server_admin.go 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. package server
  2. import (
  3. "heckel.io/ntfy/user"
  4. "net/http"
  5. )
  6. func (s *Server) handleUserAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  7. req, err := readJSONWithLimit[apiUserAddRequest](r.Body, jsonBodyBytesLimit, false)
  8. if err != nil {
  9. return err
  10. } else if !user.AllowedUsername(req.Username) || req.Password == "" {
  11. return errHTTPBadRequest.Wrap("username invalid, or password missing")
  12. }
  13. u, err := s.userManager.User(req.Username)
  14. if err != nil && err != user.ErrUserNotFound {
  15. return err
  16. } else if u != nil {
  17. return errHTTPConflictUserExists
  18. }
  19. var tier *user.Tier
  20. if req.Tier != "" {
  21. tier, err = s.userManager.Tier(req.Tier)
  22. if err == user.ErrTierNotFound {
  23. return errHTTPBadRequestTierInvalid
  24. } else if err != nil {
  25. return err
  26. }
  27. }
  28. if err := s.userManager.AddUser(req.Username, req.Password, user.RoleUser); err != nil {
  29. return err
  30. }
  31. if tier != nil {
  32. if err := s.userManager.ChangeTier(req.Username, req.Tier); err != nil {
  33. return err
  34. }
  35. }
  36. return s.writeJSON(w, newSuccessResponse())
  37. }
  38. func (s *Server) handleUserDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  39. req, err := readJSONWithLimit[apiUserDeleteRequest](r.Body, jsonBodyBytesLimit, false)
  40. if err != nil {
  41. return err
  42. }
  43. u, err := s.userManager.User(req.Username)
  44. if err == user.ErrUserNotFound {
  45. return errHTTPBadRequestUserNotFound
  46. } else if err != nil {
  47. return err
  48. } else if !u.IsUser() {
  49. return errHTTPUnauthorized.Wrap("can only remove regular users from API")
  50. }
  51. if err := s.userManager.RemoveUser(req.Username); err != nil {
  52. return err
  53. }
  54. if err := s.killUserSubscriber(u, "*"); err != nil { // FIXME super inefficient
  55. return err
  56. }
  57. return s.writeJSON(w, newSuccessResponse())
  58. }
  59. func (s *Server) handleAccessAllow(w http.ResponseWriter, r *http.Request, v *visitor) error {
  60. req, err := readJSONWithLimit[apiAccessAllowRequest](r.Body, jsonBodyBytesLimit, false)
  61. if err != nil {
  62. return err
  63. }
  64. permission, err := user.ParsePermission(req.Permission)
  65. if err != nil {
  66. return errHTTPBadRequestPermissionInvalid
  67. }
  68. if err := s.userManager.AllowAccess(req.Username, req.Topic, permission); err != nil {
  69. return err
  70. }
  71. return s.writeJSON(w, newSuccessResponse())
  72. }
  73. func (s *Server) handleAccessReset(w http.ResponseWriter, r *http.Request, v *visitor) error {
  74. req, err := readJSONWithLimit[apiAccessResetRequest](r.Body, jsonBodyBytesLimit, false)
  75. if err != nil {
  76. return err
  77. }
  78. u, err := s.userManager.User(req.Username)
  79. if err != nil {
  80. return err
  81. }
  82. if err := s.userManager.ResetAccess(req.Username, req.Topic); err != nil {
  83. return err
  84. }
  85. if err := s.killUserSubscriber(u, req.Topic); err != nil { // This may be a pattern
  86. return err
  87. }
  88. return s.writeJSON(w, newSuccessResponse())
  89. }
  90. func (s *Server) killUserSubscriber(u *user.User, topicPattern string) error {
  91. topics, err := s.topicsFromPattern(topicPattern)
  92. if err != nil {
  93. return err
  94. }
  95. for _, t := range topics {
  96. t.CancelSubscriberUser(u.ID)
  97. }
  98. return nil
  99. }