181 lines
4.3 KiB
Go
181 lines
4.3 KiB
Go
|
package http
|
||
|
|
||
|
import (
|
||
|
"encoding/json"
|
||
|
"net/http"
|
||
|
"os"
|
||
|
"strings"
|
||
|
"time"
|
||
|
|
||
|
"github.com/dgrijalva/jwt-go"
|
||
|
"github.com/dgrijalva/jwt-go/request"
|
||
|
"github.com/filebrowser/filebrowser/v2/errors"
|
||
|
"github.com/filebrowser/filebrowser/v2/users"
|
||
|
)
|
||
|
|
||
|
type userInfo struct {
|
||
|
ID uint `json:"id"`
|
||
|
Locale string `json:"locale"`
|
||
|
ViewMode users.ViewMode `json:"viewMode"`
|
||
|
Perm users.Permissions `json:"perm"`
|
||
|
Commands []string `json:"commands"`
|
||
|
LockPassword bool `json:"lockPassword"`
|
||
|
}
|
||
|
|
||
|
type authToken struct {
|
||
|
User userInfo `json:"user"`
|
||
|
jwt.StandardClaims
|
||
|
}
|
||
|
|
||
|
type extractor []string
|
||
|
|
||
|
func (e extractor) ExtractToken(r *http.Request) (string, error) {
|
||
|
token, _ := request.AuthorizationHeaderExtractor.ExtractToken(r)
|
||
|
|
||
|
// Checks if the token isn't empty and if it contains two dots.
|
||
|
// The former prevents incompatibility with URLs that previously
|
||
|
// used basic auth.
|
||
|
if token != "" && strings.Count(token, ".") == 2 {
|
||
|
return token, nil
|
||
|
}
|
||
|
|
||
|
auth := r.URL.Query().Get("auth")
|
||
|
if auth == "" {
|
||
|
return "", request.ErrNoTokenInRequest
|
||
|
}
|
||
|
|
||
|
return auth, nil
|
||
|
}
|
||
|
|
||
|
func withUser(fn handleFunc) handleFunc {
|
||
|
return func(w http.ResponseWriter, r *http.Request, d *data) (int, error) {
|
||
|
keyFunc := func(token *jwt.Token) (interface{}, error) {
|
||
|
return d.settings.Key, nil
|
||
|
}
|
||
|
|
||
|
var tk authToken
|
||
|
token, err := request.ParseFromRequestWithClaims(r, &extractor{}, &tk, keyFunc)
|
||
|
|
||
|
if err != nil || !token.Valid {
|
||
|
return http.StatusForbidden, nil
|
||
|
}
|
||
|
|
||
|
expired := !tk.VerifyExpiresAt(time.Now().Add(time.Hour).Unix(), true)
|
||
|
updated := d.store.Users.LastUpdate(tk.User.ID) > tk.IssuedAt
|
||
|
|
||
|
if expired || updated {
|
||
|
w.Header().Add("X-Renew-Token", "true")
|
||
|
}
|
||
|
|
||
|
d.user, err = d.store.Users.Get(tk.User.ID)
|
||
|
if err != nil {
|
||
|
return http.StatusInternalServerError, err
|
||
|
}
|
||
|
return fn(w, r, d)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func withAdmin(fn handleFunc) handleFunc {
|
||
|
return withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) {
|
||
|
if !d.user.Perm.Admin {
|
||
|
return http.StatusForbidden, nil
|
||
|
}
|
||
|
|
||
|
return fn(w, r, d)
|
||
|
})
|
||
|
}
|
||
|
|
||
|
var loginHandler = func(w http.ResponseWriter, r *http.Request, d *data) (int, error) {
|
||
|
auther, err := d.store.Auth.Get(d.settings.AuthMethod)
|
||
|
if err != nil {
|
||
|
return http.StatusInternalServerError, err
|
||
|
}
|
||
|
|
||
|
user, err := auther.Auth(r)
|
||
|
if err == os.ErrPermission {
|
||
|
return http.StatusForbidden, nil
|
||
|
} else if err != nil {
|
||
|
return http.StatusInternalServerError, err
|
||
|
} else {
|
||
|
return printToken(w, r, d, user)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
type signupBody struct {
|
||
|
Username string `json:"username"`
|
||
|
Password string `json:"password"`
|
||
|
}
|
||
|
|
||
|
var signupHandler = func(w http.ResponseWriter, r *http.Request, d *data) (int, error) {
|
||
|
if !d.settings.Signup {
|
||
|
return http.StatusMethodNotAllowed, nil
|
||
|
}
|
||
|
|
||
|
if r.Body == nil {
|
||
|
return http.StatusBadRequest, nil
|
||
|
}
|
||
|
|
||
|
info := &signupBody{}
|
||
|
err := json.NewDecoder(r.Body).Decode(info)
|
||
|
if err != nil {
|
||
|
return http.StatusBadRequest, err
|
||
|
}
|
||
|
|
||
|
if info.Password == "" || info.Username == "" {
|
||
|
return http.StatusBadRequest, nil
|
||
|
}
|
||
|
|
||
|
user := &users.User{
|
||
|
Username: info.Username,
|
||
|
}
|
||
|
|
||
|
d.settings.Defaults.Apply(user)
|
||
|
|
||
|
pwd, err := users.HashPwd(info.Password)
|
||
|
if err != nil {
|
||
|
return http.StatusInternalServerError, err
|
||
|
}
|
||
|
|
||
|
user.Password = pwd
|
||
|
err = d.store.Users.Save(user)
|
||
|
if err == errors.ErrExist {
|
||
|
return http.StatusConflict, err
|
||
|
} else if err != nil {
|
||
|
return http.StatusInternalServerError, err
|
||
|
}
|
||
|
|
||
|
return http.StatusOK, nil
|
||
|
}
|
||
|
|
||
|
var renewHandler = withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) {
|
||
|
return printToken(w, r, d, d.user)
|
||
|
})
|
||
|
|
||
|
func printToken(w http.ResponseWriter, r *http.Request, d *data, user *users.User) (int, error) {
|
||
|
claims := &authToken{
|
||
|
User: userInfo{
|
||
|
ID: user.ID,
|
||
|
Locale: user.Locale,
|
||
|
ViewMode: user.ViewMode,
|
||
|
Perm: user.Perm,
|
||
|
LockPassword: user.LockPassword,
|
||
|
Commands: user.Commands,
|
||
|
},
|
||
|
StandardClaims: jwt.StandardClaims{
|
||
|
IssuedAt: time.Now().Unix(),
|
||
|
ExpiresAt: time.Now().Add(time.Hour * 2).Unix(),
|
||
|
Issuer: "File Browser",
|
||
|
},
|
||
|
}
|
||
|
|
||
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
||
|
signed, err := token.SignedString(d.settings.Key)
|
||
|
if err != nil {
|
||
|
return http.StatusInternalServerError, err
|
||
|
}
|
||
|
|
||
|
w.Header().Set("Content-Type", "cty")
|
||
|
w.Write([]byte(signed))
|
||
|
return 0, nil
|
||
|
}
|