manager.go 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895
  1. package user
  2. import (
  3. "database/sql"
  4. "encoding/json"
  5. "errors"
  6. "fmt"
  7. _ "github.com/mattn/go-sqlite3" // SQLite driver
  8. "golang.org/x/crypto/bcrypt"
  9. "heckel.io/ntfy/log"
  10. "heckel.io/ntfy/util"
  11. "strings"
  12. "sync"
  13. "time"
  14. )
  15. const (
  16. bcryptCost = 10
  17. intentionalSlowDownHash = "$2a$10$YFCQvqQDwIIwnJM1xkAYOeih0dg17UVGanaTStnrSzC8NCWxcLDwy" // Cost should match bcryptCost
  18. userStatsQueueWriterInterval = 33 * time.Second
  19. tokenLength = 32
  20. tokenExpiryDuration = 72 * time.Hour // Extend tokens by this much
  21. syncTopicLength = 16
  22. tokenMaxCount = 10 // Only keep this many tokens in the table per user
  23. )
  24. var (
  25. errNoTokenProvided = errors.New("no token provided")
  26. errTopicOwnedByOthers = errors.New("topic owned by others")
  27. errNoRows = errors.New("no rows found")
  28. )
  29. // Manager-related queries
  30. const (
  31. createTablesQueriesNoTx = `
  32. CREATE TABLE IF NOT EXISTS tier (
  33. id INTEGER PRIMARY KEY AUTOINCREMENT,
  34. code TEXT NOT NULL,
  35. name TEXT NOT NULL,
  36. paid INT NOT NULL,
  37. messages_limit INT NOT NULL,
  38. messages_expiry_duration INT NOT NULL,
  39. emails_limit INT NOT NULL,
  40. reservations_limit INT NOT NULL,
  41. attachment_file_size_limit INT NOT NULL,
  42. attachment_total_size_limit INT NOT NULL,
  43. attachment_expiry_duration INT NOT NULL
  44. );
  45. CREATE TABLE IF NOT EXISTS user (
  46. id INTEGER PRIMARY KEY AUTOINCREMENT,
  47. tier_id INT,
  48. user TEXT NOT NULL,
  49. pass TEXT NOT NULL,
  50. role TEXT CHECK (role IN ('anonymous', 'admin', 'user')) NOT NULL,
  51. prefs JSON NOT NULL DEFAULT '{}',
  52. sync_topic TEXT NOT NULL,
  53. stats_messages INT NOT NULL DEFAULT (0),
  54. stats_emails INT NOT NULL DEFAULT (0),
  55. created_by TEXT NOT NULL,
  56. created_at INT NOT NULL,
  57. last_seen INT NOT NULL,
  58. last_stats_reset INT NOT NULL DEFAULT (0),
  59. FOREIGN KEY (tier_id) REFERENCES tier (id)
  60. );
  61. CREATE UNIQUE INDEX idx_user ON user (user);
  62. CREATE TABLE IF NOT EXISTS user_access (
  63. user_id INT NOT NULL,
  64. topic TEXT NOT NULL,
  65. read INT NOT NULL,
  66. write INT NOT NULL,
  67. owner_user_id INT,
  68. PRIMARY KEY (user_id, topic),
  69. FOREIGN KEY (user_id) REFERENCES user (id) ON DELETE CASCADE,
  70. FOREIGN KEY (owner_user_id) REFERENCES user (id) ON DELETE CASCADE
  71. );
  72. CREATE TABLE IF NOT EXISTS user_token (
  73. user_id INT NOT NULL,
  74. token TEXT NOT NULL,
  75. expires INT NOT NULL,
  76. PRIMARY KEY (user_id, token),
  77. FOREIGN KEY (user_id) REFERENCES user (id) ON DELETE CASCADE
  78. );
  79. CREATE TABLE IF NOT EXISTS schemaVersion (
  80. id INT PRIMARY KEY,
  81. version INT NOT NULL
  82. );
  83. INSERT INTO user (id, user, pass, role, sync_topic, created_by, created_at, last_seen)
  84. VALUES (1, '*', '', 'anonymous', '', 'system', UNIXEPOCH(), 0)
  85. ON CONFLICT (id) DO NOTHING;
  86. `
  87. createTablesQueries = `BEGIN; ` + createTablesQueriesNoTx + ` COMMIT;`
  88. builtinStartupQueries = `
  89. PRAGMA foreign_keys = ON;
  90. `
  91. selectUserByNameQuery = `
  92. SELECT u.user, u.pass, u.role, u.prefs, u.sync_topic, u.stats_messages, u.stats_emails, p.code, p.name, p.paid, p.messages_limit, p.messages_expiry_duration, p.emails_limit, p.reservations_limit, p.attachment_file_size_limit, p.attachment_total_size_limit, p.attachment_expiry_duration
  93. FROM user u
  94. LEFT JOIN tier p on p.id = u.tier_id
  95. WHERE user = ?
  96. `
  97. selectUserByTokenQuery = `
  98. SELECT u.user, u.pass, u.role, u.prefs, u.sync_topic, u.stats_messages, u.stats_emails, p.code, p.name, p.paid, p.messages_limit, p.messages_expiry_duration, p.emails_limit, p.reservations_limit, p.attachment_file_size_limit, p.attachment_total_size_limit, p.attachment_expiry_duration
  99. FROM user u
  100. JOIN user_token t on u.id = t.user_id
  101. LEFT JOIN tier p on p.id = u.tier_id
  102. WHERE t.token = ? AND t.expires >= ?
  103. `
  104. selectTopicPermsQuery = `
  105. SELECT read, write
  106. FROM user_access a
  107. JOIN user u ON u.id = a.user_id
  108. WHERE (u.user = ? OR u.user = ?) AND ? LIKE a.topic
  109. ORDER BY u.user DESC
  110. `
  111. insertUserQuery = `
  112. INSERT INTO user (user, pass, role, sync_topic, created_by, created_at, last_seen)
  113. VALUES (?, ?, ?, ?, ?, ?, ?)
  114. `
  115. selectUsernamesQuery = `
  116. SELECT user
  117. FROM user
  118. ORDER BY
  119. CASE role
  120. WHEN 'admin' THEN 1
  121. WHEN 'anonymous' THEN 3
  122. ELSE 2
  123. END, user
  124. `
  125. updateUserPassQuery = `UPDATE user SET pass = ? WHERE user = ?`
  126. updateUserRoleQuery = `UPDATE user SET role = ? WHERE user = ?`
  127. updateUserPrefsQuery = `UPDATE user SET prefs = ? WHERE user = ?`
  128. updateUserStatsQuery = `UPDATE user SET stats_messages = ?, stats_emails = ? WHERE user = ?`
  129. deleteUserQuery = `DELETE FROM user WHERE user = ?`
  130. upsertUserAccessQuery = `
  131. INSERT INTO user_access (user_id, topic, read, write, owner_user_id)
  132. VALUES ((SELECT id FROM user WHERE user = ?), ?, ?, ?, (SELECT IIF(?='',NULL,(SELECT id FROM user WHERE user=?))))
  133. ON CONFLICT (user_id, topic)
  134. DO UPDATE SET read=excluded.read, write=excluded.write, owner_user_id=excluded.owner_user_id
  135. `
  136. selectUserAccessQuery = `
  137. SELECT topic, read, write
  138. FROM user_access
  139. WHERE user_id = (SELECT id FROM user WHERE user = ?)
  140. ORDER BY write DESC, read DESC, topic
  141. `
  142. selectUserReservationsQuery = `
  143. SELECT a_user.topic, a_user.read, a_user.write, a_everyone.read AS everyone_read, a_everyone.write AS everyone_write
  144. FROM user_access a_user
  145. LEFT JOIN user_access a_everyone ON a_user.topic = a_everyone.topic AND a_everyone.user_id = (SELECT id FROM user WHERE user = ?)
  146. WHERE a_user.user_id = a_user.owner_user_id
  147. AND a_user.owner_user_id = (SELECT id FROM user WHERE user = ?)
  148. ORDER BY a_user.topic
  149. `
  150. selectUserReservationsCountQuery = `
  151. SELECT COUNT(*)
  152. FROM user_access
  153. WHERE user_id = owner_user_id AND owner_user_id = (SELECT id FROM user WHERE user = ?)
  154. `
  155. selectUserHasReservationQuery = `
  156. SELECT COUNT(*)
  157. FROM user_access
  158. WHERE user_id = owner_user_id
  159. AND owner_user_id = (SELECT id FROM user WHERE user = ?)
  160. AND topic = ?
  161. `
  162. selectOtherAccessCountQuery = `
  163. SELECT COUNT(*)
  164. FROM user_access
  165. WHERE (topic = ? OR ? LIKE topic)
  166. AND (owner_user_id IS NULL OR owner_user_id != (SELECT id FROM user WHERE user = ?))
  167. `
  168. deleteAllAccessQuery = `DELETE FROM user_access`
  169. deleteUserAccessQuery = `
  170. DELETE FROM user_access
  171. WHERE user_id = (SELECT id FROM user WHERE user = ?)
  172. OR owner_user_id = (SELECT id FROM user WHERE user = ?)
  173. `
  174. deleteTopicAccessQuery = `
  175. DELETE FROM user_access
  176. WHERE (user_id = (SELECT id FROM user WHERE user = ?) OR owner_user_id = (SELECT id FROM user WHERE user = ?))
  177. AND topic = ?
  178. `
  179. selectTokenCountQuery = `SELECT COUNT(*) FROM user_token WHERE (SELECT id FROM user WHERE user = ?)`
  180. insertTokenQuery = `INSERT INTO user_token (user_id, token, expires) VALUES ((SELECT id FROM user WHERE user = ?), ?, ?)`
  181. updateTokenExpiryQuery = `UPDATE user_token SET expires = ? WHERE user_id = (SELECT id FROM user WHERE user = ?) AND token = ?`
  182. deleteTokenQuery = `DELETE FROM user_token WHERE user_id = (SELECT id FROM user WHERE user = ?) AND token = ?`
  183. deleteExpiredTokensQuery = `DELETE FROM user_token WHERE expires < ?`
  184. deleteExcessTokensQuery = `
  185. DELETE FROM user_token
  186. WHERE (user_id, token) NOT IN (
  187. SELECT user_id, token
  188. FROM user_token
  189. WHERE user_id = (SELECT id FROM user WHERE user = ?)
  190. ORDER BY expires DESC
  191. LIMIT ?
  192. )
  193. `
  194. insertTierQuery = `
  195. INSERT INTO tier (code, name, paid, messages_limit, messages_expiry_duration, emails_limit, reservations_limit, attachment_file_size_limit, attachment_total_size_limit, attachment_expiry_duration)
  196. VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?)
  197. `
  198. selectTierIDQuery = `SELECT id FROM tier WHERE code = ?`
  199. updateUserTierQuery = `UPDATE user SET tier_id = ? WHERE user = ?`
  200. deleteUserTierQuery = `UPDATE user SET tier_id = null WHERE user = ?`
  201. )
  202. // Schema management queries
  203. const (
  204. currentSchemaVersion = 2
  205. insertSchemaVersion = `INSERT INTO schemaVersion VALUES (1, ?)`
  206. updateSchemaVersion = `UPDATE schemaVersion SET version = ? WHERE id = 1`
  207. selectSchemaVersionQuery = `SELECT version FROM schemaVersion WHERE id = 1`
  208. // 1 -> 2 (complex migration!)
  209. migrate1To2RenameUserTableQueryNoTx = `
  210. ALTER TABLE user RENAME TO user_old;
  211. `
  212. migrate1To2InsertFromOldTablesAndDropNoTx = `
  213. INSERT INTO user (user, pass, role, sync_topic, created_by, created_at, last_seen)
  214. SELECT user, pass, role, '', 'admin', UNIXEPOCH(), UNIXEPOCH() FROM user_old;
  215. INSERT INTO user_access (user_id, topic, read, write)
  216. SELECT u.id, a.topic, a.read, a.write
  217. FROM user u
  218. JOIN access a ON u.user = a.user;
  219. DROP TABLE access;
  220. DROP TABLE user_old;
  221. `
  222. )
  223. // Manager is an implementation of Manager. It stores users and access control list
  224. // in a SQLite database.
  225. type Manager struct {
  226. db *sql.DB
  227. defaultAccess Permission // Default permission if no ACL matches
  228. statsQueue map[string]*User // Username -> User, for "unimportant" user updates
  229. mu sync.Mutex
  230. }
  231. var _ Auther = (*Manager)(nil)
  232. // NewManager creates a new Manager instance
  233. func NewManager(filename, startupQueries string, defaultAccess Permission) (*Manager, error) {
  234. return newManager(filename, startupQueries, defaultAccess, userStatsQueueWriterInterval)
  235. }
  236. // NewManager creates a new Manager instance
  237. func newManager(filename, startupQueries string, defaultAccess Permission, statsWriterInterval time.Duration) (*Manager, error) {
  238. db, err := sql.Open("sqlite3", filename)
  239. if err != nil {
  240. return nil, err
  241. }
  242. if err := setupDB(db); err != nil {
  243. return nil, err
  244. }
  245. if err := runStartupQueries(db, startupQueries); err != nil {
  246. return nil, err
  247. }
  248. manager := &Manager{
  249. db: db,
  250. defaultAccess: defaultAccess,
  251. statsQueue: make(map[string]*User),
  252. }
  253. go manager.userStatsQueueWriter(statsWriterInterval)
  254. return manager, nil
  255. }
  256. // Authenticate checks username and password and returns a User if correct. The method
  257. // returns in constant-ish time, regardless of whether the user exists or the password is
  258. // correct or incorrect.
  259. func (a *Manager) Authenticate(username, password string) (*User, error) {
  260. if username == Everyone {
  261. return nil, ErrUnauthenticated
  262. }
  263. user, err := a.User(username)
  264. if err != nil {
  265. log.Trace("authentication of user %s failed (1): %s", username, err.Error())
  266. bcrypt.CompareHashAndPassword([]byte(intentionalSlowDownHash), []byte("intentional slow-down to avoid timing attacks"))
  267. return nil, ErrUnauthenticated
  268. }
  269. if err := bcrypt.CompareHashAndPassword([]byte(user.Hash), []byte(password)); err != nil {
  270. log.Trace("authentication of user %s failed (2): %s", username, err.Error())
  271. return nil, ErrUnauthenticated
  272. }
  273. return user, nil
  274. }
  275. // AuthenticateToken checks if the token exists and returns the associated User if it does.
  276. // The method sets the User.Token value to the token that was used for authentication.
  277. func (a *Manager) AuthenticateToken(token string) (*User, error) {
  278. if len(token) != tokenLength {
  279. return nil, ErrUnauthenticated
  280. }
  281. user, err := a.userByToken(token)
  282. if err != nil {
  283. return nil, ErrUnauthenticated
  284. }
  285. user.Token = token
  286. return user, nil
  287. }
  288. // CreateToken generates a random token for the given user and returns it. The token expires
  289. // after a fixed duration unless ExtendToken is called. This function also prunes tokens for the
  290. // given user, if there are too many of them.
  291. func (a *Manager) CreateToken(user *User) (*Token, error) {
  292. token, expires := util.RandomString(tokenLength), time.Now().Add(tokenExpiryDuration)
  293. tx, err := a.db.Begin()
  294. if err != nil {
  295. return nil, err
  296. }
  297. defer tx.Rollback()
  298. if _, err := tx.Exec(insertTokenQuery, user.Name, token, expires.Unix()); err != nil {
  299. return nil, err
  300. }
  301. rows, err := tx.Query(selectTokenCountQuery, user.Name)
  302. if err != nil {
  303. return nil, err
  304. }
  305. defer rows.Close()
  306. if !rows.Next() {
  307. return nil, errNoRows
  308. }
  309. var tokenCount int
  310. if err := rows.Scan(&tokenCount); err != nil {
  311. return nil, err
  312. }
  313. if tokenCount >= tokenMaxCount {
  314. // This pruning logic is done in two queries for efficiency. The SELECT above is a lookup
  315. // on two indices, whereas the query below is a full table scan.
  316. if _, err := tx.Exec(deleteExcessTokensQuery, user.Name, tokenMaxCount); err != nil {
  317. return nil, err
  318. }
  319. }
  320. if err := tx.Commit(); err != nil {
  321. return nil, err
  322. }
  323. return &Token{
  324. Value: token,
  325. Expires: expires,
  326. }, nil
  327. }
  328. // ExtendToken sets the new expiry date for a token, thereby extending its use further into the future.
  329. func (a *Manager) ExtendToken(user *User) (*Token, error) {
  330. if user.Token == "" {
  331. return nil, errNoTokenProvided
  332. }
  333. newExpires := time.Now().Add(tokenExpiryDuration)
  334. if _, err := a.db.Exec(updateTokenExpiryQuery, newExpires.Unix(), user.Name, user.Token); err != nil {
  335. return nil, err
  336. }
  337. return &Token{
  338. Value: user.Token,
  339. Expires: newExpires,
  340. }, nil
  341. }
  342. // RemoveToken deletes the token defined in User.Token
  343. func (a *Manager) RemoveToken(user *User) error {
  344. if user.Token == "" {
  345. return ErrUnauthorized
  346. }
  347. if _, err := a.db.Exec(deleteTokenQuery, user.Name, user.Token); err != nil {
  348. return err
  349. }
  350. return nil
  351. }
  352. // RemoveExpiredTokens deletes all expired tokens from the database
  353. func (a *Manager) RemoveExpiredTokens() error {
  354. if _, err := a.db.Exec(deleteExpiredTokensQuery, time.Now().Unix()); err != nil {
  355. return err
  356. }
  357. return nil
  358. }
  359. // ChangeSettings persists the user settings
  360. func (a *Manager) ChangeSettings(user *User) error {
  361. prefs, err := json.Marshal(user.Prefs)
  362. if err != nil {
  363. return err
  364. }
  365. if _, err := a.db.Exec(updateUserPrefsQuery, string(prefs), user.Name); err != nil {
  366. return err
  367. }
  368. return nil
  369. }
  370. // EnqueueStats adds the user to a queue which writes out user stats (messages, emails, ..) in
  371. // batches at a regular interval
  372. func (a *Manager) EnqueueStats(user *User) {
  373. a.mu.Lock()
  374. defer a.mu.Unlock()
  375. a.statsQueue[user.Name] = user
  376. }
  377. func (a *Manager) userStatsQueueWriter(interval time.Duration) {
  378. ticker := time.NewTicker(interval)
  379. for range ticker.C {
  380. if err := a.writeUserStatsQueue(); err != nil {
  381. log.Warn("User Manager: Writing user stats queue failed: %s", err.Error())
  382. }
  383. }
  384. }
  385. func (a *Manager) writeUserStatsQueue() error {
  386. a.mu.Lock()
  387. if len(a.statsQueue) == 0 {
  388. a.mu.Unlock()
  389. log.Trace("User Manager: No user stats updates to commit")
  390. return nil
  391. }
  392. statsQueue := a.statsQueue
  393. a.statsQueue = make(map[string]*User)
  394. a.mu.Unlock()
  395. tx, err := a.db.Begin()
  396. if err != nil {
  397. return err
  398. }
  399. defer tx.Rollback()
  400. log.Debug("User Manager: Writing user stats queue for %d user(s)", len(statsQueue))
  401. for username, u := range statsQueue {
  402. log.Trace("User Manager: Updating stats for user %s: messages=%d, emails=%d", username, u.Stats.Messages, u.Stats.Emails)
  403. if _, err := tx.Exec(updateUserStatsQuery, u.Stats.Messages, u.Stats.Emails, username); err != nil {
  404. return err
  405. }
  406. }
  407. return tx.Commit()
  408. }
  409. // Authorize returns nil if the given user has access to the given topic using the desired
  410. // permission. The user param may be nil to signal an anonymous user.
  411. func (a *Manager) Authorize(user *User, topic string, perm Permission) error {
  412. if user != nil && user.Role == RoleAdmin {
  413. return nil // Admin can do everything
  414. }
  415. username := Everyone
  416. if user != nil {
  417. username = user.Name
  418. }
  419. // Select the read/write permissions for this user/topic combo. The query may return two
  420. // rows (one for everyone, and one for the user), but prioritizes the user.
  421. rows, err := a.db.Query(selectTopicPermsQuery, Everyone, username, topic)
  422. if err != nil {
  423. return err
  424. }
  425. defer rows.Close()
  426. if !rows.Next() {
  427. return a.resolvePerms(a.defaultAccess, perm)
  428. }
  429. var read, write bool
  430. if err := rows.Scan(&read, &write); err != nil {
  431. return err
  432. } else if err := rows.Err(); err != nil {
  433. return err
  434. }
  435. return a.resolvePerms(NewPermission(read, write), perm)
  436. }
  437. func (a *Manager) resolvePerms(base, perm Permission) error {
  438. if perm == PermissionRead && base.IsRead() {
  439. return nil
  440. } else if perm == PermissionWrite && base.IsWrite() {
  441. return nil
  442. }
  443. return ErrUnauthorized
  444. }
  445. // AddUser adds a user with the given username, password and role
  446. func (a *Manager) AddUser(username, password string, role Role, createdBy string) error {
  447. if !AllowedUsername(username) || !AllowedRole(role) {
  448. return ErrInvalidArgument
  449. }
  450. hash, err := bcrypt.GenerateFromPassword([]byte(password), bcryptCost)
  451. if err != nil {
  452. return err
  453. }
  454. // INSERT INTO user (user, pass, role, sync_topic, created_by, created_at, last_seen)
  455. syncTopic, now := util.RandomString(syncTopicLength), time.Now().Unix()
  456. if _, err = a.db.Exec(insertUserQuery, username, hash, role, syncTopic, createdBy, now, now); err != nil {
  457. return err
  458. }
  459. return nil
  460. }
  461. // RemoveUser deletes the user with the given username. The function returns nil on success, even
  462. // if the user did not exist in the first place.
  463. func (a *Manager) RemoveUser(username string) error {
  464. if !AllowedUsername(username) {
  465. return ErrInvalidArgument
  466. }
  467. // Rows in user_access, user_token, etc. are deleted via foreign keys
  468. if _, err := a.db.Exec(deleteUserQuery, username); err != nil {
  469. return err
  470. }
  471. return nil
  472. }
  473. // Users returns a list of users. It always also returns the Everyone user ("*").
  474. func (a *Manager) Users() ([]*User, error) {
  475. rows, err := a.db.Query(selectUsernamesQuery)
  476. if err != nil {
  477. return nil, err
  478. }
  479. defer rows.Close()
  480. usernames := make([]string, 0)
  481. for rows.Next() {
  482. var username string
  483. if err := rows.Scan(&username); err != nil {
  484. return nil, err
  485. } else if err := rows.Err(); err != nil {
  486. return nil, err
  487. }
  488. usernames = append(usernames, username)
  489. }
  490. rows.Close()
  491. users := make([]*User, 0)
  492. for _, username := range usernames {
  493. user, err := a.User(username)
  494. if err != nil {
  495. return nil, err
  496. }
  497. users = append(users, user)
  498. }
  499. return users, nil
  500. }
  501. // User returns the user with the given username if it exists, or ErrNotFound otherwise.
  502. // You may also pass Everyone to retrieve the anonymous user and its Grant list.
  503. func (a *Manager) User(username string) (*User, error) {
  504. rows, err := a.db.Query(selectUserByNameQuery, username)
  505. if err != nil {
  506. return nil, err
  507. }
  508. return a.readUser(rows)
  509. }
  510. func (a *Manager) userByToken(token string) (*User, error) {
  511. rows, err := a.db.Query(selectUserByTokenQuery, token, time.Now().Unix())
  512. if err != nil {
  513. return nil, err
  514. }
  515. return a.readUser(rows)
  516. }
  517. func (a *Manager) readUser(rows *sql.Rows) (*User, error) {
  518. defer rows.Close()
  519. var username, hash, role, prefs, syncTopic string
  520. var tierCode, tierName sql.NullString
  521. var paid sql.NullBool
  522. var messages, emails int64
  523. var messagesLimit, messagesExpiryDuration, emailsLimit, reservationsLimit, attachmentFileSizeLimit, attachmentTotalSizeLimit, attachmentExpiryDuration sql.NullInt64
  524. if !rows.Next() {
  525. return nil, ErrNotFound
  526. }
  527. if err := rows.Scan(&username, &hash, &role, &prefs, &syncTopic, &messages, &emails, &tierCode, &tierName, &paid, &messagesLimit, &messagesExpiryDuration, &emailsLimit, &reservationsLimit, &attachmentFileSizeLimit, &attachmentTotalSizeLimit, &attachmentExpiryDuration); err != nil {
  528. return nil, err
  529. } else if err := rows.Err(); err != nil {
  530. return nil, err
  531. }
  532. user := &User{
  533. Name: username,
  534. Hash: hash,
  535. Role: Role(role),
  536. Prefs: &Prefs{},
  537. SyncTopic: syncTopic,
  538. Stats: &Stats{
  539. Messages: messages,
  540. Emails: emails,
  541. },
  542. }
  543. if err := json.Unmarshal([]byte(prefs), user.Prefs); err != nil {
  544. return nil, err
  545. }
  546. if tierCode.Valid {
  547. user.Tier = &Tier{
  548. Code: tierCode.String,
  549. Name: tierName.String,
  550. Paid: paid.Bool,
  551. MessagesLimit: messagesLimit.Int64,
  552. MessagesExpiryDuration: time.Duration(messagesExpiryDuration.Int64) * time.Second,
  553. EmailsLimit: emailsLimit.Int64,
  554. ReservationsLimit: reservationsLimit.Int64,
  555. AttachmentFileSizeLimit: attachmentFileSizeLimit.Int64,
  556. AttachmentTotalSizeLimit: attachmentTotalSizeLimit.Int64,
  557. AttachmentExpiryDuration: time.Duration(attachmentExpiryDuration.Int64) * time.Second,
  558. }
  559. }
  560. return user, nil
  561. }
  562. // Grants returns all user-specific access control entries
  563. func (a *Manager) Grants(username string) ([]Grant, error) {
  564. rows, err := a.db.Query(selectUserAccessQuery, username)
  565. if err != nil {
  566. return nil, err
  567. }
  568. defer rows.Close()
  569. grants := make([]Grant, 0)
  570. for rows.Next() {
  571. var topic string
  572. var read, write bool
  573. if err := rows.Scan(&topic, &read, &write); err != nil {
  574. return nil, err
  575. } else if err := rows.Err(); err != nil {
  576. return nil, err
  577. }
  578. grants = append(grants, Grant{
  579. TopicPattern: fromSQLWildcard(topic),
  580. Allow: NewPermission(read, write),
  581. })
  582. }
  583. return grants, nil
  584. }
  585. // Reservations returns all user-owned topics, and the associated everyone-access
  586. func (a *Manager) Reservations(username string) ([]Reservation, error) {
  587. rows, err := a.db.Query(selectUserReservationsQuery, Everyone, username)
  588. if err != nil {
  589. return nil, err
  590. }
  591. defer rows.Close()
  592. reservations := make([]Reservation, 0)
  593. for rows.Next() {
  594. var topic string
  595. var ownerRead, ownerWrite bool
  596. var everyoneRead, everyoneWrite sql.NullBool
  597. if err := rows.Scan(&topic, &ownerRead, &ownerWrite, &everyoneRead, &everyoneWrite); err != nil {
  598. return nil, err
  599. } else if err := rows.Err(); err != nil {
  600. return nil, err
  601. }
  602. reservations = append(reservations, Reservation{
  603. Topic: topic,
  604. Owner: NewPermission(ownerRead, ownerWrite),
  605. Everyone: NewPermission(everyoneRead.Bool, everyoneWrite.Bool), // false if null
  606. })
  607. }
  608. return reservations, nil
  609. }
  610. // HasReservation returns true if the given topic access is owned by the user
  611. func (a *Manager) HasReservation(username, topic string) (bool, error) {
  612. rows, err := a.db.Query(selectUserHasReservationQuery, username, topic)
  613. if err != nil {
  614. return false, err
  615. }
  616. defer rows.Close()
  617. if !rows.Next() {
  618. return false, errNoRows
  619. }
  620. var count int64
  621. if err := rows.Scan(&count); err != nil {
  622. return false, err
  623. }
  624. return count > 0, nil
  625. }
  626. // ReservationsCount returns the number of reservations owned by this user
  627. func (a *Manager) ReservationsCount(username string) (int64, error) {
  628. rows, err := a.db.Query(selectUserReservationsCountQuery, username)
  629. if err != nil {
  630. return 0, err
  631. }
  632. defer rows.Close()
  633. if !rows.Next() {
  634. return 0, errNoRows
  635. }
  636. var count int64
  637. if err := rows.Scan(&count); err != nil {
  638. return 0, err
  639. }
  640. return count, nil
  641. }
  642. // ChangePassword changes a user's password
  643. func (a *Manager) ChangePassword(username, password string) error {
  644. hash, err := bcrypt.GenerateFromPassword([]byte(password), bcryptCost)
  645. if err != nil {
  646. return err
  647. }
  648. if _, err := a.db.Exec(updateUserPassQuery, hash, username); err != nil {
  649. return err
  650. }
  651. return nil
  652. }
  653. // ChangeRole changes a user's role. When a role is changed from RoleUser to RoleAdmin,
  654. // all existing access control entries (Grant) are removed, since they are no longer needed.
  655. func (a *Manager) ChangeRole(username string, role Role) error {
  656. if !AllowedUsername(username) || !AllowedRole(role) {
  657. return ErrInvalidArgument
  658. }
  659. if _, err := a.db.Exec(updateUserRoleQuery, string(role), username); err != nil {
  660. return err
  661. }
  662. if role == RoleAdmin {
  663. if _, err := a.db.Exec(deleteUserAccessQuery, username, username); err != nil {
  664. return err
  665. }
  666. }
  667. return nil
  668. }
  669. // ChangeTier changes a user's tier using the tier code
  670. func (a *Manager) ChangeTier(username, tier string) error {
  671. if !AllowedUsername(username) {
  672. return ErrInvalidArgument
  673. }
  674. rows, err := a.db.Query(selectTierIDQuery, tier)
  675. if err != nil {
  676. return err
  677. }
  678. defer rows.Close()
  679. if !rows.Next() {
  680. return ErrInvalidArgument
  681. }
  682. var tierID int64
  683. if err := rows.Scan(&tierID); err != nil {
  684. return err
  685. }
  686. rows.Close()
  687. if _, err := a.db.Exec(updateUserTierQuery, tierID, username); err != nil {
  688. return err
  689. }
  690. return nil
  691. }
  692. // CheckAllowAccess tests if a user may create an access control entry for the given topic.
  693. // If there are any ACL entries that are not owned by the user, an error is returned.
  694. func (a *Manager) CheckAllowAccess(username string, topic string) error {
  695. if (!AllowedUsername(username) && username != Everyone) || !AllowedTopic(topic) {
  696. return ErrInvalidArgument
  697. }
  698. rows, err := a.db.Query(selectOtherAccessCountQuery, topic, topic, username)
  699. if err != nil {
  700. return err
  701. }
  702. defer rows.Close()
  703. if !rows.Next() {
  704. return errNoRows
  705. }
  706. var otherCount int
  707. if err := rows.Scan(&otherCount); err != nil {
  708. return err
  709. }
  710. if otherCount > 0 {
  711. return errTopicOwnedByOthers
  712. }
  713. return nil
  714. }
  715. // AllowAccess adds or updates an entry in th access control list for a specific user. It controls
  716. // read/write access to a topic. The parameter topicPattern may include wildcards (*). The ACL entry
  717. // owner may either be a user (username), or the system (empty).
  718. func (a *Manager) AllowAccess(owner, username string, topicPattern string, read bool, write bool) error {
  719. if !AllowedUsername(username) && username != Everyone {
  720. return ErrInvalidArgument
  721. } else if owner != "" && !AllowedUsername(owner) {
  722. return ErrInvalidArgument
  723. } else if !AllowedTopicPattern(topicPattern) {
  724. return ErrInvalidArgument
  725. }
  726. if _, err := a.db.Exec(upsertUserAccessQuery, username, toSQLWildcard(topicPattern), read, write, owner, owner); err != nil {
  727. return err
  728. }
  729. return nil
  730. }
  731. // ResetAccess removes an access control list entry for a specific username/topic, or (if topic is
  732. // empty) for an entire user. The parameter topicPattern may include wildcards (*).
  733. func (a *Manager) ResetAccess(username string, topicPattern string) error {
  734. if !AllowedUsername(username) && username != Everyone && username != "" {
  735. return ErrInvalidArgument
  736. } else if !AllowedTopicPattern(topicPattern) && topicPattern != "" {
  737. return ErrInvalidArgument
  738. }
  739. if username == "" && topicPattern == "" {
  740. _, err := a.db.Exec(deleteAllAccessQuery, username)
  741. return err
  742. } else if topicPattern == "" {
  743. _, err := a.db.Exec(deleteUserAccessQuery, username, username)
  744. return err
  745. }
  746. _, err := a.db.Exec(deleteTopicAccessQuery, username, username, toSQLWildcard(topicPattern))
  747. return err
  748. }
  749. // ResetTier removes the tier from the given user
  750. func (a *Manager) ResetTier(username string) error {
  751. if !AllowedUsername(username) && username != Everyone && username != "" {
  752. return ErrInvalidArgument
  753. }
  754. _, err := a.db.Exec(deleteUserTierQuery, username)
  755. return err
  756. }
  757. // DefaultAccess returns the default read/write access if no access control entry matches
  758. func (a *Manager) DefaultAccess() Permission {
  759. return a.defaultAccess
  760. }
  761. // CreateTier creates a new tier in the database
  762. func (a *Manager) CreateTier(tier *Tier) error {
  763. if _, err := a.db.Exec(insertTierQuery, tier.Code, tier.Name, tier.Paid, tier.MessagesLimit, int64(tier.MessagesExpiryDuration.Seconds()), tier.EmailsLimit, tier.ReservationsLimit, tier.AttachmentFileSizeLimit, tier.AttachmentTotalSizeLimit, int64(tier.AttachmentExpiryDuration.Seconds())); err != nil {
  764. return err
  765. }
  766. return nil
  767. }
  768. func toSQLWildcard(s string) string {
  769. return strings.ReplaceAll(s, "*", "%")
  770. }
  771. func fromSQLWildcard(s string) string {
  772. return strings.ReplaceAll(s, "%", "*")
  773. }
  774. func runStartupQueries(db *sql.DB, startupQueries string) error {
  775. if _, err := db.Exec(startupQueries); err != nil {
  776. return err
  777. }
  778. if _, err := db.Exec(builtinStartupQueries); err != nil {
  779. return err
  780. }
  781. return nil
  782. }
  783. func setupDB(db *sql.DB) error {
  784. // If 'schemaVersion' table does not exist, this must be a new database
  785. rowsSV, err := db.Query(selectSchemaVersionQuery)
  786. if err != nil {
  787. return setupNewDB(db)
  788. }
  789. defer rowsSV.Close()
  790. // If 'schemaVersion' table exists, read version and potentially upgrade
  791. schemaVersion := 0
  792. if !rowsSV.Next() {
  793. return errors.New("cannot determine schema version: database file may be corrupt")
  794. }
  795. if err := rowsSV.Scan(&schemaVersion); err != nil {
  796. return err
  797. }
  798. rowsSV.Close()
  799. // Do migrations
  800. if schemaVersion == currentSchemaVersion {
  801. return nil
  802. } else if schemaVersion == 1 {
  803. return migrateFrom1(db)
  804. }
  805. return fmt.Errorf("unexpected schema version found: %d", schemaVersion)
  806. }
  807. func setupNewDB(db *sql.DB) error {
  808. if _, err := db.Exec(createTablesQueries); err != nil {
  809. return err
  810. }
  811. if _, err := db.Exec(insertSchemaVersion, currentSchemaVersion); err != nil {
  812. return err
  813. }
  814. return nil
  815. }
  816. func migrateFrom1(db *sql.DB) error {
  817. log.Info("Migrating user database schema: from 1 to 2")
  818. tx, err := db.Begin()
  819. if err != nil {
  820. return err
  821. }
  822. defer tx.Rollback()
  823. if _, err := tx.Exec(migrate1To2RenameUserTableQueryNoTx); err != nil {
  824. return err
  825. }
  826. if _, err := tx.Exec(createTablesQueriesNoTx); err != nil {
  827. return err
  828. }
  829. if _, err := tx.Exec(migrate1To2InsertFromOldTablesAndDropNoTx); err != nil {
  830. return err
  831. }
  832. if _, err := tx.Exec(updateSchemaVersion, 2); err != nil {
  833. return err
  834. }
  835. if err := tx.Commit(); err != nil {
  836. return err
  837. }
  838. return nil // Update this when a new version is added
  839. }