server_account.go 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275
  1. package server
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "heckel.io/ntfy/auth"
  6. "heckel.io/ntfy/util"
  7. "net/http"
  8. )
  9. func (s *Server) handleAccountCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  10. signupAllowed := s.config.EnableSignup
  11. admin := v.user != nil && v.user.Role == auth.RoleAdmin
  12. if !signupAllowed && !admin {
  13. return errHTTPUnauthorized
  14. }
  15. body, err := util.Peek(r.Body, 4096) // FIXME
  16. if err != nil {
  17. return err
  18. }
  19. defer r.Body.Close()
  20. var newAccount apiAccountCreateRequest
  21. if err := json.NewDecoder(body).Decode(&newAccount); err != nil {
  22. return err
  23. }
  24. if err := s.auth.AddUser(newAccount.Username, newAccount.Password, auth.RoleUser); err != nil { // TODO this should return a User
  25. return err
  26. }
  27. w.Header().Set("Content-Type", "application/json")
  28. w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
  29. // FIXME return something
  30. return nil
  31. }
  32. func (s *Server) handleAccountGet(w http.ResponseWriter, r *http.Request, v *visitor) error {
  33. w.Header().Set("Content-Type", "application/json")
  34. w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
  35. stats, err := v.Stats()
  36. if err != nil {
  37. return err
  38. }
  39. response := &apiAccountSettingsResponse{
  40. Stats: &apiAccountStats{
  41. Messages: stats.Messages,
  42. MessagesRemaining: stats.MessagesRemaining,
  43. Emails: stats.Emails,
  44. EmailsRemaining: stats.EmailsRemaining,
  45. AttachmentTotalSize: stats.AttachmentTotalSize,
  46. AttachmentTotalSizeRemaining: stats.AttachmentTotalSizeRemaining,
  47. },
  48. Limits: &apiAccountLimits{
  49. Basis: stats.Basis,
  50. Messages: stats.MessagesLimit,
  51. Emails: stats.EmailsLimit,
  52. AttachmentTotalSize: stats.AttachmentTotalSizeLimit,
  53. AttachmentFileSize: stats.AttachmentFileSizeLimit,
  54. },
  55. }
  56. if v.user != nil {
  57. response.Username = v.user.Name
  58. response.Role = string(v.user.Role)
  59. if v.user.Prefs != nil {
  60. if v.user.Prefs.Language != "" {
  61. response.Language = v.user.Prefs.Language
  62. }
  63. if v.user.Prefs.Notification != nil {
  64. response.Notification = v.user.Prefs.Notification
  65. }
  66. if v.user.Prefs.Subscriptions != nil {
  67. response.Subscriptions = v.user.Prefs.Subscriptions
  68. }
  69. }
  70. if v.user.Plan != nil {
  71. response.Plan = &apiAccountPlan{
  72. Code: v.user.Plan.Code,
  73. Upgradable: v.user.Plan.Upgradable,
  74. }
  75. } else if v.user.Role == auth.RoleAdmin {
  76. response.Plan = &apiAccountPlan{
  77. Code: string(auth.PlanUnlimited),
  78. Upgradable: false,
  79. }
  80. } else {
  81. response.Plan = &apiAccountPlan{
  82. Code: string(auth.PlanDefault),
  83. Upgradable: true,
  84. }
  85. }
  86. } else {
  87. response.Username = auth.Everyone
  88. response.Role = string(auth.RoleAnonymous)
  89. response.Plan = &apiAccountPlan{
  90. Code: string(auth.PlanNone),
  91. Upgradable: true,
  92. }
  93. }
  94. if err := json.NewEncoder(w).Encode(response); err != nil {
  95. return err
  96. }
  97. return nil
  98. }
  99. func (s *Server) handleAccountDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  100. if v.user == nil {
  101. return errHTTPUnauthorized
  102. }
  103. if err := s.auth.RemoveUser(v.user.Name); err != nil {
  104. return err
  105. }
  106. w.Header().Set("Content-Type", "application/json")
  107. w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
  108. // FIXME return something
  109. return nil
  110. }
  111. func (s *Server) handleAccountPasswordChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  112. if v.user == nil {
  113. return errHTTPUnauthorized
  114. }
  115. body, err := util.Peek(r.Body, 4096) // FIXME
  116. if err != nil {
  117. return err
  118. }
  119. defer r.Body.Close()
  120. var newPassword apiAccountCreateRequest // Re-use!
  121. if err := json.NewDecoder(body).Decode(&newPassword); err != nil {
  122. return err
  123. }
  124. if err := s.auth.ChangePassword(v.user.Name, newPassword.Password); err != nil {
  125. return err
  126. }
  127. w.Header().Set("Content-Type", "application/json")
  128. w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
  129. // FIXME return something
  130. return nil
  131. }
  132. func (s *Server) handleAccountTokenGet(w http.ResponseWriter, r *http.Request, v *visitor) error {
  133. // TODO rate limit
  134. if v.user == nil {
  135. return errHTTPUnauthorized
  136. }
  137. token, err := s.auth.CreateToken(v.user)
  138. if err != nil {
  139. return err
  140. }
  141. w.Header().Set("Content-Type", "application/json")
  142. w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
  143. response := &apiAccountTokenResponse{
  144. Token: token,
  145. }
  146. if err := json.NewEncoder(w).Encode(response); err != nil {
  147. return err
  148. }
  149. return nil
  150. }
  151. func (s *Server) handleAccountTokenDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  152. // TODO rate limit
  153. if v.user == nil || v.user.Token == "" {
  154. return errHTTPUnauthorized
  155. }
  156. if err := s.auth.RemoveToken(v.user); err != nil {
  157. return err
  158. }
  159. w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
  160. return nil
  161. }
  162. func (s *Server) handleAccountSettingsChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  163. if v.user == nil {
  164. return errors.New("no user")
  165. }
  166. w.Header().Set("Content-Type", "application/json")
  167. w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
  168. body, err := util.Peek(r.Body, 4096) // FIXME
  169. if err != nil {
  170. return err
  171. }
  172. defer r.Body.Close()
  173. var newPrefs auth.UserPrefs
  174. if err := json.NewDecoder(body).Decode(&newPrefs); err != nil {
  175. return err
  176. }
  177. if v.user.Prefs == nil {
  178. v.user.Prefs = &auth.UserPrefs{}
  179. }
  180. prefs := v.user.Prefs
  181. if newPrefs.Language != "" {
  182. prefs.Language = newPrefs.Language
  183. }
  184. if newPrefs.Notification != nil {
  185. if prefs.Notification == nil {
  186. prefs.Notification = &auth.UserNotificationPrefs{}
  187. }
  188. if newPrefs.Notification.DeleteAfter > 0 {
  189. prefs.Notification.DeleteAfter = newPrefs.Notification.DeleteAfter
  190. }
  191. if newPrefs.Notification.Sound != "" {
  192. prefs.Notification.Sound = newPrefs.Notification.Sound
  193. }
  194. if newPrefs.Notification.MinPriority > 0 {
  195. prefs.Notification.MinPriority = newPrefs.Notification.MinPriority
  196. }
  197. }
  198. return s.auth.ChangeSettings(v.user)
  199. }
  200. func (s *Server) handleAccountSubscriptionAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  201. if v.user == nil {
  202. return errors.New("no user")
  203. }
  204. w.Header().Set("Content-Type", "application/json")
  205. w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
  206. body, err := util.Peek(r.Body, 4096) // FIXME
  207. if err != nil {
  208. return err
  209. }
  210. defer r.Body.Close()
  211. var newSubscription auth.UserSubscription
  212. if err := json.NewDecoder(body).Decode(&newSubscription); err != nil {
  213. return err
  214. }
  215. if v.user.Prefs == nil {
  216. v.user.Prefs = &auth.UserPrefs{}
  217. }
  218. newSubscription.ID = "" // Client cannot set ID
  219. for _, subscription := range v.user.Prefs.Subscriptions {
  220. if newSubscription.BaseURL == subscription.BaseURL && newSubscription.Topic == subscription.Topic {
  221. newSubscription = *subscription
  222. break
  223. }
  224. }
  225. if newSubscription.ID == "" {
  226. newSubscription.ID = util.RandomString(16)
  227. v.user.Prefs.Subscriptions = append(v.user.Prefs.Subscriptions, &newSubscription)
  228. if err := s.auth.ChangeSettings(v.user); err != nil {
  229. return err
  230. }
  231. }
  232. if err := json.NewEncoder(w).Encode(newSubscription); err != nil {
  233. return err
  234. }
  235. return nil
  236. }
  237. func (s *Server) handleAccountSubscriptionDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  238. if v.user == nil {
  239. return errors.New("no user")
  240. }
  241. w.Header().Set("Content-Type", "application/json")
  242. w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
  243. matches := accountSubscriptionSingleRegex.FindStringSubmatch(r.URL.Path)
  244. if len(matches) != 2 {
  245. return errHTTPInternalErrorInvalidFilePath // FIXME
  246. }
  247. subscriptionID := matches[1]
  248. if v.user.Prefs == nil || v.user.Prefs.Subscriptions == nil {
  249. return nil
  250. }
  251. newSubscriptions := make([]*auth.UserSubscription, 0)
  252. for _, subscription := range v.user.Prefs.Subscriptions {
  253. if subscription.ID != subscriptionID {
  254. newSubscriptions = append(newSubscriptions, subscription)
  255. }
  256. }
  257. if len(newSubscriptions) < len(v.user.Prefs.Subscriptions) {
  258. v.user.Prefs.Subscriptions = newSubscriptions
  259. if err := s.auth.ChangeSettings(v.user); err != nil {
  260. return err
  261. }
  262. }
  263. return nil
  264. }