Files
kopia/internal/server/server_authz_checks.go
Jarek Kowalski 9cba4a97be refactor(repository): major server code refactoring (#1837)
This removes big shared lock held for for the duration of each request
and replaces it with trivially short lock to capture the current
state of the server/repository before passing it to handlers.

Handlers are now limited to only accessing a small subset of Server
functionality to be able to better reason about them.
2022-03-19 22:01:38 -07:00

113 lines
2.6 KiB
Go

package server
import (
"context"
"crypto/hmac"
"crypto/sha256"
"crypto/subtle"
"encoding/hex"
"io"
"net/http"
"github.com/kopia/kopia/internal/apiclient"
"github.com/kopia/kopia/internal/auth"
)
// kopiaSessionCookie is the name of the session cookie that Kopia server will generate for all
// UI sessions.
const kopiaSessionCookie = "Kopia-Session-Cookie"
func (s *Server) generateCSRFToken(sessionID string) string {
h := hmac.New(sha256.New, s.authCookieSigningKey)
if _, err := io.WriteString(h, sessionID); err != nil {
panic("io.WriteString() failed: " + err.Error())
}
return hex.EncodeToString(h.Sum(nil))
}
func (s *Server) validateCSRFToken(r *http.Request) bool {
if s.options.DisableCSRFTokenChecks {
return true
}
ctx := r.Context()
path := r.URL.Path
sessionCookie, err := r.Cookie(kopiaSessionCookie)
if err != nil {
log(ctx).Warnf("missing or invalid session cookie for %q: %v", path, err)
return false
}
validToken := s.generateCSRFToken(sessionCookie.Value)
token := r.Header.Get(apiclient.CSRFTokenHeader)
if token == "" {
log(ctx).Warnf("missing CSRF token for %v", path)
return false
}
if subtle.ConstantTimeCompare([]byte(validToken), []byte(token)) == 1 {
return true
}
log(ctx).Warnf("got invalid CSRF token for %v: %v, want %v, session %v", path, token, validToken, sessionCookie.Value)
return false
}
func requireUIUser(ctx context.Context, rc requestContext) bool {
if rc.srv.getAuthenticator() == nil {
return true
}
if rc.srv.getOptions().UIUser == "" {
return false
}
user, _, _ := rc.req.BasicAuth()
return user == rc.srv.getOptions().UIUser
}
func requireServerControlUser(ctx context.Context, rc requestContext) bool {
if rc.srv.getAuthenticator() == nil {
return true
}
if rc.srv.getOptions().ServerControlUser == "" {
return false
}
user, _, _ := rc.req.BasicAuth()
return user == rc.srv.getOptions().ServerControlUser
}
func anyAuthenticatedUser(ctx context.Context, rc requestContext) bool {
return true
}
func handlerWillCheckAuthorization(ctx context.Context, rc requestContext) bool {
return true
}
func requireContentAccess(level auth.AccessLevel) isAuthorizedFunc {
return func(ctx context.Context, rc requestContext) bool {
return httpAuthorizationInfo(ctx, rc).ContentAccessLevel() >= level
}
}
func hasManifestAccess(ctx context.Context, rc requestContext, labels map[string]string, level auth.AccessLevel) bool {
return httpAuthorizationInfo(ctx, rc).ManifestAccessLevel(labels) >= level
}
var (
_ isAuthorizedFunc = requireUIUser
_ isAuthorizedFunc = anyAuthenticatedUser
_ isAuthorizedFunc = handlerWillCheckAuthorization
)