server_account.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649
  1. package server
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "heckel.io/ntfy/v2/log"
  6. "heckel.io/ntfy/v2/user"
  7. "heckel.io/ntfy/v2/util"
  8. "net/http"
  9. "net/netip"
  10. "strings"
  11. "time"
  12. )
  13. const (
  14. syncTopicAccountSyncEvent = "sync"
  15. tokenExpiryDuration = 72 * time.Hour // Extend tokens by this much
  16. )
  17. func (s *Server) handleAccountCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  18. u := v.User()
  19. if !u.IsAdmin() { // u may be nil, but that's fine
  20. if !s.config.EnableSignup {
  21. return errHTTPBadRequestSignupNotEnabled
  22. } else if u != nil {
  23. return errHTTPUnauthorized // Cannot create account from user context
  24. }
  25. if !v.AccountCreationAllowed() {
  26. return errHTTPTooManyRequestsLimitAccountCreation
  27. }
  28. }
  29. newAccount, err := readJSONWithLimit[apiAccountCreateRequest](r.Body, jsonBodyBytesLimit, false)
  30. if err != nil {
  31. return err
  32. }
  33. if existingUser, _ := s.userManager.User(newAccount.Username); existingUser != nil {
  34. return errHTTPConflictUserExists
  35. }
  36. logvr(v, r).Tag(tagAccount).Field("user_name", newAccount.Username).Info("Creating user %s", newAccount.Username)
  37. if err := s.userManager.AddUser(newAccount.Username, newAccount.Password, user.RoleUser, false); err != nil {
  38. if errors.Is(err, user.ErrInvalidArgument) {
  39. return errHTTPBadRequestInvalidUsername
  40. }
  41. return err
  42. }
  43. v.AccountCreated()
  44. return s.writeJSON(w, newSuccessResponse())
  45. }
  46. func (s *Server) handleAccountGet(w http.ResponseWriter, r *http.Request, v *visitor) error {
  47. info, err := v.Info()
  48. if err != nil {
  49. return err
  50. }
  51. logvr(v, r).Tag(tagAccount).Fields(visitorExtendedInfoContext(info)).Debug("Retrieving account stats")
  52. limits, stats := info.Limits, info.Stats
  53. response := &apiAccountResponse{
  54. Limits: &apiAccountLimits{
  55. Basis: string(limits.Basis),
  56. Messages: limits.MessageLimit,
  57. MessagesExpiryDuration: int64(limits.MessageExpiryDuration.Seconds()),
  58. Emails: limits.EmailLimit,
  59. Calls: limits.CallLimit,
  60. Reservations: limits.ReservationsLimit,
  61. AttachmentTotalSize: limits.AttachmentTotalSizeLimit,
  62. AttachmentFileSize: limits.AttachmentFileSizeLimit,
  63. AttachmentExpiryDuration: int64(limits.AttachmentExpiryDuration.Seconds()),
  64. AttachmentBandwidth: limits.AttachmentBandwidthLimit,
  65. },
  66. Stats: &apiAccountStats{
  67. Messages: stats.Messages,
  68. MessagesRemaining: stats.MessagesRemaining,
  69. Emails: stats.Emails,
  70. EmailsRemaining: stats.EmailsRemaining,
  71. Calls: stats.Calls,
  72. CallsRemaining: stats.CallsRemaining,
  73. Reservations: stats.Reservations,
  74. ReservationsRemaining: stats.ReservationsRemaining,
  75. AttachmentTotalSize: stats.AttachmentTotalSize,
  76. AttachmentTotalSizeRemaining: stats.AttachmentTotalSizeRemaining,
  77. },
  78. }
  79. u := v.User()
  80. if u != nil {
  81. response.Username = u.Name
  82. response.Role = string(u.Role)
  83. response.SyncTopic = u.SyncTopic
  84. response.Provisioned = u.Provisioned
  85. if u.Prefs != nil {
  86. if u.Prefs.Language != nil {
  87. response.Language = *u.Prefs.Language
  88. }
  89. if u.Prefs.Notification != nil {
  90. response.Notification = u.Prefs.Notification
  91. }
  92. if u.Prefs.Subscriptions != nil {
  93. response.Subscriptions = u.Prefs.Subscriptions
  94. }
  95. }
  96. if u.Tier != nil {
  97. response.Tier = &apiAccountTier{
  98. Code: u.Tier.Code,
  99. Name: u.Tier.Name,
  100. }
  101. }
  102. if u.Billing.StripeCustomerID != "" {
  103. response.Billing = &apiAccountBilling{
  104. Customer: true,
  105. Subscription: u.Billing.StripeSubscriptionID != "",
  106. Status: string(u.Billing.StripeSubscriptionStatus),
  107. Interval: string(u.Billing.StripeSubscriptionInterval),
  108. PaidUntil: u.Billing.StripeSubscriptionPaidUntil.Unix(),
  109. CancelAt: u.Billing.StripeSubscriptionCancelAt.Unix(),
  110. }
  111. }
  112. if s.config.EnableReservations {
  113. reservations, err := s.userManager.Reservations(u.Name)
  114. if err != nil {
  115. return err
  116. }
  117. if len(reservations) > 0 {
  118. response.Reservations = make([]*apiAccountReservation, 0)
  119. for _, r := range reservations {
  120. response.Reservations = append(response.Reservations, &apiAccountReservation{
  121. Topic: r.Topic,
  122. Everyone: r.Everyone.String(),
  123. })
  124. }
  125. }
  126. }
  127. tokens, err := s.userManager.Tokens(u.ID)
  128. if err != nil {
  129. return err
  130. }
  131. if len(tokens) > 0 {
  132. response.Tokens = make([]*apiAccountTokenResponse, 0)
  133. for _, t := range tokens {
  134. var lastOrigin string
  135. if t.LastOrigin != netip.IPv4Unspecified() {
  136. lastOrigin = t.LastOrigin.String()
  137. }
  138. response.Tokens = append(response.Tokens, &apiAccountTokenResponse{
  139. Token: t.Value,
  140. Label: t.Label,
  141. LastAccess: t.LastAccess.Unix(),
  142. LastOrigin: lastOrigin,
  143. Expires: t.Expires.Unix(),
  144. Provisioned: t.Provisioned,
  145. })
  146. }
  147. }
  148. if s.config.TwilioAccount != "" {
  149. phoneNumbers, err := s.userManager.PhoneNumbers(u.ID)
  150. if err != nil {
  151. return err
  152. }
  153. if len(phoneNumbers) > 0 {
  154. response.PhoneNumbers = phoneNumbers
  155. }
  156. }
  157. } else {
  158. response.Username = user.Everyone
  159. response.Role = string(user.RoleAnonymous)
  160. }
  161. return s.writeJSON(w, response)
  162. }
  163. func (s *Server) handleAccountDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  164. req, err := readJSONWithLimit[apiAccountDeleteRequest](r.Body, jsonBodyBytesLimit, false)
  165. if err != nil {
  166. return err
  167. } else if req.Password == "" {
  168. return errHTTPBadRequest
  169. }
  170. u := v.User()
  171. if _, err := s.userManager.Authenticate(u.Name, req.Password); err != nil {
  172. return errHTTPBadRequestIncorrectPasswordConfirmation
  173. }
  174. if err := s.userManager.CanChangeUser(u.Name); err != nil {
  175. if errors.Is(err, user.ErrProvisionedUserChange) {
  176. return errHTTPConflictProvisionedUserChange
  177. }
  178. return err
  179. }
  180. if s.webPush != nil && u.ID != "" {
  181. if err := s.webPush.RemoveSubscriptionsByUserID(u.ID); err != nil {
  182. logvr(v, r).Err(err).Warn("Error removing web push subscriptions for %s", u.Name)
  183. }
  184. }
  185. if u.Billing.StripeSubscriptionID != "" {
  186. logvr(v, r).Tag(tagStripe).Info("Canceling billing subscription for user %s", u.Name)
  187. if _, err := s.stripe.CancelSubscription(u.Billing.StripeSubscriptionID); err != nil {
  188. return err
  189. }
  190. }
  191. if err := s.maybeRemoveMessagesAndExcessReservations(r, v, u, 0); err != nil {
  192. return err
  193. }
  194. logvr(v, r).Tag(tagAccount).Info("Marking user %s as deleted", u.Name)
  195. if err := s.userManager.MarkUserRemoved(u); err != nil {
  196. return err
  197. }
  198. return s.writeJSON(w, newSuccessResponse())
  199. }
  200. func (s *Server) handleAccountPasswordChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  201. req, err := readJSONWithLimit[apiAccountPasswordChangeRequest](r.Body, jsonBodyBytesLimit, false)
  202. if err != nil {
  203. return err
  204. } else if req.Password == "" || req.NewPassword == "" {
  205. return errHTTPBadRequest
  206. }
  207. u := v.User()
  208. if _, err := s.userManager.Authenticate(u.Name, req.Password); err != nil {
  209. return errHTTPBadRequestIncorrectPasswordConfirmation
  210. }
  211. logvr(v, r).Tag(tagAccount).Debug("Changing password for user %s", u.Name)
  212. if err := s.userManager.ChangePassword(u.Name, req.NewPassword, false); err != nil {
  213. if errors.Is(err, user.ErrProvisionedUserChange) {
  214. return errHTTPConflictProvisionedUserChange
  215. }
  216. return err
  217. }
  218. return s.writeJSON(w, newSuccessResponse())
  219. }
  220. func (s *Server) handleAccountTokenCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  221. req, err := readJSONWithLimit[apiAccountTokenIssueRequest](r.Body, jsonBodyBytesLimit, true) // Allow empty body!
  222. if err != nil {
  223. return err
  224. }
  225. var label string
  226. if req.Label != nil {
  227. label = *req.Label
  228. }
  229. expires := time.Now().Add(tokenExpiryDuration)
  230. if req.Expires != nil {
  231. expires = time.Unix(*req.Expires, 0)
  232. }
  233. u := v.User()
  234. logvr(v, r).
  235. Tag(tagAccount).
  236. Fields(log.Context{
  237. "token_label": label,
  238. "token_expires": expires,
  239. }).
  240. Debug("Creating token for user %s", u.Name)
  241. token, err := s.userManager.CreateToken(u.ID, label, expires, v.IP(), false)
  242. if err != nil {
  243. return err
  244. }
  245. response := &apiAccountTokenResponse{
  246. Token: token.Value,
  247. Label: token.Label,
  248. LastAccess: token.LastAccess.Unix(),
  249. LastOrigin: token.LastOrigin.String(),
  250. Expires: token.Expires.Unix(),
  251. }
  252. return s.writeJSON(w, response)
  253. }
  254. func (s *Server) handleAccountTokenUpdate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  255. u := v.User()
  256. req, err := readJSONWithLimit[apiAccountTokenUpdateRequest](r.Body, jsonBodyBytesLimit, true) // Allow empty body!
  257. if err != nil {
  258. return err
  259. } else if req.Token == "" {
  260. req.Token = u.Token
  261. if req.Token == "" {
  262. return errHTTPBadRequestNoTokenProvided
  263. }
  264. }
  265. var expires *time.Time
  266. if req.Expires != nil {
  267. expires = util.Time(time.Unix(*req.Expires, 0))
  268. } else if req.Label == nil {
  269. expires = util.Time(time.Now().Add(tokenExpiryDuration)) // If label/expires not set, extend token by 72 hours
  270. }
  271. logvr(v, r).
  272. Tag(tagAccount).
  273. Fields(log.Context{
  274. "token_label": req.Label,
  275. "token_expires": expires,
  276. }).
  277. Debug("Updating token for user %s as deleted", u.Name)
  278. token, err := s.userManager.ChangeToken(u.ID, req.Token, req.Label, expires)
  279. if err != nil {
  280. if errors.Is(err, user.ErrProvisionedTokenChange) {
  281. return errHTTPConflictProvisionedTokenChange
  282. }
  283. return err
  284. }
  285. response := &apiAccountTokenResponse{
  286. Token: token.Value,
  287. Label: token.Label,
  288. LastAccess: token.LastAccess.Unix(),
  289. LastOrigin: token.LastOrigin.String(),
  290. Expires: token.Expires.Unix(),
  291. }
  292. return s.writeJSON(w, response)
  293. }
  294. func (s *Server) handleAccountTokenDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  295. u := v.User()
  296. token := readParam(r, "X-Token", "Token") // DELETEs cannot have a body, and we don't want it in the path
  297. if token == "" {
  298. token = u.Token
  299. if token == "" {
  300. return errHTTPBadRequestNoTokenProvided
  301. }
  302. }
  303. if err := s.userManager.RemoveToken(u.ID, token); err != nil {
  304. if errors.Is(err, user.ErrProvisionedTokenChange) {
  305. return errHTTPConflictProvisionedTokenChange
  306. }
  307. return err
  308. }
  309. logvr(v, r).
  310. Tag(tagAccount).
  311. Field("token", token).
  312. Debug("Deleted token for user %s", u.Name)
  313. return s.writeJSON(w, newSuccessResponse())
  314. }
  315. func (s *Server) handleAccountSettingsChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  316. newPrefs, err := readJSONWithLimit[user.Prefs](r.Body, jsonBodyBytesLimit, false)
  317. if err != nil {
  318. return err
  319. }
  320. u := v.User()
  321. if u.Prefs == nil {
  322. u.Prefs = &user.Prefs{}
  323. }
  324. prefs := u.Prefs
  325. if newPrefs.Language != nil {
  326. prefs.Language = newPrefs.Language
  327. }
  328. if newPrefs.Notification != nil {
  329. if prefs.Notification == nil {
  330. prefs.Notification = &user.NotificationPrefs{}
  331. }
  332. if newPrefs.Notification.DeleteAfter != nil {
  333. prefs.Notification.DeleteAfter = newPrefs.Notification.DeleteAfter
  334. }
  335. if newPrefs.Notification.Sound != nil {
  336. prefs.Notification.Sound = newPrefs.Notification.Sound
  337. }
  338. if newPrefs.Notification.MinPriority != nil {
  339. prefs.Notification.MinPriority = newPrefs.Notification.MinPriority
  340. }
  341. }
  342. logvr(v, r).Tag(tagAccount).Debug("Changing account settings for user %s", u.Name)
  343. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  344. return err
  345. }
  346. return s.writeJSON(w, newSuccessResponse())
  347. }
  348. func (s *Server) handleAccountSubscriptionAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  349. newSubscription, err := readJSONWithLimit[user.Subscription](r.Body, jsonBodyBytesLimit, false)
  350. if err != nil {
  351. return err
  352. }
  353. u := v.User()
  354. prefs := u.Prefs
  355. if prefs == nil {
  356. prefs = &user.Prefs{}
  357. }
  358. for _, subscription := range prefs.Subscriptions {
  359. if newSubscription.BaseURL == subscription.BaseURL && newSubscription.Topic == subscription.Topic {
  360. return errHTTPConflictSubscriptionExists
  361. }
  362. }
  363. prefs.Subscriptions = append(prefs.Subscriptions, newSubscription)
  364. logvr(v, r).Tag(tagAccount).With(newSubscription).Debug("Adding subscription for user %s", u.Name)
  365. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  366. return err
  367. }
  368. return s.writeJSON(w, newSubscription)
  369. }
  370. func (s *Server) handleAccountSubscriptionChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  371. updatedSubscription, err := readJSONWithLimit[user.Subscription](r.Body, jsonBodyBytesLimit, false)
  372. if err != nil {
  373. return err
  374. }
  375. u := v.User()
  376. prefs := u.Prefs
  377. if prefs == nil || prefs.Subscriptions == nil {
  378. return errHTTPNotFound
  379. }
  380. var subscription *user.Subscription
  381. for _, sub := range prefs.Subscriptions {
  382. if sub.BaseURL == updatedSubscription.BaseURL && sub.Topic == updatedSubscription.Topic {
  383. sub.DisplayName = updatedSubscription.DisplayName
  384. subscription = sub
  385. break
  386. }
  387. }
  388. if subscription == nil {
  389. return errHTTPNotFound
  390. }
  391. logvr(v, r).Tag(tagAccount).With(subscription).Debug("Changing subscription for user %s", u.Name)
  392. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  393. return err
  394. }
  395. return s.writeJSON(w, subscription)
  396. }
  397. func (s *Server) handleAccountSubscriptionDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  398. // DELETEs cannot have a body, and we don't want it in the path
  399. deleteBaseURL := readParam(r, "X-BaseURL", "BaseURL")
  400. deleteTopic := readParam(r, "X-Topic", "Topic")
  401. u := v.User()
  402. prefs := u.Prefs
  403. if prefs == nil || prefs.Subscriptions == nil {
  404. return nil
  405. }
  406. newSubscriptions := make([]*user.Subscription, 0)
  407. for _, sub := range u.Prefs.Subscriptions {
  408. if sub.BaseURL == deleteBaseURL && sub.Topic == deleteTopic {
  409. logvr(v, r).Tag(tagAccount).With(sub).Debug("Removing subscription for user %s", u.Name)
  410. } else {
  411. newSubscriptions = append(newSubscriptions, sub)
  412. }
  413. }
  414. if len(newSubscriptions) < len(prefs.Subscriptions) {
  415. prefs.Subscriptions = newSubscriptions
  416. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  417. return err
  418. }
  419. }
  420. return s.writeJSON(w, newSuccessResponse())
  421. }
  422. // handleAccountReservationAdd adds a topic reservation for the logged-in user, but only if the user has a tier
  423. // with enough remaining reservations left, or if the user is an admin. Admins can always reserve a topic, unless
  424. // it is already reserved by someone else.
  425. func (s *Server) handleAccountReservationAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  426. u := v.User()
  427. req, err := readJSONWithLimit[apiAccountReservationRequest](r.Body, jsonBodyBytesLimit, false)
  428. if err != nil {
  429. return err
  430. }
  431. if !topicRegex.MatchString(req.Topic) {
  432. return errHTTPBadRequestTopicInvalid
  433. }
  434. everyone, err := user.ParsePermission(req.Everyone)
  435. if err != nil {
  436. return errHTTPBadRequestPermissionInvalid
  437. }
  438. // Check if we are allowed to reserve this topic
  439. if u.IsUser() && u.Tier == nil {
  440. return errHTTPUnauthorized
  441. } else if err := s.userManager.AllowReservation(u.Name, req.Topic); err != nil {
  442. return errHTTPConflictTopicReserved
  443. } else if u.IsUser() {
  444. hasReservation, err := s.userManager.HasReservation(u.Name, req.Topic)
  445. if err != nil {
  446. return err
  447. }
  448. if !hasReservation {
  449. reservations, err := s.userManager.ReservationsCount(u.Name)
  450. if err != nil {
  451. return err
  452. } else if reservations >= u.Tier.ReservationLimit {
  453. return errHTTPTooManyRequestsLimitReservations
  454. }
  455. }
  456. }
  457. // Actually add the reservation
  458. logvr(v, r).
  459. Tag(tagAccount).
  460. Fields(log.Context{
  461. "topic": req.Topic,
  462. "everyone": everyone.String(),
  463. }).
  464. Debug("Adding topic reservation")
  465. if err := s.userManager.AddReservation(u.Name, req.Topic, everyone); err != nil {
  466. return err
  467. }
  468. // Kill existing subscribers
  469. t, err := s.topicFromID(req.Topic)
  470. if err != nil {
  471. return err
  472. }
  473. t.CancelSubscribersExceptUser(u.ID)
  474. return s.writeJSON(w, newSuccessResponse())
  475. }
  476. // handleAccountReservationDelete deletes a topic reservation if it is owned by the current user
  477. func (s *Server) handleAccountReservationDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  478. matches := apiAccountReservationSingleRegex.FindStringSubmatch(r.URL.Path)
  479. if len(matches) != 2 {
  480. return errHTTPInternalErrorInvalidPath
  481. }
  482. topic := matches[1]
  483. if !topicRegex.MatchString(topic) {
  484. return errHTTPBadRequestTopicInvalid
  485. }
  486. u := v.User()
  487. authorized, err := s.userManager.HasReservation(u.Name, topic)
  488. if err != nil {
  489. return err
  490. } else if !authorized {
  491. return errHTTPUnauthorized
  492. }
  493. deleteMessages := readBoolParam(r, false, "X-Delete-Messages", "Delete-Messages")
  494. logvr(v, r).
  495. Tag(tagAccount).
  496. Fields(log.Context{
  497. "topic": topic,
  498. "delete_messages": deleteMessages,
  499. }).
  500. Debug("Removing topic reservation")
  501. if err := s.userManager.RemoveReservations(u.Name, topic); err != nil {
  502. return err
  503. }
  504. if deleteMessages {
  505. if err := s.messageCache.ExpireMessages(topic); err != nil {
  506. return err
  507. }
  508. s.pruneMessages()
  509. }
  510. return s.writeJSON(w, newSuccessResponse())
  511. }
  512. // maybeRemoveMessagesAndExcessReservations deletes topic reservations for the given user (if too many for tier),
  513. // and marks associated messages for the topics as deleted. This also eventually deletes attachments.
  514. // The process relies on the manager to perform the actual deletions (see runManager).
  515. func (s *Server) maybeRemoveMessagesAndExcessReservations(r *http.Request, v *visitor, u *user.User, reservationsLimit int64) error {
  516. reservations, err := s.userManager.Reservations(u.Name)
  517. if err != nil {
  518. return err
  519. } else if int64(len(reservations)) <= reservationsLimit {
  520. logvr(v, r).Tag(tagAccount).Debug("No excess reservations to remove")
  521. return nil
  522. }
  523. topics := make([]string, 0)
  524. for i := int64(len(reservations)) - 1; i >= reservationsLimit; i-- {
  525. topics = append(topics, reservations[i].Topic)
  526. }
  527. logvr(v, r).Tag(tagAccount).Info("Removing excess reservations for topics %s", strings.Join(topics, ", "))
  528. if err := s.userManager.RemoveReservations(u.Name, topics...); err != nil {
  529. return err
  530. }
  531. if err := s.messageCache.ExpireMessages(topics...); err != nil {
  532. return err
  533. }
  534. go s.pruneMessages()
  535. return nil
  536. }
  537. func (s *Server) handleAccountPhoneNumberVerify(w http.ResponseWriter, r *http.Request, v *visitor) error {
  538. u := v.User()
  539. req, err := readJSONWithLimit[apiAccountPhoneNumberVerifyRequest](r.Body, jsonBodyBytesLimit, false)
  540. if err != nil {
  541. return err
  542. } else if !phoneNumberRegex.MatchString(req.Number) {
  543. return errHTTPBadRequestPhoneNumberInvalid
  544. } else if req.Channel != "sms" && req.Channel != "call" {
  545. return errHTTPBadRequestPhoneNumberVerifyChannelInvalid
  546. }
  547. // Check user is allowed to add phone numbers
  548. if u == nil || (u.IsUser() && u.Tier == nil) {
  549. return errHTTPUnauthorized
  550. } else if u.IsUser() && u.Tier.CallLimit == 0 {
  551. return errHTTPUnauthorized
  552. }
  553. // Check if phone number exists
  554. phoneNumbers, err := s.userManager.PhoneNumbers(u.ID)
  555. if err != nil {
  556. return err
  557. } else if util.Contains(phoneNumbers, req.Number) {
  558. return errHTTPConflictPhoneNumberExists
  559. }
  560. // Actually add the unverified number, and send verification
  561. logvr(v, r).Tag(tagAccount).Field("phone_number", req.Number).Debug("Sending phone number verification")
  562. if err := s.verifyPhoneNumber(v, r, req.Number, req.Channel); err != nil {
  563. return err
  564. }
  565. return s.writeJSON(w, newSuccessResponse())
  566. }
  567. func (s *Server) handleAccountPhoneNumberAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  568. u := v.User()
  569. req, err := readJSONWithLimit[apiAccountPhoneNumberAddRequest](r.Body, jsonBodyBytesLimit, false)
  570. if err != nil {
  571. return err
  572. }
  573. if !phoneNumberRegex.MatchString(req.Number) {
  574. return errHTTPBadRequestPhoneNumberInvalid
  575. }
  576. if err := s.verifyPhoneNumberCheck(v, r, req.Number, req.Code); err != nil {
  577. return err
  578. }
  579. logvr(v, r).Tag(tagAccount).Field("phone_number", req.Number).Debug("Adding phone number as verified")
  580. if err := s.userManager.AddPhoneNumber(u.ID, req.Number); err != nil {
  581. return err
  582. }
  583. return s.writeJSON(w, newSuccessResponse())
  584. }
  585. func (s *Server) handleAccountPhoneNumberDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  586. u := v.User()
  587. req, err := readJSONWithLimit[apiAccountPhoneNumberAddRequest](r.Body, jsonBodyBytesLimit, false)
  588. if err != nil {
  589. return err
  590. }
  591. if !phoneNumberRegex.MatchString(req.Number) {
  592. return errHTTPBadRequestPhoneNumberInvalid
  593. }
  594. logvr(v, r).Tag(tagAccount).Field("phone_number", req.Number).Debug("Deleting phone number")
  595. if err := s.userManager.RemovePhoneNumber(u.ID, req.Number); err != nil {
  596. return err
  597. }
  598. return s.writeJSON(w, newSuccessResponse())
  599. }
  600. // publishSyncEventAsync kicks of a Go routine to publish a sync message to the user's sync topic
  601. func (s *Server) publishSyncEventAsync(v *visitor) {
  602. go func() {
  603. if err := s.publishSyncEvent(v); err != nil {
  604. logv(v).Err(err).Trace("Error publishing to user's sync topic")
  605. }
  606. }()
  607. }
  608. // publishSyncEvent publishes a sync message to the user's sync topic
  609. func (s *Server) publishSyncEvent(v *visitor) error {
  610. u := v.User()
  611. if u == nil || u.SyncTopic == "" {
  612. return nil
  613. }
  614. logv(v).Field("sync_topic", u.SyncTopic).Trace("Publishing sync event to user's sync topic")
  615. syncTopic, err := s.topicFromID(u.SyncTopic)
  616. if err != nil {
  617. return err
  618. }
  619. messageBytes, err := json.Marshal(&apiAccountSyncTopicResponse{Event: syncTopicAccountSyncEvent})
  620. if err != nil {
  621. return err
  622. }
  623. m := newDefaultMessage(syncTopic.ID, string(messageBytes))
  624. if err := syncTopic.Publish(v, m); err != nil {
  625. return err
  626. }
  627. return nil
  628. }