server.go 71 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "context"
  17. "crypto/tls"
  18. "crypto/x509"
  19. "errors"
  20. "fmt"
  21. "log"
  22. "net"
  23. "net/http"
  24. "path/filepath"
  25. "strings"
  26. "time"
  27. "github.com/go-chi/chi/v5"
  28. "github.com/go-chi/chi/v5/middleware"
  29. "github.com/go-chi/jwtauth/v5"
  30. "github.com/go-chi/render"
  31. "github.com/lestrrat-go/jwx/jwa"
  32. "github.com/rs/cors"
  33. "github.com/rs/xid"
  34. "github.com/sftpgo/sdk"
  35. "github.com/unrolled/secure"
  36. "github.com/drakkan/sftpgo/v2/internal/common"
  37. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  38. "github.com/drakkan/sftpgo/v2/internal/logger"
  39. "github.com/drakkan/sftpgo/v2/internal/mfa"
  40. "github.com/drakkan/sftpgo/v2/internal/smtp"
  41. "github.com/drakkan/sftpgo/v2/internal/util"
  42. "github.com/drakkan/sftpgo/v2/internal/version"
  43. )
  44. var (
  45. compressor = middleware.NewCompressor(5)
  46. xForwardedProto = http.CanonicalHeaderKey("X-Forwarded-Proto")
  47. )
  48. type httpdServer struct {
  49. binding Binding
  50. staticFilesPath string
  51. openAPIPath string
  52. enableWebAdmin bool
  53. enableWebClient bool
  54. renderOpenAPI bool
  55. isShared int
  56. router *chi.Mux
  57. tokenAuth *jwtauth.JWTAuth
  58. signingPassphrase string
  59. cors CorsConfig
  60. }
  61. func newHttpdServer(b Binding, staticFilesPath, signingPassphrase string, cors CorsConfig,
  62. openAPIPath string,
  63. ) *httpdServer {
  64. if openAPIPath == "" {
  65. b.RenderOpenAPI = false
  66. }
  67. return &httpdServer{
  68. binding: b,
  69. staticFilesPath: staticFilesPath,
  70. openAPIPath: openAPIPath,
  71. enableWebAdmin: b.EnableWebAdmin,
  72. enableWebClient: b.EnableWebClient,
  73. renderOpenAPI: b.RenderOpenAPI,
  74. signingPassphrase: signingPassphrase,
  75. cors: cors,
  76. }
  77. }
  78. func (s *httpdServer) setShared(value int) {
  79. s.isShared = value
  80. }
  81. func (s *httpdServer) listenAndServe() error {
  82. s.initializeRouter()
  83. httpServer := &http.Server{
  84. Handler: s.router,
  85. ReadHeaderTimeout: 30 * time.Second,
  86. ReadTimeout: 60 * time.Second,
  87. WriteTimeout: 60 * time.Second,
  88. IdleTimeout: 60 * time.Second,
  89. MaxHeaderBytes: 1 << 18, // 256KB
  90. ErrorLog: log.New(&logger.StdLoggerWrapper{Sender: logSender}, "", 0),
  91. }
  92. if certMgr != nil && s.binding.EnableHTTPS {
  93. certID := common.DefaultTLSKeyPaidID
  94. if getConfigPath(s.binding.CertificateFile, "") != "" && getConfigPath(s.binding.CertificateKeyFile, "") != "" {
  95. certID = s.binding.GetAddress()
  96. }
  97. config := &tls.Config{
  98. GetCertificate: certMgr.GetCertificateFunc(certID),
  99. MinVersion: util.GetTLSVersion(s.binding.MinTLSVersion),
  100. NextProtos: []string{"http/1.1", "h2"},
  101. CipherSuites: util.GetTLSCiphersFromNames(s.binding.TLSCipherSuites),
  102. PreferServerCipherSuites: true,
  103. }
  104. httpServer.TLSConfig = config
  105. logger.Debug(logSender, "", "configured TLS cipher suites for binding %#v: %v, certID: %v",
  106. s.binding.GetAddress(), httpServer.TLSConfig.CipherSuites, certID)
  107. if s.binding.ClientAuthType == 1 {
  108. httpServer.TLSConfig.ClientCAs = certMgr.GetRootCAs()
  109. httpServer.TLSConfig.ClientAuth = tls.RequireAndVerifyClientCert
  110. httpServer.TLSConfig.VerifyConnection = s.verifyTLSConnection
  111. }
  112. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, true, logSender)
  113. }
  114. return util.HTTPListenAndServe(httpServer, s.binding.Address, s.binding.Port, false, logSender)
  115. }
  116. func (s *httpdServer) verifyTLSConnection(state tls.ConnectionState) error {
  117. if certMgr != nil {
  118. var clientCrt *x509.Certificate
  119. var clientCrtName string
  120. if len(state.PeerCertificates) > 0 {
  121. clientCrt = state.PeerCertificates[0]
  122. clientCrtName = clientCrt.Subject.String()
  123. }
  124. if len(state.VerifiedChains) == 0 {
  125. logger.Warn(logSender, "", "TLS connection cannot be verified: unable to get verification chain")
  126. return errors.New("TLS connection cannot be verified: unable to get verification chain")
  127. }
  128. for _, verifiedChain := range state.VerifiedChains {
  129. var caCrt *x509.Certificate
  130. if len(verifiedChain) > 0 {
  131. caCrt = verifiedChain[len(verifiedChain)-1]
  132. }
  133. if certMgr.IsRevoked(clientCrt, caCrt) {
  134. logger.Debug(logSender, "", "tls handshake error, client certificate %#v has been revoked", clientCrtName)
  135. return common.ErrCrtRevoked
  136. }
  137. }
  138. }
  139. return nil
  140. }
  141. func (s *httpdServer) refreshCookie(next http.Handler) http.Handler {
  142. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  143. s.checkCookieExpiration(w, r)
  144. next.ServeHTTP(w, r)
  145. })
  146. }
  147. func (s *httpdServer) renderClientLoginPage(w http.ResponseWriter, error, ip string) {
  148. data := loginPage{
  149. CurrentURL: webClientLoginPath,
  150. Version: version.Get().Version,
  151. Error: error,
  152. CSRFToken: createCSRFToken(ip),
  153. StaticURL: webStaticFilesPath,
  154. Branding: s.binding.Branding.WebClient,
  155. FormDisabled: s.binding.isWebClientLoginFormDisabled(),
  156. }
  157. if s.binding.showAdminLoginURL() {
  158. data.AltLoginURL = webAdminLoginPath
  159. data.AltLoginName = s.binding.Branding.WebAdmin.ShortName
  160. }
  161. if smtp.IsEnabled() && !data.FormDisabled {
  162. data.ForgotPwdURL = webClientForgotPwdPath
  163. }
  164. if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
  165. data.OpenIDLoginURL = webClientOIDCLoginPath
  166. }
  167. renderClientTemplate(w, templateClientLogin, data)
  168. }
  169. func (s *httpdServer) handleWebClientLogout(w http.ResponseWriter, r *http.Request) {
  170. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  171. c := jwtTokenClaims{}
  172. c.removeCookie(w, r, webBaseClientPath)
  173. s.logoutOIDCUser(w, r)
  174. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  175. }
  176. func (s *httpdServer) handleWebClientChangePwdPost(w http.ResponseWriter, r *http.Request) {
  177. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  178. err := r.ParseForm()
  179. if err != nil {
  180. s.renderClientChangePasswordPage(w, r, err.Error())
  181. return
  182. }
  183. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  184. s.renderClientForbiddenPage(w, r, err.Error())
  185. return
  186. }
  187. err = doChangeUserPassword(r, r.Form.Get("current_password"), r.Form.Get("new_password1"),
  188. r.Form.Get("new_password2"))
  189. if err != nil {
  190. s.renderClientChangePasswordPage(w, r, err.Error())
  191. return
  192. }
  193. s.handleWebClientLogout(w, r)
  194. }
  195. func (s *httpdServer) handleClientWebLogin(w http.ResponseWriter, r *http.Request) {
  196. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  197. if !dataprovider.HasAdmin() {
  198. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  199. return
  200. }
  201. s.renderClientLoginPage(w, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
  202. }
  203. func (s *httpdServer) handleWebClientLoginPost(w http.ResponseWriter, r *http.Request) {
  204. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  205. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  206. if err := r.ParseForm(); err != nil {
  207. s.renderClientLoginPage(w, err.Error(), ipAddr)
  208. return
  209. }
  210. protocol := common.ProtocolHTTP
  211. username := r.Form.Get("username")
  212. password := r.Form.Get("password")
  213. if username == "" || password == "" {
  214. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  215. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  216. s.renderClientLoginPage(w, "Invalid credentials", ipAddr)
  217. return
  218. }
  219. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  220. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  221. dataprovider.LoginMethodPassword, ipAddr, err)
  222. s.renderClientLoginPage(w, err.Error(), ipAddr)
  223. return
  224. }
  225. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  226. s.renderClientLoginPage(w, fmt.Sprintf("access denied by post connect hook: %v", err), ipAddr)
  227. return
  228. }
  229. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  230. if err != nil {
  231. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  232. s.renderClientLoginPage(w, dataprovider.ErrInvalidCredentials.Error(), ipAddr)
  233. return
  234. }
  235. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  236. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  237. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  238. s.renderClientLoginPage(w, err.Error(), ipAddr)
  239. return
  240. }
  241. defer user.CloseFs() //nolint:errcheck
  242. err = user.CheckFsRoot(connectionID)
  243. if err != nil {
  244. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  245. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  246. s.renderClientLoginPage(w, err.Error(), ipAddr)
  247. return
  248. }
  249. s.loginUser(w, r, &user, connectionID, ipAddr, false, s.renderClientLoginPage)
  250. }
  251. func (s *httpdServer) handleWebClientPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  252. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  253. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  254. err := r.ParseForm()
  255. if err != nil {
  256. s.renderClientResetPwdPage(w, err.Error(), ipAddr)
  257. return
  258. }
  259. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  260. s.renderClientForbiddenPage(w, r, err.Error())
  261. return
  262. }
  263. _, user, err := handleResetPassword(r, r.Form.Get("code"), r.Form.Get("password"), false)
  264. if err != nil {
  265. s.renderClientResetPwdPage(w, err.Error(), ipAddr)
  266. return
  267. }
  268. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  269. if err := checkHTTPClientUser(user, r, connectionID, true); err != nil {
  270. s.renderClientResetPwdPage(w, fmt.Sprintf("Password reset successfully but unable to login: %v", err.Error()), ipAddr)
  271. return
  272. }
  273. defer user.CloseFs() //nolint:errcheck
  274. err = user.CheckFsRoot(connectionID)
  275. if err != nil {
  276. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  277. s.renderClientResetPwdPage(w, fmt.Sprintf("Password reset successfully but unable to login: %v", err.Error()), ipAddr)
  278. return
  279. }
  280. s.loginUser(w, r, user, connectionID, ipAddr, false, s.renderClientResetPwdPage)
  281. }
  282. func (s *httpdServer) handleWebClientTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  283. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  284. claims, err := getTokenClaims(r)
  285. if err != nil {
  286. s.renderNotFoundPage(w, r, nil)
  287. return
  288. }
  289. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  290. if err := r.ParseForm(); err != nil {
  291. s.renderClientTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  292. return
  293. }
  294. username := claims.Username
  295. recoveryCode := r.Form.Get("recovery_code")
  296. if username == "" || recoveryCode == "" {
  297. s.renderClientTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  298. return
  299. }
  300. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  301. s.renderClientTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  302. return
  303. }
  304. user, userMerged, err := dataprovider.GetUserVariants(username)
  305. if err != nil {
  306. s.renderClientTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  307. return
  308. }
  309. if !userMerged.Filters.TOTPConfig.Enabled || !util.Contains(userMerged.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  310. s.renderClientTwoFactorPage(w, "Two factory authentication is not enabled", ipAddr)
  311. return
  312. }
  313. for idx, code := range user.Filters.RecoveryCodes {
  314. if err := code.Secret.Decrypt(); err != nil {
  315. s.renderClientInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  316. return
  317. }
  318. if code.Secret.GetPayload() == recoveryCode {
  319. if code.Used {
  320. s.renderClientTwoFactorRecoveryPage(w, "This recovery code was already used", ipAddr)
  321. return
  322. }
  323. user.Filters.RecoveryCodes[idx].Used = true
  324. err = dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, ipAddr)
  325. if err != nil {
  326. logger.Warn(logSender, "", "unable to set the recovery code %#v as used: %v", recoveryCode, err)
  327. s.renderClientInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  328. return
  329. }
  330. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  331. s.loginUser(w, r, &userMerged, connectionID, ipAddr, true,
  332. s.renderClientTwoFactorRecoveryPage)
  333. return
  334. }
  335. }
  336. s.renderClientTwoFactorRecoveryPage(w, "Invalid recovery code", ipAddr)
  337. }
  338. func (s *httpdServer) handleWebClientTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  339. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  340. claims, err := getTokenClaims(r)
  341. if err != nil {
  342. s.renderNotFoundPage(w, r, nil)
  343. return
  344. }
  345. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  346. if err := r.ParseForm(); err != nil {
  347. s.renderClientTwoFactorPage(w, err.Error(), ipAddr)
  348. return
  349. }
  350. username := claims.Username
  351. passcode := r.Form.Get("passcode")
  352. if username == "" || passcode == "" {
  353. s.renderClientTwoFactorPage(w, "Invalid credentials", ipAddr)
  354. return
  355. }
  356. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  357. s.renderClientTwoFactorPage(w, err.Error(), ipAddr)
  358. return
  359. }
  360. user, err := dataprovider.GetUserWithGroupSettings(username)
  361. if err != nil {
  362. s.renderClientTwoFactorPage(w, "Invalid credentials", ipAddr)
  363. return
  364. }
  365. if !user.Filters.TOTPConfig.Enabled || !util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  366. s.renderClientTwoFactorPage(w, "Two factory authentication is not enabled", ipAddr)
  367. return
  368. }
  369. err = user.Filters.TOTPConfig.Secret.Decrypt()
  370. if err != nil {
  371. s.renderClientInternalServerErrorPage(w, r, err)
  372. return
  373. }
  374. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  375. user.Filters.TOTPConfig.Secret.GetPayload())
  376. if !match || err != nil {
  377. s.renderClientTwoFactorPage(w, "Invalid authentication code", ipAddr)
  378. return
  379. }
  380. connectionID := fmt.Sprintf("%v_%v", getProtocolFromRequest(r), xid.New().String())
  381. s.loginUser(w, r, &user, connectionID, ipAddr, true, s.renderClientTwoFactorPage)
  382. }
  383. func (s *httpdServer) handleWebAdminTwoFactorRecoveryPost(w http.ResponseWriter, r *http.Request) {
  384. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  385. claims, err := getTokenClaims(r)
  386. if err != nil {
  387. s.renderNotFoundPage(w, r, nil)
  388. return
  389. }
  390. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  391. if err := r.ParseForm(); err != nil {
  392. s.renderTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  393. return
  394. }
  395. username := claims.Username
  396. recoveryCode := r.Form.Get("recovery_code")
  397. if username == "" || recoveryCode == "" {
  398. s.renderTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  399. return
  400. }
  401. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  402. s.renderTwoFactorRecoveryPage(w, err.Error(), ipAddr)
  403. return
  404. }
  405. admin, err := dataprovider.AdminExists(username)
  406. if err != nil {
  407. s.renderTwoFactorRecoveryPage(w, "Invalid credentials", ipAddr)
  408. return
  409. }
  410. if !admin.Filters.TOTPConfig.Enabled {
  411. s.renderTwoFactorRecoveryPage(w, "Two factory authentication is not enabled", ipAddr)
  412. return
  413. }
  414. for idx, code := range admin.Filters.RecoveryCodes {
  415. if err := code.Secret.Decrypt(); err != nil {
  416. s.renderInternalServerErrorPage(w, r, fmt.Errorf("unable to decrypt recovery code: %w", err))
  417. return
  418. }
  419. if code.Secret.GetPayload() == recoveryCode {
  420. if code.Used {
  421. s.renderTwoFactorRecoveryPage(w, "This recovery code was already used", ipAddr)
  422. return
  423. }
  424. admin.Filters.RecoveryCodes[idx].Used = true
  425. err = dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, ipAddr)
  426. if err != nil {
  427. logger.Warn(logSender, "", "unable to set the recovery code %#v as used: %v", recoveryCode, err)
  428. s.renderInternalServerErrorPage(w, r, errors.New("unable to set the recovery code as used"))
  429. return
  430. }
  431. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorRecoveryPage, ipAddr)
  432. return
  433. }
  434. }
  435. s.renderTwoFactorRecoveryPage(w, "Invalid recovery code", ipAddr)
  436. }
  437. func (s *httpdServer) handleWebAdminTwoFactorPost(w http.ResponseWriter, r *http.Request) {
  438. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  439. claims, err := getTokenClaims(r)
  440. if err != nil {
  441. s.renderNotFoundPage(w, r, nil)
  442. return
  443. }
  444. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  445. if err := r.ParseForm(); err != nil {
  446. s.renderTwoFactorPage(w, err.Error(), ipAddr)
  447. return
  448. }
  449. username := claims.Username
  450. passcode := r.Form.Get("passcode")
  451. if username == "" || passcode == "" {
  452. s.renderTwoFactorPage(w, "Invalid credentials", ipAddr)
  453. return
  454. }
  455. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  456. s.renderTwoFactorPage(w, err.Error(), ipAddr)
  457. return
  458. }
  459. admin, err := dataprovider.AdminExists(username)
  460. if err != nil {
  461. s.renderTwoFactorPage(w, "Invalid credentials", ipAddr)
  462. return
  463. }
  464. if !admin.Filters.TOTPConfig.Enabled {
  465. s.renderTwoFactorPage(w, "Two factory authentication is not enabled", ipAddr)
  466. return
  467. }
  468. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  469. if err != nil {
  470. s.renderInternalServerErrorPage(w, r, err)
  471. return
  472. }
  473. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  474. admin.Filters.TOTPConfig.Secret.GetPayload())
  475. if !match || err != nil {
  476. s.renderTwoFactorPage(w, "Invalid authentication code", ipAddr)
  477. return
  478. }
  479. s.loginAdmin(w, r, &admin, true, s.renderTwoFactorPage, ipAddr)
  480. }
  481. func (s *httpdServer) handleWebAdminLoginPost(w http.ResponseWriter, r *http.Request) {
  482. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  483. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  484. if err := r.ParseForm(); err != nil {
  485. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  486. return
  487. }
  488. username := r.Form.Get("username")
  489. password := r.Form.Get("password")
  490. if username == "" || password == "" {
  491. s.renderAdminLoginPage(w, "Invalid credentials", ipAddr)
  492. return
  493. }
  494. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  495. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  496. return
  497. }
  498. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  499. if err != nil {
  500. s.renderAdminLoginPage(w, err.Error(), ipAddr)
  501. return
  502. }
  503. s.loginAdmin(w, r, &admin, false, s.renderAdminLoginPage, ipAddr)
  504. }
  505. func (s *httpdServer) renderAdminLoginPage(w http.ResponseWriter, error, ip string) {
  506. data := loginPage{
  507. CurrentURL: webAdminLoginPath,
  508. Version: version.Get().Version,
  509. Error: error,
  510. CSRFToken: createCSRFToken(ip),
  511. StaticURL: webStaticFilesPath,
  512. Branding: s.binding.Branding.WebAdmin,
  513. FormDisabled: s.binding.isWebAdminLoginFormDisabled(),
  514. }
  515. if s.binding.showClientLoginURL() {
  516. data.AltLoginURL = webClientLoginPath
  517. data.AltLoginName = s.binding.Branding.WebClient.ShortName
  518. }
  519. if smtp.IsEnabled() && !data.FormDisabled {
  520. data.ForgotPwdURL = webAdminForgotPwdPath
  521. }
  522. if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
  523. data.OpenIDLoginURL = webAdminOIDCLoginPath
  524. }
  525. renderAdminTemplate(w, templateLogin, data)
  526. }
  527. func (s *httpdServer) handleWebAdminLogin(w http.ResponseWriter, r *http.Request) {
  528. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  529. if !dataprovider.HasAdmin() {
  530. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  531. return
  532. }
  533. s.renderAdminLoginPage(w, getFlashMessage(w, r), util.GetIPFromRemoteAddress(r.RemoteAddr))
  534. }
  535. func (s *httpdServer) handleWebAdminLogout(w http.ResponseWriter, r *http.Request) {
  536. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  537. c := jwtTokenClaims{}
  538. c.removeCookie(w, r, webBaseAdminPath)
  539. s.logoutOIDCUser(w, r)
  540. http.Redirect(w, r, webAdminLoginPath, http.StatusFound)
  541. }
  542. func (s *httpdServer) handleWebAdminChangePwdPost(w http.ResponseWriter, r *http.Request) {
  543. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  544. err := r.ParseForm()
  545. if err != nil {
  546. s.renderChangePasswordPage(w, r, err.Error())
  547. return
  548. }
  549. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  550. s.renderForbiddenPage(w, r, err.Error())
  551. return
  552. }
  553. err = doChangeAdminPassword(r, r.Form.Get("current_password"), r.Form.Get("new_password1"),
  554. r.Form.Get("new_password2"))
  555. if err != nil {
  556. s.renderChangePasswordPage(w, r, err.Error())
  557. return
  558. }
  559. s.handleWebAdminLogout(w, r)
  560. }
  561. func (s *httpdServer) handleWebAdminPasswordResetPost(w http.ResponseWriter, r *http.Request) {
  562. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  563. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  564. err := r.ParseForm()
  565. if err != nil {
  566. s.renderResetPwdPage(w, err.Error(), ipAddr)
  567. return
  568. }
  569. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  570. s.renderForbiddenPage(w, r, err.Error())
  571. return
  572. }
  573. admin, _, err := handleResetPassword(r, r.Form.Get("code"), r.Form.Get("password"), true)
  574. if err != nil {
  575. if e, ok := err.(*util.ValidationError); ok {
  576. s.renderResetPwdPage(w, e.GetErrorString(), ipAddr)
  577. return
  578. }
  579. s.renderResetPwdPage(w, err.Error(), ipAddr)
  580. return
  581. }
  582. s.loginAdmin(w, r, admin, false, s.renderResetPwdPage, ipAddr)
  583. }
  584. func (s *httpdServer) handleWebAdminSetupPost(w http.ResponseWriter, r *http.Request) {
  585. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  586. if dataprovider.HasAdmin() {
  587. s.renderBadRequestPage(w, r, errors.New("an admin user already exists"))
  588. return
  589. }
  590. err := r.ParseForm()
  591. if err != nil {
  592. s.renderAdminSetupPage(w, r, "", err.Error())
  593. return
  594. }
  595. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  596. if err := verifyCSRFToken(r.Form.Get(csrfFormToken), ipAddr); err != nil {
  597. s.renderForbiddenPage(w, r, err.Error())
  598. return
  599. }
  600. username := r.Form.Get("username")
  601. password := r.Form.Get("password")
  602. confirmPassword := r.Form.Get("confirm_password")
  603. installCode := r.Form.Get("install_code")
  604. if installationCode != "" && installCode != resolveInstallationCode() {
  605. s.renderAdminSetupPage(w, r, username, fmt.Sprintf("%v mismatch", installationCodeHint))
  606. return
  607. }
  608. if username == "" {
  609. s.renderAdminSetupPage(w, r, username, "Please set a username")
  610. return
  611. }
  612. if password == "" {
  613. s.renderAdminSetupPage(w, r, username, "Please set a password")
  614. return
  615. }
  616. if password != confirmPassword {
  617. s.renderAdminSetupPage(w, r, username, "Passwords mismatch")
  618. return
  619. }
  620. admin := dataprovider.Admin{
  621. Username: username,
  622. Password: password,
  623. Status: 1,
  624. Permissions: []string{dataprovider.PermAdminAny},
  625. }
  626. err = dataprovider.AddAdmin(&admin, username, ipAddr)
  627. if err != nil {
  628. s.renderAdminSetupPage(w, r, username, err.Error())
  629. return
  630. }
  631. s.loginAdmin(w, r, &admin, false, nil, ipAddr)
  632. }
  633. func (s *httpdServer) loginUser(
  634. w http.ResponseWriter, r *http.Request, user *dataprovider.User, connectionID, ipAddr string,
  635. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, error, ip string),
  636. ) {
  637. c := jwtTokenClaims{
  638. Username: user.Username,
  639. Permissions: user.Filters.WebClient,
  640. Signature: user.GetSignature(),
  641. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  642. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  643. }
  644. audience := tokenAudienceWebClient
  645. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) &&
  646. user.CanManageMFA() && !isSecondFactorAuth {
  647. audience = tokenAudienceWebClientPartial
  648. }
  649. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  650. if err != nil {
  651. logger.Warn(logSender, connectionID, "unable to set user login cookie %v", err)
  652. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  653. errorFunc(w, err.Error(), ipAddr)
  654. return
  655. }
  656. if isSecondFactorAuth {
  657. invalidateToken(r)
  658. }
  659. if audience == tokenAudienceWebClientPartial {
  660. http.Redirect(w, r, webClientTwoFactorPath, http.StatusFound)
  661. return
  662. }
  663. updateLoginMetrics(user, dataprovider.LoginMethodPassword, ipAddr, err)
  664. dataprovider.UpdateLastLogin(user)
  665. http.Redirect(w, r, webClientFilesPath, http.StatusFound)
  666. }
  667. func (s *httpdServer) loginAdmin(
  668. w http.ResponseWriter, r *http.Request, admin *dataprovider.Admin,
  669. isSecondFactorAuth bool, errorFunc func(w http.ResponseWriter, error, ip string),
  670. ipAddr string,
  671. ) {
  672. c := jwtTokenClaims{
  673. Username: admin.Username,
  674. Permissions: admin.Permissions,
  675. Signature: admin.GetSignature(),
  676. }
  677. audience := tokenAudienceWebAdmin
  678. if admin.Filters.TOTPConfig.Enabled && admin.CanManageMFA() && !isSecondFactorAuth {
  679. audience = tokenAudienceWebAdminPartial
  680. }
  681. err := c.createAndSetCookie(w, r, s.tokenAuth, audience, ipAddr)
  682. if err != nil {
  683. logger.Warn(logSender, "", "unable to set admin login cookie %v", err)
  684. if errorFunc == nil {
  685. s.renderAdminSetupPage(w, r, admin.Username, err.Error())
  686. return
  687. }
  688. errorFunc(w, err.Error(), ipAddr)
  689. return
  690. }
  691. if isSecondFactorAuth {
  692. invalidateToken(r)
  693. }
  694. if audience == tokenAudienceWebAdminPartial {
  695. http.Redirect(w, r, webAdminTwoFactorPath, http.StatusFound)
  696. return
  697. }
  698. dataprovider.UpdateAdminLastLogin(admin)
  699. http.Redirect(w, r, webUsersPath, http.StatusFound)
  700. }
  701. func (s *httpdServer) logout(w http.ResponseWriter, r *http.Request) {
  702. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  703. invalidateToken(r)
  704. sendAPIResponse(w, r, nil, "Your token has been invalidated", http.StatusOK)
  705. }
  706. func (s *httpdServer) getUserToken(w http.ResponseWriter, r *http.Request) {
  707. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  708. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  709. username, password, ok := r.BasicAuth()
  710. protocol := common.ProtocolHTTP
  711. if !ok {
  712. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  713. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  714. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  715. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  716. return
  717. }
  718. if username == "" || password == "" {
  719. updateLoginMetrics(&dataprovider.User{BaseUser: sdk.BaseUser{Username: username}},
  720. dataprovider.LoginMethodPassword, ipAddr, common.ErrNoCredentials)
  721. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  722. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  723. return
  724. }
  725. if err := common.Config.ExecutePostConnectHook(ipAddr, protocol); err != nil {
  726. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  727. return
  728. }
  729. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, protocol)
  730. if err != nil {
  731. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  732. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  733. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  734. http.StatusUnauthorized)
  735. return
  736. }
  737. connectionID := fmt.Sprintf("%v_%v", protocol, xid.New().String())
  738. if err := checkHTTPClientUser(&user, r, connectionID, true); err != nil {
  739. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  740. sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
  741. return
  742. }
  743. if user.Filters.TOTPConfig.Enabled && util.Contains(user.Filters.TOTPConfig.Protocols, common.ProtocolHTTP) {
  744. passcode := r.Header.Get(otpHeaderCode)
  745. if passcode == "" {
  746. logger.Debug(logSender, "", "TOTP enabled for user %#v and not passcode provided, authentication refused", user.Username)
  747. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  748. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  749. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  750. http.StatusUnauthorized)
  751. return
  752. }
  753. err = user.Filters.TOTPConfig.Secret.Decrypt()
  754. if err != nil {
  755. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  756. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err), http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  757. return
  758. }
  759. match, err := mfa.ValidateTOTPPasscode(user.Filters.TOTPConfig.ConfigName, passcode,
  760. user.Filters.TOTPConfig.Secret.GetPayload())
  761. if !match || err != nil {
  762. logger.Debug(logSender, "invalid passcode for user %#v, match? %v, err: %v", user.Username, match, err)
  763. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  764. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, dataprovider.ErrInvalidCredentials)
  765. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  766. http.StatusUnauthorized)
  767. return
  768. }
  769. }
  770. defer user.CloseFs() //nolint:errcheck
  771. err = user.CheckFsRoot(connectionID)
  772. if err != nil {
  773. logger.Warn(logSender, connectionID, "unable to check fs root: %v", err)
  774. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  775. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  776. return
  777. }
  778. s.generateAndSendUserToken(w, r, ipAddr, user)
  779. }
  780. func (s *httpdServer) generateAndSendUserToken(w http.ResponseWriter, r *http.Request, ipAddr string, user dataprovider.User) {
  781. c := jwtTokenClaims{
  782. Username: user.Username,
  783. Permissions: user.Filters.WebClient,
  784. Signature: user.GetSignature(),
  785. MustSetTwoFactorAuth: user.MustSetSecondFactor(),
  786. RequiredTwoFactorProtocols: user.Filters.TwoFactorAuthProtocols,
  787. }
  788. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPIUser, ipAddr)
  789. if err != nil {
  790. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, common.ErrInternalFailure)
  791. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  792. return
  793. }
  794. updateLoginMetrics(&user, dataprovider.LoginMethodPassword, ipAddr, err)
  795. dataprovider.UpdateLastLogin(&user)
  796. render.JSON(w, r, resp)
  797. }
  798. func (s *httpdServer) getToken(w http.ResponseWriter, r *http.Request) {
  799. username, password, ok := r.BasicAuth()
  800. if !ok {
  801. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  802. sendAPIResponse(w, r, nil, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  803. return
  804. }
  805. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  806. admin, err := dataprovider.CheckAdminAndPass(username, password, ipAddr)
  807. if err != nil {
  808. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  809. sendAPIResponse(w, r, err, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  810. return
  811. }
  812. if admin.Filters.TOTPConfig.Enabled {
  813. passcode := r.Header.Get(otpHeaderCode)
  814. if passcode == "" {
  815. logger.Debug(logSender, "", "TOTP enabled for admin %#v and not passcode provided, authentication refused", admin.Username)
  816. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  817. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
  818. return
  819. }
  820. err = admin.Filters.TOTPConfig.Secret.Decrypt()
  821. if err != nil {
  822. sendAPIResponse(w, r, fmt.Errorf("unable to decrypt TOTP secret: %w", err),
  823. http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  824. return
  825. }
  826. match, err := mfa.ValidateTOTPPasscode(admin.Filters.TOTPConfig.ConfigName, passcode,
  827. admin.Filters.TOTPConfig.Secret.GetPayload())
  828. if !match || err != nil {
  829. logger.Debug(logSender, "invalid passcode for admin %#v, match? %v, err: %v", admin.Username, match, err)
  830. w.Header().Set(common.HTTPAuthenticationHeader, basicRealm)
  831. sendAPIResponse(w, r, dataprovider.ErrInvalidCredentials, http.StatusText(http.StatusUnauthorized),
  832. http.StatusUnauthorized)
  833. return
  834. }
  835. }
  836. s.generateAndSendToken(w, r, admin, ipAddr)
  837. }
  838. func (s *httpdServer) generateAndSendToken(w http.ResponseWriter, r *http.Request, admin dataprovider.Admin, ip string) {
  839. c := jwtTokenClaims{
  840. Username: admin.Username,
  841. Permissions: admin.Permissions,
  842. Signature: admin.GetSignature(),
  843. }
  844. resp, err := c.createTokenResponse(s.tokenAuth, tokenAudienceAPI, ip)
  845. if err != nil {
  846. sendAPIResponse(w, r, err, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  847. return
  848. }
  849. dataprovider.UpdateAdminLastLogin(&admin)
  850. render.JSON(w, r, resp)
  851. }
  852. func (s *httpdServer) checkCookieExpiration(w http.ResponseWriter, r *http.Request) {
  853. if _, ok := r.Context().Value(oidcTokenKey).(string); ok {
  854. return
  855. }
  856. token, claims, err := jwtauth.FromContext(r.Context())
  857. if err != nil {
  858. return
  859. }
  860. tokenClaims := jwtTokenClaims{}
  861. tokenClaims.Decode(claims)
  862. if tokenClaims.Username == "" || tokenClaims.Signature == "" {
  863. return
  864. }
  865. if time.Until(token.Expiration()) > tokenRefreshThreshold {
  866. return
  867. }
  868. if util.Contains(token.Audience(), tokenAudienceWebClient) {
  869. s.refreshClientToken(w, r, tokenClaims)
  870. } else {
  871. s.refreshAdminToken(w, r, tokenClaims)
  872. }
  873. }
  874. func (s *httpdServer) refreshClientToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  875. user, err := dataprovider.GetUserWithGroupSettings(tokenClaims.Username)
  876. if err != nil {
  877. return
  878. }
  879. if user.GetSignature() != tokenClaims.Signature {
  880. logger.Debug(logSender, "", "signature mismatch for user %#v, unable to refresh cookie", user.Username)
  881. return
  882. }
  883. if err := checkHTTPClientUser(&user, r, xid.New().String(), true); err != nil {
  884. logger.Debug(logSender, "", "unable to refresh cookie for user %#v: %v", user.Username, err)
  885. return
  886. }
  887. tokenClaims.Permissions = user.Filters.WebClient
  888. logger.Debug(logSender, "", "cookie refreshed for user %#v", user.Username)
  889. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebClient, util.GetIPFromRemoteAddress(r.RemoteAddr)) //nolint:errcheck
  890. }
  891. func (s *httpdServer) refreshAdminToken(w http.ResponseWriter, r *http.Request, tokenClaims jwtTokenClaims) {
  892. admin, err := dataprovider.AdminExists(tokenClaims.Username)
  893. if err != nil {
  894. return
  895. }
  896. if admin.Status != 1 {
  897. logger.Debug(logSender, "", "admin %#v is disabled, unable to refresh cookie", admin.Username)
  898. return
  899. }
  900. if admin.GetSignature() != tokenClaims.Signature {
  901. logger.Debug(logSender, "", "signature mismatch for admin %#v, unable to refresh cookie", admin.Username)
  902. return
  903. }
  904. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  905. if !admin.CanLoginFromIP(ipAddr) {
  906. logger.Debug(logSender, "", "admin %#v cannot login from %v, unable to refresh cookie", admin.Username, r.RemoteAddr)
  907. return
  908. }
  909. tokenClaims.Permissions = admin.Permissions
  910. logger.Debug(logSender, "", "cookie refreshed for admin %#v", admin.Username)
  911. tokenClaims.createAndSetCookie(w, r, s.tokenAuth, tokenAudienceWebAdmin, ipAddr) //nolint:errcheck
  912. }
  913. func (s *httpdServer) updateContextFromCookie(r *http.Request) *http.Request {
  914. token, _, err := jwtauth.FromContext(r.Context())
  915. if token == nil || err != nil {
  916. _, err = r.Cookie(jwtCookieKey)
  917. if err != nil {
  918. return r
  919. }
  920. token, err = jwtauth.VerifyRequest(s.tokenAuth, r, jwtauth.TokenFromCookie)
  921. ctx := jwtauth.NewContext(r.Context(), token, err)
  922. return r.WithContext(ctx)
  923. }
  924. return r
  925. }
  926. func (s *httpdServer) checkConnection(next http.Handler) http.Handler {
  927. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  928. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  929. var ip net.IP
  930. isUnixSocket := filepath.IsAbs(s.binding.Address)
  931. if !isUnixSocket {
  932. ip = net.ParseIP(ipAddr)
  933. }
  934. areHeadersAllowed := false
  935. if isUnixSocket || ip != nil {
  936. for _, allow := range s.binding.allowHeadersFrom {
  937. if allow(ip) {
  938. parsedIP := util.GetRealIP(r, s.binding.ClientIPProxyHeader, s.binding.ClientIPHeaderDepth)
  939. if parsedIP != "" {
  940. ipAddr = parsedIP
  941. r.RemoteAddr = ipAddr
  942. }
  943. if forwardedProto := r.Header.Get(xForwardedProto); forwardedProto != "" {
  944. ctx := context.WithValue(r.Context(), forwardedProtoKey, forwardedProto)
  945. r = r.WithContext(ctx)
  946. }
  947. areHeadersAllowed = true
  948. break
  949. }
  950. }
  951. }
  952. if !areHeadersAllowed {
  953. for idx := range s.binding.Security.proxyHeaders {
  954. r.Header.Del(s.binding.Security.proxyHeaders[idx])
  955. }
  956. }
  957. common.Connections.AddClientConnection(ipAddr)
  958. defer common.Connections.RemoveClientConnection(ipAddr)
  959. if !common.Connections.IsNewConnectionAllowed(ipAddr) {
  960. logger.Log(logger.LevelDebug, common.ProtocolHTTP, "", fmt.Sprintf("connection not allowed from ip %#v", ipAddr))
  961. s.sendForbiddenResponse(w, r, "connection not allowed from your ip")
  962. return
  963. }
  964. if common.IsBanned(ipAddr) {
  965. s.sendForbiddenResponse(w, r, "your IP address is banned")
  966. return
  967. }
  968. if delay, err := common.LimitRate(common.ProtocolHTTP, ipAddr); err != nil {
  969. delay += 499999999 * time.Nanosecond
  970. w.Header().Set("Retry-After", fmt.Sprintf("%.0f", delay.Seconds()))
  971. w.Header().Set("X-Retry-In", delay.String())
  972. s.sendTooManyRequestResponse(w, r, err)
  973. return
  974. }
  975. next.ServeHTTP(w, r)
  976. })
  977. }
  978. func (s *httpdServer) sendTooManyRequestResponse(w http.ResponseWriter, r *http.Request, err error) {
  979. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  980. r = s.updateContextFromCookie(r)
  981. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  982. s.renderClientMessagePage(w, r, http.StatusText(http.StatusTooManyRequests), "Rate limit exceeded",
  983. http.StatusTooManyRequests, err, "")
  984. return
  985. }
  986. s.renderMessagePage(w, r, http.StatusText(http.StatusTooManyRequests), "Rate limit exceeded", http.StatusTooManyRequests,
  987. err, "")
  988. return
  989. }
  990. sendAPIResponse(w, r, err, http.StatusText(http.StatusTooManyRequests), http.StatusTooManyRequests)
  991. }
  992. func (s *httpdServer) sendForbiddenResponse(w http.ResponseWriter, r *http.Request, message string) {
  993. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  994. r = s.updateContextFromCookie(r)
  995. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  996. s.renderClientForbiddenPage(w, r, message)
  997. return
  998. }
  999. s.renderForbiddenPage(w, r, message)
  1000. return
  1001. }
  1002. sendAPIResponse(w, r, errors.New(message), message, http.StatusForbidden)
  1003. }
  1004. func (s *httpdServer) badHostHandler(w http.ResponseWriter, r *http.Request) {
  1005. host := r.Host
  1006. for _, header := range s.binding.Security.HostsProxyHeaders {
  1007. if h := r.Header.Get(header); h != "" {
  1008. host = h
  1009. break
  1010. }
  1011. }
  1012. s.sendForbiddenResponse(w, r, fmt.Sprintf("The host %#v is not allowed", host))
  1013. }
  1014. func (s *httpdServer) redirectToWebPath(w http.ResponseWriter, r *http.Request, webPath string) {
  1015. if dataprovider.HasAdmin() {
  1016. http.Redirect(w, r, webPath, http.StatusFound)
  1017. return
  1018. }
  1019. if s.enableWebAdmin {
  1020. http.Redirect(w, r, webAdminSetupPath, http.StatusFound)
  1021. }
  1022. }
  1023. func (s *httpdServer) isStaticFileURL(r *http.Request) bool {
  1024. var urlPath string
  1025. rctx := chi.RouteContext(r.Context())
  1026. if rctx != nil && rctx.RoutePath != "" {
  1027. urlPath = rctx.RoutePath
  1028. } else {
  1029. urlPath = r.URL.Path
  1030. }
  1031. return !strings.HasPrefix(urlPath, webOpenAPIPath) && !strings.HasPrefix(urlPath, webStaticFilesPath)
  1032. }
  1033. func (s *httpdServer) initializeRouter() {
  1034. s.tokenAuth = jwtauth.New(jwa.HS256.String(), getSigningKey(s.signingPassphrase), nil)
  1035. s.router = chi.NewRouter()
  1036. s.router.Use(middleware.RequestID)
  1037. s.router.Use(s.checkConnection)
  1038. s.router.Use(logger.NewStructuredLogger(logger.GetLogger()))
  1039. s.router.Use(middleware.Recoverer)
  1040. if s.binding.Security.Enabled {
  1041. secureMiddleware := secure.New(secure.Options{
  1042. AllowedHosts: s.binding.Security.AllowedHosts,
  1043. AllowedHostsAreRegex: s.binding.Security.AllowedHostsAreRegex,
  1044. HostsProxyHeaders: s.binding.Security.HostsProxyHeaders,
  1045. SSLRedirect: s.binding.Security.HTTPSRedirect,
  1046. SSLHost: s.binding.Security.HTTPSHost,
  1047. SSLTemporaryRedirect: true,
  1048. SSLProxyHeaders: s.binding.Security.getHTTPSProxyHeaders(),
  1049. STSSeconds: s.binding.Security.STSSeconds,
  1050. STSIncludeSubdomains: s.binding.Security.STSIncludeSubdomains,
  1051. STSPreload: s.binding.Security.STSPreload,
  1052. ContentTypeNosniff: s.binding.Security.ContentTypeNosniff,
  1053. ContentSecurityPolicy: s.binding.Security.ContentSecurityPolicy,
  1054. PermissionsPolicy: s.binding.Security.PermissionsPolicy,
  1055. CrossOriginOpenerPolicy: s.binding.Security.CrossOriginOpenerPolicy,
  1056. ExpectCTHeader: s.binding.Security.ExpectCTHeader,
  1057. })
  1058. secureMiddleware.SetBadHostHandler(http.HandlerFunc(s.badHostHandler))
  1059. s.router.Use(secureMiddleware.Handler)
  1060. }
  1061. if s.cors.Enabled {
  1062. c := cors.New(cors.Options{
  1063. AllowedOrigins: util.RemoveDuplicates(s.cors.AllowedOrigins, true),
  1064. AllowedMethods: util.RemoveDuplicates(s.cors.AllowedMethods, true),
  1065. AllowedHeaders: util.RemoveDuplicates(s.cors.AllowedHeaders, true),
  1066. ExposedHeaders: util.RemoveDuplicates(s.cors.ExposedHeaders, true),
  1067. MaxAge: s.cors.MaxAge,
  1068. AllowCredentials: s.cors.AllowCredentials,
  1069. OptionsPassthrough: s.cors.OptionsPassthrough,
  1070. OptionsSuccessStatus: s.cors.OptionsSuccessStatus,
  1071. AllowPrivateNetwork: s.cors.AllowPrivateNetwork,
  1072. })
  1073. s.router.Use(c.Handler)
  1074. }
  1075. s.router.Use(middleware.GetHead)
  1076. // StripSlashes causes infinite redirects at the root path if used with http.FileServer
  1077. s.router.Use(middleware.Maybe(middleware.StripSlashes, s.isStaticFileURL))
  1078. s.router.NotFound(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  1079. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1080. if (s.enableWebAdmin || s.enableWebClient) && isWebRequest(r) {
  1081. r = s.updateContextFromCookie(r)
  1082. if s.enableWebClient && (isWebClientRequest(r) || !s.enableWebAdmin) {
  1083. s.renderClientNotFoundPage(w, r, nil)
  1084. return
  1085. }
  1086. s.renderNotFoundPage(w, r, nil)
  1087. return
  1088. }
  1089. sendAPIResponse(w, r, nil, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  1090. }))
  1091. s.router.Get(healthzPath, func(w http.ResponseWriter, r *http.Request) {
  1092. render.PlainText(w, r, "ok")
  1093. })
  1094. s.router.Get(robotsTxtPath, func(w http.ResponseWriter, r *http.Request) {
  1095. render.PlainText(w, r, "User-agent: *\nDisallow: /")
  1096. })
  1097. // share API exposed to external users
  1098. s.router.Get(sharesPath+"/{id}", s.downloadFromShare)
  1099. s.router.Post(sharesPath+"/{id}", s.uploadFilesToShare)
  1100. s.router.Post(sharesPath+"/{id}/{name}", s.uploadFileToShare)
  1101. s.router.With(compressor.Handler).Get(sharesPath+"/{id}/dirs", s.readBrowsableShareContents)
  1102. s.router.Get(sharesPath+"/{id}/files", s.downloadBrowsableSharedFile)
  1103. s.router.Get(tokenPath, s.getToken)
  1104. s.router.Post(adminPath+"/{username}/forgot-password", forgotAdminPassword)
  1105. s.router.Post(adminPath+"/{username}/reset-password", resetAdminPassword)
  1106. s.router.Post(userPath+"/{username}/forgot-password", forgotUserPassword)
  1107. s.router.Post(userPath+"/{username}/reset-password", resetUserPassword)
  1108. s.router.Group(func(router chi.Router) {
  1109. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeAdmin))
  1110. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1111. router.Use(jwtAuthenticatorAPI)
  1112. router.Get(versionPath, func(w http.ResponseWriter, r *http.Request) {
  1113. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1114. render.JSON(w, r, version.Get())
  1115. })
  1116. router.With(forbidAPIKeyAuthentication).Get(logoutPath, s.logout)
  1117. router.With(forbidAPIKeyAuthentication).Get(adminProfilePath, getAdminProfile)
  1118. router.With(forbidAPIKeyAuthentication).Put(adminProfilePath, updateAdminProfile)
  1119. router.With(forbidAPIKeyAuthentication).Put(adminPwdPath, changeAdminPassword)
  1120. // admin TOTP APIs
  1121. router.With(forbidAPIKeyAuthentication).Get(adminTOTPConfigsPath, getTOTPConfigs)
  1122. router.With(forbidAPIKeyAuthentication).Post(adminTOTPGeneratePath, generateTOTPSecret)
  1123. router.With(forbidAPIKeyAuthentication).Post(adminTOTPValidatePath, validateTOTPPasscode)
  1124. router.With(forbidAPIKeyAuthentication).Post(adminTOTPSavePath, saveTOTPConfig)
  1125. router.With(forbidAPIKeyAuthentication).Get(admin2FARecoveryCodesPath, getRecoveryCodes)
  1126. router.With(forbidAPIKeyAuthentication).Post(admin2FARecoveryCodesPath, generateRecoveryCodes)
  1127. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus)).
  1128. Get(serverStatusPath, func(w http.ResponseWriter, r *http.Request) {
  1129. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1130. render.JSON(w, r, getServicesStatus())
  1131. })
  1132. router.With(s.checkPerm(dataprovider.PermAdminViewConnections)).
  1133. Get(activeConnectionsPath, func(w http.ResponseWriter, r *http.Request) {
  1134. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1135. render.JSON(w, r, common.Connections.GetStats())
  1136. })
  1137. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections)).
  1138. Delete(activeConnectionsPath+"/{connectionID}", handleCloseConnection)
  1139. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/users/scans", getUsersQuotaScans)
  1140. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/users/{username}/scan", startUserQuotaScan)
  1141. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Get(quotasBasePath+"/folders/scans", getFoldersQuotaScans)
  1142. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans)).Post(quotasBasePath+"/folders/{name}/scan", startFolderQuotaScan)
  1143. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath, getUsers)
  1144. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(userPath, addUser)
  1145. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(userPath+"/{username}", getUserByUsername)
  1146. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}", updateUser)
  1147. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers)).Delete(userPath+"/{username}", deleteUser)
  1148. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(userPath+"/{username}/2fa/disable", disableUser2FA)
  1149. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(folderPath, getFolders)
  1150. router.With(s.checkPerm(dataprovider.PermAdminViewUsers)).Get(folderPath+"/{name}", getFolderByName)
  1151. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(folderPath, addFolder)
  1152. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(folderPath+"/{name}", updateFolder)
  1153. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers)).Delete(folderPath+"/{name}", deleteFolder)
  1154. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath, getGroups)
  1155. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Get(groupPath+"/{name}", getGroupByName)
  1156. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(groupPath, addGroup)
  1157. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Put(groupPath+"/{name}", updateGroup)
  1158. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Delete(groupPath+"/{name}", deleteGroup)
  1159. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(dumpDataPath, dumpData)
  1160. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(loadDataPath, loadData)
  1161. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(loadDataPath, loadDataFromRequest)
  1162. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/usage",
  1163. updateUserQuotaUsage)
  1164. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/users/{username}/transfer-usage",
  1165. updateUserTransferQuotaUsage)
  1166. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Put(quotasBasePath+"/folders/{name}/usage",
  1167. updateFolderQuotaUsage)
  1168. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts, getDefenderHosts)
  1169. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(defenderHosts+"/{id}", getDefenderHostByID)
  1170. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(defenderHosts+"/{id}", deleteDefenderHostByID)
  1171. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath, getAdmins)
  1172. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(adminPath, addAdmin)
  1173. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Get(adminPath+"/{username}", getAdminByUsername)
  1174. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}", updateAdmin)
  1175. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Delete(adminPath+"/{username}", deleteAdmin)
  1176. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Put(adminPath+"/{username}/2fa/disable", disableAdmin2FA)
  1177. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Get(retentionChecksPath, getRetentionChecks)
  1178. router.With(s.checkPerm(dataprovider.PermAdminRetentionChecks)).Post(retentionBasePath+"/{username}/check",
  1179. startRetentionCheck)
  1180. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Get(metadataChecksPath, getMetadataChecks)
  1181. router.With(s.checkPerm(dataprovider.PermAdminMetadataChecks)).Post(metadataBasePath+"/{username}/check",
  1182. startMetadataCheck)
  1183. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1184. Get(fsEventsPath, searchFsEvents)
  1185. router.With(s.checkPerm(dataprovider.PermAdminViewEvents), compressor.Handler).
  1186. Get(providerEventsPath, searchProviderEvents)
  1187. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1188. Get(apiKeysPath, getAPIKeys)
  1189. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1190. Post(apiKeysPath, addAPIKey)
  1191. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1192. Get(apiKeysPath+"/{id}", getAPIKeyByID)
  1193. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1194. Put(apiKeysPath+"/{id}", updateAPIKey)
  1195. router.With(forbidAPIKeyAuthentication, s.checkPerm(dataprovider.PermAdminManageAPIKeys)).
  1196. Delete(apiKeysPath+"/{id}", deleteAPIKey)
  1197. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath, getEventActions)
  1198. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventActionsPath+"/{name}", getEventActionByName)
  1199. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventActionsPath, addEventAction)
  1200. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventActionsPath+"/{name}", updateEventAction)
  1201. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventActionsPath+"/{name}", deleteEventAction)
  1202. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath, getEventRules)
  1203. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Get(eventRulesPath+"/{name}", getEventRuleByName)
  1204. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(eventRulesPath, addEventRule)
  1205. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Put(eventRulesPath+"/{name}", updateEventRule)
  1206. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Delete(eventRulesPath+"/{name}", deleteEventRule)
  1207. })
  1208. s.router.Get(userTokenPath, s.getUserToken)
  1209. s.router.Group(func(router chi.Router) {
  1210. router.Use(checkAPIKeyAuth(s.tokenAuth, dataprovider.APIKeyScopeUser))
  1211. router.Use(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromHeader))
  1212. router.Use(jwtAuthenticatorAPIUser)
  1213. router.With(forbidAPIKeyAuthentication).Get(userLogoutPath, s.logout)
  1214. router.With(forbidAPIKeyAuthentication, s.checkSecondFactorRequirement,
  1215. s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).Put(userPwdPath, changeUserPassword)
  1216. router.With(forbidAPIKeyAuthentication).Get(userProfilePath, getUserProfile)
  1217. router.With(forbidAPIKeyAuthentication, s.checkSecondFactorRequirement).Put(userProfilePath, updateUserProfile)
  1218. // user TOTP APIs
  1219. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1220. Get(userTOTPConfigsPath, getTOTPConfigs)
  1221. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1222. Post(userTOTPGeneratePath, generateTOTPSecret)
  1223. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1224. Post(userTOTPValidatePath, validateTOTPPasscode)
  1225. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1226. Post(userTOTPSavePath, saveTOTPConfig)
  1227. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1228. Get(user2FARecoveryCodesPath, getRecoveryCodes)
  1229. router.With(forbidAPIKeyAuthentication, s.checkHTTPUserPerm(sdk.WebClientMFADisabled)).
  1230. Post(user2FARecoveryCodesPath, generateRecoveryCodes)
  1231. router.With(s.checkSecondFactorRequirement, compressor.Handler).Get(userDirsPath, readUserFolder)
  1232. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1233. Post(userDirsPath, createUserDir)
  1234. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1235. Patch(userDirsPath, renameUserDir)
  1236. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1237. Delete(userDirsPath, deleteUserDir)
  1238. router.With(s.checkSecondFactorRequirement).Get(userFilesPath, getUserFile)
  1239. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1240. Post(userFilesPath, uploadUserFiles)
  1241. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1242. Patch(userFilesPath, renameUserFile)
  1243. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1244. Delete(userFilesPath, deleteUserFile)
  1245. router.With(s.checkSecondFactorRequirement).Post(userStreamZipPath, getUserFilesAsZipStream)
  1246. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1247. Get(userSharesPath, getShares)
  1248. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1249. Post(userSharesPath, addShare)
  1250. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1251. Get(userSharesPath+"/{id}", getShareByID)
  1252. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1253. Put(userSharesPath+"/{id}", updateShare)
  1254. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1255. Delete(userSharesPath+"/{id}", deleteShare)
  1256. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1257. Post(userUploadFilePath, uploadUserFile)
  1258. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled)).
  1259. Patch(userFilesDirsMetadataPath, setFileDirMetadata)
  1260. })
  1261. if s.renderOpenAPI {
  1262. s.router.Group(func(router chi.Router) {
  1263. router.Use(compressor.Handler)
  1264. serveStaticDir(router, webOpenAPIPath, s.openAPIPath)
  1265. })
  1266. }
  1267. if s.enableWebAdmin || s.enableWebClient {
  1268. s.router.Group(func(router chi.Router) {
  1269. router.Use(compressor.Handler)
  1270. serveStaticDir(router, webStaticFilesPath, s.staticFilesPath)
  1271. })
  1272. if s.binding.OIDC.isEnabled() {
  1273. s.router.Get(webOIDCRedirectPath, s.handleOIDCRedirect)
  1274. }
  1275. if s.enableWebClient {
  1276. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1277. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1278. s.redirectToWebPath(w, r, webClientLoginPath)
  1279. })
  1280. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1281. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1282. s.redirectToWebPath(w, r, webClientLoginPath)
  1283. })
  1284. } else {
  1285. s.router.Get(webRootPath, func(w http.ResponseWriter, r *http.Request) {
  1286. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1287. s.redirectToWebPath(w, r, webAdminLoginPath)
  1288. })
  1289. s.router.Get(webBasePath, func(w http.ResponseWriter, r *http.Request) {
  1290. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1291. s.redirectToWebPath(w, r, webAdminLoginPath)
  1292. })
  1293. }
  1294. }
  1295. s.setupWebClientRoutes()
  1296. s.setupWebAdminRoutes()
  1297. }
  1298. func (s *httpdServer) setupWebClientRoutes() {
  1299. if s.enableWebClient {
  1300. s.router.Get(webBaseClientPath, func(w http.ResponseWriter, r *http.Request) {
  1301. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  1302. http.Redirect(w, r, webClientLoginPath, http.StatusFound)
  1303. })
  1304. s.router.Get(webClientLoginPath, s.handleClientWebLogin)
  1305. if s.binding.OIDC.isEnabled() && !s.binding.isWebClientOIDCLoginDisabled() {
  1306. s.router.Get(webClientOIDCLoginPath, s.handleWebClientOIDCLogin)
  1307. }
  1308. if !s.binding.isWebClientLoginFormDisabled() {
  1309. s.router.Post(webClientLoginPath, s.handleWebClientLoginPost)
  1310. s.router.Get(webClientForgotPwdPath, s.handleWebClientForgotPwd)
  1311. s.router.Post(webClientForgotPwdPath, s.handleWebClientForgotPwdPost)
  1312. s.router.Get(webClientResetPwdPath, s.handleWebClientPasswordReset)
  1313. s.router.Post(webClientResetPwdPath, s.handleWebClientPasswordResetPost)
  1314. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1315. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1316. Get(webClientTwoFactorPath, s.handleWebClientTwoFactor)
  1317. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1318. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1319. Post(webClientTwoFactorPath, s.handleWebClientTwoFactorPost)
  1320. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1321. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1322. Get(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecovery)
  1323. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1324. s.jwtAuthenticatorPartial(tokenAudienceWebClientPartial)).
  1325. Post(webClientTwoFactorRecoveryPath, s.handleWebClientTwoFactorRecoveryPost)
  1326. }
  1327. // share API exposed to external users
  1328. s.router.Get(webClientPubSharesPath+"/{id}", s.downloadFromShare)
  1329. s.router.Get(webClientPubSharesPath+"/{id}/browse", s.handleShareGetFiles)
  1330. s.router.Get(webClientPubSharesPath+"/{id}/upload", s.handleClientUploadToShare)
  1331. s.router.With(compressor.Handler).Get(webClientPubSharesPath+"/{id}/dirs", s.handleShareGetDirContents)
  1332. s.router.Post(webClientPubSharesPath+"/{id}", s.uploadFilesToShare)
  1333. s.router.Post(webClientPubSharesPath+"/{id}/{name}", s.uploadFileToShare)
  1334. s.router.Group(func(router chi.Router) {
  1335. if s.binding.OIDC.isEnabled() {
  1336. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebClient))
  1337. }
  1338. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1339. router.Use(jwtAuthenticatorWebClient)
  1340. router.Get(webClientLogoutPath, s.handleWebClientLogout)
  1341. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientFilesPath, s.handleClientGetFiles)
  1342. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientViewPDFPath, s.handleClientViewPDF)
  1343. router.With(s.checkSecondFactorRequirement, s.refreshCookie, verifyCSRFHeader).Get(webClientFilePath, getUserFile)
  1344. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1345. Post(webClientFilePath, uploadUserFile)
  1346. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientEditFilePath, s.handleClientEditFile)
  1347. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1348. Patch(webClientFilesPath, renameUserFile)
  1349. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1350. Delete(webClientFilesPath, deleteUserFile)
  1351. router.With(s.checkSecondFactorRequirement, compressor.Handler, s.refreshCookie).
  1352. Get(webClientDirsPath, s.handleClientGetDirContents)
  1353. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1354. Post(webClientDirsPath, createUserDir)
  1355. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1356. Patch(webClientDirsPath, renameUserDir)
  1357. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientWriteDisabled), verifyCSRFHeader).
  1358. Delete(webClientDirsPath, deleteUserDir)
  1359. router.With(s.checkSecondFactorRequirement, s.refreshCookie).
  1360. Get(webClientDownloadZipPath, s.handleWebClientDownloadZip)
  1361. router.With(s.checkSecondFactorRequirement, s.refreshCookie).Get(webClientProfilePath,
  1362. s.handleClientGetProfile)
  1363. router.With(s.checkSecondFactorRequirement).Post(webClientProfilePath, s.handleWebClientProfilePost)
  1364. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1365. Get(webChangeClientPwdPath, s.handleWebClientChangePwd)
  1366. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientPasswordChangeDisabled)).
  1367. Post(webChangeClientPwdPath, s.handleWebClientChangePwdPost)
  1368. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), s.refreshCookie).
  1369. Get(webClientMFAPath, s.handleWebClientMFA)
  1370. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1371. Post(webClientTOTPGeneratePath, generateTOTPSecret)
  1372. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1373. Post(webClientTOTPValidatePath, validateTOTPPasscode)
  1374. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1375. Post(webClientTOTPSavePath, saveTOTPConfig)
  1376. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader, s.refreshCookie).
  1377. Get(webClientRecoveryCodesPath, getRecoveryCodes)
  1378. router.With(s.checkHTTPUserPerm(sdk.WebClientMFADisabled), verifyCSRFHeader).
  1379. Post(webClientRecoveryCodesPath, generateRecoveryCodes)
  1380. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1381. Get(webClientSharesPath, s.handleClientGetShares)
  1382. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1383. Get(webClientSharePath, s.handleClientAddShareGet)
  1384. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1385. Post(webClientSharePath, s.handleClientAddSharePost)
  1386. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), s.refreshCookie).
  1387. Get(webClientSharePath+"/{id}", s.handleClientUpdateShareGet)
  1388. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled)).
  1389. Post(webClientSharePath+"/{id}", s.handleClientUpdateSharePost)
  1390. router.With(s.checkSecondFactorRequirement, s.checkHTTPUserPerm(sdk.WebClientSharesDisabled), verifyCSRFHeader).
  1391. Delete(webClientSharePath+"/{id}", deleteShare)
  1392. })
  1393. }
  1394. }
  1395. func (s *httpdServer) setupWebAdminRoutes() {
  1396. if s.enableWebAdmin {
  1397. s.router.Get(webBaseAdminPath, func(w http.ResponseWriter, r *http.Request) {
  1398. r.Body = http.MaxBytesReader(w, r.Body, maxLoginBodySize)
  1399. s.redirectToWebPath(w, r, webAdminLoginPath)
  1400. })
  1401. s.router.Get(webAdminLoginPath, s.handleWebAdminLogin)
  1402. if s.binding.OIDC.hasRoles() && !s.binding.isWebAdminOIDCLoginDisabled() {
  1403. s.router.Get(webAdminOIDCLoginPath, s.handleWebAdminOIDCLogin)
  1404. }
  1405. s.router.Get(webAdminSetupPath, s.handleWebAdminSetupGet)
  1406. s.router.Post(webAdminSetupPath, s.handleWebAdminSetupPost)
  1407. if !s.binding.isWebAdminLoginFormDisabled() {
  1408. s.router.Post(webAdminLoginPath, s.handleWebAdminLoginPost)
  1409. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1410. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1411. Get(webAdminTwoFactorPath, s.handleWebAdminTwoFactor)
  1412. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1413. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1414. Post(webAdminTwoFactorPath, s.handleWebAdminTwoFactorPost)
  1415. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1416. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1417. Get(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecovery)
  1418. s.router.With(jwtauth.Verify(s.tokenAuth, jwtauth.TokenFromCookie),
  1419. s.jwtAuthenticatorPartial(tokenAudienceWebAdminPartial)).
  1420. Post(webAdminTwoFactorRecoveryPath, s.handleWebAdminTwoFactorRecoveryPost)
  1421. s.router.Get(webAdminForgotPwdPath, s.handleWebAdminForgotPwd)
  1422. s.router.Post(webAdminForgotPwdPath, s.handleWebAdminForgotPwdPost)
  1423. s.router.Get(webAdminResetPwdPath, s.handleWebAdminPasswordReset)
  1424. s.router.Post(webAdminResetPwdPath, s.handleWebAdminPasswordResetPost)
  1425. }
  1426. s.router.Group(func(router chi.Router) {
  1427. if s.binding.OIDC.isEnabled() {
  1428. router.Use(s.oidcTokenAuthenticator(tokenAudienceWebAdmin))
  1429. }
  1430. router.Use(jwtauth.Verify(s.tokenAuth, tokenFromContext, jwtauth.TokenFromCookie))
  1431. router.Use(jwtAuthenticatorWebAdmin)
  1432. router.Get(webLogoutPath, s.handleWebAdminLogout)
  1433. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminProfilePath, s.handleWebAdminProfile)
  1434. router.With(s.requireBuiltinLogin).Post(webAdminProfilePath, s.handleWebAdminProfilePost)
  1435. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webChangeAdminPwdPath, s.handleWebAdminChangePwd)
  1436. router.With(s.requireBuiltinLogin).Post(webChangeAdminPwdPath, s.handleWebAdminChangePwdPost)
  1437. router.With(s.refreshCookie, s.requireBuiltinLogin).Get(webAdminMFAPath, s.handleWebAdminMFA)
  1438. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPGeneratePath, generateTOTPSecret)
  1439. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPValidatePath, validateTOTPPasscode)
  1440. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminTOTPSavePath, saveTOTPConfig)
  1441. router.With(verifyCSRFHeader, s.requireBuiltinLogin, s.refreshCookie).Get(webAdminRecoveryCodesPath,
  1442. getRecoveryCodes)
  1443. router.With(verifyCSRFHeader, s.requireBuiltinLogin).Post(webAdminRecoveryCodesPath, generateRecoveryCodes)
  1444. router.With(s.checkPerm(dataprovider.PermAdminViewUsers), s.refreshCookie).
  1445. Get(webUsersPath, s.handleGetWebUsers)
  1446. router.With(s.checkPerm(dataprovider.PermAdminAddUsers), s.refreshCookie).
  1447. Get(webUserPath, s.handleWebAddUserGet)
  1448. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers), s.refreshCookie).
  1449. Get(webUserPath+"/{username}", s.handleWebUpdateUserGet)
  1450. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(webUserPath, s.handleWebAddUserPost)
  1451. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Post(webUserPath+"/{username}",
  1452. s.handleWebUpdateUserPost)
  1453. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1454. Get(webGroupsPath, s.handleWebGetGroups)
  1455. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1456. Get(webGroupPath, s.handleWebAddGroupGet)
  1457. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath, s.handleWebAddGroupPost)
  1458. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), s.refreshCookie).
  1459. Get(webGroupPath+"/{name}", s.handleWebUpdateGroupGet)
  1460. router.With(s.checkPerm(dataprovider.PermAdminManageGroups)).Post(webGroupPath+"/{name}",
  1461. s.handleWebUpdateGroupPost)
  1462. router.With(s.checkPerm(dataprovider.PermAdminManageGroups), verifyCSRFHeader).
  1463. Delete(webGroupPath+"/{name}", deleteGroup)
  1464. router.With(s.checkPerm(dataprovider.PermAdminViewConnections), s.refreshCookie).
  1465. Get(webConnectionsPath, s.handleWebGetConnections)
  1466. router.With(s.checkPerm(dataprovider.PermAdminViewUsers), s.refreshCookie).
  1467. Get(webFoldersPath, s.handleWebGetFolders)
  1468. router.With(s.checkPerm(dataprovider.PermAdminAddUsers), s.refreshCookie).
  1469. Get(webFolderPath, s.handleWebAddFolderGet)
  1470. router.With(s.checkPerm(dataprovider.PermAdminAddUsers)).Post(webFolderPath, s.handleWebAddFolderPost)
  1471. router.With(s.checkPerm(dataprovider.PermAdminViewServerStatus), s.refreshCookie).
  1472. Get(webStatusPath, s.handleWebGetStatus)
  1473. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1474. Get(webAdminsPath, s.handleGetWebAdmins)
  1475. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1476. Get(webAdminPath, s.handleWebAddAdminGet)
  1477. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), s.refreshCookie).
  1478. Get(webAdminPath+"/{username}", s.handleWebUpdateAdminGet)
  1479. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath, s.handleWebAddAdminPost)
  1480. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins)).Post(webAdminPath+"/{username}",
  1481. s.handleWebUpdateAdminPost)
  1482. router.With(s.checkPerm(dataprovider.PermAdminManageAdmins), verifyCSRFHeader).
  1483. Delete(webAdminPath+"/{username}", deleteAdmin)
  1484. router.With(s.checkPerm(dataprovider.PermAdminCloseConnections), verifyCSRFHeader).
  1485. Delete(webConnectionsPath+"/{connectionID}", handleCloseConnection)
  1486. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers), s.refreshCookie).
  1487. Get(webFolderPath+"/{name}", s.handleWebUpdateFolderGet)
  1488. router.With(s.checkPerm(dataprovider.PermAdminChangeUsers)).Post(webFolderPath+"/{name}",
  1489. s.handleWebUpdateFolderPost)
  1490. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers), verifyCSRFHeader).
  1491. Delete(webFolderPath+"/{name}", deleteFolder)
  1492. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1493. Post(webScanVFolderPath+"/{name}", startFolderQuotaScan)
  1494. router.With(s.checkPerm(dataprovider.PermAdminDeleteUsers), verifyCSRFHeader).
  1495. Delete(webUserPath+"/{username}", deleteUser)
  1496. router.With(s.checkPerm(dataprovider.PermAdminQuotaScans), verifyCSRFHeader).
  1497. Post(webQuotaScanPath+"/{username}", startUserQuotaScan)
  1498. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webMaintenancePath, s.handleWebMaintenance)
  1499. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Get(webBackupPath, dumpData)
  1500. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webRestorePath, s.handleWebRestore)
  1501. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1502. Get(webTemplateUser, s.handleWebTemplateUserGet)
  1503. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateUser, s.handleWebTemplateUserPost)
  1504. router.With(s.checkPerm(dataprovider.PermAdminManageSystem), s.refreshCookie).
  1505. Get(webTemplateFolder, s.handleWebTemplateFolderGet)
  1506. router.With(s.checkPerm(dataprovider.PermAdminManageSystem)).Post(webTemplateFolder, s.handleWebTemplateFolderPost)
  1507. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderPath, s.handleWebDefenderPage)
  1508. router.With(s.checkPerm(dataprovider.PermAdminViewDefender)).Get(webDefenderHostsPath, getDefenderHosts)
  1509. router.With(s.checkPerm(dataprovider.PermAdminManageDefender)).Delete(webDefenderHostsPath+"/{id}",
  1510. deleteDefenderHostByID)
  1511. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1512. Get(webAdminEventActionsPath, s.handleWebGetEventActions)
  1513. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1514. Get(webAdminEventActionPath, s.handleWebAddEventActionGet)
  1515. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath,
  1516. s.handleWebAddEventActionPost)
  1517. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1518. Get(webAdminEventActionPath+"/{name}", s.handleWebUpdateEventActionGet)
  1519. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventActionPath+"/{name}",
  1520. s.handleWebUpdateEventActionPost)
  1521. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1522. Delete(webAdminEventActionPath+"/{name}", deleteEventAction)
  1523. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1524. Get(webAdminEventRulesPath, s.handleWebGetEventRules)
  1525. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1526. Get(webAdminEventRulePath, s.handleWebAddEventRuleGet)
  1527. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath,
  1528. s.handleWebAddEventRulePost)
  1529. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), s.refreshCookie).
  1530. Get(webAdminEventRulePath+"/{name}", s.handleWebUpdateEventRuleGet)
  1531. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules)).Post(webAdminEventRulePath+"/{name}",
  1532. s.handleWebUpdateEventRulePost)
  1533. router.With(s.checkPerm(dataprovider.PermAdminManageEventRules), verifyCSRFHeader).
  1534. Delete(webAdminEventRulePath+"/{name}", deleteEventRule)
  1535. })
  1536. }
  1537. }