1
0

token.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227
  1. //go:build !noserver
  2. package cmd
  3. import (
  4. "errors"
  5. "fmt"
  6. "github.com/urfave/cli/v2"
  7. "heckel.io/ntfy/v2/user"
  8. "heckel.io/ntfy/v2/util"
  9. "net/netip"
  10. "time"
  11. )
  12. func init() {
  13. commands = append(commands, cmdToken)
  14. }
  15. var flagsToken = append([]cli.Flag{}, flagsUser...)
  16. var cmdToken = &cli.Command{
  17. Name: "token",
  18. Usage: "Create, list or delete user tokens",
  19. UsageText: "ntfy token [list|add|remove] ...",
  20. Flags: flagsToken,
  21. Before: initConfigFileInputSourceFunc("config", flagsToken, initLogFunc),
  22. Category: categoryServer,
  23. Subcommands: []*cli.Command{
  24. {
  25. Name: "add",
  26. Aliases: []string{"a"},
  27. Usage: "Create a new token",
  28. UsageText: "ntfy token add [--expires=<duration>] [--label=..] USERNAME",
  29. Action: execTokenAdd,
  30. Flags: []cli.Flag{
  31. &cli.StringFlag{Name: "expires", Aliases: []string{"e"}, Value: "", Usage: "token expires after"},
  32. &cli.StringFlag{Name: "label", Aliases: []string{"l"}, Value: "", Usage: "token label"},
  33. },
  34. Description: `Create a new user access token.
  35. User access tokens can be used to publish, subscribe, or perform any other user-specific tasks.
  36. Tokens have full access, and can perform any task a user can do. They are meant to be used to
  37. avoid spreading the password to various places.
  38. This is a server-only command. It directly reads from user.db as defined in the server config
  39. file server.yml. The command only works if 'auth-file' is properly defined.
  40. Examples:
  41. ntfy token add phil # Create token for user phil which never expires
  42. ntfy token add --expires=2d phil # Create token for user phil which expires in 2 days
  43. ntfy token add -e "tuesday, 8pm" phil # Create token for user phil which expires next Tuesday
  44. ntfy token add -l backups phil # Create token for user phil with label "backups"`,
  45. },
  46. {
  47. Name: "remove",
  48. Aliases: []string{"del", "rm"},
  49. Usage: "Removes a token",
  50. UsageText: "ntfy token remove USERNAME TOKEN",
  51. Action: execTokenDel,
  52. Description: `Remove a token from the ntfy user database.
  53. Example:
  54. ntfy token del phil tk_th2srHVlxrANQHAso5t0HuQ1J1TjN`,
  55. },
  56. {
  57. Name: "list",
  58. Aliases: []string{"l"},
  59. Usage: "Shows a list of tokens",
  60. Action: execTokenList,
  61. Description: `Shows a list of all tokens.
  62. This is a server-only command. It directly reads from user.db as defined in the server config
  63. file server.yml. The command only works if 'auth-file' is properly defined.`,
  64. },
  65. {
  66. Name: "generate",
  67. Usage: "Generates a random token",
  68. Action: execTokenGenerate,
  69. Description: `Randomly generate a token to be used in provisioned tokens.
  70. This command only generates the token value, but does not persist it anywhere.
  71. The output can be used in the 'auth-tokens' config option.`,
  72. },
  73. },
  74. Description: `Manage access tokens for individual users.
  75. User access tokens can be used to publish, subscribe, or perform any other user-specific tasks.
  76. Tokens have full access, and can perform any task a user can do. They are meant to be used to
  77. avoid spreading the password to various places.
  78. This is a server-only command. It directly manages the user.db as defined in the server config
  79. file server.yml. The command only works if 'auth-file' is properly defined.
  80. Examples:
  81. ntfy token list # Shows list of tokens for all users
  82. ntfy token list phil # Shows list of tokens for user phil
  83. ntfy token add phil # Create token for user phil which never expires
  84. ntfy token add --expires=2d phil # Create token for user phil which expires in 2 days
  85. ntfy token remove phil tk_th2srHVlxr... # Delete token`,
  86. }
  87. func execTokenAdd(c *cli.Context) error {
  88. username := c.Args().Get(0)
  89. expiresStr := c.String("expires")
  90. label := c.String("label")
  91. if username == "" {
  92. return errors.New("username expected, type 'ntfy token add --help' for help")
  93. } else if username == userEveryone || username == user.Everyone {
  94. return errors.New("username not allowed")
  95. }
  96. expires := time.Unix(0, 0)
  97. if expiresStr != "" {
  98. var err error
  99. expires, err = util.ParseFutureTime(expiresStr, time.Now())
  100. if err != nil {
  101. return err
  102. }
  103. }
  104. manager, err := createUserManager(c)
  105. if err != nil {
  106. return err
  107. }
  108. u, err := manager.User(username)
  109. if errors.Is(err, user.ErrUserNotFound) {
  110. return fmt.Errorf("user %s does not exist", username)
  111. } else if err != nil {
  112. return err
  113. }
  114. token, err := manager.CreateToken(u.ID, label, expires, netip.IPv4Unspecified(), false)
  115. if err != nil {
  116. return err
  117. }
  118. if expires.Unix() == 0 {
  119. fmt.Fprintf(c.App.ErrWriter, "token %s created for user %s, never expires\n", token.Value, u.Name)
  120. } else {
  121. fmt.Fprintf(c.App.ErrWriter, "token %s created for user %s, expires %v\n", token.Value, u.Name, expires.Format(time.UnixDate))
  122. }
  123. return nil
  124. }
  125. func execTokenDel(c *cli.Context) error {
  126. username, token := c.Args().Get(0), c.Args().Get(1)
  127. if username == "" || token == "" {
  128. return errors.New("username and token expected, type 'ntfy token remove --help' for help")
  129. } else if username == userEveryone || username == user.Everyone {
  130. return errors.New("username not allowed")
  131. }
  132. manager, err := createUserManager(c)
  133. if err != nil {
  134. return err
  135. }
  136. u, err := manager.User(username)
  137. if errors.Is(err, user.ErrUserNotFound) {
  138. return fmt.Errorf("user %s does not exist", username)
  139. } else if err != nil {
  140. return err
  141. }
  142. if err := manager.RemoveToken(u.ID, token); err != nil {
  143. return err
  144. }
  145. fmt.Fprintf(c.App.ErrWriter, "token %s for user %s removed\n", token, username)
  146. return nil
  147. }
  148. func execTokenList(c *cli.Context) error {
  149. username := c.Args().Get(0)
  150. if username == userEveryone || username == user.Everyone {
  151. return errors.New("username not allowed")
  152. }
  153. manager, err := createUserManager(c)
  154. if err != nil {
  155. return err
  156. }
  157. var users []*user.User
  158. if username != "" {
  159. u, err := manager.User(username)
  160. if errors.Is(err, user.ErrUserNotFound) {
  161. return fmt.Errorf("user %s does not exist", username)
  162. } else if err != nil {
  163. return err
  164. }
  165. users = append(users, u)
  166. } else {
  167. users, err = manager.Users()
  168. if err != nil {
  169. return err
  170. }
  171. }
  172. usersWithTokens := 0
  173. for _, u := range users {
  174. tokens, err := manager.Tokens(u.ID)
  175. if err != nil {
  176. return err
  177. } else if len(tokens) == 0 && username != "" {
  178. fmt.Fprintf(c.App.ErrWriter, "user %s has no access tokens\n", username)
  179. return nil
  180. } else if len(tokens) == 0 {
  181. continue
  182. }
  183. usersWithTokens++
  184. fmt.Fprintf(c.App.ErrWriter, "user %s\n", u.Name)
  185. for _, t := range tokens {
  186. var label, expires, provisioned string
  187. if t.Label != "" {
  188. label = fmt.Sprintf(" (%s)", t.Label)
  189. }
  190. if t.Expires.Unix() == 0 {
  191. expires = "never expires"
  192. } else {
  193. expires = fmt.Sprintf("expires %s", t.Expires.Format(time.RFC822))
  194. }
  195. if t.Provisioned {
  196. provisioned = " (server config)"
  197. }
  198. fmt.Fprintf(c.App.ErrWriter, "- %s%s, %s, accessed from %s at %s%s\n", t.Value, label, expires, t.LastOrigin.String(), t.LastAccess.Format(time.RFC822), provisioned)
  199. }
  200. }
  201. if usersWithTokens == 0 {
  202. fmt.Fprintf(c.App.ErrWriter, "no users with tokens\n")
  203. }
  204. return nil
  205. }
  206. func execTokenGenerate(c *cli.Context) error {
  207. fmt.Fprintln(c.App.Writer, user.GenerateToken())
  208. return nil
  209. }