csrf_middleware.go 1.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "errors"
  6. "log/slog"
  7. "net/http"
  8. "miniflux.app/v2/internal/crypto"
  9. "miniflux.app/v2/internal/http/request"
  10. "miniflux.app/v2/internal/http/response"
  11. )
  12. type csrfMiddleware struct {
  13. basePath string
  14. }
  15. func newCSRFMiddleware(basePath string) *csrfMiddleware {
  16. return &csrfMiddleware{basePath: basePath}
  17. }
  18. // handle validates the CSRF token on state-changing requests. It must be
  19. // chained inside handleWebSession so that the session is already present
  20. // in the request context.
  21. func (m *csrfMiddleware) handle(next http.Handler) http.Handler {
  22. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  23. switch r.Method {
  24. case http.MethodGet, http.MethodHead, http.MethodOptions:
  25. // Safe methods don't require CSRF validation.
  26. default:
  27. if !m.validate(w, r) {
  28. return
  29. }
  30. }
  31. next.ServeHTTP(w, r)
  32. })
  33. }
  34. func (m *csrfMiddleware) validate(w http.ResponseWriter, r *http.Request) bool {
  35. csrfToken := request.WebSession(r).CSRF()
  36. formValue := r.FormValue("csrf")
  37. headerValue := r.Header.Get("X-Csrf-Token")
  38. if crypto.ConstantTimeCmp(csrfToken, formValue) || crypto.ConstantTimeCmp(csrfToken, headerValue) {
  39. return true
  40. }
  41. slog.Warn("Invalid or missing CSRF token",
  42. slog.String("url", r.RequestURI),
  43. )
  44. if r.URL.Path == "/login" {
  45. response.HTMLRedirect(w, r, m.basePath+"/")
  46. } else {
  47. response.HTMLBadRequest(w, r, errors.New("invalid or missing CSRF"))
  48. }
  49. return false
  50. }