdServer) refreshCookie(next http.Handler) http.Handler {
  145. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  146. s.checkCookieExpiration(w, r)
  147. next.ServeHTTP(w, r)
  148. })
  149. }
  150. func (s *httpdServer) renderClientLoginPage(w http.ResponseWriter, r *http.Request, error, ip string) {
  151. data := loginPage{
  152. commonBasePage: getCommonBasePage(r),
  153. Title: util.I18nLoginTitle,
  154. CurrentURL: webClientLoginPath,
  155. Error: error,
  156. CSRFToken: createCSRFToken(ip),
  157. Branding: s.binding.Branding.WebClient,
  158. FormDisabled: s.binding.isWebClientLoginFormDisabled(),
  159. }
  160. if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
  161. data.CurrentURL += "?next=" + url.QueryEscape(next)
  162. }
  163. if s.binding.showAdminLoginURL() {
  164. data.AltLoginURL = webAdminLoginPath
  165. data.AltLoginName = s.binding.Branding.WebAdmin.ShortName
  166. }
  167. if smtp.IsEnabled() && !data.FormDisabled {
  168. data.ForgotPwdURL = webClientForgotPwdPath
  169. }
  170. if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
  171. data.OpenIDLoginURL = webClientOIDCLoginPath
  172. }
  173. renderClientTemplate(w, templateClientLogin, data)
  174. }
  175. func (s *httpdServer) handleWebClientLogout(w http.ResponseWriter, r *http.Request) {
  176. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  177. c := jwtTokenClaims{}
  178. c.removeCookie(w, r, webBaseClientPath)
  179. s.logoutOIDCUser(w, r)
  180. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  181. }
  182. func (s *httpdServer) handleWebClientChangePwdPost(w http.ResponseWriter, r *http.Request) {
  183. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  184. if err := r.ParseForm(); err != nil {
  185. s.renderClientChangePasswordPage(w, r, util.I18nErrorInvalidForm)
  186. return
  187. }
  188. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  189. s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
  190. return
  191. }
  192. err := doChangeUserPassword(r, strings.TrimSpace(r.Form.Get("current_password")),
  193. strings.TrimSpace(r.Form.Get("new_password1")), strings.TrimSpace(r.Form.Get("new_password2")))
  194. if err != nil {
  195. s.renderClientChangePasswordPage(w, r, getI18NErrorString(err, util.I18nErrorChangePwdGeneric))
  196. return
  197. }
  198. s.handleWebClientLogout(w, r)
  199. }
  200. func (s *httpdServer) handleClientWebLogin(w http.ResponseWriter, r *http.Request) {
  201. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  202. if !dataprovider.HasAdmin() {
  203. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  204. return
  205. }
  206. s.renderClientLoginPage(w, r, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
  207. }
  208. func (s *httpdServer) handleWebClientLoginPost(w http.ResponseWriter, r *http.Request) {
  209. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  210. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  211. if err := r.ParseForm(); err != nil {
  212. s.renderClientLoginPage(w, r, util.I18nErrorInvalidForm, ipAddr)
  213. return
  214. }
  215. protocol := common.ProtocolHTTP
  216. username := strings.TrimSpace(r.Form.Get("username"))
  217. password := strings.TrimSpace(r.Form.Get("password"))
  218. if username == "" || password == "" {
  219. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  220. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  221. s.renderClientLoginPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
  222. return
  223. }
  224. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  225. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  226. dataprovider.LoginMethodPassword, ipAddr, err)
  227. s.renderClientLoginPage(w, r, util.I18nErrorInvalidCSRF, ipAddr)
  228. return
  229. }
  230. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  231. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  232. dataprovider.LoginMethodPassword, ipAddr, err)
  233. s.renderClientLoginPage(w, r, util.I18nError403Message, ipAddr)
  234. return
  235. }
  236. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  237. if err != nil {
  238. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  239. s.renderClientLoginPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
  240. return
  241. }
  242. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  243. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  244. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  245. s.renderClientLoginPage(w, r, getI18NErrorString(err, util.I18nError403Message), ipAddr)
  246. return
  247. }
  248. defer user.CloseFs() //nolint:errcheck
  249. err = user.CheckFsRoot(connectionID)
  250. if err != nil {
  251. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  252. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  253. s.renderClientLoginPage(w, r, getI18NErrorString(err, util.I18nErrorFsGeneric), ipAddr)
  254. return
  255. }
  256. s.loginUser(w, r, &user, connectionID, ipAddr, false, s.renderClientLoginPage)
  257. }
  258. func (s *httpdServer) handleWebClientPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  259. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  260. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  261. err := r.ParseForm()
  262. if err != nil {
  263. s.renderClientResetPwdPage(w, r, util.I18nErrorInvalidForm, ipAddr)
  264. return
  265. }
  266. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  267. s.renderClientForbiddenPage(w, r, util.NewI18nError(err, util.I18nErrorInvalidCSRF))
  268. return
  269. }
  270. newPassword := strings.TrimSpace(r.Form.Get("password"))
  271. confirmPassword := strings.TrimSpace(r.Form.Get("confirm_password"))
  272. if newPassword != confirmPassword {
  273. s.renderClientResetPwdPage(w, r, util.I18nErrorChangePwdNoMatch, ipAddr)
  274. return
  275. }
  276. _, user, err := handleResetPassword(r, strings.TrimSpace(r.Form.Get("code")),
  277. newPassword, false)
  278. if err != nil {
  279. s.renderClientResetPwdPage(w, r, getI18NErrorString(err, util.I18nErrorChangePwdGeneric), ipAddr)
  280. return
  281. }
  282. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  283. if err := checkHTTPClientUser(user, r, connectionID, true); err != nil {
  284. s.renderClientResetPwdPage(w, r, getI18NErrorString(err, util.I18nErrorDirList403), ipAddr)
  285. return
  286. }
  287. defer user.CloseFs() //nolint:errcheck
  288. err = user.CheckFsRoot(connectionID)
  289. if err != nil {
  290. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  291. s.renderClientResetPwdPage(w, r, util.I18nErrorLoginAfterReset, ipAddr)
  292. return
  293. }
  294. s.loginUser(w, r, user, connectionID, ipAddr, false, s.renderClientResetPwdPage)
  295. }
  296. func (s *httpdServer) handleWebClientTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  297. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  298. claims, err := getTokenClaims(r)
  299. if err != nil {
  300. s.renderNotFoundPage(w, r, nil)
  301. return
  302. }
  303. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  304. if err := r.ParseForm(); err != nil {
  305. s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidForm, ipAddr)
  306. return
  307. }
  308. username := claims.Username
  309. recoveryCode := strings.TrimSpace(r.Form.Get("recovery_code"))
  310. if username == "" || recoveryCode == "" {
  311. s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
  312. return
  313. }
  314. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  315. s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidCSRF, ipAddr)
  316. return
  317. }
  318. user, userMerged, err := dataprovider.GetUserVariants(username, "")
  319. if err != nil {
  320. if errors.Is(err, util.ErrNotFound) {
  321. handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
  322. }
  323. s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
  324. return
  325. }
  326. if !userMerged.Filters.TOTPConfig.Enabled || !util.Contains(userMerged.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  327. s.renderClientTwoFactorPage(w, r, "Two factory authentication is not enabled", ipAddr)
  328. return
  329. }
  330. for idx, code := range user.Filters.RecoveryCodes {
  331. if err := code.Secret.Decrypt(); err != nil {
  332. s.renderClientInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  333. return
  334. }
  335. if code.Secret.GetPayload() == recoveryCode {
  336. if code.Used {
  337. s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
  338. return
  339. }
  340. user.Filters.RecoveryCodes[idx].Used = true
  341. err = dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, ipAddr, user.Role)
  342. if err != nil {
  343. logger.Warn(logSender, "", "unable to set the recovery code %q as used: %v", recoveryCode, err)
  344. s.renderClientInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  345. return
  346. }
  347. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  348. s.loginUser(w, r, &userMerged, connectionID, ipAddr, true,
  349. s.renderClientTwoFactorRecoveryPage)
  350. return
  351. }
  352. }
  353. handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
  354. s.renderClientTwoFactorRecoveryPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
  355. }
  356. func (s *httpdServer) handleWebClientTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  357. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  358. claims, err := getTokenClaims(r)
  359. if err != nil {
  360. s.renderNotFoundPage(w, r, nil)
  361. return
  362. }
  363. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  364. if err := r.ParseForm(); err != nil {
  365. s.renderClientTwoFactorPage(w, r, util.I18nErrorInvalidForm, ipAddr)
  366. return
  367. }
  368. username := claims.Username
  369. passcode := strings.TrimSpace(r.Form.Get("passcode"))
  370. if username == "" || passcode == "" {
  371. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  372. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  373. s.renderClientTwoFactorPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
  374. return
  375. }
  376. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  377. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  378. dataprovider.LoginMethodPassword, ipAddr, err)
  379. s.renderClientTwoFactorPage(w, r, util.I18nErrorInvalidCSRF, ipAddr)
  380. return
  381. }
  382. user, err := dataprovider.GetUserWithGroupSettings(username, "")
  383. if err != nil {
  384. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  385. dataprovider.LoginMethodPassword, ipAddr, err)
  386. s.renderClientTwoFactorPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
  387. return
  388. }
  389. if !user.Filters.TOTPConfig.Enabled || !util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  390. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  391. s.renderClientTwoFactorPage(w, r, util.I18n2FADisabled, ipAddr)
  392. return
  393. }
  394. err = user.Filters.TOTPConfig.Secret.Decrypt()
  395. if err != nil {
  396. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  397. s.renderClientInternalServerErrorPage(w, r, err)
  398. return
  399. }
  400. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  401. user.Filters.TOTPConfig.Secret.GetPayload())
  402. if !match || err != nil {
  403. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  404. s.renderClientTwoFactorPage(w, r, util.I18nErrorInvalidCredentials, ipAddr)
  405. return
  406. }
  407. connectionID := fmt.Sprintf("%s_%s", getProtocolFromRequest(r), xid.New().String())
  408. s.loginUser(w, r, &user, connectionID, ipAddr, true, s.renderClientTwoFactorPage)
  409. }
  410. func (s *httpdServer) handleWebAdminTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  411. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  412. claims, err := getTokenClaims(r)
  413. if err != nil {
  414. s.renderNotFoundPage(w, r, nil)
  415. return
  416. }
  417. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  418. if err := r.ParseForm(); err != nil {
  419. s.renderTwoFactorRecoveryPage(w, r, err.Error(), ipAddr)
  420. return
  421. }
  422. username := claims.Username
  423. recoveryCode := strings.TrimSpace(r.Form.Get("recovery_code"))
  424. if username == "" || recoveryCode == "" {
  425. s.renderTwoFactorRecoveryPage(w, r, "Invalid credentials", ipAddr)
  426. return
  427. }
  428. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  429. s.renderTwoFactorRecoveryPage(w, r, err.Error(), ipAddr)
  430. return
  431. }
  432. admin, err := dataprovider.AdminExists(username)
  433. if err != nil {
  434. if errors.Is(err, util.ErrNotFound) {
  435. handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
  436. }
  437. s.renderTwoFactorRecoveryPage(w, r, "Invalid credentials", ipAddr)
  438. return
  439. }
  440. if !admin.Filters.TOTPConfig.Enabled {
  441. s.renderTwoFactorRecoveryPage(w, r, "Two factory authentication is not enabled", ipAddr)
  442. return
  443. }
  444. for idx, code := range admin.Filters.RecoveryCodes {
  445. if err := code.Secret.Decrypt(); err != nil {
  446. s.renderInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  447. return
  448. }
  449. if code.Secret.GetPayload() == recoveryCode {
  450. if code.Used {
  451. s.renderTwoFactorRecoveryPage(w, r, "This recovery code was already used", ipAddr)
  452. return
  453. }
  454. admin.Filters.RecoveryCodes[idx].Used = true
  455. err = dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, ipAddr, admin.Role)
  456. if err != nil {
  457. logger.Warn(logSender, "", "unable to set the recovery code %q as used: %v", recoveryCode, err)
  458. s.renderInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  459. return
  460. }
  461. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorRecoveryPage, ipAddr)
  462. return
  463. }
  464. }
  465. handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
  466. s.renderTwoFactorRecoveryPage(w, r, "Invalid recovery code", ipAddr)
  467. }
  468. func (s *httpdServer) handleWebAdminTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  469. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  470. claims, err := getTokenClaims(r)
  471. if err != nil {
  472. s.renderNotFoundPage(w, r, nil)
  473. return
  474. }
  475. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  476. if err := r.ParseForm(); err != nil {
  477. s.renderTwoFactorPage(w, r, err.Error(), ipAddr)
  478. return
  479. }
  480. username := claims.Username
  481. passcode := strings.TrimSpace(r.Form.Get("passcode"))
  482. if username == "" || passcode == "" {
  483. s.renderTwoFactorPage(w, r, "Invalid credentials", ipAddr)
  484. return
  485. }
  486. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  487. err = handleDefenderEventLoginFailed(ipAddr, err)
  488. s.renderTwoFactorPage(w, r, err.Error(), ipAddr)
  489. return
  490. }
  491. admin, err := dataprovider.AdminExists(username)
  492. if err != nil {
  493. if errors.Is(err, util.ErrNotFound) {
  494. handleDefenderEventLoginFailed(ipAddr, err) //nolint:errcheck
  495. }
  496. s.renderTwoFactorPage(w, r, "Invalid credentials", ipAddr)
  497. return
  498. }
  499. if !admin.Filters.TOTPConfig.Enabled {
  500. s.renderTwoFactorPage(w, r, "Two factory authentication is not enabled", ipAddr)
  501. return
  502. }
  503. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  504. if err != nil {
  505. s.renderInternalServerErrorPage(w, r, err)
  506. return
  507. }
  508. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  509. admin.Filters.TOTPConfig.Secret.GetPayload())
  510. if !match || err != nil {
  511. handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials) //nolint:errcheck
  512. s.renderTwoFactorPage(w, r, "Invalid authentication code", ipAddr)
  513. return
  514. }
  515. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorPage, ipAddr)
  516. }
  517. func (s *httpdServer) handleWebAdminLoginPost(w http.ResponseWriter, r *http.Request) {
  518. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  519. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  520. if err := r.ParseForm(); err != nil {
  521. s.renderAdminLoginPage(w, r, err.Error(), ipAddr)
  522. return
  523. }
  524. username := strings.TrimSpace(r.Form.Get("username"))
  525. password := strings.TrimSpace(r.Form.Get("password"))
  526. if username == "" || password == "" {
  527. s.renderAdminLoginPage(w, r, "Invalid credentials", ipAddr)
  528. return
  529. }
  530. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  531. s.renderAdminLoginPage(w, r, err.Error(), ipAddr)
  532. return
  533. }
  534. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  535. if err != nil {
  536. err = handleDefenderEventLoginFailed(ipAddr, err)
  537. s.renderAdminLoginPage(w, r, err.Error(), ipAddr)
  538. return
  539. }
  540. s.loginAdmin(w, r, &admin, false, s.renderAdminLoginPage, ipAddr)
  541. }
  542. func (s *httpdServer) renderAdminLoginPage(w http.ResponseWriter, r *http.Request, error, ip string) {
  543. data := loginPage{
  544. commonBasePage: getCommonBasePage(r),
  545. Title: util.I18nLoginTitle,
  546. CurrentURL: webAdminLoginPath,
  547. Error: error,
  548. CSRFToken: createCSRFToken(ip),
  549. Branding: s.binding.Branding.WebAdmin,
  550. FormDisabled: s.binding.isWebAdminLoginFormDisabled(),
  551. }
  552. if s.binding.showClientLoginURL() {
  553. data.AltLoginURL = webClientLoginPath
  554. data.AltLoginName = s.binding.Branding.WebClient.ShortName
  555. }
  556. if smtp.IsEnabled() && !data.FormDisabled {
  557. data.ForgotPwdURL = webAdminForgotPwdPath
  558. }
  559. if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
  560. data.OpenIDLoginURL = webAdminOIDCLoginPath
  561. }
  562. renderAdminTemplate(w, templateLogin, data)
  563. }
  564. func (s *httpdServer) handleWebAdminLogin(w http.ResponseWriter, r *http.Request) {
  565. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  566. if !dataprovider.HasAdmin() {
  567. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  568. return
  569. }
  570. s.renderAdminLoginPage(w, r, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
  571. }
  572. func (s *httpdServer) handleWebAdminLogout(w http.ResponseWriter, r *http.Request) {
  573. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  574. c := jwtTokenClaims{}
  575. c.removeCookie(w, r, webBaseAdminPath)
  576. s.logoutOIDCUser(w, r)
  577. http.Redirect(w, r, webAdminLoginPath, http.StatusFound)
  578. }
  579. func (s *httpdServer) handleWebAdminChangePwdPost(w http.ResponseWriter, r *http.Request) {
  580. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  581. err := r.ParseForm()
  582. if err != nil {
  583. s.renderChangePasswordPage(w, r, err.Error())
  584. return
  585. }
  586. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  587. s.renderForbiddenPage(w, r, err.Error())
  588. return
  589. }
  590. err = doChangeAdminPassword(r, strings.TrimSpace(r.Form.Get("current_password")),
  591. strings.TrimSpace(r.Form.Get("new_password1")), strings.TrimSpace(r.Form.Get("new_password2")))
  592. if err != nil {
  593. s.renderChangePasswordPage(w, r, err.Error())
  594. return
  595. }
  596. s.handleWebAdminLogout(w, r)
  597. }
  598. func (s *httpdServer) handleWebAdminPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  599. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  600. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  601. err := r.ParseForm()
  602. if err != nil {
  603. s.renderResetPwdPage(w, r, err.Error(), ipAddr)
  604. return
  605. }
  606. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  607. s.renderForbiddenPage(w, r, err.Error())
  608. return
  609. }
  610. admin, _, err := handleResetPassword(r, strings.TrimSpace(r.Form.Get("code")),
  611. strings.TrimSpace(r.Form.Get("password")), true)
  612. if err != nil {
  613. if e, ok := err.(*util.ValidationError); ok {
  614. s.renderResetPwdPage(w, r, e.GetErrorString(), ipAddr)
  615. return
  616. }
  617. s.renderResetPwdPage(w, r, err.Error(), ipAddr)
  618. return
  619. }
  620. s.loginAdmin(w, r, admin, false, s.renderResetPwdPage, ipAddr)
  621. }
  622. func (s *httpdServer) handleWebAdminSetupPost(w http.ResponseWriter, r *http.Request) {
  623. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  624. if dataprovider.HasAdmin() {
  625. s.renderBadRequestPage(w, r, errors.New("an admin user already exists"))
  626. return
  627. }
  628. err := r.ParseForm()
  629. if err != nil {
  630. s.renderAdminSetupPage(w, r, "", err.Error())
  631. return
  632. }
  633. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  634. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  635. s.renderForbiddenPage(w, r, err.Error())
  636. return
  637. }
  638. username := strings.TrimSpace(r.Form.Get("username"))
  639. password := strings.TrimSpace(r.Form.Get("password"))
  640. confirmPassword := strings.TrimSpace(r.Form.Get("confirm_password"))
  641. installCode := strings.TrimSpace(r.Form.Get("install_code"))
  642. if installationCode != "" && installCode != resolveInstallationCode() {
  643. s.renderAdminSetupPage(w, r, username, fmt.Sprintf("%v mismatch", installationCodeHint))
  644. return
  645. }
  646. if username == "" {
  647. s.renderAdminSetupPage(w, r, username, "Please set a username")
  648. return
  649. }
  650. if password == "" {
  651. s.renderAdminSetupPage(w, r, username, "Please set a password")
  652. return
  653. }
  654. if password != confirmPassword {
  655. s.renderAdminSetupPage(w, r, username, "Passwords mismatch")
  656. return
  657. }
  658. admin := dataprovider.Admin{
  659. Username: username,
  660. Password: password,
  661. Status: 1,
  662. Permissions: []string{dataprovider.PermAdminAny},
  663. }
  664. err = dataprovider.AddAdmin(&admin, username, ipAddr, "")
  665. if err != nil {
  666. s.renderAdminSetupPage(w, r, username, err.Error())
  667. return
  668. }
  669. s.loginAdmin(w, r, &admin, false, nil, ipAddr)
  670. }
  671. func (s *httpdServer) loginUser(
  672. w http.ResponseWriter, r *http.Request, user *dataprovider.User, connectionID, ipAddr string,
  673. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, r *http.Request, error, ip string),
  674. ) {
  675. c := jwtTokenClaims{
  676. Username: user.Username,
  677. Permissions: user.Filters.WebClient,
  678. Signature: user.GetSignature(),
  679. Role: user.Role,
  680. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  681. MustChangePassword: user.MustChangePassword(),
  682. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  683. }
  684. audience := tokenAudienceWebClient
  685. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) &&
  686. user.CanManageMFA() && !isSecondFactorAuth {
  687. audience = tokenAudienceWebClientPartial
  688. }
  689. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  690. if err != nil {
  691. logger.Warn(logSender, connectionID, "unable to set user login cookie %v", err)
  692. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  693. errorFunc(w, r, util.I18nError500Message, ipAddr)
  694. return
  695. }
  696. if isSecondFactorAuth {
  697. invalidateToken(r)
  698. }
  699. if audience == tokenAudienceWebClientPartial {
  700. redirectPath := webClientTwoFactorPath
  701. if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
  702. redirectPath += "?next=" + url.QueryEscape(next)
  703. }
  704. http.Redirect(w, r, redirectPath, http.StatusFound)
  705. return
  706. }
  707. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, err)
  708. dataprovider.UpdateLastLogin(user)
  709. if next := r.URL.Query().Get("next"); strings.HasPrefix(next, webClientFilesPath) {
  710. http.Redirect(w, r, next, http.StatusFound)
  711. return
  712. }
  713. http.Redirect(w, r, webClientFilesPath, http.StatusFound)
  714. }
  715. func (s *httpdServer) loginAdmin(
  716. w http.ResponseWriter, r *http.Request, admin *dataprovider.Admin,
  717. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, r *http.Request, error, ip string),
  718. ipAddr string,
  719. ) {
  720. c := jwtTokenClaims{
  721. Username: admin.Username,
  722. Permissions: admin.Permissions,
  723. Role: admin.Role,
  724. Signature: admin.GetSignature(),
  725. HideUserPageSections: admin.Filters.Preferences.HideUserPageSections,
  726. }
  727. audience := tokenAudienceWebAdmin
  728. if admin.Filters.TOTPConfig.Enabled && admin.CanManageMFA() && !isSecondFactorAuth {
  729. audience = tokenAudienceWebAdminPartial
  730. }
  731. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  732. if err != nil {
  733. logger.Warn(logSender, "", "unable to set admin login cookie %v", err)
  734. if errorFunc == nil {
  735. s.renderAdminSetupPage(w, r, admin.Username, err.Error())
  736. return
  737. }
  738. errorFunc(w, r, err.Error(), ipAddr)
  739. return
  740. }
  741. if isSecondFactorAuth {
  742. invalidateToken(r)
  743. }
  744. if audience == tokenAudienceWebAdminPartial {
  745. http.Redirect(w, r, webAdminTwoFactorPath, http.StatusFound)
  746. return
  747. }
  748. dataprovider.UpdateAdminLastLogin(admin)
  749. http.Redirect(w, r, webUsersPath, http.StatusFound)
  750. }
  751. func (s *httpdServer) logout(w http.ResponseWriter, r *http.Request) {
  752. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  753. invalidateToken(r)
  754. sendAPIResponse(w, r, nil, "Your token has been invalidated", http.StatusOK)
  755. }
  756. func (s *httpdServer) getUserToken(w http.ResponseWriter, r *http.Request) {
  757. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  758. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  759. username, password, ok := r.BasicAuth()
  760. protocol := common.ProtocolHTTP
  761. if !ok {
  762. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  763. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  764. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  765. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  766. return
  767. }
  768. if username == "" || password == "" {
  769. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  770. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  771. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  772. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  773. return
  774. }
  775. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  776. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  777. dataprovider.LoginMethodPassword, ipAddr, err)
  778. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  779. return
  780. }
  781. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  782. if err != nil {
  783. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  784. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  785. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  786. http.StatusUnauthorized)
  787. return
  788. }
  789. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  790. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  791. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  792. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  793. return
  794. }
  795. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  796. passcode := r.Header.Get(otpHeaderCode)
  797. if passcode == "" {
  798. logger.Debug(logSender, "", "TOTP enabled for user %q and not passcode provided, authentication refused", user.Username)
  799. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  800. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  801. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  802. http.StatusUnauthorized)
  803. return
  804. }
  805. err = user.Filters.TOTPConfig.Secret.Decrypt()
  806. if err != nil {
  807. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  808. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err), http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  809. return
  810. }
  811. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  812. user.Filters.TOTPConfig.Secret.GetPayload())
  813. if !match || err != nil {
  814. logger.Debug(logSender, "invalid passcode for user %q, match? %v, err: %v", user.Username, match, err)
  815. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  816. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  817. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  818. http.StatusUnauthorized)
  819. return
  820. }
  821. }
  822. defer user.CloseFs() //nolint:errcheck
  823. err = user.CheckFsRoot(connectionID)
  824. if err != nil {
  825. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  826. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  827. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  828. return
  829. }
  830. s.generateAndSendUserToken(w, r, ipAddr, user)
  831. }
  832. func (s *httpdServer) generateAndSendUserToken(w http.ResponseWriter, r *http.Request, ipAddr string, user dataprovider.User) {
  833. c := jwtTokenClaims{
  834. Username: user.Username,
  835. Permissions: user.Filters.WebClient,
  836. Signature: user.GetSignature(),
  837. Role: user.Role,
  838. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  839. MustChangePassword: user.MustChangePassword(),
  840. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  841. }
  842. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPIUser, ipAddr)
  843. if err != nil {
  844. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  845. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  846. return
  847. }
  848. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  849. dataprovider.UpdateLastLogin(&user)
  850. render.JSON(w, r, resp)
  851. }
  852. func (s *httpdServer) getToken(w http.ResponseWriter, r *http.Request) {
  853. username, password, ok := r.BasicAuth()
  854. if !ok {
  855. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  856. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  857. return
  858. }
  859. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  860. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  861. if err != nil {
  862. err = handleDefenderEventLoginFailed(ipAddr, err)
  863. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  864. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  865. return
  866. }
  867. if admin.Filters.TOTPConfig.Enabled {
  868. passcode := r.Header.Get(otpHeaderCode)
  869. if passcode == "" {
  870. logger.Debug(logSender, "", "TOTP enabled for admin %q and not passcode provided, authentication refused", admin.Username)
  871. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  872. err = handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials)
  873. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  874. return
  875. }
  876. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  877. if err != nil {
  878. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err),
  879. http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  880. return
  881. }
  882. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  883. admin.Filters.TOTPConfig.Secret.GetPayload())
  884. if !match || err != nil {
  885. logger.Debug(logSender, "invalid passcode for admin %q, match? %v, err: %v", admin.Username, match, err)
  886. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  887. err = handleDefenderEventLoginFailed(ipAddr, dataprovider.ErrInvalidCredentials)
  888. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized),
  889. http.StatusUnauthorized)
  890. return
  891. }
  892. }
  893. s.generateAndSendToken(w, r, admin, ipAddr)
  894. }
  895. func (s *httpdServer) generateAndSendToken(w http.ResponseWriter, r *http.Request, admin dataprovider.Admin, ip string) {
  896. c := jwtTokenClaims{
  897. Username: admin.Username,
  898. Permissions: admin.Permissions,
  899. Role: admin.Role,
  900. Signature: admin.GetSignature(),
  901. }
  902. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPI, ip)
  903. if err != nil {
  904. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  905. return
  906. }
  907. dataprovider.UpdateAdminLastLogin(&admin)
  908. render.JSON(w, r, resp)
  909. }
  910. func (s *httpdServer) checkCookieExpiration(w http.ResponseWriter, r *http.Request) {
  911. if _, ok := r.Context().Value(oidcTokenKey).(string); ok {
  912. return
  913. }
  914. token, claims, err := jwtauth.FromContext(r.Context())
  915. if err != nil {
  916. return
  917. }
  918. tokenClaims := jwtTokenClaims{}
  919. tokenClaims.Decode(claims)
  920. if tokenClaims.Username == "" || tokenClaims.Signature == "" {
  921. return
  922. }
  923. if time.Until(token.Expiration()) > tokenRefreshThreshold {
  924. return
  925. }
  926. if util.Contains(token.Audience(), tokenAudienceWebClient) {
  927. s.refreshClientToken(w, r, tokenClaims)
  928. } else {
  929. s.refreshAdminToken(w, r, tokenClaims)
  930. }
  931. }
  932. func (s *httpdServer) refreshClientToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  933. user, err := dataprovider.GetUserWithGroupSettings(tokenClaims.Username, "")
  934. if err != nil {
  935. return
  936. }
  937. if user.GetSignature() != tokenClaims.Signature {
  938. logger.Debug(logSender, "", "signature mismatch for user %q, unable to refresh cookie", user.Username)
  939. return
  940. }
  941. if err := checkHTTPClientUser(&user, r, xid.New().String(), true); err != nil {
  942. logger.Debug(logSender, "", "unable to refresh cookie for user %q: %v", user.Username, err)
  943. return
  944. }
  945. tokenClaims.Permissions = user.Filters.WebClient
  946. tokenClaims.Role = user.Role
  947. logger.Debug(logSender, "", "cookie refreshed for user %q", user.Username)
  948. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebClient, util.GetIPFromRemoteAddress(r.RemoteAddr)) //nolint:errcheck
  949. }
  950. func (s *httpdServer) refreshAdminToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  951. admin, err := dataprovider.AdminExists(tokenClaims.Username)
  952. if err != nil {
  953. return
  954. }
  955. if admin.Status != 1 {
  956. logger.Debug(logSender, "", "admin %q is disabled, unable to refresh cookie", admin.Username)
  957. return
  958. }
  959. if admin.GetSignature() != tokenClaims.Signature {
  960. logger.Debug(logSender, "", "signature mismatch for admin %q, unable to refresh cookie", admin.Username)
  961. return
  962. }
  963. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  964. if !admin.CanLoginFromIP(ipAddr) {
  965. logger.Debug(logSender, "", "admin %q cannot login from %v, unable to refresh cookie", admin.Username, r.RemoteAddr)
  966. return
  967. }
  968. tokenClaims.Permissions = admin.Permissions
  969. tokenClaims.Role = admin.Role
  970. tokenClaims.HideUserPageSections = admin.Filters.Preferences.HideUserPageSections
  971. logger.Debug(logSender, "", "cookie refreshed for admin %q", admin.Username)
  972. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebAdmin, ipAddr) //nolint:errcheck
  973. }
  974. func (s *httpdServer) updateContextFromCookie(r *http.Request) *http.Request {
  975. token, _, err := jwtauth.FromContext(r.Context())
  976. if token == nil || err != nil {
  977. _, err = r.Cookie(jwtCookieKey)
  978. if err != nil {
  979. return r
  980. }
  981. token, err = jwtauth.VerifyRequest(s.tokenAuth, r, jwtauth.TokenFromCookie)
  982. ctx := jwtauth.NewContext(r.Context(), token, err)
  983. return r.WithContext(ctx)
  984. }
  985. return r
  986. }
  987. func (s *httpdServer) parseHeaders(next http.Handler) http.Handler {
  988. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  989. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  990. var ip net.IP
  991. isUnixSocket := filepath.IsAbs(s.binding.Address)
  992. if !isUnixSocket {
  993. ip = net.ParseIP(ipAddr)
  994. }
  995. areHeadersAllowed := false
  996. if isUnixSocket || ip != nil {
  997. for _, allow := range s.binding.allowHeadersFrom {
  998. if allow(ip) {
  999. parsedIP := util.GetRealIP(r, s.binding.ClientIPProxyHeader, s.binding.ClientIPHeaderDepth)
  1000. if parsedIP != "" {
  1001. ipAddr = parsedIP
  1002. r.RemoteAddr = ipAddr
  1003. }
  1004. if forwardedProto := r.Header.Get(xForwardedProto); forwardedProto != "" {
  1005. ctx := context.WithValue(r.Context(), forwardedProtoKey, forwardedProto)
  1006. r = r.WithContext(ctx)
  1007. }
  1008. areHeadersAllowed = true
  1009. break
  1010. }
  1011. }
  1012. }
  1013. if !areHeadersAllowed {
  1014. for idx := range s.binding.Security.proxyHeaders {
  1015. r.Header.Del(s.binding.Security.proxyHeaders[idx])
  1016. }
  1017. }
  1018. next.ServeHTTP(w, r)
  1019. })
  1020. }
  1021. func (s *httpdServer) checkConnection(next http.Handler) http.Handler {
  1022. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  1023. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  1024. common.Connections.AddClientConnection(ipAddr)
  1025. defer common.Connections.RemoveClientConnection(ipAddr)
  1026. if err := common.Connections.IsNewConnectionAllowed(ipAddr, common.ProtocolHTTP); err != nil {
  1027. logger.Log(logger.LevelDebug, common.ProtocolHTTP, "", "connection not allowed from ip %q: %v", ipAddr, err)
  1028. s.sendForbiddenResponse(w, r, util.NewI18nError(err, util.I18nErrorConnectionForbidden))
  1029. return
  1030. }
  1031. if common.IsBanned(ipAddr, common.ProtocolHTTP) {
  1032. s.sendForbiddenResponse(w, r, util.NewI18nError(
  1033. util.NewGenericError("your IP address is blocked"),
  1034. util.I18nErrorIPForbidden),
  1035. )
  1036. return
  1037. }
  1038. if delay, err := common.LimitRate(common.ProtocolHTTP, ipAddr); err != nil {
  1039. delay += 499999999 * time.Nanosecond
  1040. w.Header().Set("Retry-After", fmt.Sprintf("%.0f", delay.Seconds()))
  1041. w.Header().Set("X-Retry-In", delay.String())
  1042. s.sendTooManyRequestResponse(w, r, err)
  1043. return
  1044. }
  1045. next.ServeHTTP(w, r)
  1046. })
  1047. }
  1048. func (s *httpdServer) sendTooManyRequestResponse(w http.ResponseWriter, r *http.Request, err error) {
  1049. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1050. r = s.updateContextFromCookie(r)
  1051. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1052. s.renderClientMessagePage(w, r, util.I18nError429Title, http.StatusTooManyRequests,
  1053. util.NewI18nError(errors.New(http.StatusText(http.StatusTooManyRequests)), util.I18nError429Message), "")
  1054. return
  1055. }
  1056. s.renderMessagePage(w, r, http.StatusText(http.StatusTooManyRequests), "Rate limit exceeded", http.StatusTooManyRequests,
  1057. err, "")
  1058. return
  1059. }
  1060. sendAPIResponse(w, r, err, http.StatusText(http.StatusTooManyRequests), http.StatusTooManyRequests)
  1061. }
  1062. func (s *httpdServer) sendForbiddenResponse(w http.ResponseWriter, r *http.Request, err error) {
  1063. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1064. r = s.updateContextFromCookie(r)
  1065. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1066. s.renderClientForbiddenPage(w, r, err)
  1067. return
  1068. }
  1069. s.renderForbiddenPage(w, r, err.Error())
  1070. return
  1071. }
  1072. sendAPIResponse(w, r, err, "", http.StatusForbidden)
  1073. }
  1074. func (s *httpdServer) badHostHandler(w http.ResponseWriter, r *http.Request) {
  1075. host := r.Host
  1076. for _, header := range s.binding.Security.HostsProxyHeaders {
  1077. if h := r.Header.Get(header); h != "" {
  1078. host = h
  1079. break
  1080. }
  1081. }
  1082. s.sendForbiddenResponse(w, r, util.NewI18nError(
  1083. util.NewGenericError(fmt.Sprintf("The host %q is not allowed", host)),
  1084. util.I18nErrorConnectionForbidden,
  1085. ))
  1086. }
  1087. func (s *httpdServer) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  1088. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1089. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1090. r = s.updateContextFromCookie(r)
  1091. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1092. s.renderClientNotFoundPage(w, r, nil)
  1093. return
  1094. }
  1095. s.renderNotFoundPage(w, r, nil)
  1096. return
  1097. }
  1098. sendAPIResponse(w, r, nil, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  1099. }
  1100. func (s *httpdServer) redirectToWebPath(w http.ResponseWriter, r *http.Request, webPath string) {
  1101. if dataprovider.HasAdmin() {
  1102. http.Redirect(w, r, webPath, http.StatusFound)
  1103. return
  1104. }
  1105. if s.enableWebAdmin {
  1106. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  1107. }
  1108. }
  1109. // The StripSlashes causes infinite redirects at the root path if used with http.FileServer.
  1110. // We also don't strip paths with more than one trailing slash, see #1434
  1111. func (s *httpdServer) mustStripSlash(r *http.Request) bool {
  1112. var urlPath string
  1113. rctx := chi.RouteContext(r.Context())
  1114. if rctx != nil && rctx.RoutePath != "" {
  1115. urlPath = rctx.RoutePath
  1116. } else {
  1117. urlPath = r.URL.Path
  1118. }
  1119. return !strings.HasSuffix(urlPath, "//") && !strings.HasPrefix(urlPath, webOpenAPIPath) &&
  1120. !strings.HasPrefix(urlPath, webStaticFilesPath) && !strings.HasPrefix(urlPath, acmeChallengeURI)
  1121. }
  1122. func (s *httpdServer) initializeRouter() {
  1123. var hasHTTPSRedirect bool
  1124. s.tokenAuth = jwtauth.New(jwa.HS256.String(), getSigningKey(s.signingPassphrase), nil)
  1125. s.router = chi.NewRouter()
  1126. s.router.Use(middleware.RequestID)
  1127. s.router.Use(s.parseHeaders)
  1128. s.router.Use(logger.NewStructuredLogger(logger.GetLogger()))
  1129. s.router.Use(middleware.Recoverer)
  1130. s.router.Use(s.checkConnection)
  1131. if s.binding.Security.Enabled {
  1132. secureMiddleware := secure.New(secure.Options{
  1133. AllowedHosts: s.binding.Security.AllowedHosts,
  1134. AllowedHostsAreRegex: s.binding.Security.AllowedHostsAreRegex,
  1135. HostsProxyHeaders: s.binding.Security.HostsProxyHeaders,
  1136. SSLProxyHeaders: s.binding.Security.getHTTPSProxyHeaders(),
  1137. STSSeconds: s.binding.Security.STSSeconds,
  1138. STSIncludeSubdomains: s.binding.Security.STSIncludeSubdomains,
  1139. STSPreload: s.binding.Security.STSPreload,
  1140. ContentTypeNosniff: s.binding.Security.ContentTypeNosniff,
  1141. ContentSecurityPolicy: s.binding.Security.ContentSecurityPolicy,
  1142. PermissionsPolicy: s.binding.Security.PermissionsPolicy,
  1143. CrossOriginOpenerPolicy: s.binding.Security.CrossOriginOpenerPolicy,
  1144. ExpectCTHeader: s.binding.Security.ExpectCTHeader,
  1145. })
  1146. secureMiddleware.SetBadHostHandler(http.HandlerFunc(s.badHostHandler))
  1147. s.router.Use(secureMiddleware.Handler)
  1148. if s.binding.Security.HTTPSRedirect {
  1149. s.router.Use(s.binding.Security.redirectHandler)
  1150. hasHTTPSRedirect = true
  1151. }
  1152. }
  1153. if s.cors.Enabled {
  1154. c := cors.New(cors.Options{
  1155. AllowedOrigins: util.RemoveDuplicates(s.cors.AllowedOrigins, true),
  1156. AllowedMethods: util.RemoveDuplicates(s.cors.AllowedMethods, true),
  1157. AllowedHeaders: util.RemoveDuplicates(s.cors.AllowedHeaders, true),
  1158. ExposedHeaders: util.RemoveDuplicates(s.cors.ExposedHeaders, true),
  1159. MaxAge: s.cors.MaxAge,
  1160. AllowCredentials: s.cors.AllowCredentials,
  1161. OptionsPassthrough: s.cors.OptionsPassthrough,
  1162. OptionsSuccessStatus: s.cors.OptionsSuccessStatus,
  1163. AllowPrivateNetwork: s.cors.AllowPrivateNetwork,
  1164. })
  1165. s.router.Use(c.Handler)
  1166. }
  1167. s.router.Use(middleware.GetHead)
  1168. s.router.Use(middleware.Maybe(middleware.StripSlashes, s.mustStripSlash))
  1169. s.router.NotFound(s.notFoundHandler)
  1170. s.router.Get(healthzPath, func(w http.ResponseWriter, r *http.Request) {
  1171. render.PlainText(w, r, "ok")
  1172. })
  1173. s.router.Get(robotsTxtPath, func(w http.ResponseWriter, r *http.Request) {
  1174. render.PlainText(w, r, "User-agent: *\nDisallow: /")
  1175. })
  1176. if hasHTTPSRedirect {
  1177. if p := acme.GetHTTP01WebRoot(); p != "" {
  1178. serveStaticDir(s.router, acmeChallengeURI, p, true)
  1179. }
  1180. }
  1181. if s.enableRESTAPI {
  1182. // share API available to external users
  1183. s.router.Get(sharesPath+"/{id}", s.downloadFromShare) //nolint:goconst
  1184. s.router.Post(sharesPath+"/{id}", s.uploadFilesToShare)
  1185. s.router.Post(sharesPath+"/{id}/{name}", s.uploadFileToShare)
  1186. s.router.With(compressor.Handler).Get(sharesPath+"/{id}/dirs", s.readBrowsableShareContents)
  1187. s.router.Get(sharesPath+"/{id}/files", s.downloadBrowsableSharedFile)
  1188. s.router.Get(tokenPath, s.getToken)
  1189. s.router.Post(adminPath+"/{username}/forgot-password", forgotAdminPassword)
  1190. s.router.Post(adminPath+"/{username}/reset-password", resetAdminPassword)
  1191. s.router.Post(userPath+"/{username}/forgot-password", forgotUserPassword)
  1192. s.router.Post(userPath+"/{username}/reset-password", resetUserPassword)
  1193. s.router.Group(func(router chi.Router) {
  1194. router.Use(checkNodeToken(s.tokenAuth))
  1195. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeAdmin))
  1196. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1197. router.Use(jwtAuthenticatorAPI)
  1198. router.Get(versionPath, func(w http.ResponseWriter, r *http.Request) {
  1199. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1200. render.JSON(w, r, version.Get())
  1201. })
  1202. router.With(forbidAPIKeyAuthentication).Get(logoutPath, s.logout)
  1203. router.With(forbidAPIKeyAuthentication).Get(adminProfilePath, getAdminProfile)
  1204. router.With(forbidAPIKeyAuthentication).Put(adminProfilePath, updateAdminProfile)
  1205. router.With(forbidAPIKeyAuthentication).Put(adminPwdPath, changeAdminPassword)
  1206. // admin TOTP APIs
  1207. router.With(forbidAPIKeyAuthentication).Get(adminTOTPConfigsPath, getTOTPConfigs)
  1208. router.With(forbidAPIKeyAuthentication).Post(adminTOTPGeneratePath, generateTOTPSecret)
  1209. router.With(forbidAPIKeyAuthentication).Post(adminTOTPValidatePath, validateTOTPPasscode)
  1210. router.With(forbidAPIKeyAuthentication).Post(adminTOTPSavePath, saveTOTPConfig)
  1211. router.With(forbidAPIKeyAuthentication).Get(admin2FARecoveryCodesPath, getRecoveryCodes)
  1212. router.With(forbidAPIKeyAuthentication).Post(admin2FARecoveryCodesPath, generateRecoveryCodes)
  1213. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus)).
  1214. Get(serverStatusPath, func(w http.ResponseWriter, r *http.Request) {
  1215. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1216. render.JSON(w, r, getServicesStatus())
  1217. })
  1218. router.With(s.checkPerm(dataprovider.PermAdminViewConnections)).Get(activeConnectionsPath, getActiveConnections)
  1219. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections)).
  1220. Delete(activeConnectionsPath+"/{connectionID}", handleCloseConnection)
  1221. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/users/scans", getUsersQuotaScans)
  1222. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/users/{username}/scan", startUserQuotaScan)
  1223. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/folders/scans", getFoldersQuotaScans)
  1224. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/folders/{name}/scan", startFolderQuotaScan)
  1225. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath, getUsers)
  1226. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(userPath, addUser)
  1227. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath+"/{username}", getUserByUsername) //nolint:goconst
  1228. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}", updateUser)
  1229. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers)).Delete(userPath+"/{username}", deleteUser)
  1230. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}/2fa/disable", disableUser2FA)
  1231. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Get(folderPath, getFolders)
  1232. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Get(folderPath+"/{name}", getFolderByName) //nolint:goconst
  1233. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Post(folderPath, addFolder)
  1234. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Put(folderPath+"/{name}", updateFolder)
  1235. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Delete(folderPath+"/{name}", deleteFolder)
  1236. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath, getGroups)
  1237. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath+"/{name}", getGroupByName)
  1238. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(groupPath, addGroup)
  1239. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Put(groupPath+"/{name}", updateGroup)
  1240. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Delete(groupPath+"/{name}", deleteGroup)
  1241. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(dumpDataPath, dumpData)
  1242. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(loadDataPath, loadData)
  1243. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(loadDataPath, loadDataFromRequest)
  1244. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/usage",
  1245. updateUserQuotaUsage)
  1246. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/transfer-usage",
  1247. updateUserTransferQuotaUsage)
  1248. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/folders/{name}/usage",
  1249. updateFolderQuotaUsage)
  1250. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts, getDefenderHosts)
  1251. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts+"/{id}", getDefenderHostByID)
  1252. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(defenderHosts+"/{id}", deleteDefenderHostByID)
  1253. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath, getAdmins)
  1254. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(adminPath, addAdmin)
  1255. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath+"/{username}", getAdminByUsername)
  1256. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}", updateAdmin)
  1257. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Delete(adminPath+"/{username}", deleteAdmin)
  1258. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}/2fa/disable", disableAdmin2FA)
  1259. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Get(retentionChecksPath, getRetentionChecks)
  1260. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Post(retentionBasePath+"/{username}/check",
  1261. startRetentionCheck)
  1262. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Get(metadataChecksPath, getMetadataChecks)
  1263. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Post(metadataBasePath+"/{username}/check",
  1264. startMetadataCheck)
  1265. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1266. Get(fsEventsPath, searchFsEvents)
  1267. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1268. Get(providerEventsPath, searchProviderEvents)
  1269. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1270. Get(logEventsPath, searchLogEvents)
  1271. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1272. Get(apiKeysPath, getAPIKeys)
  1273. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1274. Post(apiKeysPath, addAPIKey)
  1275. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1276. Get(apiKeysPath+"/{id}", getAPIKeyByID)
  1277. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1278. Put(apiKeysPath+"/{id}", updateAPIKey)
  1279. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1280. Delete(apiKeysPath+"/{id}", deleteAPIKey)
  1281. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath, getEventActions)
  1282. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath+"/{name}", getEventActionByName)
  1283. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventActionsPath, addEventAction)
  1284. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventActionsPath+"/{name}", updateEventAction)
  1285. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventActionsPath+"/{name}", deleteEventAction)
  1286. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath, getEventRules)
  1287. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath+"/{name}", getEventRuleByName)
  1288. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventRulesPath, addEventRule)
  1289. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventRulesPath+"/{name}", updateEventRule)
  1290. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventRulesPath+"/{name}", deleteEventRule)
  1291. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventRulesPath+"/run/{name}", runOnDemandRule)
  1292. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Get(rolesPath, getRoles)
  1293. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(rolesPath, addRole)
  1294. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Get(rolesPath+"/{name}", getRoleByName)
  1295. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Put(rolesPath+"/{name}", updateRole)
  1296. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Delete(rolesPath+"/{name}", deleteRole)
  1297. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), compressor.Handler).Get(ipListsPath+"/{type}", getIPListEntries) //nolint:goconst
  1298. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(ipListsPath+"/{type}", addIPListEntry)
  1299. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Get(ipListsPath+"/{type}/{ipornet}", getIPListEntry) //nolint:goconst
  1300. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Put(ipListsPath+"/{type}/{ipornet}", updateIPListEntry)
  1301. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Delete(ipListsPath+"/{type}/{ipornet}", deleteIPListEntry)
  1302. })
  1303. s.router.Get(userTokenPath, s.getUserToken)
  1304. s.router.Group(func(router chi.Router) {
  1305. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeUser))
  1306. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1307. router.Use(jwtAuthenticatorAPIUser)
  1308. router.With(forbidAPIKeyAuthentication).Get(userLogoutPath, s.logout)
  1309. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1310. Put(userPwdPath, changeUserPassword)
  1311. router.With(forbidAPIKeyAuthentication).Get(userProfilePath, getUserProfile)
  1312. router.With(forbidAPIKeyAuthentication, s.checkAuthRequirements).Put(userProfilePath, updateUserProfile)
  1313. // user TOTP APIs
  1314. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1315. Get(userTOTPConfigsPath, getTOTPConfigs)
  1316. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1317. Post(userTOTPGeneratePath, generateTOTPSecret)
  1318. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1319. Post(userTOTPValidatePath, validateTOTPPasscode)
  1320. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1321. Post(userTOTPSavePath, saveTOTPConfig)
  1322. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1323. Get(user2FARecoveryCodesPath, getRecoveryCodes)
  1324. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1325. Post(user2FARecoveryCodesPath, generateRecoveryCodes)
  1326. router.With(s.checkAuthRequirements, compressor.Handler).Get(userDirsPath, readUserFolder)
  1327. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1328. Post(userDirsPath, createUserDir)
  1329. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1330. Patch(userDirsPath, renameUserFsEntry)
  1331. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1332. Delete(userDirsPath, deleteUserDir)
  1333. router.With(s.checkAuthRequirements).Get(userFilesPath, getUserFile)
  1334. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1335. Post(userFilesPath, uploadUserFiles)
  1336. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1337. Patch(userFilesPath, renameUserFsEntry)
  1338. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1339. Delete(userFilesPath, deleteUserFile)
  1340. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1341. Post(userFileActionsPath+"/move", renameUserFsEntry)
  1342. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1343. Post(userFileActionsPath+"/copy", copyUserFsEntry)
  1344. router.With(s.checkAuthRequirements).Post(userStreamZipPath, getUserFilesAsZipStream)
  1345. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1346. Get(userSharesPath, getShares)
  1347. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1348. Post(userSharesPath, addShare)
  1349. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1350. Get(userSharesPath+"/{id}", getShareByID)
  1351. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1352. Put(userSharesPath+"/{id}", updateShare)
  1353. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1354. Delete(userSharesPath+"/{id}", deleteShare)
  1355. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1356. Post(userUploadFilePath, uploadUserFile)
  1357. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1358. Patch(userFilesDirsMetadataPath, setFileDirMetadata)
  1359. })
  1360. if s.renderOpenAPI {
  1361. s.router.Group(func(router chi.Router) {
  1362. router.Use(compressor.Handler)
  1363. serveStaticDir(router, webOpenAPIPath, s.openAPIPath, false)
  1364. })
  1365. }
  1366. }
  1367. if s.enableWebAdmin || s.enableWebClient {
  1368. s.router.Group(func(router chi.Router) {
  1369. router.Use(compressor.Handler)
  1370. serveStaticDir(router, webStaticFilesPath, s.staticFilesPath, true)
  1371. })
  1372. if s.binding.OIDC.isEnabled() {
  1373. s.router.Get(webOIDCRedirectPath, s.handleOIDCRedirect)
  1374. }
  1375. if s.enableWebClient {
  1376. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1377. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1378. s.redirectToWebPath(w, r, webClientLoginPath)
  1379. })
  1380. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1381. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1382. s.redirectToWebPath(w, r, webClientLoginPath)
  1383. })
  1384. } else {
  1385. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1386. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1387. s.redirectToWebPath(w, r, webAdminLoginPath)
  1388. })
  1389. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1390. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1391. s.redirectToWebPath(w, r, webAdminLoginPath)
  1392. })
  1393. }
  1394. }
  1395. s.setupWebClientRoutes()
  1396. s.setupWebAdminRoutes()
  1397. }
  1398. func (s *httpdServer) setupWebClientRoutes() {
  1399. if s.enableWebClient {
  1400. s.router.Get(webBaseClientPath, func(w http.ResponseWriter, r *http.Request) {
  1401. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1402. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  1403. })
  1404. s.router.Get(webClientLoginPath, s.handleClientWebLogin)
  1405. if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
  1406. s.router.Get(webClientOIDCLoginPath, s.handleWebClientOIDCLogin)
  1407. }
  1408. if !s.binding.isWebClientLoginFormDisabled() {
  1409. s.router.Post(webClientLoginPath, s.handleWebClientLoginPost)
  1410. s.router.Get(webClientForgotPwdPath, s.handleWebClientForgotPwd)
  1411. s.router.Post(webClientForgotPwdPath, s.handleWebClientForgotPwdPost)
  1412. s.router.Get(webClientResetPwdPath, s.handleWebClientPasswordReset)
  1413. s.router.Post(webClientResetPwdPath, s.handleWebClientPasswordResetPost)
  1414. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1415. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1416. Get(webClientTwoFactorPath, s.handleWebClientTwoFactor)
  1417. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1418. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1419. Post(webClientTwoFactorPath, s.handleWebClientTwoFactorPost)
  1420. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1421. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1422. Get(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecovery)
  1423. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1424. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1425. Post(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecoveryPost)
  1426. }
  1427. // share routes available to external users
  1428. s.router.Get(webClientPubSharesPath+"/{id}/login", s.handleClientShareLoginGet)
  1429. s.router.Post(webClientPubSharesPath+"/{id}/login", s.handleClientShareLoginPost)
  1430. s.router.Get(webClientPubSharesPath+"/{id}", s.downloadFromShare)
  1431. s.router.Post(webClientPubSharesPath+"/{id}/partial", s.handleClientSharePartialDownload)
  1432. s.router.Get(webClientPubSharesPath+"/{id}/browse", s.handleShareGetFiles)
  1433. s.router.Get(webClientPubSharesPath+"/{id}/download", s.handleClientSharedFile)
  1434. s.router.Get(webClientPubSharesPath+"/{id}/upload", s.handleClientUploadToShare)
  1435. s.router.With(compressor.Handler).Get(webClientPubSharesPath+"/{id}/dirs", s.handleShareGetDirContents)
  1436. s.router.Post(webClientPubSharesPath+"/{id}", s.uploadFilesToShare)
  1437. s.router.Post(webClientPubSharesPath+"/{id}/{name}", s.uploadFileToShare)
  1438. s.router.Get(webClientPubSharesPath+"/{id}/viewpdf", s.handleShareViewPDF)
  1439. s.router.Get(webClientPubSharesPath+"/{id}/getpdf", s.handleShareGetPDF)
  1440. s.router.Group(func(router chi.Router) {
  1441. if s.binding.OIDC.isEnabled() {
  1442. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebClient))
  1443. }
  1444. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1445. router.Use(jwtAuthenticatorWebClient)
  1446. router.Get(webClientLogoutPath, s.handleWebClientLogout)
  1447. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientFilesPath, s.handleClientGetFiles)
  1448. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientViewPDFPath, s.handleClientViewPDF)
  1449. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientGetPDFPath, s.handleClientGetPDF)
  1450. router.With(s.checkAuthRequirements, s.refreshCookie, verifyCSRFHeader).Get(webClientFilePath, getUserFile)
  1451. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1452. Post(webClientFilePath, uploadUserFile)
  1453. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientEditFilePath, s.handleClientEditFile)
  1454. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1455. Delete(webClientFilesPath, deleteUserFile)
  1456. router.With(s.checkAuthRequirements, compressor.Handler, s.refreshCookie).
  1457. Get(webClientDirsPath, s.handleClientGetDirContents)
  1458. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1459. Post(webClientDirsPath, createUserDir)
  1460. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1461. Delete(webClientDirsPath, deleteUserDir)
  1462. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1463. Post(webClientFileActionsPath+"/move", renameUserFsEntry)
  1464. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1465. Post(webClientFileActionsPath+"/copy", copyUserFsEntry)
  1466. router.With(s.checkAuthRequirements, s.refreshCookie).
  1467. Post(webClientDownloadZipPath, s.handleWebClientDownloadZip)
  1468. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientPingPath, s.handleClientPing)
  1469. router.With(s.checkAuthRequirements, s.refreshCookie).Get(webClientProfilePath,
  1470. s.handleClientGetProfile)
  1471. router.With(s.checkAuthRequirements).Post(webClientProfilePath, s.handleWebClientProfilePost)
  1472. router.With(s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1473. Get(webChangeClientPwdPath, s.handleWebClientChangePwd)
  1474. router.With(s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1475. Post(webChangeClientPwdPath, s.handleWebClientChangePwdPost)
  1476. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), s.refreshCookie).
  1477. Get(webClientMFAPath, s.handleWebClientMFA)
  1478. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), s.refreshCookie).
  1479. Get(webClientMFAPath+"/qrcode", getQRCode)
  1480. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1481. Post(webClientTOTPGeneratePath, generateTOTPSecret)
  1482. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1483. Post(webClientTOTPValidatePath, validateTOTPPasscode)
  1484. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1485. Post(webClientTOTPSavePath, saveTOTPConfig)
  1486. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader, s.refreshCookie).
  1487. Get(webClientRecoveryCodesPath, getRecoveryCodes)
  1488. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1489. Post(webClientRecoveryCodesPath, generateRecoveryCodes)
  1490. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1491. Get(webClientSharesPath, s.handleClientGetShares)
  1492. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1493. Get(webClientSharePath, s.handleClientAddShareGet)
  1494. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1495. Post(webClientSharePath, s.handleClientAddSharePost)
  1496. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1497. Get(webClientSharePath+"/{id}", s.handleClientUpdateShareGet)
  1498. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1499. Post(webClientSharePath+"/{id}", s.handleClientUpdateSharePost)
  1500. router.With(s.checkAuthRequirements, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), verifyCSRFHeader).
  1501. Delete(webClientSharePath+"/{id}", deleteShare)
  1502. })
  1503. }
  1504. }
  1505. func (s *httpdServer) setupWebAdminRoutes() {
  1506. if s.enableWebAdmin {
  1507. s.router.Get(webBaseAdminPath, func(w http.ResponseWriter, r *http.Request) {
  1508. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1509. s.redirectToWebPath(w, r, webAdminLoginPath)
  1510. })
  1511. s.router.Get(webAdminLoginPath, s.handleWebAdminLogin)
  1512. if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
  1513. s.router.Get(webAdminOIDCLoginPath, s.handleWebAdminOIDCLogin)
  1514. }
  1515. s.router.Get(webOAuth2RedirectPath, s.handleOAuth2TokenRedirect)
  1516. s.router.Get(webAdminSetupPath, s.handleWebAdminSetupGet)
  1517. s.router.Post(webAdminSetupPath, s.handleWebAdminSetupPost)
  1518. if !s.binding.isWebAdminLoginFormDisabled() {
  1519. s.router.Post(webAdminLoginPath, s.handleWebAdminLoginPost)
  1520. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1521. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1522. Get(webAdminTwoFactorPath, s.handleWebAdminTwoFactor)
  1523. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1524. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1525. Post(webAdminTwoFactorPath, s.handleWebAdminTwoFactorPost)
  1526. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1527. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1528. Get(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecovery)
  1529. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1530. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1531. Post(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecoveryPost)
  1532. s.router.Get(webAdminForgotPwdPath, s.handleWebAdminForgotPwd)
  1533. s.router.Post(webAdminForgotPwdPath, s.handleWebAdminForgotPwdPost)
  1534. s.router.Get(webAdminResetPwdPath, s.handleWebAdminPasswordReset)
  1535. s.router.Post(webAdminResetPwdPath, s.handleWebAdminPasswordResetPost)
  1536. }
  1537. s.router.Group(func(router chi.Router) {
  1538. if s.binding.OIDC.isEnabled() {
  1539. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebAdmin))
  1540. }
  1541. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1542. router.Use(jwtAuthenticatorWebAdmin)
  1543. router.Get(webLogoutPath, s.handleWebAdminLogout)
  1544. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminProfilePath, s.handleWebAdminProfile)
  1545. router.With(s.requireBuiltinLogin).Post(webAdminProfilePath, s.handleWebAdminProfilePost)
  1546. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webChangeAdminPwdPath, s.handleWebAdminChangePwd)
  1547. router.With(s.requireBuiltinLogin).Post(webChangeAdminPwdPath, s.handleWebAdminChangePwdPost)
  1548. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminMFAPath, s.handleWebAdminMFA)
  1549. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminMFAPath+"/qrcode", getQRCode)
  1550. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPGeneratePath, generateTOTPSecret)
  1551. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPValidatePath, validateTOTPPasscode)
  1552. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPSavePath, saveTOTPConfig)
  1553. router.With(verifyCSRFHeader, s.requireBuiltinLogin, s.refreshCookie).Get(webAdminRecoveryCodesPath,
  1554. getRecoveryCodes)
  1555. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminRecoveryCodesPath, generateRecoveryCodes)
  1556. router.With(s.checkPerm(dataprovider.PermAdminViewUsers), s.refreshCookie).
  1557. Get(webUsersPath, s.handleGetWebUsers)
  1558. router.With(s.checkPerm(dataprovider.PermAdminAddUsers), s.refreshCookie).
  1559. Get(webUserPath, s.handleWebAddUserGet)
  1560. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers), s.refreshCookie).
  1561. Get(webUserPath+"/{username}", s.handleWebUpdateUserGet)
  1562. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(webUserPath, s.handleWebAddUserPost)
  1563. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Post(webUserPath+"/{username}",
  1564. s.handleWebUpdateUserPost)
  1565. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1566. Get(webGroupsPath, s.handleWebGetGroups)
  1567. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1568. Get(webGroupPath, s.handleWebAddGroupGet)
  1569. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath, s.handleWebAddGroupPost)
  1570. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1571. Get(webGroupPath+"/{name}", s.handleWebUpdateGroupGet)
  1572. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath+"/{name}",
  1573. s.handleWebUpdateGroupPost)
  1574. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), verifyCSRFHeader).
  1575. Delete(webGroupPath+"/{name}", deleteGroup)
  1576. router.With(s.checkPerm(dataprovider.PermAdminViewConnections), s.refreshCookie).
  1577. Get(webConnectionsPath, s.handleWebGetConnections)
  1578. router.With(s.checkPerm(dataprovider.PermAdminManageFolders), s.refreshCookie).
  1579. Get(webFoldersPath, s.handleWebGetFolders)
  1580. router.With(s.checkPerm(dataprovider.PermAdminManageFolders), s.refreshCookie).
  1581. Get(webFolderPath, s.handleWebAddFolderGet)
  1582. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Post(webFolderPath, s.handleWebAddFolderPost)
  1583. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus), s.refreshCookie).
  1584. Get(webStatusPath, s.handleWebGetStatus)
  1585. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1586. Get(webAdminsPath, s.handleGetWebAdmins)
  1587. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1588. Get(webAdminPath, s.handleWebAddAdminGet)
  1589. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1590. Get(webAdminPath+"/{username}", s.handleWebUpdateAdminGet)
  1591. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath, s.handleWebAddAdminPost)
  1592. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath+"/{username}",
  1593. s.handleWebUpdateAdminPost)
  1594. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), verifyCSRFHeader).
  1595. Delete(webAdminPath+"/{username}", deleteAdmin)
  1596. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections), verifyCSRFHeader).
  1597. Delete(webConnectionsPath+"/{connectionID}", handleCloseConnection)
  1598. router.With(s.checkPerm(dataprovider.PermAdminManageFolders), s.refreshCookie).
  1599. Get(webFolderPath+"/{name}", s.handleWebUpdateFolderGet)
  1600. router.With(s.checkPerm(dataprovider.PermAdminManageFolders)).Post(webFolderPath+"/{name}",
  1601. s.handleWebUpdateFolderPost)
  1602. router.With(s.checkPerm(dataprovider.PermAdminManageFolders), verifyCSRFHeader).
  1603. Delete(webFolderPath+"/{name}", deleteFolder)
  1604. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1605. Post(webScanVFolderPath+"/{name}", startFolderQuotaScan)
  1606. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers), verifyCSRFHeader).
  1607. Delete(webUserPath+"/{username}", deleteUser)
  1608. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1609. Post(webQuotaScanPath+"/{username}", startUserQuotaScan)
  1610. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webMaintenancePath, s.handleWebMaintenance)
  1611. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webBackupPath, dumpData)
  1612. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webRestorePath, s.handleWebRestore)
  1613. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1614. Get(webTemplateUser, s.handleWebTemplateUserGet)
  1615. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateUser, s.handleWebTemplateUserPost)
  1616. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1617. Get(webTemplateFolder, s.handleWebTemplateFolderGet)
  1618. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateFolder, s.handleWebTemplateFolderPost)
  1619. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderPath, s.handleWebDefenderPage)
  1620. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderHostsPath, getDefenderHosts)
  1621. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(webDefenderHostsPath+"/{id}",
  1622. deleteDefenderHostByID)
  1623. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1624. Get(webAdminEventActionsPath, s.handleWebGetEventActions)
  1625. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1626. Get(webAdminEventActionPath, s.handleWebAddEventActionGet)
  1627. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath,
  1628. s.handleWebAddEventActionPost)
  1629. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1630. Get(webAdminEventActionPath+"/{name}", s.handleWebUpdateEventActionGet)
  1631. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath+"/{name}",
  1632. s.handleWebUpdateEventActionPost)
  1633. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1634. Delete(webAdminEventActionPath+"/{name}", deleteEventAction)
  1635. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1636. Get(webAdminEventRulesPath, s.handleWebGetEventRules)
  1637. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1638. Get(webAdminEventRulePath, s.handleWebAddEventRuleGet)
  1639. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath,
  1640. s.handleWebAddEventRulePost)
  1641. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1642. Get(webAdminEventRulePath+"/{name}", s.handleWebUpdateEventRuleGet)
  1643. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath+"/{name}",
  1644. s.handleWebUpdateEventRulePost)
  1645. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1646. Delete(webAdminEventRulePath+"/{name}", deleteEventRule)
  1647. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1648. Post(webAdminEventRulePath+"/run/{name}", runOnDemandRule)
  1649. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
  1650. Get(webAdminRolesPath, s.handleWebGetRoles)
  1651. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
  1652. Get(webAdminRolePath, s.handleWebAddRoleGet)
  1653. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(webAdminRolePath, s.handleWebAddRolePost)
  1654. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), s.refreshCookie).
  1655. Get(webAdminRolePath+"/{name}", s.handleWebUpdateRoleGet)
  1656. router.With(s.checkPerm(dataprovider.PermAdminManageRoles)).Post(webAdminRolePath+"/{name}",
  1657. s.handleWebUpdateRolePost)
  1658. router.With(s.checkPerm(dataprovider.PermAdminManageRoles), verifyCSRFHeader).
  1659. Delete(webAdminRolePath+"/{name}", deleteRole)
  1660. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), s.refreshCookie).Get(webEventsPath,
  1661. s.handleWebGetEvents)
  1662. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
  1663. Get(webEventsFsSearchPath, searchFsEvents)
  1664. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
  1665. Get(webEventsProviderSearchPath, searchProviderEvents)
  1666. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler, s.refreshCookie).
  1667. Get(webEventsLogSearchPath, searchLogEvents)
  1668. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Get(webIPListsPath, s.handleWebIPListsPage)
  1669. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), compressor.Handler, s.refreshCookie).
  1670. Get(webIPListsPath+"/{type}", getIPListEntries)
  1671. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), s.refreshCookie).Get(webIPListPath+"/{type}",
  1672. s.handleWebAddIPListEntryGet)
  1673. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(webIPListPath+"/{type}",
  1674. s.handleWebAddIPListEntryPost)
  1675. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), s.refreshCookie).Get(webIPListPath+"/{type}/{ipornet}",
  1676. s.handleWebUpdateIPListEntryGet)
  1677. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists)).Post(webIPListPath+"/{type}/{ipornet}",
  1678. s.handleWebUpdateIPListEntryPost)
  1679. router.With(s.checkPerm(dataprovider.PermAdminManageIPLists), verifyCSRFHeader).
  1680. Delete(webIPListPath+"/{type}/{ipornet}", deleteIPListEntry)
  1681. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).Get(webConfigsPath, s.handleWebConfigs)
  1682. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webConfigsPath, s.handleWebConfigsPost)
  1683. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), verifyCSRFHeader, s.refreshCookie).
  1684. Post(webConfigsPath+"/smtp/test", testSMTPConfig)
  1685. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), verifyCSRFHeader, s.refreshCookie).
  1686. Post(webOAuth2TokenPath, handleSMTPOAuth2TokenRequestPost)
  1687. })
  1688. }
  1689. }