| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437 |
- package server
- import (
- "encoding/json"
- "github.com/stretchr/testify/require"
- "heckel.io/ntfy/v2/user"
- "heckel.io/ntfy/v2/util"
- "sync/atomic"
- "testing"
- "time"
- )
- func TestVersion_Admin(t *testing.T) {
- c := newTestConfigWithAuthFile(t)
- c.BuildVersion = "1.2.3"
- c.BuildCommit = "abcdef0"
- c.BuildDate = "2026-02-08T00:00:00Z"
- s := newTestServer(t, c)
- defer s.closeDatabases()
- // Create admin and regular user
- require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin, false))
- require.Nil(t, s.userManager.AddUser("ben", "ben", user.RoleUser, false))
- // Admin can access /v1/version
- rr := request(t, s, "GET", "/v1/version", "", map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- var versionResponse apiVersionResponse
- require.Nil(t, json.NewDecoder(rr.Body).Decode(&versionResponse))
- require.Equal(t, "1.2.3", versionResponse.Version)
- require.Equal(t, "abcdef0", versionResponse.Commit)
- require.Equal(t, "2026-02-08T00:00:00Z", versionResponse.Date)
- // Non-admin user cannot access /v1/version
- rr = request(t, s, "GET", "/v1/version", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 401, rr.Code)
- // Unauthenticated user cannot access /v1/version
- rr = request(t, s, "GET", "/v1/version", "", nil)
- require.Equal(t, 401, rr.Code)
- }
- func TestUser_AddRemove(t *testing.T) {
- s := newTestServer(t, newTestConfigWithAuthFile(t))
- defer s.closeDatabases()
- // Create admin, tier
- require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin, false))
- require.Nil(t, s.userManager.AddTier(&user.Tier{
- Code: "tier1",
- }))
- // Create user via API
- rr := request(t, s, "POST", "/v1/users", `{"username": "ben", "password":"ben"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Create user with tier via API
- rr = request(t, s, "PUT", "/v1/users", `{"username": "emma", "password":"emma", "tier": "tier1"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Check users
- users, err := s.userManager.Users()
- require.Nil(t, err)
- require.Equal(t, 4, len(users))
- require.Equal(t, "phil", users[0].Name)
- require.Equal(t, "ben", users[1].Name)
- require.Equal(t, user.RoleUser, users[1].Role)
- require.Nil(t, users[1].Tier)
- require.Equal(t, "emma", users[2].Name)
- require.Equal(t, user.RoleUser, users[2].Role)
- require.Equal(t, "tier1", users[2].Tier.Code)
- require.Equal(t, user.Everyone, users[3].Name)
- // Delete user via API
- rr = request(t, s, "DELETE", "/v1/users", `{"username": "ben"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Check user was deleted
- users, err = s.userManager.Users()
- require.Nil(t, err)
- require.Equal(t, 3, len(users))
- require.Equal(t, "phil", users[0].Name)
- require.Equal(t, "emma", users[1].Name)
- require.Equal(t, user.Everyone, users[2].Name)
- // Reject invalid user change
- rr = request(t, s, "PUT", "/v1/users", `{"username": "ben"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 400, rr.Code)
- }
- func TestUser_AddWithPasswordHash(t *testing.T) {
- s := newTestServer(t, newTestConfigWithAuthFile(t))
- defer s.closeDatabases()
- // Create admin
- require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin, false))
- // Create user via API
- rr := request(t, s, "POST", "/v1/users", `{"username": "ben", "hash":"$2a$04$2aPIIqPXQU16OfkSUZH1XOzpu1gsPRKkrfVdFLgWQ.tqb.vtTCuVe"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Check that user can login with password
- rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 200, rr.Code)
- // Check users
- users, err := s.userManager.Users()
- require.Nil(t, err)
- require.Equal(t, 3, len(users))
- require.Equal(t, "phil", users[0].Name)
- require.Equal(t, user.RoleAdmin, users[0].Role)
- require.Equal(t, "ben", users[1].Name)
- require.Equal(t, user.RoleUser, users[1].Role)
- }
- func TestUser_ChangeUserPassword(t *testing.T) {
- s := newTestServer(t, newTestConfigWithAuthFile(t))
- defer s.closeDatabases()
- // Create admin
- require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin, false))
- // Create user via API
- rr := request(t, s, "POST", "/v1/users", `{"username": "ben", "password": "ben"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Try to login with first password
- rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 200, rr.Code)
- // Change password via API
- rr = request(t, s, "PUT", "/v1/users", `{"username": "ben", "password": "ben-two"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Make sure first password fails
- rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 401, rr.Code)
- // Try to login with second password
- rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben-two"),
- })
- require.Equal(t, 200, rr.Code)
- }
- func TestUser_ChangeUserTier(t *testing.T) {
- s := newTestServer(t, newTestConfigWithAuthFile(t))
- defer s.closeDatabases()
- // Create admin, tier
- require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin, false))
- require.Nil(t, s.userManager.AddTier(&user.Tier{
- Code: "tier1",
- }))
- require.Nil(t, s.userManager.AddTier(&user.Tier{
- Code: "tier2",
- }))
- // Create user with tier via API
- rr := request(t, s, "POST", "/v1/users", `{"username": "ben", "password":"ben", "tier": "tier1"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Check users
- users, err := s.userManager.Users()
- require.Nil(t, err)
- require.Equal(t, 3, len(users))
- require.Equal(t, "phil", users[0].Name)
- require.Equal(t, "ben", users[1].Name)
- require.Equal(t, user.RoleUser, users[1].Role)
- require.Equal(t, "tier1", users[1].Tier.Code)
- // Change user tier via API
- rr = request(t, s, "PUT", "/v1/users", `{"username": "ben", "tier": "tier2"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Check users again
- users, err = s.userManager.Users()
- require.Nil(t, err)
- require.Equal(t, "tier2", users[1].Tier.Code)
- }
- func TestUser_ChangeUserPasswordAndTier(t *testing.T) {
- s := newTestServer(t, newTestConfigWithAuthFile(t))
- defer s.closeDatabases()
- // Create admin, tier
- require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin, false))
- require.Nil(t, s.userManager.AddTier(&user.Tier{
- Code: "tier1",
- }))
- require.Nil(t, s.userManager.AddTier(&user.Tier{
- Code: "tier2",
- }))
- // Create user with tier via API
- rr := request(t, s, "POST", "/v1/users", `{"username": "ben", "password":"ben", "tier": "tier1"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Check users
- users, err := s.userManager.Users()
- require.Nil(t, err)
- require.Equal(t, 3, len(users))
- require.Equal(t, "phil", users[0].Name)
- require.Equal(t, "ben", users[1].Name)
- require.Equal(t, user.RoleUser, users[1].Role)
- require.Equal(t, "tier1", users[1].Tier.Code)
- // Change user password and tier via API
- rr = request(t, s, "PUT", "/v1/users", `{"username": "ben", "password":"ben-two", "tier": "tier2"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Make sure first password fails
- rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 401, rr.Code)
- // Try to login with second password
- rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben-two"),
- })
- require.Equal(t, 200, rr.Code)
- // Check new tier
- users, err = s.userManager.Users()
- require.Nil(t, err)
- require.Equal(t, "tier2", users[1].Tier.Code)
- }
- func TestUser_ChangeUserPasswordWithHash(t *testing.T) {
- s := newTestServer(t, newTestConfigWithAuthFile(t))
- defer s.closeDatabases()
- // Create admin
- require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin, false))
- // Create user with tier via API
- rr := request(t, s, "POST", "/v1/users", `{"username": "ben", "password":"not-ben"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Try to login with first password
- rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "not-ben"),
- })
- require.Equal(t, 200, rr.Code)
- // Change user password and tier via API
- rr = request(t, s, "PUT", "/v1/users", `{"username": "ben", "hash":"$2a$04$2aPIIqPXQU16OfkSUZH1XOzpu1gsPRKkrfVdFLgWQ.tqb.vtTCuVe"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Try to login with second password
- rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 200, rr.Code)
- }
- func TestUser_DontChangeAdminPassword(t *testing.T) {
- s := newTestServer(t, newTestConfigWithAuthFile(t))
- defer s.closeDatabases()
- // Create admin
- require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin, false))
- require.Nil(t, s.userManager.AddUser("admin", "admin", user.RoleAdmin, false))
- // Try to change password via API
- rr := request(t, s, "PUT", "/v1/users", `{"username": "admin", "password": "admin-new"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 403, rr.Code)
- }
- func TestUser_AddRemove_Failures(t *testing.T) {
- s := newTestServer(t, newTestConfigWithAuthFile(t))
- defer s.closeDatabases()
- // Create admin
- require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin, false))
- require.Nil(t, s.userManager.AddUser("ben", "ben", user.RoleUser, false))
- // Cannot create user with invalid username
- rr := request(t, s, "POST", "/v1/users", `{"username": "not valid", "password":"ben"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 400, rr.Code)
- // Cannot create user if user already exists
- rr = request(t, s, "POST", "/v1/users", `{"username": "phil", "password":"phil"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 40901, toHTTPError(t, rr.Body.String()).Code)
- // Cannot create user with invalid tier
- rr = request(t, s, "POST", "/v1/users", `{"username": "emma", "password":"emma", "tier": "invalid"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 40030, toHTTPError(t, rr.Body.String()).Code)
- // Cannot delete user as non-admin
- rr = request(t, s, "DELETE", "/v1/users", `{"username": "ben"}`, map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 401, rr.Code)
- // Delete user via API
- rr = request(t, s, "DELETE", "/v1/users", `{"username": "ben"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- }
- func TestAccess_AllowReset(t *testing.T) {
- c := newTestConfigWithAuthFile(t)
- c.AuthDefault = user.PermissionDenyAll
- s := newTestServer(t, c)
- defer s.closeDatabases()
- // User and admin
- require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin, false))
- require.Nil(t, s.userManager.AddUser("ben", "ben", user.RoleUser, false))
- // Subscribing not allowed
- rr := request(t, s, "GET", "/gold/json?poll=1", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 403, rr.Code)
- // Grant access
- rr = request(t, s, "POST", "/v1/users/access", `{"username": "ben", "topic":"gold", "permission":"ro"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Now subscribing is allowed
- rr = request(t, s, "GET", "/gold/json?poll=1", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 200, rr.Code)
- // Reset access
- rr = request(t, s, "DELETE", "/v1/users/access", `{"username": "ben", "topic":"gold"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Subscribing not allowed (again)
- rr = request(t, s, "GET", "/gold/json?poll=1", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 403, rr.Code)
- }
- func TestAccess_AllowReset_NonAdminAttempt(t *testing.T) {
- c := newTestConfigWithAuthFile(t)
- c.AuthDefault = user.PermissionDenyAll
- s := newTestServer(t, c)
- defer s.closeDatabases()
- // User
- require.Nil(t, s.userManager.AddUser("ben", "ben", user.RoleUser, false))
- // Grant access fails, because non-admin
- rr := request(t, s, "POST", "/v1/users/access", `{"username": "ben", "topic":"gold", "permission":"ro"}`, map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 401, rr.Code)
- }
- func TestAccess_AllowReset_KillConnection(t *testing.T) {
- c := newTestConfigWithAuthFile(t)
- c.AuthDefault = user.PermissionDenyAll
- s := newTestServer(t, c)
- defer s.closeDatabases()
- // User and admin, grant access to "gol*" topics
- require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin, false))
- require.Nil(t, s.userManager.AddUser("ben", "ben", user.RoleUser, false))
- require.Nil(t, s.userManager.AllowAccess("ben", "gol*", user.PermissionRead)) // Wildcard!
- start, timeTaken := time.Now(), atomic.Int64{}
- go func() {
- rr := request(t, s, "GET", "/gold/json", "", map[string]string{
- "Authorization": util.BasicAuth("ben", "ben"),
- })
- require.Equal(t, 200, rr.Code)
- timeTaken.Store(time.Since(start).Milliseconds())
- }()
- time.Sleep(500 * time.Millisecond)
- // Reset access
- rr := request(t, s, "DELETE", "/v1/users/access", `{"username": "ben", "topic":"gol*"}`, map[string]string{
- "Authorization": util.BasicAuth("phil", "phil"),
- })
- require.Equal(t, 200, rr.Code)
- // Wait for connection to be killed; this will fail if the connection is never killed
- waitFor(t, func() bool {
- return timeTaken.Load() >= 500
- })
- }
|