server_admin.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203
  1. package server
  2. import (
  3. "errors"
  4. "heckel.io/ntfy/v2/user"
  5. "net/http"
  6. )
  7. func (s *Server) handleVersion(w http.ResponseWriter, r *http.Request, v *visitor) error {
  8. return s.writeJSON(w, &apiVersionResponse{
  9. Version: s.config.BuildVersion,
  10. Commit: s.config.BuildCommit,
  11. Date: s.config.BuildDate,
  12. })
  13. }
  14. func (s *Server) handleUsersGet(w http.ResponseWriter, r *http.Request, v *visitor) error {
  15. users, err := s.userManager.Users()
  16. if err != nil {
  17. return err
  18. }
  19. grants, err := s.userManager.AllGrants()
  20. if err != nil {
  21. return err
  22. }
  23. usersResponse := make([]*apiUserResponse, len(users))
  24. for i, u := range users {
  25. tier := ""
  26. if u.Tier != nil {
  27. tier = u.Tier.Code
  28. }
  29. userGrants := make([]*apiUserGrantResponse, len(grants[u.ID]))
  30. for i, g := range grants[u.ID] {
  31. userGrants[i] = &apiUserGrantResponse{
  32. Topic: g.TopicPattern,
  33. Permission: g.Permission.String(),
  34. }
  35. }
  36. usersResponse[i] = &apiUserResponse{
  37. Username: u.Name,
  38. Role: string(u.Role),
  39. Tier: tier,
  40. Grants: userGrants,
  41. }
  42. }
  43. return s.writeJSON(w, usersResponse)
  44. }
  45. func (s *Server) handleUsersAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  46. req, err := readJSONWithLimit[apiUserAddOrUpdateRequest](r.Body, jsonBodyBytesLimit, false)
  47. if err != nil {
  48. return err
  49. } else if !user.AllowedUsername(req.Username) || (req.Password == "" && req.Hash == "") {
  50. return errHTTPBadRequest.Wrap("username invalid, or password/password_hash missing")
  51. }
  52. u, err := s.userManager.User(req.Username)
  53. if err != nil && !errors.Is(err, user.ErrUserNotFound) {
  54. return err
  55. } else if u != nil {
  56. return errHTTPConflictUserExists
  57. }
  58. var tier *user.Tier
  59. if req.Tier != "" {
  60. tier, err = s.userManager.Tier(req.Tier)
  61. if errors.Is(err, user.ErrTierNotFound) {
  62. return errHTTPBadRequestTierInvalid
  63. } else if err != nil {
  64. return err
  65. }
  66. }
  67. password, hashed := req.Password, false
  68. if req.Hash != "" {
  69. password, hashed = req.Hash, true
  70. }
  71. if err := s.userManager.AddUser(req.Username, password, user.RoleUser, hashed); err != nil {
  72. return err
  73. }
  74. if tier != nil {
  75. if err := s.userManager.ChangeTier(req.Username, req.Tier); err != nil {
  76. return err
  77. }
  78. }
  79. return s.writeJSON(w, newSuccessResponse())
  80. }
  81. func (s *Server) handleUsersUpdate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  82. req, err := readJSONWithLimit[apiUserAddOrUpdateRequest](r.Body, jsonBodyBytesLimit, false)
  83. if err != nil {
  84. return err
  85. } else if !user.AllowedUsername(req.Username) {
  86. return errHTTPBadRequest.Wrap("username invalid")
  87. } else if req.Password == "" && req.Hash == "" && req.Tier == "" {
  88. return errHTTPBadRequest.Wrap("need to provide at least one of \"password\", \"password_hash\" or \"tier\"")
  89. }
  90. u, err := s.userManager.User(req.Username)
  91. if err != nil && !errors.Is(err, user.ErrUserNotFound) {
  92. return err
  93. } else if u != nil {
  94. if u.IsAdmin() {
  95. return errHTTPForbidden
  96. }
  97. if req.Hash != "" {
  98. if err := s.userManager.ChangePassword(req.Username, req.Hash, true); err != nil {
  99. return err
  100. }
  101. } else if req.Password != "" {
  102. if err := s.userManager.ChangePassword(req.Username, req.Password, false); err != nil {
  103. return err
  104. }
  105. }
  106. } else {
  107. password, hashed := req.Password, false
  108. if req.Hash != "" {
  109. password, hashed = req.Hash, true
  110. }
  111. if err := s.userManager.AddUser(req.Username, password, user.RoleUser, hashed); err != nil {
  112. return err
  113. }
  114. }
  115. if req.Tier != "" {
  116. if _, err = s.userManager.Tier(req.Tier); errors.Is(err, user.ErrTierNotFound) {
  117. return errHTTPBadRequestTierInvalid
  118. } else if err != nil {
  119. return err
  120. }
  121. if err := s.userManager.ChangeTier(req.Username, req.Tier); err != nil {
  122. return err
  123. }
  124. }
  125. return s.writeJSON(w, newSuccessResponse())
  126. }
  127. func (s *Server) handleUsersDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  128. req, err := readJSONWithLimit[apiUserDeleteRequest](r.Body, jsonBodyBytesLimit, false)
  129. if err != nil {
  130. return err
  131. }
  132. u, err := s.userManager.User(req.Username)
  133. if errors.Is(err, user.ErrUserNotFound) {
  134. return errHTTPBadRequestUserNotFound
  135. } else if err != nil {
  136. return err
  137. } else if !u.IsUser() {
  138. return errHTTPUnauthorized.Wrap("can only remove regular users from API")
  139. }
  140. if err := s.userManager.RemoveUser(req.Username); err != nil {
  141. return err
  142. }
  143. if err := s.killUserSubscriber(u, "*"); err != nil { // FIXME super inefficient
  144. return err
  145. }
  146. return s.writeJSON(w, newSuccessResponse())
  147. }
  148. func (s *Server) handleAccessAllow(w http.ResponseWriter, r *http.Request, v *visitor) error {
  149. req, err := readJSONWithLimit[apiAccessAllowRequest](r.Body, jsonBodyBytesLimit, false)
  150. if err != nil {
  151. return err
  152. }
  153. _, err = s.userManager.User(req.Username)
  154. if errors.Is(err, user.ErrUserNotFound) {
  155. return errHTTPBadRequestUserNotFound
  156. } else if err != nil {
  157. return err
  158. }
  159. permission, err := user.ParsePermission(req.Permission)
  160. if err != nil {
  161. return errHTTPBadRequestPermissionInvalid
  162. }
  163. if err := s.userManager.AllowAccess(req.Username, req.Topic, permission); err != nil {
  164. return err
  165. }
  166. return s.writeJSON(w, newSuccessResponse())
  167. }
  168. func (s *Server) handleAccessReset(w http.ResponseWriter, r *http.Request, v *visitor) error {
  169. req, err := readJSONWithLimit[apiAccessResetRequest](r.Body, jsonBodyBytesLimit, false)
  170. if err != nil {
  171. return err
  172. }
  173. u, err := s.userManager.User(req.Username)
  174. if err != nil {
  175. return err
  176. }
  177. if err := s.userManager.ResetAccess(req.Username, req.Topic); err != nil {
  178. return err
  179. }
  180. if err := s.killUserSubscriber(u, req.Topic); err != nil { // This may be a pattern
  181. return err
  182. }
  183. return s.writeJSON(w, newSuccessResponse())
  184. }
  185. func (s *Server) killUserSubscriber(u *user.User, topicPattern string) error {
  186. topics, err := s.topicsFromPattern(topicPattern)
  187. if err != nil {
  188. return err
  189. }
  190. for _, t := range topics {
  191. t.CancelSubscriberUser(u.ID)
  192. }
  193. return nil
  194. }