2014-11-16 13:13:20 -07:00
|
|
|
// Copyright (C) 2014 The Syncthing Authors.
|
2014-09-29 12:43:32 -07:00
|
|
|
//
|
2015-03-07 13:36:35 -07:00
|
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
|
|
// You can obtain one at http://mozilla.org/MPL/2.0/.
|
2014-09-03 23:31:38 -07:00
|
|
|
|
2014-06-04 12:20:07 -07:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"os"
|
2014-07-06 06:00:44 -07:00
|
|
|
"strings"
|
2014-06-04 12:20:07 -07:00
|
|
|
|
2016-01-29 10:16:01 -07:00
|
|
|
"github.com/syncthing/syncthing/lib/config"
|
2015-08-06 02:29:25 -07:00
|
|
|
"github.com/syncthing/syncthing/lib/osutil"
|
2016-05-26 00:02:56 -07:00
|
|
|
"github.com/syncthing/syncthing/lib/rand"
|
2015-08-06 02:29:25 -07:00
|
|
|
"github.com/syncthing/syncthing/lib/sync"
|
2014-06-04 12:20:07 -07:00
|
|
|
)
|
|
|
|
|
2016-01-03 13:56:19 -07:00
|
|
|
// csrfTokens is a list of valid tokens. It is sorted so that the most
|
|
|
|
// recently used token is first in the list. New tokens are added to the front
|
|
|
|
// of the list (as it is the most recently used at that time). The list is
|
|
|
|
// pruned to a maximum of maxCsrfTokens, throwing away the least recently used
|
|
|
|
// tokens.
|
2014-06-04 12:20:07 -07:00
|
|
|
var csrfTokens []string
|
2015-04-28 13:32:10 -07:00
|
|
|
var csrfMut = sync.NewMutex()
|
2014-06-04 12:20:07 -07:00
|
|
|
|
2016-01-03 13:56:19 -07:00
|
|
|
const maxCsrfTokens = 25
|
|
|
|
|
2014-06-04 12:20:07 -07:00
|
|
|
// Check for CSRF token on /rest/ URLs. If a correct one is not given, reject
|
|
|
|
// the request with 403. For / and /index.html, set a new CSRF cookie if none
|
|
|
|
// is currently set.
|
2016-01-29 10:16:01 -07:00
|
|
|
func csrfMiddleware(unique string, prefix string, cfg config.GUIConfiguration, next http.Handler) http.Handler {
|
2014-09-01 13:51:44 -07:00
|
|
|
loadCsrfTokens()
|
2014-07-05 12:40:29 -07:00
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// Allow requests carrying a valid API key
|
2016-01-29 10:16:01 -07:00
|
|
|
if cfg.IsValidAPIKey(r.Header.Get("X-API-Key")) {
|
2014-07-05 12:40:29 -07:00
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2016-05-21 06:48:55 -07:00
|
|
|
// Allow requests for anything not under the protected path prefix,
|
|
|
|
// and set a CSRF cookie if there isn't already a valid one.
|
2014-07-06 06:00:44 -07:00
|
|
|
if !strings.HasPrefix(r.URL.Path, prefix) {
|
2015-06-22 08:57:08 -07:00
|
|
|
cookie, err := r.Cookie("CSRF-Token-" + unique)
|
2014-07-05 12:40:29 -07:00
|
|
|
if err != nil || !validCsrfToken(cookie.Value) {
|
2016-01-03 13:56:19 -07:00
|
|
|
httpl.Debugln("new CSRF cookie in response to request for", r.URL)
|
2014-07-05 12:40:29 -07:00
|
|
|
cookie = &http.Cookie{
|
2015-06-22 08:57:08 -07:00
|
|
|
Name: "CSRF-Token-" + unique,
|
2014-07-05 12:40:29 -07:00
|
|
|
Value: newCsrfToken(),
|
|
|
|
}
|
|
|
|
http.SetCookie(w, cookie)
|
|
|
|
}
|
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
return
|
|
|
|
}
|
2014-06-05 00:16:12 -07:00
|
|
|
|
2014-07-05 12:40:29 -07:00
|
|
|
// Verify the CSRF token
|
2015-06-22 08:57:08 -07:00
|
|
|
token := r.Header.Get("X-CSRF-Token-" + unique)
|
2014-06-04 12:20:07 -07:00
|
|
|
if !validCsrfToken(token) {
|
|
|
|
http.Error(w, "CSRF Error", 403)
|
2014-07-05 12:40:29 -07:00
|
|
|
return
|
2014-06-04 12:20:07 -07:00
|
|
|
}
|
2014-07-05 12:40:29 -07:00
|
|
|
|
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
})
|
2014-06-04 12:20:07 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
func validCsrfToken(token string) bool {
|
|
|
|
csrfMut.Lock()
|
|
|
|
defer csrfMut.Unlock()
|
2016-01-03 13:56:19 -07:00
|
|
|
for i, t := range csrfTokens {
|
2014-06-04 12:20:07 -07:00
|
|
|
if t == token {
|
2016-01-03 13:56:19 -07:00
|
|
|
if i > 0 {
|
|
|
|
// Move this token to the head of the list. Copy the tokens at
|
|
|
|
// the front one step to the right and then replace the token
|
|
|
|
// at the head.
|
|
|
|
copy(csrfTokens[1:], csrfTokens[:i+1])
|
|
|
|
csrfTokens[0] = token
|
|
|
|
}
|
2014-06-04 12:20:07 -07:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func newCsrfToken() string {
|
2016-05-26 00:02:56 -07:00
|
|
|
token := rand.String(32)
|
2014-06-04 12:20:07 -07:00
|
|
|
|
|
|
|
csrfMut.Lock()
|
2016-01-03 13:56:19 -07:00
|
|
|
csrfTokens = append([]string{token}, csrfTokens...)
|
|
|
|
if len(csrfTokens) > maxCsrfTokens {
|
|
|
|
csrfTokens = csrfTokens[:maxCsrfTokens]
|
2014-06-04 12:20:07 -07:00
|
|
|
}
|
|
|
|
defer csrfMut.Unlock()
|
|
|
|
|
|
|
|
saveCsrfTokens()
|
|
|
|
|
|
|
|
return token
|
|
|
|
}
|
|
|
|
|
|
|
|
func saveCsrfTokens() {
|
2015-07-11 08:03:40 -07:00
|
|
|
// We're ignoring errors in here. It's not super critical and there's
|
|
|
|
// nothing relevant we can do about them anyway...
|
2015-07-13 03:44:59 -07:00
|
|
|
|
2015-07-11 08:03:40 -07:00
|
|
|
name := locations[locCsrfTokens]
|
|
|
|
f, err := osutil.CreateAtomic(name, 0600)
|
2014-06-04 12:20:07 -07:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, t := range csrfTokens {
|
2015-07-11 08:03:40 -07:00
|
|
|
fmt.Fprintln(f, t)
|
2014-06-04 12:20:07 -07:00
|
|
|
}
|
|
|
|
|
2015-07-11 08:03:40 -07:00
|
|
|
f.Close()
|
2014-06-04 12:20:07 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
func loadCsrfTokens() {
|
2015-03-29 03:55:27 -07:00
|
|
|
f, err := os.Open(locations[locCsrfTokens])
|
2014-06-04 12:20:07 -07:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
s := bufio.NewScanner(f)
|
|
|
|
for s.Scan() {
|
|
|
|
csrfTokens = append(csrfTokens, s.Text())
|
|
|
|
}
|
|
|
|
}
|