server_account.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572
  1. package server
  2. import (
  3. "encoding/json"
  4. "heckel.io/ntfy/log"
  5. "heckel.io/ntfy/user"
  6. "heckel.io/ntfy/util"
  7. "net/http"
  8. "net/netip"
  9. "strings"
  10. "time"
  11. )
  12. const (
  13. subscriptionIDLength = 16
  14. subscriptionIDPrefix = "su_"
  15. syncTopicAccountSyncEvent = "sync"
  16. tokenExpiryDuration = 72 * time.Hour // Extend tokens by this much
  17. )
  18. func (s *Server) handleAccountCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  19. u := v.User()
  20. if !u.Admin() { // u may be nil, but that's fine
  21. if !s.config.EnableSignup {
  22. return errHTTPBadRequestSignupNotEnabled
  23. } else if u != nil {
  24. return errHTTPUnauthorized // Cannot create account from user context
  25. }
  26. if !v.AccountCreationAllowed() {
  27. return errHTTPTooManyRequestsLimitAccountCreation
  28. }
  29. }
  30. newAccount, err := readJSONWithLimit[apiAccountCreateRequest](r.Body, jsonBodyBytesLimit, false)
  31. if err != nil {
  32. return err
  33. }
  34. if existingUser, _ := s.userManager.User(newAccount.Username); existingUser != nil {
  35. return errHTTPConflictUserExists
  36. }
  37. logvr(v, r).Tag(tagAccount).Field("user_name", newAccount.Username).Info("Creating user %s", newAccount.Username)
  38. if err := s.userManager.AddUser(newAccount.Username, newAccount.Password, user.RoleUser); err != nil {
  39. return err
  40. }
  41. return s.writeJSON(w, newSuccessResponse())
  42. }
  43. func (s *Server) handleAccountGet(w http.ResponseWriter, r *http.Request, v *visitor) error {
  44. info, err := v.Info()
  45. if err != nil {
  46. return err
  47. }
  48. logvr(v, r).Tag(tagAccount).Fields(visitorExtendedInfoContext(info)).Debug("Retrieving account stats")
  49. limits, stats := info.Limits, info.Stats
  50. response := &apiAccountResponse{
  51. Limits: &apiAccountLimits{
  52. Basis: string(limits.Basis),
  53. Messages: limits.MessageLimit,
  54. MessagesExpiryDuration: int64(limits.MessageExpiryDuration.Seconds()),
  55. Emails: limits.EmailLimit,
  56. Reservations: limits.ReservationsLimit,
  57. AttachmentTotalSize: limits.AttachmentTotalSizeLimit,
  58. AttachmentFileSize: limits.AttachmentFileSizeLimit,
  59. AttachmentExpiryDuration: int64(limits.AttachmentExpiryDuration.Seconds()),
  60. AttachmentBandwidth: limits.AttachmentBandwidthLimit,
  61. },
  62. Stats: &apiAccountStats{
  63. Messages: stats.Messages,
  64. MessagesRemaining: stats.MessagesRemaining,
  65. Emails: stats.Emails,
  66. EmailsRemaining: stats.EmailsRemaining,
  67. Reservations: stats.Reservations,
  68. ReservationsRemaining: stats.ReservationsRemaining,
  69. AttachmentTotalSize: stats.AttachmentTotalSize,
  70. AttachmentTotalSizeRemaining: stats.AttachmentTotalSizeRemaining,
  71. },
  72. }
  73. u := v.User()
  74. if u != nil {
  75. response.Username = u.Name
  76. response.Role = string(u.Role)
  77. response.SyncTopic = u.SyncTopic
  78. if u.Prefs != nil {
  79. if u.Prefs.Language != nil {
  80. response.Language = *u.Prefs.Language
  81. }
  82. if u.Prefs.Notification != nil {
  83. response.Notification = u.Prefs.Notification
  84. }
  85. if u.Prefs.Subscriptions != nil {
  86. response.Subscriptions = u.Prefs.Subscriptions
  87. }
  88. }
  89. if u.Tier != nil {
  90. response.Tier = &apiAccountTier{
  91. Code: u.Tier.Code,
  92. Name: u.Tier.Name,
  93. }
  94. }
  95. if u.Billing.StripeCustomerID != "" {
  96. response.Billing = &apiAccountBilling{
  97. Customer: true,
  98. Subscription: u.Billing.StripeSubscriptionID != "",
  99. Status: string(u.Billing.StripeSubscriptionStatus),
  100. PaidUntil: u.Billing.StripeSubscriptionPaidUntil.Unix(),
  101. CancelAt: u.Billing.StripeSubscriptionCancelAt.Unix(),
  102. }
  103. }
  104. reservations, err := s.userManager.Reservations(u.Name)
  105. if err != nil {
  106. return err
  107. }
  108. if len(reservations) > 0 {
  109. response.Reservations = make([]*apiAccountReservation, 0)
  110. for _, r := range reservations {
  111. response.Reservations = append(response.Reservations, &apiAccountReservation{
  112. Topic: r.Topic,
  113. Everyone: r.Everyone.String(),
  114. })
  115. }
  116. }
  117. tokens, err := s.userManager.Tokens(u.ID)
  118. if err != nil {
  119. return err
  120. }
  121. if len(tokens) > 0 {
  122. response.Tokens = make([]*apiAccountTokenResponse, 0)
  123. for _, t := range tokens {
  124. var lastOrigin string
  125. if t.LastOrigin != netip.IPv4Unspecified() {
  126. lastOrigin = t.LastOrigin.String()
  127. }
  128. response.Tokens = append(response.Tokens, &apiAccountTokenResponse{
  129. Token: t.Value,
  130. Label: t.Label,
  131. LastAccess: t.LastAccess.Unix(),
  132. LastOrigin: lastOrigin,
  133. Expires: t.Expires.Unix(),
  134. })
  135. }
  136. }
  137. } else {
  138. response.Username = user.Everyone
  139. response.Role = string(user.RoleAnonymous)
  140. }
  141. return s.writeJSON(w, response)
  142. }
  143. func (s *Server) handleAccountDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  144. req, err := readJSONWithLimit[apiAccountDeleteRequest](r.Body, jsonBodyBytesLimit, false)
  145. if err != nil {
  146. return err
  147. } else if req.Password == "" {
  148. return errHTTPBadRequest
  149. }
  150. u := v.User()
  151. if _, err := s.userManager.Authenticate(u.Name, req.Password); err != nil {
  152. return errHTTPBadRequestIncorrectPasswordConfirmation
  153. }
  154. if u.Billing.StripeSubscriptionID != "" {
  155. logvr(v, r).Tag(tagStripe).Info("Canceling billing subscription for user %s", u.Name)
  156. if _, err := s.stripe.CancelSubscription(u.Billing.StripeSubscriptionID); err != nil {
  157. return err
  158. }
  159. }
  160. if err := s.maybeRemoveMessagesAndExcessReservations(r, v, u, 0); err != nil {
  161. return err
  162. }
  163. logvr(v, r).Tag(tagAccount).Info("Marking user %s as deleted", u.Name)
  164. if err := s.userManager.MarkUserRemoved(u); err != nil {
  165. return err
  166. }
  167. return s.writeJSON(w, newSuccessResponse())
  168. }
  169. func (s *Server) handleAccountPasswordChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  170. req, err := readJSONWithLimit[apiAccountPasswordChangeRequest](r.Body, jsonBodyBytesLimit, false)
  171. if err != nil {
  172. return err
  173. } else if req.Password == "" || req.NewPassword == "" {
  174. return errHTTPBadRequest
  175. }
  176. u := v.User()
  177. if _, err := s.userManager.Authenticate(u.Name, req.Password); err != nil {
  178. return errHTTPBadRequestIncorrectPasswordConfirmation
  179. }
  180. logvr(v, r).Tag(tagAccount).Debug("Changing password for user %s", u.Name)
  181. if err := s.userManager.ChangePassword(u.Name, req.NewPassword); err != nil {
  182. return err
  183. }
  184. return s.writeJSON(w, newSuccessResponse())
  185. }
  186. func (s *Server) handleAccountTokenCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  187. // TODO rate limit
  188. req, err := readJSONWithLimit[apiAccountTokenIssueRequest](r.Body, jsonBodyBytesLimit, true) // Allow empty body!
  189. if err != nil {
  190. return err
  191. }
  192. var label string
  193. if req.Label != nil {
  194. label = *req.Label
  195. }
  196. expires := time.Now().Add(tokenExpiryDuration)
  197. if req.Expires != nil {
  198. expires = time.Unix(*req.Expires, 0)
  199. }
  200. u := v.User()
  201. logvr(v, r).
  202. Tag(tagAccount).
  203. Fields(log.Context{
  204. "token_label": label,
  205. "token_expires": expires,
  206. }).
  207. Debug("Creating token for user %s", u.Name)
  208. token, err := s.userManager.CreateToken(u.ID, label, expires, v.IP())
  209. if err != nil {
  210. return err
  211. }
  212. response := &apiAccountTokenResponse{
  213. Token: token.Value,
  214. Label: token.Label,
  215. LastAccess: token.LastAccess.Unix(),
  216. LastOrigin: token.LastOrigin.String(),
  217. Expires: token.Expires.Unix(),
  218. }
  219. return s.writeJSON(w, response)
  220. }
  221. func (s *Server) handleAccountTokenUpdate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  222. // TODO rate limit
  223. u := v.User()
  224. req, err := readJSONWithLimit[apiAccountTokenUpdateRequest](r.Body, jsonBodyBytesLimit, true) // Allow empty body!
  225. if err != nil {
  226. return err
  227. } else if req.Token == "" {
  228. req.Token = u.Token
  229. if req.Token == "" {
  230. return errHTTPBadRequestNoTokenProvided
  231. }
  232. }
  233. var expires *time.Time
  234. if req.Expires != nil {
  235. expires = util.Time(time.Unix(*req.Expires, 0))
  236. } else if req.Label == nil {
  237. expires = util.Time(time.Now().Add(tokenExpiryDuration)) // If label/expires not set, extend token by 72 hours
  238. }
  239. logvr(v, r).
  240. Tag(tagAccount).
  241. Fields(log.Context{
  242. "token_label": req.Label,
  243. "token_expires": expires,
  244. }).
  245. Debug("Updating token for user %s as deleted", u.Name)
  246. token, err := s.userManager.ChangeToken(u.ID, req.Token, req.Label, expires)
  247. if err != nil {
  248. return err
  249. }
  250. response := &apiAccountTokenResponse{
  251. Token: token.Value,
  252. Label: token.Label,
  253. LastAccess: token.LastAccess.Unix(),
  254. LastOrigin: token.LastOrigin.String(),
  255. Expires: token.Expires.Unix(),
  256. }
  257. return s.writeJSON(w, response)
  258. }
  259. func (s *Server) handleAccountTokenDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  260. // TODO rate limit
  261. u := v.User()
  262. token := readParam(r, "X-Token", "Token") // DELETEs cannot have a body, and we don't want it in the path
  263. if token == "" {
  264. token = u.Token
  265. if token == "" {
  266. return errHTTPBadRequestNoTokenProvided
  267. }
  268. }
  269. if err := s.userManager.RemoveToken(u.ID, token); err != nil {
  270. return err
  271. }
  272. logvr(v, r).
  273. Tag(tagAccount).
  274. Field("token", token).
  275. Debug("Deleted token for user %s", u.Name)
  276. return s.writeJSON(w, newSuccessResponse())
  277. }
  278. func (s *Server) handleAccountSettingsChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  279. newPrefs, err := readJSONWithLimit[user.Prefs](r.Body, jsonBodyBytesLimit, false)
  280. if err != nil {
  281. return err
  282. }
  283. u := v.User()
  284. if u.Prefs == nil {
  285. u.Prefs = &user.Prefs{}
  286. }
  287. prefs := u.Prefs
  288. if newPrefs.Language != nil {
  289. prefs.Language = newPrefs.Language
  290. }
  291. if newPrefs.Notification != nil {
  292. if prefs.Notification == nil {
  293. prefs.Notification = &user.NotificationPrefs{}
  294. }
  295. if newPrefs.Notification.DeleteAfter != nil {
  296. prefs.Notification.DeleteAfter = newPrefs.Notification.DeleteAfter
  297. }
  298. if newPrefs.Notification.Sound != nil {
  299. prefs.Notification.Sound = newPrefs.Notification.Sound
  300. }
  301. if newPrefs.Notification.MinPriority != nil {
  302. prefs.Notification.MinPriority = newPrefs.Notification.MinPriority
  303. }
  304. }
  305. logvr(v, r).Tag(tagAccount).Debug("Changing account settings for user %s", u.Name)
  306. if err := s.userManager.ChangeSettings(u); err != nil {
  307. return err
  308. }
  309. return s.writeJSON(w, newSuccessResponse())
  310. }
  311. func (s *Server) handleAccountSubscriptionAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  312. newSubscription, err := readJSONWithLimit[user.Subscription](r.Body, jsonBodyBytesLimit, false)
  313. if err != nil {
  314. return err
  315. }
  316. u := v.User()
  317. if u.Prefs == nil {
  318. u.Prefs = &user.Prefs{}
  319. }
  320. newSubscription.ID = "" // Client cannot set ID
  321. for _, subscription := range u.Prefs.Subscriptions {
  322. if newSubscription.BaseURL == subscription.BaseURL && newSubscription.Topic == subscription.Topic {
  323. newSubscription = subscription
  324. break
  325. }
  326. }
  327. if newSubscription.ID == "" {
  328. newSubscription.ID = util.RandomStringPrefix(subscriptionIDPrefix, subscriptionIDLength)
  329. u.Prefs.Subscriptions = append(u.Prefs.Subscriptions, newSubscription)
  330. logvr(v, r).
  331. Tag(tagAccount).
  332. Fields(log.Context{
  333. "base_url": newSubscription.BaseURL,
  334. "topic": newSubscription.Topic,
  335. }).
  336. Debug("Adding subscription for user %s", u.Name)
  337. if err := s.userManager.ChangeSettings(u); err != nil {
  338. return err
  339. }
  340. }
  341. return s.writeJSON(w, newSubscription)
  342. }
  343. func (s *Server) handleAccountSubscriptionChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  344. matches := apiAccountSubscriptionSingleRegex.FindStringSubmatch(r.URL.Path)
  345. if len(matches) != 2 {
  346. return errHTTPInternalErrorInvalidPath
  347. }
  348. subscriptionID := matches[1]
  349. updatedSubscription, err := readJSONWithLimit[user.Subscription](r.Body, jsonBodyBytesLimit, false)
  350. if err != nil {
  351. return err
  352. }
  353. u := v.User()
  354. if u.Prefs == nil || u.Prefs.Subscriptions == nil {
  355. return errHTTPNotFound
  356. }
  357. var subscription *user.Subscription
  358. for _, sub := range u.Prefs.Subscriptions {
  359. if sub.ID == subscriptionID {
  360. sub.DisplayName = updatedSubscription.DisplayName
  361. subscription = sub
  362. break
  363. }
  364. }
  365. if subscription == nil {
  366. return errHTTPNotFound
  367. }
  368. logvr(v, r).
  369. Tag(tagAccount).
  370. Fields(log.Context{
  371. "base_url": subscription.BaseURL,
  372. "topic": subscription.Topic,
  373. "display_name": subscription.DisplayName,
  374. }).
  375. Debug("Changing subscription for user %s", u.Name)
  376. if err := s.userManager.ChangeSettings(u); err != nil {
  377. return err
  378. }
  379. return s.writeJSON(w, subscription)
  380. }
  381. func (s *Server) handleAccountSubscriptionDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  382. matches := apiAccountSubscriptionSingleRegex.FindStringSubmatch(r.URL.Path)
  383. if len(matches) != 2 {
  384. return errHTTPInternalErrorInvalidPath
  385. }
  386. subscriptionID := matches[1]
  387. u := v.User()
  388. if u.Prefs == nil || u.Prefs.Subscriptions == nil {
  389. return nil
  390. }
  391. newSubscriptions := make([]*user.Subscription, 0)
  392. for _, subscription := range u.Prefs.Subscriptions {
  393. if subscription.ID == subscriptionID {
  394. logvr(v, r).
  395. Tag(tagAccount).
  396. Fields(log.Context{
  397. "base_url": subscription.BaseURL,
  398. "topic": subscription.Topic,
  399. }).
  400. Debug("Removing subscription for user %s", u.Name)
  401. } else {
  402. newSubscriptions = append(newSubscriptions, subscription)
  403. }
  404. }
  405. if len(newSubscriptions) < len(u.Prefs.Subscriptions) {
  406. u.Prefs.Subscriptions = newSubscriptions
  407. if err := s.userManager.ChangeSettings(u); err != nil {
  408. return err
  409. }
  410. }
  411. return s.writeJSON(w, newSuccessResponse())
  412. }
  413. // handleAccountReservationAdd adds a topic reservation for the logged-in user, but only if the user has a tier
  414. // with enough remaining reservations left, or if the user is an admin. Admins can always reserve a topic, unless
  415. // it is already reserved by someone else.
  416. func (s *Server) handleAccountReservationAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  417. u := v.User()
  418. req, err := readJSONWithLimit[apiAccountReservationRequest](r.Body, jsonBodyBytesLimit, false)
  419. if err != nil {
  420. return err
  421. }
  422. if !topicRegex.MatchString(req.Topic) {
  423. return errHTTPBadRequestTopicInvalid
  424. }
  425. everyone, err := user.ParsePermission(req.Everyone)
  426. if err != nil {
  427. return errHTTPBadRequestPermissionInvalid
  428. }
  429. // Check if we are allowed to reserve this topic
  430. if u.User() && u.Tier == nil {
  431. return errHTTPUnauthorized
  432. } else if err := s.userManager.CheckAllowAccess(u.Name, req.Topic); err != nil {
  433. return errHTTPConflictTopicReserved
  434. } else if u.User() {
  435. hasReservation, err := s.userManager.HasReservation(u.Name, req.Topic)
  436. if err != nil {
  437. return err
  438. }
  439. if !hasReservation {
  440. reservations, err := s.userManager.ReservationsCount(u.Name)
  441. if err != nil {
  442. return err
  443. } else if reservations >= u.Tier.ReservationLimit {
  444. return errHTTPTooManyRequestsLimitReservations
  445. }
  446. }
  447. }
  448. // Actually add the reservation
  449. logvr(v, r).
  450. Tag(tagAccount).
  451. Fields(log.Context{
  452. "topic": req.Topic,
  453. "everyone": everyone.String(),
  454. }).
  455. Debug("Adding topic reservation")
  456. if err := s.userManager.AddReservation(u.Name, req.Topic, everyone); err != nil {
  457. return err
  458. }
  459. // Kill existing subscribers
  460. t, err := s.topicFromID(req.Topic)
  461. if err != nil {
  462. return err
  463. }
  464. t.CancelSubscribers(u.ID)
  465. return s.writeJSON(w, newSuccessResponse())
  466. }
  467. // handleAccountReservationDelete deletes a topic reservation if it is owned by the current user
  468. func (s *Server) handleAccountReservationDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  469. matches := apiAccountReservationSingleRegex.FindStringSubmatch(r.URL.Path)
  470. if len(matches) != 2 {
  471. return errHTTPInternalErrorInvalidPath
  472. }
  473. topic := matches[1]
  474. if !topicRegex.MatchString(topic) {
  475. return errHTTPBadRequestTopicInvalid
  476. }
  477. u := v.User()
  478. authorized, err := s.userManager.HasReservation(u.Name, topic)
  479. if err != nil {
  480. return err
  481. } else if !authorized {
  482. return errHTTPUnauthorized
  483. }
  484. deleteMessages := readBoolParam(r, false, "X-Delete-Messages", "Delete-Messages")
  485. logvr(v, r).
  486. Tag(tagAccount).
  487. Fields(log.Context{
  488. "topic": topic,
  489. "delete_messages": deleteMessages,
  490. }).
  491. Debug("Removing topic reservation")
  492. if err := s.userManager.RemoveReservations(u.Name, topic); err != nil {
  493. return err
  494. }
  495. if deleteMessages {
  496. if err := s.messageCache.ExpireMessages(topic); err != nil {
  497. return err
  498. }
  499. }
  500. return s.writeJSON(w, newSuccessResponse())
  501. }
  502. // maybeRemoveMessagesAndExcessReservations deletes topic reservations for the given user (if too many for tier),
  503. // and marks associated messages for the topics as deleted. This also eventually deletes attachments.
  504. // The process relies on the manager to perform the actual deletions (see runManager).
  505. func (s *Server) maybeRemoveMessagesAndExcessReservations(r *http.Request, v *visitor, u *user.User, reservationsLimit int64) error {
  506. reservations, err := s.userManager.Reservations(u.Name)
  507. if err != nil {
  508. return err
  509. } else if int64(len(reservations)) <= reservationsLimit {
  510. logvr(v, r).Tag(tagAccount).Debug("No excess reservations to remove")
  511. return nil
  512. }
  513. topics := make([]string, 0)
  514. for i := int64(len(reservations)) - 1; i >= reservationsLimit; i-- {
  515. topics = append(topics, reservations[i].Topic)
  516. }
  517. logvr(v, r).Tag(tagAccount).Info("Removing excess reservations for topics %s", strings.Join(topics, ", "))
  518. if err := s.userManager.RemoveReservations(u.Name, topics...); err != nil {
  519. return err
  520. }
  521. if err := s.messageCache.ExpireMessages(topics...); err != nil {
  522. return err
  523. }
  524. return nil
  525. }
  526. // publishSyncEventAsync kicks of a Go routine to publish a sync message to the user's sync topic
  527. func (s *Server) publishSyncEventAsync(v *visitor) {
  528. go func() {
  529. if err := s.publishSyncEvent(v); err != nil {
  530. logv(v).Err(err).Trace("Error publishing to user's sync topic")
  531. }
  532. }()
  533. }
  534. // publishSyncEvent publishes a sync message to the user's sync topic
  535. func (s *Server) publishSyncEvent(v *visitor) error {
  536. u := v.User()
  537. if u == nil || u.SyncTopic == "" {
  538. return nil
  539. }
  540. logv(v).Field("sync_topic", u.SyncTopic).Trace("Publishing sync event to user's sync topic")
  541. syncTopic, err := s.topicFromID(u.SyncTopic)
  542. if err != nil {
  543. return err
  544. }
  545. messageBytes, err := json.Marshal(&apiAccountSyncTopicResponse{Event: syncTopicAccountSyncEvent})
  546. if err != nil {
  547. return err
  548. }
  549. m := newDefaultMessage(syncTopic.ID, string(messageBytes))
  550. if err := syncTopic.Publish(v, m); err != nil {
  551. return err
  552. }
  553. return nil
  554. }