server_account.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576
  1. package server
  2. import (
  3. "encoding/json"
  4. "heckel.io/ntfy/log"
  5. "heckel.io/ntfy/user"
  6. "heckel.io/ntfy/util"
  7. "net/http"
  8. "net/netip"
  9. "strings"
  10. "time"
  11. )
  12. const (
  13. subscriptionIDLength = 16
  14. subscriptionIDPrefix = "su_"
  15. syncTopicAccountSyncEvent = "sync"
  16. tokenExpiryDuration = 72 * time.Hour // Extend tokens by this much
  17. )
  18. func (s *Server) handleAccountCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  19. u := v.User()
  20. if !u.IsAdmin() { // u may be nil, but that's fine
  21. if !s.config.EnableSignup {
  22. return errHTTPBadRequestSignupNotEnabled
  23. } else if u != nil {
  24. return errHTTPUnauthorized // Cannot create account from user context
  25. }
  26. if !v.AccountCreationAllowed() {
  27. return errHTTPTooManyRequestsLimitAccountCreation
  28. }
  29. }
  30. newAccount, err := readJSONWithLimit[apiAccountCreateRequest](r.Body, jsonBodyBytesLimit, false)
  31. if err != nil {
  32. return err
  33. }
  34. if existingUser, _ := s.userManager.User(newAccount.Username); existingUser != nil {
  35. return errHTTPConflictUserExists
  36. }
  37. logvr(v, r).Tag(tagAccount).Field("user_name", newAccount.Username).Info("Creating user %s", newAccount.Username)
  38. if err := s.userManager.AddUser(newAccount.Username, newAccount.Password, user.RoleUser); err != nil {
  39. return err
  40. }
  41. v.AccountCreated()
  42. return s.writeJSON(w, newSuccessResponse())
  43. }
  44. func (s *Server) handleAccountGet(w http.ResponseWriter, r *http.Request, v *visitor) error {
  45. info, err := v.Info()
  46. if err != nil {
  47. return err
  48. }
  49. logvr(v, r).Tag(tagAccount).Fields(visitorExtendedInfoContext(info)).Debug("Retrieving account stats")
  50. limits, stats := info.Limits, info.Stats
  51. response := &apiAccountResponse{
  52. Limits: &apiAccountLimits{
  53. Basis: string(limits.Basis),
  54. Messages: limits.MessageLimit,
  55. MessagesExpiryDuration: int64(limits.MessageExpiryDuration.Seconds()),
  56. Emails: limits.EmailLimit,
  57. Reservations: limits.ReservationsLimit,
  58. AttachmentTotalSize: limits.AttachmentTotalSizeLimit,
  59. AttachmentFileSize: limits.AttachmentFileSizeLimit,
  60. AttachmentExpiryDuration: int64(limits.AttachmentExpiryDuration.Seconds()),
  61. AttachmentBandwidth: limits.AttachmentBandwidthLimit,
  62. },
  63. Stats: &apiAccountStats{
  64. Messages: stats.Messages,
  65. MessagesRemaining: stats.MessagesRemaining,
  66. Emails: stats.Emails,
  67. EmailsRemaining: stats.EmailsRemaining,
  68. Reservations: stats.Reservations,
  69. ReservationsRemaining: stats.ReservationsRemaining,
  70. AttachmentTotalSize: stats.AttachmentTotalSize,
  71. AttachmentTotalSizeRemaining: stats.AttachmentTotalSizeRemaining,
  72. },
  73. }
  74. u := v.User()
  75. if u != nil {
  76. response.Username = u.Name
  77. response.Role = string(u.Role)
  78. response.SyncTopic = u.SyncTopic
  79. if u.Prefs != nil {
  80. if u.Prefs.Language != nil {
  81. response.Language = *u.Prefs.Language
  82. }
  83. if u.Prefs.Notification != nil {
  84. response.Notification = u.Prefs.Notification
  85. }
  86. if u.Prefs.Subscriptions != nil {
  87. response.Subscriptions = u.Prefs.Subscriptions
  88. }
  89. }
  90. if u.Tier != nil {
  91. response.Tier = &apiAccountTier{
  92. Code: u.Tier.Code,
  93. Name: u.Tier.Name,
  94. }
  95. }
  96. if u.Billing.StripeCustomerID != "" {
  97. response.Billing = &apiAccountBilling{
  98. Customer: true,
  99. Subscription: u.Billing.StripeSubscriptionID != "",
  100. Status: string(u.Billing.StripeSubscriptionStatus),
  101. PaidUntil: u.Billing.StripeSubscriptionPaidUntil.Unix(),
  102. CancelAt: u.Billing.StripeSubscriptionCancelAt.Unix(),
  103. }
  104. }
  105. reservations, err := s.userManager.Reservations(u.Name)
  106. if err != nil {
  107. return err
  108. }
  109. if len(reservations) > 0 {
  110. response.Reservations = make([]*apiAccountReservation, 0)
  111. for _, r := range reservations {
  112. response.Reservations = append(response.Reservations, &apiAccountReservation{
  113. Topic: r.Topic,
  114. Everyone: r.Everyone.String(),
  115. })
  116. }
  117. }
  118. tokens, err := s.userManager.Tokens(u.ID)
  119. if err != nil {
  120. return err
  121. }
  122. if len(tokens) > 0 {
  123. response.Tokens = make([]*apiAccountTokenResponse, 0)
  124. for _, t := range tokens {
  125. var lastOrigin string
  126. if t.LastOrigin != netip.IPv4Unspecified() {
  127. lastOrigin = t.LastOrigin.String()
  128. }
  129. response.Tokens = append(response.Tokens, &apiAccountTokenResponse{
  130. Token: t.Value,
  131. Label: t.Label,
  132. LastAccess: t.LastAccess.Unix(),
  133. LastOrigin: lastOrigin,
  134. Expires: t.Expires.Unix(),
  135. })
  136. }
  137. }
  138. } else {
  139. response.Username = user.Everyone
  140. response.Role = string(user.RoleAnonymous)
  141. }
  142. return s.writeJSON(w, response)
  143. }
  144. func (s *Server) handleAccountDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  145. req, err := readJSONWithLimit[apiAccountDeleteRequest](r.Body, jsonBodyBytesLimit, false)
  146. if err != nil {
  147. return err
  148. } else if req.Password == "" {
  149. return errHTTPBadRequest
  150. }
  151. u := v.User()
  152. if _, err := s.userManager.Authenticate(u.Name, req.Password); err != nil {
  153. return errHTTPBadRequestIncorrectPasswordConfirmation
  154. }
  155. if u.Billing.StripeSubscriptionID != "" {
  156. logvr(v, r).Tag(tagStripe).Info("Canceling billing subscription for user %s", u.Name)
  157. if _, err := s.stripe.CancelSubscription(u.Billing.StripeSubscriptionID); err != nil {
  158. return err
  159. }
  160. }
  161. if err := s.maybeRemoveMessagesAndExcessReservations(r, v, u, 0); err != nil {
  162. return err
  163. }
  164. logvr(v, r).Tag(tagAccount).Info("Marking user %s as deleted", u.Name)
  165. if err := s.userManager.MarkUserRemoved(u); err != nil {
  166. return err
  167. }
  168. return s.writeJSON(w, newSuccessResponse())
  169. }
  170. func (s *Server) handleAccountPasswordChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  171. req, err := readJSONWithLimit[apiAccountPasswordChangeRequest](r.Body, jsonBodyBytesLimit, false)
  172. if err != nil {
  173. return err
  174. } else if req.Password == "" || req.NewPassword == "" {
  175. return errHTTPBadRequest
  176. }
  177. u := v.User()
  178. if _, err := s.userManager.Authenticate(u.Name, req.Password); err != nil {
  179. return errHTTPBadRequestIncorrectPasswordConfirmation
  180. }
  181. logvr(v, r).Tag(tagAccount).Debug("Changing password for user %s", u.Name)
  182. if err := s.userManager.ChangePassword(u.Name, req.NewPassword); err != nil {
  183. return err
  184. }
  185. return s.writeJSON(w, newSuccessResponse())
  186. }
  187. func (s *Server) handleAccountTokenCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  188. // TODO rate limit
  189. req, err := readJSONWithLimit[apiAccountTokenIssueRequest](r.Body, jsonBodyBytesLimit, true) // Allow empty body!
  190. if err != nil {
  191. return err
  192. }
  193. var label string
  194. if req.Label != nil {
  195. label = *req.Label
  196. }
  197. expires := time.Now().Add(tokenExpiryDuration)
  198. if req.Expires != nil {
  199. expires = time.Unix(*req.Expires, 0)
  200. }
  201. u := v.User()
  202. logvr(v, r).
  203. Tag(tagAccount).
  204. Fields(log.Context{
  205. "token_label": label,
  206. "token_expires": expires,
  207. }).
  208. Debug("Creating token for user %s", u.Name)
  209. token, err := s.userManager.CreateToken(u.ID, label, expires, v.IP())
  210. if err != nil {
  211. return err
  212. }
  213. response := &apiAccountTokenResponse{
  214. Token: token.Value,
  215. Label: token.Label,
  216. LastAccess: token.LastAccess.Unix(),
  217. LastOrigin: token.LastOrigin.String(),
  218. Expires: token.Expires.Unix(),
  219. }
  220. return s.writeJSON(w, response)
  221. }
  222. func (s *Server) handleAccountTokenUpdate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  223. // TODO rate limit
  224. u := v.User()
  225. req, err := readJSONWithLimit[apiAccountTokenUpdateRequest](r.Body, jsonBodyBytesLimit, true) // Allow empty body!
  226. if err != nil {
  227. return err
  228. } else if req.Token == "" {
  229. req.Token = u.Token
  230. if req.Token == "" {
  231. return errHTTPBadRequestNoTokenProvided
  232. }
  233. }
  234. var expires *time.Time
  235. if req.Expires != nil {
  236. expires = util.Time(time.Unix(*req.Expires, 0))
  237. } else if req.Label == nil {
  238. expires = util.Time(time.Now().Add(tokenExpiryDuration)) // If label/expires not set, extend token by 72 hours
  239. }
  240. logvr(v, r).
  241. Tag(tagAccount).
  242. Fields(log.Context{
  243. "token_label": req.Label,
  244. "token_expires": expires,
  245. }).
  246. Debug("Updating token for user %s as deleted", u.Name)
  247. token, err := s.userManager.ChangeToken(u.ID, req.Token, req.Label, expires)
  248. if err != nil {
  249. return err
  250. }
  251. response := &apiAccountTokenResponse{
  252. Token: token.Value,
  253. Label: token.Label,
  254. LastAccess: token.LastAccess.Unix(),
  255. LastOrigin: token.LastOrigin.String(),
  256. Expires: token.Expires.Unix(),
  257. }
  258. return s.writeJSON(w, response)
  259. }
  260. func (s *Server) handleAccountTokenDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  261. // TODO rate limit
  262. u := v.User()
  263. token := readParam(r, "X-Token", "Token") // DELETEs cannot have a body, and we don't want it in the path
  264. if token == "" {
  265. token = u.Token
  266. if token == "" {
  267. return errHTTPBadRequestNoTokenProvided
  268. }
  269. }
  270. if err := s.userManager.RemoveToken(u.ID, token); err != nil {
  271. return err
  272. }
  273. logvr(v, r).
  274. Tag(tagAccount).
  275. Field("token", token).
  276. Debug("Deleted token for user %s", u.Name)
  277. return s.writeJSON(w, newSuccessResponse())
  278. }
  279. func (s *Server) handleAccountSettingsChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  280. newPrefs, err := readJSONWithLimit[user.Prefs](r.Body, jsonBodyBytesLimit, false)
  281. if err != nil {
  282. return err
  283. }
  284. u := v.User()
  285. if u.Prefs == nil {
  286. u.Prefs = &user.Prefs{}
  287. }
  288. prefs := u.Prefs
  289. if newPrefs.Language != nil {
  290. prefs.Language = newPrefs.Language
  291. }
  292. if newPrefs.Notification != nil {
  293. if prefs.Notification == nil {
  294. prefs.Notification = &user.NotificationPrefs{}
  295. }
  296. if newPrefs.Notification.DeleteAfter != nil {
  297. prefs.Notification.DeleteAfter = newPrefs.Notification.DeleteAfter
  298. }
  299. if newPrefs.Notification.Sound != nil {
  300. prefs.Notification.Sound = newPrefs.Notification.Sound
  301. }
  302. if newPrefs.Notification.MinPriority != nil {
  303. prefs.Notification.MinPriority = newPrefs.Notification.MinPriority
  304. }
  305. }
  306. logvr(v, r).Tag(tagAccount).Debug("Changing account settings for user %s", u.Name)
  307. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  308. return err
  309. }
  310. return s.writeJSON(w, newSuccessResponse())
  311. }
  312. func (s *Server) handleAccountSubscriptionAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  313. newSubscription, err := readJSONWithLimit[user.Subscription](r.Body, jsonBodyBytesLimit, false)
  314. if err != nil {
  315. return err
  316. }
  317. u := v.User()
  318. if u.Prefs == nil {
  319. u.Prefs = &user.Prefs{}
  320. }
  321. newSubscription.ID = "" // Client cannot set ID
  322. for _, subscription := range u.Prefs.Subscriptions {
  323. if newSubscription.BaseURL == subscription.BaseURL && newSubscription.Topic == subscription.Topic {
  324. newSubscription = subscription
  325. break
  326. }
  327. }
  328. if newSubscription.ID == "" {
  329. newSubscription.ID = util.RandomStringPrefix(subscriptionIDPrefix, subscriptionIDLength)
  330. prefs := u.Prefs
  331. prefs.Subscriptions = append(prefs.Subscriptions, newSubscription)
  332. logvr(v, r).
  333. Tag(tagAccount).
  334. Fields(log.Context{
  335. "base_url": newSubscription.BaseURL,
  336. "topic": newSubscription.Topic,
  337. }).
  338. Debug("Adding subscription for user %s", u.Name)
  339. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  340. return err
  341. }
  342. }
  343. return s.writeJSON(w, newSubscription)
  344. }
  345. func (s *Server) handleAccountSubscriptionChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  346. matches := apiAccountSubscriptionSingleRegex.FindStringSubmatch(r.URL.Path)
  347. if len(matches) != 2 {
  348. return errHTTPInternalErrorInvalidPath
  349. }
  350. subscriptionID := matches[1]
  351. updatedSubscription, err := readJSONWithLimit[user.Subscription](r.Body, jsonBodyBytesLimit, false)
  352. if err != nil {
  353. return err
  354. }
  355. u := v.User()
  356. if u.Prefs == nil || u.Prefs.Subscriptions == nil {
  357. return errHTTPNotFound
  358. }
  359. prefs := u.Prefs
  360. var subscription *user.Subscription
  361. for _, sub := range prefs.Subscriptions {
  362. if sub.ID == subscriptionID {
  363. sub.DisplayName = updatedSubscription.DisplayName
  364. subscription = sub
  365. break
  366. }
  367. }
  368. if subscription == nil {
  369. return errHTTPNotFound
  370. }
  371. logvr(v, r).
  372. Tag(tagAccount).
  373. Fields(log.Context{
  374. "base_url": subscription.BaseURL,
  375. "topic": subscription.Topic,
  376. "display_name": subscription.DisplayName,
  377. }).
  378. Debug("Changing subscription for user %s", u.Name)
  379. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  380. return err
  381. }
  382. return s.writeJSON(w, subscription)
  383. }
  384. func (s *Server) handleAccountSubscriptionDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  385. matches := apiAccountSubscriptionSingleRegex.FindStringSubmatch(r.URL.Path)
  386. if len(matches) != 2 {
  387. return errHTTPInternalErrorInvalidPath
  388. }
  389. subscriptionID := matches[1]
  390. u := v.User()
  391. if u.Prefs == nil || u.Prefs.Subscriptions == nil {
  392. return nil
  393. }
  394. newSubscriptions := make([]*user.Subscription, 0)
  395. for _, subscription := range u.Prefs.Subscriptions {
  396. if subscription.ID == subscriptionID {
  397. logvr(v, r).
  398. Tag(tagAccount).
  399. Fields(log.Context{
  400. "base_url": subscription.BaseURL,
  401. "topic": subscription.Topic,
  402. }).
  403. Debug("Removing subscription for user %s", u.Name)
  404. } else {
  405. newSubscriptions = append(newSubscriptions, subscription)
  406. }
  407. }
  408. if len(newSubscriptions) < len(u.Prefs.Subscriptions) {
  409. prefs := u.Prefs
  410. prefs.Subscriptions = newSubscriptions
  411. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  412. return err
  413. }
  414. }
  415. return s.writeJSON(w, newSuccessResponse())
  416. }
  417. // handleAccountReservationAdd adds a topic reservation for the logged-in user, but only if the user has a tier
  418. // with enough remaining reservations left, or if the user is an admin. Admins can always reserve a topic, unless
  419. // it is already reserved by someone else.
  420. func (s *Server) handleAccountReservationAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  421. u := v.User()
  422. req, err := readJSONWithLimit[apiAccountReservationRequest](r.Body, jsonBodyBytesLimit, false)
  423. if err != nil {
  424. return err
  425. }
  426. if !topicRegex.MatchString(req.Topic) {
  427. return errHTTPBadRequestTopicInvalid
  428. }
  429. everyone, err := user.ParsePermission(req.Everyone)
  430. if err != nil {
  431. return errHTTPBadRequestPermissionInvalid
  432. }
  433. // Check if we are allowed to reserve this topic
  434. if u.IsUser() && u.Tier == nil {
  435. return errHTTPUnauthorized
  436. } else if err := s.userManager.AllowReservation(u.Name, req.Topic); err != nil {
  437. return errHTTPConflictTopicReserved
  438. } else if u.IsUser() {
  439. hasReservation, err := s.userManager.HasReservation(u.Name, req.Topic)
  440. if err != nil {
  441. return err
  442. }
  443. if !hasReservation {
  444. reservations, err := s.userManager.ReservationsCount(u.Name)
  445. if err != nil {
  446. return err
  447. } else if reservations >= u.Tier.ReservationLimit {
  448. return errHTTPTooManyRequestsLimitReservations
  449. }
  450. }
  451. }
  452. // Actually add the reservation
  453. logvr(v, r).
  454. Tag(tagAccount).
  455. Fields(log.Context{
  456. "topic": req.Topic,
  457. "everyone": everyone.String(),
  458. }).
  459. Debug("Adding topic reservation")
  460. if err := s.userManager.AddReservation(u.Name, req.Topic, everyone); err != nil {
  461. return err
  462. }
  463. // Kill existing subscribers
  464. t, err := s.topicFromID(req.Topic)
  465. if err != nil {
  466. return err
  467. }
  468. t.CancelSubscribers(u.ID)
  469. return s.writeJSON(w, newSuccessResponse())
  470. }
  471. // handleAccountReservationDelete deletes a topic reservation if it is owned by the current user
  472. func (s *Server) handleAccountReservationDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  473. matches := apiAccountReservationSingleRegex.FindStringSubmatch(r.URL.Path)
  474. if len(matches) != 2 {
  475. return errHTTPInternalErrorInvalidPath
  476. }
  477. topic := matches[1]
  478. if !topicRegex.MatchString(topic) {
  479. return errHTTPBadRequestTopicInvalid
  480. }
  481. u := v.User()
  482. authorized, err := s.userManager.HasReservation(u.Name, topic)
  483. if err != nil {
  484. return err
  485. } else if !authorized {
  486. return errHTTPUnauthorized
  487. }
  488. deleteMessages := readBoolParam(r, false, "X-Delete-Messages", "Delete-Messages")
  489. logvr(v, r).
  490. Tag(tagAccount).
  491. Fields(log.Context{
  492. "topic": topic,
  493. "delete_messages": deleteMessages,
  494. }).
  495. Debug("Removing topic reservation")
  496. if err := s.userManager.RemoveReservations(u.Name, topic); err != nil {
  497. return err
  498. }
  499. if deleteMessages {
  500. if err := s.messageCache.ExpireMessages(topic); err != nil {
  501. return err
  502. }
  503. }
  504. return s.writeJSON(w, newSuccessResponse())
  505. }
  506. // maybeRemoveMessagesAndExcessReservations deletes topic reservations for the given user (if too many for tier),
  507. // and marks associated messages for the topics as deleted. This also eventually deletes attachments.
  508. // The process relies on the manager to perform the actual deletions (see runManager).
  509. func (s *Server) maybeRemoveMessagesAndExcessReservations(r *http.Request, v *visitor, u *user.User, reservationsLimit int64) error {
  510. reservations, err := s.userManager.Reservations(u.Name)
  511. if err != nil {
  512. return err
  513. } else if int64(len(reservations)) <= reservationsLimit {
  514. logvr(v, r).Tag(tagAccount).Debug("No excess reservations to remove")
  515. return nil
  516. }
  517. topics := make([]string, 0)
  518. for i := int64(len(reservations)) - 1; i >= reservationsLimit; i-- {
  519. topics = append(topics, reservations[i].Topic)
  520. }
  521. logvr(v, r).Tag(tagAccount).Info("Removing excess reservations for topics %s", strings.Join(topics, ", "))
  522. if err := s.userManager.RemoveReservations(u.Name, topics...); err != nil {
  523. return err
  524. }
  525. if err := s.messageCache.ExpireMessages(topics...); err != nil {
  526. return err
  527. }
  528. return nil
  529. }
  530. // publishSyncEventAsync kicks of a Go routine to publish a sync message to the user's sync topic
  531. func (s *Server) publishSyncEventAsync(v *visitor) {
  532. go func() {
  533. if err := s.publishSyncEvent(v); err != nil {
  534. logv(v).Err(err).Trace("Error publishing to user's sync topic")
  535. }
  536. }()
  537. }
  538. // publishSyncEvent publishes a sync message to the user's sync topic
  539. func (s *Server) publishSyncEvent(v *visitor) error {
  540. u := v.User()
  541. if u == nil || u.SyncTopic == "" {
  542. return nil
  543. }
  544. logv(v).Field("sync_topic", u.SyncTopic).Trace("Publishing sync event to user's sync topic")
  545. syncTopic, err := s.topicFromID(u.SyncTopic)
  546. if err != nil {
  547. return err
  548. }
  549. messageBytes, err := json.Marshal(&apiAccountSyncTopicResponse{Event: syncTopicAccountSyncEvent})
  550. if err != nil {
  551. return err
  552. }
  553. m := newDefaultMessage(syncTopic.ID, string(messageBytes))
  554. if err := syncTopic.Publish(v, m); err != nil {
  555. return err
  556. }
  557. return nil
  558. }