server_admin.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195
  1. package server
  2. import (
  3. "errors"
  4. "heckel.io/ntfy/v2/user"
  5. "net/http"
  6. )
  7. func (s *Server) handleUsersGet(w http.ResponseWriter, r *http.Request, v *visitor) error {
  8. users, err := s.userManager.Users()
  9. if err != nil {
  10. return err
  11. }
  12. grants, err := s.userManager.AllGrants()
  13. if err != nil {
  14. return err
  15. }
  16. usersResponse := make([]*apiUserResponse, len(users))
  17. for i, u := range users {
  18. tier := ""
  19. if u.Tier != nil {
  20. tier = u.Tier.Code
  21. }
  22. userGrants := make([]*apiUserGrantResponse, len(grants[u.ID]))
  23. for i, g := range grants[u.ID] {
  24. userGrants[i] = &apiUserGrantResponse{
  25. Topic: g.TopicPattern,
  26. Permission: g.Allow.String(),
  27. }
  28. }
  29. usersResponse[i] = &apiUserResponse{
  30. Username: u.Name,
  31. Role: string(u.Role),
  32. Tier: tier,
  33. Grants: userGrants,
  34. }
  35. }
  36. return s.writeJSON(w, usersResponse)
  37. }
  38. func (s *Server) handleUsersAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  39. req, err := readJSONWithLimit[apiUserAddOrUpdateRequest](r.Body, jsonBodyBytesLimit, false)
  40. if err != nil {
  41. return err
  42. } else if !user.AllowedUsername(req.Username) || (req.Password == "" && req.Hash == "") {
  43. return errHTTPBadRequest.Wrap("username invalid, or password/password_hash missing")
  44. }
  45. u, err := s.userManager.User(req.Username)
  46. if err != nil && !errors.Is(err, user.ErrUserNotFound) {
  47. return err
  48. } else if u != nil {
  49. return errHTTPConflictUserExists
  50. }
  51. var tier *user.Tier
  52. if req.Tier != "" {
  53. tier, err = s.userManager.Tier(req.Tier)
  54. if errors.Is(err, user.ErrTierNotFound) {
  55. return errHTTPBadRequestTierInvalid
  56. } else if err != nil {
  57. return err
  58. }
  59. }
  60. password, hashed := req.Password, false
  61. if req.Hash != "" {
  62. password, hashed = req.Hash, true
  63. }
  64. if err := s.userManager.AddUser(req.Username, password, user.RoleUser, hashed); err != nil {
  65. return err
  66. }
  67. if tier != nil {
  68. if err := s.userManager.ChangeTier(req.Username, req.Tier); err != nil {
  69. return err
  70. }
  71. }
  72. return s.writeJSON(w, newSuccessResponse())
  73. }
  74. func (s *Server) handleUsersUpdate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  75. req, err := readJSONWithLimit[apiUserAddOrUpdateRequest](r.Body, jsonBodyBytesLimit, false)
  76. if err != nil {
  77. return err
  78. } else if !user.AllowedUsername(req.Username) {
  79. return errHTTPBadRequest.Wrap("username invalid")
  80. } else if req.Password == "" && req.Hash == "" && req.Tier == "" {
  81. return errHTTPBadRequest.Wrap("need to provide at least one of \"password\", \"password_hash\" or \"tier\"")
  82. }
  83. u, err := s.userManager.User(req.Username)
  84. if err != nil && !errors.Is(err, user.ErrUserNotFound) {
  85. return err
  86. } else if u != nil {
  87. if u.IsAdmin() {
  88. return errHTTPForbidden
  89. }
  90. if req.Hash != "" {
  91. if err := s.userManager.ChangePassword(req.Username, req.Hash, true); err != nil {
  92. return err
  93. }
  94. } else if req.Password != "" {
  95. if err := s.userManager.ChangePassword(req.Username, req.Password, false); err != nil {
  96. return err
  97. }
  98. }
  99. } else {
  100. password, hashed := req.Password, false
  101. if req.Hash != "" {
  102. password, hashed = req.Hash, true
  103. }
  104. if err := s.userManager.AddUser(req.Username, password, user.RoleUser, hashed); err != nil {
  105. return err
  106. }
  107. }
  108. if req.Tier != "" {
  109. if _, err = s.userManager.Tier(req.Tier); errors.Is(err, user.ErrTierNotFound) {
  110. return errHTTPBadRequestTierInvalid
  111. } else if err != nil {
  112. return err
  113. }
  114. if err := s.userManager.ChangeTier(req.Username, req.Tier); err != nil {
  115. return err
  116. }
  117. }
  118. return s.writeJSON(w, newSuccessResponse())
  119. }
  120. func (s *Server) handleUsersDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  121. req, err := readJSONWithLimit[apiUserDeleteRequest](r.Body, jsonBodyBytesLimit, false)
  122. if err != nil {
  123. return err
  124. }
  125. u, err := s.userManager.User(req.Username)
  126. if errors.Is(err, user.ErrUserNotFound) {
  127. return errHTTPBadRequestUserNotFound
  128. } else if err != nil {
  129. return err
  130. } else if !u.IsUser() {
  131. return errHTTPUnauthorized.Wrap("can only remove regular users from API")
  132. }
  133. if err := s.userManager.RemoveUser(req.Username); err != nil {
  134. return err
  135. }
  136. if err := s.killUserSubscriber(u, "*"); err != nil { // FIXME super inefficient
  137. return err
  138. }
  139. return s.writeJSON(w, newSuccessResponse())
  140. }
  141. func (s *Server) handleAccessAllow(w http.ResponseWriter, r *http.Request, v *visitor) error {
  142. req, err := readJSONWithLimit[apiAccessAllowRequest](r.Body, jsonBodyBytesLimit, false)
  143. if err != nil {
  144. return err
  145. }
  146. _, err = s.userManager.User(req.Username)
  147. if errors.Is(err, user.ErrUserNotFound) {
  148. return errHTTPBadRequestUserNotFound
  149. } else if err != nil {
  150. return err
  151. }
  152. permission, err := user.ParsePermission(req.Permission)
  153. if err != nil {
  154. return errHTTPBadRequestPermissionInvalid
  155. }
  156. if err := s.userManager.AllowAccess(req.Username, req.Topic, permission); err != nil {
  157. return err
  158. }
  159. return s.writeJSON(w, newSuccessResponse())
  160. }
  161. func (s *Server) handleAccessReset(w http.ResponseWriter, r *http.Request, v *visitor) error {
  162. req, err := readJSONWithLimit[apiAccessResetRequest](r.Body, jsonBodyBytesLimit, false)
  163. if err != nil {
  164. return err
  165. }
  166. u, err := s.userManager.User(req.Username)
  167. if err != nil {
  168. return err
  169. }
  170. if err := s.userManager.ResetAccess(req.Username, req.Topic); err != nil {
  171. return err
  172. }
  173. if err := s.killUserSubscriber(u, req.Topic); err != nil { // This may be a pattern
  174. return err
  175. }
  176. return s.writeJSON(w, newSuccessResponse())
  177. }
  178. func (s *Server) killUserSubscriber(u *user.User, topicPattern string) error {
  179. topics, err := s.topicsFromPattern(topicPattern)
  180. if err != nil {
  181. return err
  182. }
  183. for _, t := range topics {
  184. t.CancelSubscriberUser(u.ID)
  185. }
  186. return nil
  187. }