server_account.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432
  1. package server
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "heckel.io/ntfy/log"
  6. "heckel.io/ntfy/user"
  7. "heckel.io/ntfy/util"
  8. "net/http"
  9. "strings"
  10. )
  11. const (
  12. subscriptionIDLength = 16
  13. syncTopicAccountSyncEvent = "sync"
  14. )
  15. func (s *Server) handleAccountCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  16. admin := v.user != nil && v.user.Role == user.RoleAdmin
  17. if !admin {
  18. if !s.config.EnableSignup {
  19. return errHTTPBadRequestSignupNotEnabled
  20. } else if v.user != nil {
  21. return errHTTPUnauthorized // Cannot create account from user context
  22. }
  23. }
  24. newAccount, err := readJSONWithLimit[apiAccountCreateRequest](r.Body, jsonBodyBytesLimit)
  25. if err != nil {
  26. return err
  27. }
  28. if existingUser, _ := s.userManager.User(newAccount.Username); existingUser != nil {
  29. return errHTTPConflictUserExists
  30. }
  31. if v.accountLimiter != nil && !v.accountLimiter.Allow() {
  32. return errHTTPTooManyRequestsLimitAccountCreation
  33. }
  34. if err := s.userManager.AddUser(newAccount.Username, newAccount.Password, user.RoleUser); err != nil { // TODO this should return a User
  35. return err
  36. }
  37. return s.writeJSON(w, newSuccessResponse())
  38. }
  39. func (s *Server) handleAccountGet(w http.ResponseWriter, _ *http.Request, v *visitor) error {
  40. info, err := v.Info()
  41. if err != nil {
  42. return err
  43. }
  44. limits, stats := info.Limits, info.Stats
  45. response := &apiAccountResponse{
  46. Limits: &apiAccountLimits{
  47. Basis: string(limits.Basis),
  48. Messages: limits.MessagesLimit,
  49. MessagesExpiryDuration: int64(limits.MessagesExpiryDuration.Seconds()),
  50. Emails: limits.EmailsLimit,
  51. Reservations: limits.ReservationsLimit,
  52. AttachmentTotalSize: limits.AttachmentTotalSizeLimit,
  53. AttachmentFileSize: limits.AttachmentFileSizeLimit,
  54. AttachmentExpiryDuration: int64(limits.AttachmentExpiryDuration.Seconds()),
  55. },
  56. Stats: &apiAccountStats{
  57. Messages: stats.Messages,
  58. MessagesRemaining: stats.MessagesRemaining,
  59. Emails: stats.Emails,
  60. EmailsRemaining: stats.EmailsRemaining,
  61. Reservations: stats.Reservations,
  62. ReservationsRemaining: stats.ReservationsRemaining,
  63. AttachmentTotalSize: stats.AttachmentTotalSize,
  64. AttachmentTotalSizeRemaining: stats.AttachmentTotalSizeRemaining,
  65. },
  66. }
  67. if v.user != nil {
  68. response.Username = v.user.Name
  69. response.Role = string(v.user.Role)
  70. response.SyncTopic = v.user.SyncTopic
  71. if v.user.Prefs != nil {
  72. if v.user.Prefs.Language != "" {
  73. response.Language = v.user.Prefs.Language
  74. }
  75. if v.user.Prefs.Notification != nil {
  76. response.Notification = v.user.Prefs.Notification
  77. }
  78. if v.user.Prefs.Subscriptions != nil {
  79. response.Subscriptions = v.user.Prefs.Subscriptions
  80. }
  81. }
  82. if v.user.Tier != nil {
  83. response.Tier = &apiAccountTier{
  84. Code: v.user.Tier.Code,
  85. Name: v.user.Tier.Name,
  86. }
  87. }
  88. if v.user.Billing.StripeCustomerID != "" {
  89. response.Billing = &apiAccountBilling{
  90. Customer: true,
  91. Subscription: v.user.Billing.StripeSubscriptionID != "",
  92. Status: string(v.user.Billing.StripeSubscriptionStatus),
  93. PaidUntil: v.user.Billing.StripeSubscriptionPaidUntil.Unix(),
  94. CancelAt: v.user.Billing.StripeSubscriptionCancelAt.Unix(),
  95. }
  96. }
  97. reservations, err := s.userManager.Reservations(v.user.Name)
  98. if err != nil {
  99. return err
  100. }
  101. if len(reservations) > 0 {
  102. response.Reservations = make([]*apiAccountReservation, 0)
  103. for _, r := range reservations {
  104. response.Reservations = append(response.Reservations, &apiAccountReservation{
  105. Topic: r.Topic,
  106. Everyone: r.Everyone.String(),
  107. })
  108. }
  109. }
  110. } else {
  111. response.Username = user.Everyone
  112. response.Role = string(user.RoleAnonymous)
  113. }
  114. return s.writeJSON(w, response)
  115. }
  116. func (s *Server) handleAccountDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  117. req, err := readJSONWithLimit[apiAccountDeleteRequest](r.Body, jsonBodyBytesLimit)
  118. if err != nil {
  119. return err
  120. } else if req.Password == "" {
  121. return errHTTPBadRequest
  122. }
  123. if _, err := s.userManager.Authenticate(v.user.Name, req.Password); err != nil {
  124. return errHTTPBadRequestIncorrectPasswordConfirmation
  125. }
  126. if v.user.Billing.StripeSubscriptionID != "" {
  127. log.Info("%s Canceling billing subscription %s", logHTTPPrefix(v, r), v.user.Billing.StripeSubscriptionID)
  128. if _, err := s.stripe.CancelSubscription(v.user.Billing.StripeSubscriptionID); err != nil {
  129. return err
  130. }
  131. }
  132. if err := s.maybeRemoveMessagesAndExcessReservations(logHTTPPrefix(v, r), v.user, 0); err != nil {
  133. return err
  134. }
  135. log.Info("%s Marking user %s as deleted", logHTTPPrefix(v, r), v.user.Name)
  136. if err := s.userManager.MarkUserRemoved(v.user); err != nil {
  137. return err
  138. }
  139. return s.writeJSON(w, newSuccessResponse())
  140. }
  141. func (s *Server) handleAccountPasswordChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  142. req, err := readJSONWithLimit[apiAccountPasswordChangeRequest](r.Body, jsonBodyBytesLimit)
  143. if err != nil {
  144. return err
  145. } else if req.Password == "" || req.NewPassword == "" {
  146. return errHTTPBadRequest
  147. }
  148. if _, err := s.userManager.Authenticate(v.user.Name, req.Password); err != nil {
  149. return errHTTPBadRequestIncorrectPasswordConfirmation
  150. }
  151. if err := s.userManager.ChangePassword(v.user.Name, req.NewPassword); err != nil {
  152. return err
  153. }
  154. return s.writeJSON(w, newSuccessResponse())
  155. }
  156. func (s *Server) handleAccountTokenIssue(w http.ResponseWriter, _ *http.Request, v *visitor) error {
  157. // TODO rate limit
  158. token, err := s.userManager.CreateToken(v.user)
  159. if err != nil {
  160. return err
  161. }
  162. response := &apiAccountTokenResponse{
  163. Token: token.Value,
  164. Expires: token.Expires.Unix(),
  165. }
  166. return s.writeJSON(w, response)
  167. }
  168. func (s *Server) handleAccountTokenExtend(w http.ResponseWriter, _ *http.Request, v *visitor) error {
  169. // TODO rate limit
  170. if v.user == nil {
  171. return errHTTPUnauthorized
  172. } else if v.user.Token == "" {
  173. return errHTTPBadRequestNoTokenProvided
  174. }
  175. token, err := s.userManager.ExtendToken(v.user)
  176. if err != nil {
  177. return err
  178. }
  179. response := &apiAccountTokenResponse{
  180. Token: token.Value,
  181. Expires: token.Expires.Unix(),
  182. }
  183. return s.writeJSON(w, response)
  184. }
  185. func (s *Server) handleAccountTokenDelete(w http.ResponseWriter, _ *http.Request, v *visitor) error {
  186. // TODO rate limit
  187. if v.user.Token == "" {
  188. return errHTTPBadRequestNoTokenProvided
  189. }
  190. if err := s.userManager.RemoveToken(v.user); err != nil {
  191. return err
  192. }
  193. return s.writeJSON(w, newSuccessResponse())
  194. }
  195. func (s *Server) handleAccountSettingsChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  196. newPrefs, err := readJSONWithLimit[user.Prefs](r.Body, jsonBodyBytesLimit)
  197. if err != nil {
  198. return err
  199. }
  200. if v.user.Prefs == nil {
  201. v.user.Prefs = &user.Prefs{}
  202. }
  203. prefs := v.user.Prefs
  204. if newPrefs.Language != "" {
  205. prefs.Language = newPrefs.Language
  206. }
  207. if newPrefs.Notification != nil {
  208. if prefs.Notification == nil {
  209. prefs.Notification = &user.NotificationPrefs{}
  210. }
  211. if newPrefs.Notification.DeleteAfter > 0 {
  212. prefs.Notification.DeleteAfter = newPrefs.Notification.DeleteAfter
  213. }
  214. if newPrefs.Notification.Sound != "" {
  215. prefs.Notification.Sound = newPrefs.Notification.Sound
  216. }
  217. if newPrefs.Notification.MinPriority > 0 {
  218. prefs.Notification.MinPriority = newPrefs.Notification.MinPriority
  219. }
  220. }
  221. if err := s.userManager.ChangeSettings(v.user); err != nil {
  222. return err
  223. }
  224. return s.writeJSON(w, newSuccessResponse())
  225. }
  226. func (s *Server) handleAccountSubscriptionAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  227. newSubscription, err := readJSONWithLimit[user.Subscription](r.Body, jsonBodyBytesLimit)
  228. if err != nil {
  229. return err
  230. }
  231. if v.user.Prefs == nil {
  232. v.user.Prefs = &user.Prefs{}
  233. }
  234. newSubscription.ID = "" // Client cannot set ID
  235. for _, subscription := range v.user.Prefs.Subscriptions {
  236. if newSubscription.BaseURL == subscription.BaseURL && newSubscription.Topic == subscription.Topic {
  237. newSubscription = subscription
  238. break
  239. }
  240. }
  241. if newSubscription.ID == "" {
  242. newSubscription.ID = util.RandomString(subscriptionIDLength)
  243. v.user.Prefs.Subscriptions = append(v.user.Prefs.Subscriptions, newSubscription)
  244. if err := s.userManager.ChangeSettings(v.user); err != nil {
  245. return err
  246. }
  247. }
  248. return s.writeJSON(w, newSubscription)
  249. }
  250. func (s *Server) handleAccountSubscriptionChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  251. matches := apiAccountSubscriptionSingleRegex.FindStringSubmatch(r.URL.Path)
  252. if len(matches) != 2 {
  253. return errHTTPInternalErrorInvalidPath
  254. }
  255. subscriptionID := matches[1]
  256. updatedSubscription, err := readJSONWithLimit[user.Subscription](r.Body, jsonBodyBytesLimit)
  257. if err != nil {
  258. return err
  259. }
  260. if v.user.Prefs == nil || v.user.Prefs.Subscriptions == nil {
  261. return errHTTPNotFound
  262. }
  263. var subscription *user.Subscription
  264. for _, sub := range v.user.Prefs.Subscriptions {
  265. if sub.ID == subscriptionID {
  266. sub.DisplayName = updatedSubscription.DisplayName
  267. subscription = sub
  268. break
  269. }
  270. }
  271. if subscription == nil {
  272. return errHTTPNotFound
  273. }
  274. if err := s.userManager.ChangeSettings(v.user); err != nil {
  275. return err
  276. }
  277. return s.writeJSON(w, subscription)
  278. }
  279. func (s *Server) handleAccountSubscriptionDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  280. matches := apiAccountSubscriptionSingleRegex.FindStringSubmatch(r.URL.Path)
  281. if len(matches) != 2 {
  282. return errHTTPInternalErrorInvalidPath
  283. }
  284. subscriptionID := matches[1]
  285. if v.user.Prefs == nil || v.user.Prefs.Subscriptions == nil {
  286. return nil
  287. }
  288. newSubscriptions := make([]*user.Subscription, 0)
  289. for _, subscription := range v.user.Prefs.Subscriptions {
  290. if subscription.ID != subscriptionID {
  291. newSubscriptions = append(newSubscriptions, subscription)
  292. }
  293. }
  294. if len(newSubscriptions) < len(v.user.Prefs.Subscriptions) {
  295. v.user.Prefs.Subscriptions = newSubscriptions
  296. if err := s.userManager.ChangeSettings(v.user); err != nil {
  297. return err
  298. }
  299. }
  300. return s.writeJSON(w, newSuccessResponse())
  301. }
  302. func (s *Server) handleAccountReservationAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  303. if v.user != nil && v.user.Role == user.RoleAdmin {
  304. return errHTTPBadRequestMakesNoSenseForAdmin
  305. }
  306. req, err := readJSONWithLimit[apiAccountReservationRequest](r.Body, jsonBodyBytesLimit)
  307. if err != nil {
  308. return err
  309. }
  310. if !topicRegex.MatchString(req.Topic) {
  311. return errHTTPBadRequestTopicInvalid
  312. }
  313. everyone, err := user.ParsePermission(req.Everyone)
  314. if err != nil {
  315. return errHTTPBadRequestPermissionInvalid
  316. }
  317. if v.user.Tier == nil {
  318. return errHTTPUnauthorized
  319. }
  320. if err := s.userManager.CheckAllowAccess(v.user.Name, req.Topic); err != nil {
  321. return errHTTPConflictTopicReserved
  322. }
  323. hasReservation, err := s.userManager.HasReservation(v.user.Name, req.Topic)
  324. if err != nil {
  325. return err
  326. }
  327. if !hasReservation {
  328. reservations, err := s.userManager.ReservationsCount(v.user.Name)
  329. if err != nil {
  330. return err
  331. } else if reservations >= v.user.Tier.ReservationsLimit {
  332. return errHTTPTooManyRequestsLimitReservations
  333. }
  334. }
  335. if err := s.userManager.AddReservation(v.user.Name, req.Topic, everyone); err != nil {
  336. return err
  337. }
  338. return s.writeJSON(w, newSuccessResponse())
  339. }
  340. func (s *Server) handleAccountReservationDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  341. matches := apiAccountReservationSingleRegex.FindStringSubmatch(r.URL.Path)
  342. if len(matches) != 2 {
  343. return errHTTPInternalErrorInvalidPath
  344. }
  345. topic := matches[1]
  346. if !topicRegex.MatchString(topic) {
  347. return errHTTPBadRequestTopicInvalid
  348. }
  349. authorized, err := s.userManager.HasReservation(v.user.Name, topic)
  350. if err != nil {
  351. return err
  352. } else if !authorized {
  353. return errHTTPUnauthorized
  354. }
  355. if err := s.userManager.RemoveReservations(v.user.Name, topic); err != nil {
  356. return err
  357. }
  358. return s.writeJSON(w, newSuccessResponse())
  359. }
  360. // maybeRemoveMessagesAndExcessReservations deletes topic reservations for the given user (if too many for tier),
  361. // and marks associated messages for the topics as deleted. This also eventually deletes attachments.
  362. // The process relies on the manager to perform the actual deletions (see runManager).
  363. func (s *Server) maybeRemoveMessagesAndExcessReservations(logPrefix string, u *user.User, reservationsLimit int64) error {
  364. reservations, err := s.userManager.Reservations(u.Name)
  365. if err != nil {
  366. return err
  367. } else if int64(len(reservations)) <= reservationsLimit {
  368. return nil
  369. }
  370. topics := make([]string, 0)
  371. for i := int64(len(reservations)) - 1; i >= reservationsLimit; i-- {
  372. topics = append(topics, reservations[i].Topic)
  373. }
  374. log.Info("%s Removing excess reservations for topics %s", logPrefix, strings.Join(topics, ", "))
  375. if err := s.userManager.RemoveReservations(u.Name, topics...); err != nil {
  376. return err
  377. }
  378. if err := s.messageCache.ExpireMessages(topics...); err != nil {
  379. return err
  380. }
  381. return nil
  382. }
  383. func (s *Server) publishSyncEvent(v *visitor) error {
  384. if v.user == nil || v.user.SyncTopic == "" {
  385. return nil
  386. }
  387. log.Trace("Publishing sync event to user %s's sync topic %s", v.user.Name, v.user.SyncTopic)
  388. topics, err := s.topicsFromIDs(v.user.SyncTopic)
  389. if err != nil {
  390. return err
  391. } else if len(topics) == 0 {
  392. return errors.New("cannot retrieve sync topic")
  393. }
  394. syncTopic := topics[0]
  395. messageBytes, err := json.Marshal(&apiAccountSyncTopicResponse{Event: syncTopicAccountSyncEvent})
  396. if err != nil {
  397. return err
  398. }
  399. m := newDefaultMessage(syncTopic.ID, string(messageBytes))
  400. if err := syncTopic.Publish(v, m); err != nil {
  401. return err
  402. }
  403. return nil
  404. }
  405. func (s *Server) publishSyncEventAsync(v *visitor) {
  406. go func() {
  407. if v.user == nil || v.user.SyncTopic == "" {
  408. return
  409. }
  410. if err := s.publishSyncEvent(v); err != nil {
  411. log.Trace("Error publishing to user %s's sync topic %s: %s", v.user.Name, v.user.SyncTopic, err.Error())
  412. }
  413. }()
  414. }