middleware.go 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "context"
  6. "errors"
  7. "log/slog"
  8. "net/http"
  9. "net/url"
  10. "strings"
  11. "miniflux.app/v2/internal/config"
  12. "miniflux.app/v2/internal/crypto"
  13. "miniflux.app/v2/internal/http/cookie"
  14. "miniflux.app/v2/internal/http/request"
  15. "miniflux.app/v2/internal/http/response"
  16. "miniflux.app/v2/internal/model"
  17. "miniflux.app/v2/internal/storage"
  18. "miniflux.app/v2/internal/ui/session"
  19. )
  20. type middleware struct {
  21. basePath string
  22. store *storage.Storage
  23. }
  24. func newMiddleware(basePath string, store *storage.Storage) *middleware {
  25. return &middleware{basePath, store}
  26. }
  27. func (m *middleware) handleUserSession(next http.Handler) http.Handler {
  28. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  29. session := m.getUserSessionFromCookie(r)
  30. if session == nil {
  31. if isPublicRoute(r) {
  32. next.ServeHTTP(w, r)
  33. } else {
  34. slog.Debug("Redirecting to login page because no user session has been found",
  35. slog.String("url", r.RequestURI),
  36. )
  37. loginURL, _ := url.Parse(m.basePath + "/")
  38. values := loginURL.Query()
  39. values.Set("redirect_url", r.RequestURI)
  40. loginURL.RawQuery = values.Encode()
  41. response.HTMLRedirect(w, r, loginURL.String())
  42. }
  43. } else {
  44. slog.Debug("User session found",
  45. slog.String("url", r.RequestURI),
  46. slog.Int64("user_id", session.UserID),
  47. slog.Int64("user_session_id", session.ID),
  48. )
  49. ctx := r.Context()
  50. ctx = context.WithValue(ctx, request.UserIDContextKey, session.UserID)
  51. ctx = context.WithValue(ctx, request.IsAuthenticatedContextKey, true)
  52. ctx = context.WithValue(ctx, request.UserSessionTokenContextKey, session.Token)
  53. next.ServeHTTP(w, r.WithContext(ctx))
  54. }
  55. })
  56. }
  57. func (m *middleware) handleAppSession(next http.Handler) http.Handler {
  58. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  59. if strings.HasPrefix(r.URL.Path, "/feed-icon/") {
  60. // Skip app session handling for the feed icon route to avoid unnecessary session creation
  61. // when fetching feed icons.
  62. next.ServeHTTP(w, r)
  63. return
  64. }
  65. var err error
  66. session := m.getAppSessionValueFromCookie(r)
  67. if session == nil {
  68. if request.IsAuthenticated(r) {
  69. userID := request.UserID(r)
  70. slog.Debug("Cookie expired but user is logged: creating a new app session",
  71. slog.Int64("user_id", userID),
  72. )
  73. session, err = m.store.CreateAppSessionWithUserPrefs(userID)
  74. if err != nil {
  75. response.HTMLServerError(w, r, err)
  76. return
  77. }
  78. } else {
  79. slog.Debug("App session not found, creating a new one")
  80. session, err = m.store.CreateAppSession()
  81. if err != nil {
  82. response.HTMLServerError(w, r, err)
  83. return
  84. }
  85. }
  86. http.SetCookie(w, cookie.New(cookie.CookieAppSessionID, session.ID, config.Opts.HTTPS(), config.Opts.BasePath()))
  87. }
  88. if r.Method == http.MethodPost {
  89. formValue := r.FormValue("csrf")
  90. headerValue := r.Header.Get("X-Csrf-Token")
  91. if !crypto.ConstantTimeCmp(session.Data.CSRF, formValue) && !crypto.ConstantTimeCmp(session.Data.CSRF, headerValue) {
  92. slog.Warn("Invalid or missing CSRF token",
  93. slog.String("url", r.RequestURI),
  94. slog.String("form_csrf", formValue),
  95. slog.String("header_csrf", headerValue),
  96. )
  97. if r.URL.Path == "/login" {
  98. response.HTMLRedirect(w, r, m.basePath+"/")
  99. return
  100. }
  101. response.HTMLBadRequest(w, r, errors.New("invalid or missing CSRF"))
  102. return
  103. }
  104. }
  105. ctx := r.Context()
  106. ctx = context.WithValue(ctx, request.SessionIDContextKey, session.ID)
  107. ctx = context.WithValue(ctx, request.CSRFContextKey, session.Data.CSRF)
  108. ctx = context.WithValue(ctx, request.OAuth2StateContextKey, session.Data.OAuth2State)
  109. ctx = context.WithValue(ctx, request.OAuth2CodeVerifierContextKey, session.Data.OAuth2CodeVerifier)
  110. ctx = context.WithValue(ctx, request.FlashMessageContextKey, session.Data.FlashMessage)
  111. ctx = context.WithValue(ctx, request.FlashErrorMessageContextKey, session.Data.FlashErrorMessage)
  112. ctx = context.WithValue(ctx, request.UserLanguageContextKey, session.Data.Language)
  113. ctx = context.WithValue(ctx, request.UserThemeContextKey, session.Data.Theme)
  114. ctx = context.WithValue(ctx, request.LastForceRefreshContextKey, session.Data.LastForceRefresh)
  115. ctx = context.WithValue(ctx, request.WebAuthnDataContextKey, session.Data.WebAuthnSessionData)
  116. next.ServeHTTP(w, r.WithContext(ctx))
  117. })
  118. }
  119. func (m *middleware) getAppSessionValueFromCookie(r *http.Request) *model.Session {
  120. cookieValue := request.CookieValue(r, cookie.CookieAppSessionID)
  121. if cookieValue == "" {
  122. return nil
  123. }
  124. session, err := m.store.AppSession(cookieValue)
  125. if err != nil {
  126. slog.Debug("Unable to fetch app session from the database; another session will be created",
  127. slog.String("cookie_value", cookieValue),
  128. slog.Any("error", err),
  129. )
  130. return nil
  131. }
  132. return session
  133. }
  134. // isPublicRoute checks if the request path corresponds to a route that
  135. // does not require authentication. The path is expected to have the base
  136. // path already stripped.
  137. func isPublicRoute(r *http.Request) bool {
  138. path := r.URL.Path
  139. switch path {
  140. case "/", "/login", "/favicon.ico", "/manifest.json", "/robots.txt",
  141. "/healthcheck", "/offline",
  142. "/webauthn/login/begin", "/webauthn/login/finish":
  143. return true
  144. }
  145. if strings.HasPrefix(path, "/stylesheets/") ||
  146. strings.HasPrefix(path, "/icon/") ||
  147. strings.HasPrefix(path, "/feed-icon/") ||
  148. strings.HasSuffix(path, "/redirect") && strings.HasPrefix(path, "/oauth2/") ||
  149. strings.HasSuffix(path, "/callback") && strings.HasPrefix(path, "/oauth2/") ||
  150. strings.HasPrefix(path, "/share/") ||
  151. strings.HasPrefix(path, "/proxy/") ||
  152. strings.HasPrefix(path, "/js/") {
  153. return true
  154. }
  155. return false
  156. }
  157. func (m *middleware) getUserSessionFromCookie(r *http.Request) *model.UserSession {
  158. cookieValue := request.CookieValue(r, cookie.CookieUserSessionID)
  159. if cookieValue == "" {
  160. return nil
  161. }
  162. session, err := m.store.UserSessionByToken(cookieValue)
  163. if err != nil {
  164. slog.Error("Unable to fetch user session from the database",
  165. slog.String("cookie_value", cookieValue),
  166. slog.Any("error", err),
  167. )
  168. return nil
  169. }
  170. return session
  171. }
  172. func (m *middleware) handleAuthProxy(next http.Handler) http.Handler {
  173. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  174. if request.IsAuthenticated(r) || config.Opts.AuthProxyHeader() == "" {
  175. next.ServeHTTP(w, r)
  176. return
  177. }
  178. remoteIP := request.FindRemoteIP(r)
  179. trustedNetworks := config.Opts.TrustedReverseProxyNetworks()
  180. if !request.IsTrustedIP(remoteIP, trustedNetworks) {
  181. slog.Warn("[AuthProxy] Rejecting authentication request from untrusted proxy",
  182. slog.String("remote_ip", remoteIP),
  183. slog.String("client_ip", request.ClientIP(r)),
  184. slog.String("user_agent", r.UserAgent()),
  185. slog.Any("trusted_networks", trustedNetworks),
  186. )
  187. next.ServeHTTP(w, r)
  188. return
  189. }
  190. username := r.Header.Get(config.Opts.AuthProxyHeader())
  191. if username == "" {
  192. next.ServeHTTP(w, r)
  193. return
  194. }
  195. clientIP := request.ClientIP(r)
  196. slog.Debug("[AuthProxy] Received authenticated requested",
  197. slog.String("client_ip", clientIP),
  198. slog.String("remote_ip", remoteIP),
  199. slog.String("user_agent", r.UserAgent()),
  200. slog.String("username", username),
  201. )
  202. user, err := m.store.UserByUsername(username)
  203. if err != nil {
  204. response.HTMLServerError(w, r, err)
  205. return
  206. }
  207. if user == nil {
  208. if !config.Opts.IsAuthProxyUserCreationAllowed() {
  209. slog.Debug("[AuthProxy] User doesn't exist and user creation is not allowed",
  210. slog.Bool("authentication_failed", true),
  211. slog.String("client_ip", clientIP),
  212. slog.String("remote_ip", remoteIP),
  213. slog.String("user_agent", r.UserAgent()),
  214. slog.String("username", username),
  215. )
  216. response.HTMLForbidden(w, r)
  217. return
  218. }
  219. if user, err = m.store.CreateUser(&model.UserCreationRequest{Username: username}); err != nil {
  220. response.HTMLServerError(w, r, err)
  221. return
  222. }
  223. }
  224. sessionToken, _, err := m.store.CreateUserSessionFromUsername(user.Username, r.UserAgent(), clientIP)
  225. if err != nil {
  226. response.HTMLServerError(w, r, err)
  227. return
  228. }
  229. slog.Info("[AuthProxy] User authenticated successfully",
  230. slog.Bool("authentication_successful", true),
  231. slog.String("client_ip", clientIP),
  232. slog.String("remote_ip", remoteIP),
  233. slog.String("user_agent", r.UserAgent()),
  234. slog.Int64("user_id", user.ID),
  235. slog.String("username", user.Username),
  236. )
  237. m.store.SetLastLogin(user.ID)
  238. sess := session.New(m.store, request.SessionID(r))
  239. sess.SetLanguage(user.Language)
  240. sess.SetTheme(user.Theme)
  241. http.SetCookie(w, cookie.New(
  242. cookie.CookieUserSessionID,
  243. sessionToken,
  244. config.Opts.HTTPS(),
  245. config.Opts.BasePath(),
  246. ))
  247. response.HTMLRedirect(w, r, m.basePath+"/"+user.DefaultHomePage)
  248. })
  249. }