server_admin.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150
  1. package server
  2. import (
  3. "errors"
  4. "heckel.io/ntfy/v2/user"
  5. "net/http"
  6. )
  7. func (s *Server) handleUsersGet(w http.ResponseWriter, r *http.Request, v *visitor) error {
  8. users, err := s.userManager.Users()
  9. if err != nil {
  10. return err
  11. }
  12. grants, err := s.userManager.AllGrants()
  13. if err != nil {
  14. return err
  15. }
  16. usersResponse := make([]*apiUserResponse, len(users))
  17. for i, u := range users {
  18. tier := ""
  19. if u.Tier != nil {
  20. tier = u.Tier.Code
  21. }
  22. userGrants := make([]*apiUserGrantResponse, len(grants[u.ID]))
  23. for i, g := range grants[u.ID] {
  24. userGrants[i] = &apiUserGrantResponse{
  25. Topic: g.TopicPattern,
  26. Permission: g.Allow.String(),
  27. }
  28. }
  29. usersResponse[i] = &apiUserResponse{
  30. Username: u.Name,
  31. Role: string(u.Role),
  32. Tier: tier,
  33. Grants: userGrants,
  34. }
  35. }
  36. return s.writeJSON(w, usersResponse)
  37. }
  38. func (s *Server) handleUsersAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  39. req, err := readJSONWithLimit[apiUserAddRequest](r.Body, jsonBodyBytesLimit, false)
  40. if err != nil {
  41. return err
  42. } else if !user.AllowedUsername(req.Username) || req.Password == "" {
  43. return errHTTPBadRequest.Wrap("username invalid, or password missing")
  44. }
  45. u, err := s.userManager.User(req.Username)
  46. if err != nil && !errors.Is(err, user.ErrUserNotFound) {
  47. return err
  48. } else if u != nil {
  49. if req.Force == true {
  50. if err := s.userManager.ChangePassword(req.Username, req.Password); err != nil {
  51. return err
  52. }
  53. return s.writeJSON(w, newSuccessResponse())
  54. }
  55. return errHTTPConflictUserExists
  56. }
  57. var tier *user.Tier
  58. if req.Tier != "" {
  59. tier, err = s.userManager.Tier(req.Tier)
  60. if errors.Is(err, user.ErrTierNotFound) {
  61. return errHTTPBadRequestTierInvalid
  62. } else if err != nil {
  63. return err
  64. }
  65. }
  66. if err := s.userManager.AddUser(req.Username, req.Password, user.RoleUser); err != nil {
  67. return err
  68. }
  69. if tier != nil {
  70. if err := s.userManager.ChangeTier(req.Username, req.Tier); err != nil {
  71. return err
  72. }
  73. }
  74. return s.writeJSON(w, newSuccessResponse())
  75. }
  76. func (s *Server) handleUsersDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  77. req, err := readJSONWithLimit[apiUserDeleteRequest](r.Body, jsonBodyBytesLimit, false)
  78. if err != nil {
  79. return err
  80. }
  81. u, err := s.userManager.User(req.Username)
  82. if errors.Is(err, user.ErrUserNotFound) {
  83. return errHTTPBadRequestUserNotFound
  84. } else if err != nil {
  85. return err
  86. } else if !u.IsUser() {
  87. return errHTTPUnauthorized.Wrap("can only remove regular users from API")
  88. }
  89. if err := s.userManager.RemoveUser(req.Username); err != nil {
  90. return err
  91. }
  92. if err := s.killUserSubscriber(u, "*"); err != nil { // FIXME super inefficient
  93. return err
  94. }
  95. return s.writeJSON(w, newSuccessResponse())
  96. }
  97. func (s *Server) handleAccessAllow(w http.ResponseWriter, r *http.Request, v *visitor) error {
  98. req, err := readJSONWithLimit[apiAccessAllowRequest](r.Body, jsonBodyBytesLimit, false)
  99. if err != nil {
  100. return err
  101. }
  102. _, err = s.userManager.User(req.Username)
  103. if errors.Is(err, user.ErrUserNotFound) {
  104. return errHTTPBadRequestUserNotFound
  105. } else if err != nil {
  106. return err
  107. }
  108. permission, err := user.ParsePermission(req.Permission)
  109. if err != nil {
  110. return errHTTPBadRequestPermissionInvalid
  111. }
  112. if err := s.userManager.AllowAccess(req.Username, req.Topic, permission); err != nil {
  113. return err
  114. }
  115. return s.writeJSON(w, newSuccessResponse())
  116. }
  117. func (s *Server) handleAccessReset(w http.ResponseWriter, r *http.Request, v *visitor) error {
  118. req, err := readJSONWithLimit[apiAccessResetRequest](r.Body, jsonBodyBytesLimit, false)
  119. if err != nil {
  120. return err
  121. }
  122. u, err := s.userManager.User(req.Username)
  123. if err != nil {
  124. return err
  125. }
  126. if err := s.userManager.ResetAccess(req.Username, req.Topic); err != nil {
  127. return err
  128. }
  129. if err := s.killUserSubscriber(u, req.Topic); err != nil { // This may be a pattern
  130. return err
  131. }
  132. return s.writeJSON(w, newSuccessResponse())
  133. }
  134. func (s *Server) killUserSubscriber(u *user.User, topicPattern string) error {
  135. topics, err := s.topicsFromPattern(topicPattern)
  136. if err != nil {
  137. return err
  138. }
  139. for _, t := range topics {
  140. t.CancelSubscriberUser(u.ID)
  141. }
  142. return nil
  143. }