server_account.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549
  1. package server
  2. import (
  3. "encoding/json"
  4. "heckel.io/ntfy/log"
  5. "heckel.io/ntfy/user"
  6. "heckel.io/ntfy/util"
  7. "net/http"
  8. "net/netip"
  9. "strings"
  10. "time"
  11. )
  12. const (
  13. syncTopicAccountSyncEvent = "sync"
  14. tokenExpiryDuration = 72 * time.Hour // Extend tokens by this much
  15. )
  16. func (s *Server) handleAccountCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  17. u := v.User()
  18. if !u.IsAdmin() { // u may be nil, but that's fine
  19. if !s.config.EnableSignup {
  20. return errHTTPBadRequestSignupNotEnabled
  21. } else if u != nil {
  22. return errHTTPUnauthorized // Cannot create account from user context
  23. }
  24. if !v.AccountCreationAllowed() {
  25. return errHTTPTooManyRequestsLimitAccountCreation
  26. }
  27. }
  28. newAccount, err := readJSONWithLimit[apiAccountCreateRequest](r.Body, jsonBodyBytesLimit, false)
  29. if err != nil {
  30. return err
  31. }
  32. if existingUser, _ := s.userManager.User(newAccount.Username); existingUser != nil {
  33. return errHTTPConflictUserExists
  34. }
  35. logvr(v, r).Tag(tagAccount).Field("user_name", newAccount.Username).Info("Creating user %s", newAccount.Username)
  36. if err := s.userManager.AddUser(newAccount.Username, newAccount.Password, user.RoleUser); err != nil {
  37. return err
  38. }
  39. v.AccountCreated()
  40. return s.writeJSON(w, newSuccessResponse())
  41. }
  42. func (s *Server) handleAccountGet(w http.ResponseWriter, r *http.Request, v *visitor) error {
  43. info, err := v.Info()
  44. if err != nil {
  45. return err
  46. }
  47. logvr(v, r).Tag(tagAccount).Fields(visitorExtendedInfoContext(info)).Debug("Retrieving account stats")
  48. limits, stats := info.Limits, info.Stats
  49. response := &apiAccountResponse{
  50. Limits: &apiAccountLimits{
  51. Basis: string(limits.Basis),
  52. Messages: limits.MessageLimit,
  53. MessagesExpiryDuration: int64(limits.MessageExpiryDuration.Seconds()),
  54. Emails: limits.EmailLimit,
  55. SMS: limits.SMSLimit,
  56. Calls: limits.CallLimit,
  57. Reservations: limits.ReservationsLimit,
  58. AttachmentTotalSize: limits.AttachmentTotalSizeLimit,
  59. AttachmentFileSize: limits.AttachmentFileSizeLimit,
  60. AttachmentExpiryDuration: int64(limits.AttachmentExpiryDuration.Seconds()),
  61. AttachmentBandwidth: limits.AttachmentBandwidthLimit,
  62. },
  63. Stats: &apiAccountStats{
  64. Messages: stats.Messages,
  65. MessagesRemaining: stats.MessagesRemaining,
  66. Emails: stats.Emails,
  67. EmailsRemaining: stats.EmailsRemaining,
  68. SMS: stats.SMS,
  69. SMSRemaining: stats.SMSRemaining,
  70. Calls: stats.Calls,
  71. CallsRemaining: stats.CallsRemaining,
  72. Reservations: stats.Reservations,
  73. ReservationsRemaining: stats.ReservationsRemaining,
  74. AttachmentTotalSize: stats.AttachmentTotalSize,
  75. AttachmentTotalSizeRemaining: stats.AttachmentTotalSizeRemaining,
  76. },
  77. }
  78. u := v.User()
  79. if u != nil {
  80. response.Username = u.Name
  81. response.Role = string(u.Role)
  82. response.SyncTopic = u.SyncTopic
  83. if u.Prefs != nil {
  84. if u.Prefs.Language != nil {
  85. response.Language = *u.Prefs.Language
  86. }
  87. if u.Prefs.Notification != nil {
  88. response.Notification = u.Prefs.Notification
  89. }
  90. if u.Prefs.Subscriptions != nil {
  91. response.Subscriptions = u.Prefs.Subscriptions
  92. }
  93. }
  94. if u.Tier != nil {
  95. response.Tier = &apiAccountTier{
  96. Code: u.Tier.Code,
  97. Name: u.Tier.Name,
  98. }
  99. }
  100. if u.Billing.StripeCustomerID != "" {
  101. response.Billing = &apiAccountBilling{
  102. Customer: true,
  103. Subscription: u.Billing.StripeSubscriptionID != "",
  104. Status: string(u.Billing.StripeSubscriptionStatus),
  105. Interval: string(u.Billing.StripeSubscriptionInterval),
  106. PaidUntil: u.Billing.StripeSubscriptionPaidUntil.Unix(),
  107. CancelAt: u.Billing.StripeSubscriptionCancelAt.Unix(),
  108. }
  109. }
  110. reservations, err := s.userManager.Reservations(u.Name)
  111. if err != nil {
  112. return err
  113. }
  114. if len(reservations) > 0 {
  115. response.Reservations = make([]*apiAccountReservation, 0)
  116. for _, r := range reservations {
  117. response.Reservations = append(response.Reservations, &apiAccountReservation{
  118. Topic: r.Topic,
  119. Everyone: r.Everyone.String(),
  120. })
  121. }
  122. }
  123. tokens, err := s.userManager.Tokens(u.ID)
  124. if err != nil {
  125. return err
  126. }
  127. if len(tokens) > 0 {
  128. response.Tokens = make([]*apiAccountTokenResponse, 0)
  129. for _, t := range tokens {
  130. var lastOrigin string
  131. if t.LastOrigin != netip.IPv4Unspecified() {
  132. lastOrigin = t.LastOrigin.String()
  133. }
  134. response.Tokens = append(response.Tokens, &apiAccountTokenResponse{
  135. Token: t.Value,
  136. Label: t.Label,
  137. LastAccess: t.LastAccess.Unix(),
  138. LastOrigin: lastOrigin,
  139. Expires: t.Expires.Unix(),
  140. })
  141. }
  142. }
  143. } else {
  144. response.Username = user.Everyone
  145. response.Role = string(user.RoleAnonymous)
  146. }
  147. return s.writeJSON(w, response)
  148. }
  149. func (s *Server) handleAccountDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  150. req, err := readJSONWithLimit[apiAccountDeleteRequest](r.Body, jsonBodyBytesLimit, false)
  151. if err != nil {
  152. return err
  153. } else if req.Password == "" {
  154. return errHTTPBadRequest
  155. }
  156. u := v.User()
  157. if _, err := s.userManager.Authenticate(u.Name, req.Password); err != nil {
  158. return errHTTPBadRequestIncorrectPasswordConfirmation
  159. }
  160. if u.Billing.StripeSubscriptionID != "" {
  161. logvr(v, r).Tag(tagStripe).Info("Canceling billing subscription for user %s", u.Name)
  162. if _, err := s.stripe.CancelSubscription(u.Billing.StripeSubscriptionID); err != nil {
  163. return err
  164. }
  165. }
  166. if err := s.maybeRemoveMessagesAndExcessReservations(r, v, u, 0); err != nil {
  167. return err
  168. }
  169. logvr(v, r).Tag(tagAccount).Info("Marking user %s as deleted", u.Name)
  170. if err := s.userManager.MarkUserRemoved(u); err != nil {
  171. return err
  172. }
  173. return s.writeJSON(w, newSuccessResponse())
  174. }
  175. func (s *Server) handleAccountPasswordChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  176. req, err := readJSONWithLimit[apiAccountPasswordChangeRequest](r.Body, jsonBodyBytesLimit, false)
  177. if err != nil {
  178. return err
  179. } else if req.Password == "" || req.NewPassword == "" {
  180. return errHTTPBadRequest
  181. }
  182. u := v.User()
  183. if _, err := s.userManager.Authenticate(u.Name, req.Password); err != nil {
  184. return errHTTPBadRequestIncorrectPasswordConfirmation
  185. }
  186. logvr(v, r).Tag(tagAccount).Debug("Changing password for user %s", u.Name)
  187. if err := s.userManager.ChangePassword(u.Name, req.NewPassword); err != nil {
  188. return err
  189. }
  190. return s.writeJSON(w, newSuccessResponse())
  191. }
  192. func (s *Server) handleAccountTokenCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  193. req, err := readJSONWithLimit[apiAccountTokenIssueRequest](r.Body, jsonBodyBytesLimit, true) // Allow empty body!
  194. if err != nil {
  195. return err
  196. }
  197. var label string
  198. if req.Label != nil {
  199. label = *req.Label
  200. }
  201. expires := time.Now().Add(tokenExpiryDuration)
  202. if req.Expires != nil {
  203. expires = time.Unix(*req.Expires, 0)
  204. }
  205. u := v.User()
  206. logvr(v, r).
  207. Tag(tagAccount).
  208. Fields(log.Context{
  209. "token_label": label,
  210. "token_expires": expires,
  211. }).
  212. Debug("Creating token for user %s", u.Name)
  213. token, err := s.userManager.CreateToken(u.ID, label, expires, v.IP())
  214. if err != nil {
  215. return err
  216. }
  217. response := &apiAccountTokenResponse{
  218. Token: token.Value,
  219. Label: token.Label,
  220. LastAccess: token.LastAccess.Unix(),
  221. LastOrigin: token.LastOrigin.String(),
  222. Expires: token.Expires.Unix(),
  223. }
  224. return s.writeJSON(w, response)
  225. }
  226. func (s *Server) handleAccountTokenUpdate(w http.ResponseWriter, r *http.Request, v *visitor) error {
  227. u := v.User()
  228. req, err := readJSONWithLimit[apiAccountTokenUpdateRequest](r.Body, jsonBodyBytesLimit, true) // Allow empty body!
  229. if err != nil {
  230. return err
  231. } else if req.Token == "" {
  232. req.Token = u.Token
  233. if req.Token == "" {
  234. return errHTTPBadRequestNoTokenProvided
  235. }
  236. }
  237. var expires *time.Time
  238. if req.Expires != nil {
  239. expires = util.Time(time.Unix(*req.Expires, 0))
  240. } else if req.Label == nil {
  241. expires = util.Time(time.Now().Add(tokenExpiryDuration)) // If label/expires not set, extend token by 72 hours
  242. }
  243. logvr(v, r).
  244. Tag(tagAccount).
  245. Fields(log.Context{
  246. "token_label": req.Label,
  247. "token_expires": expires,
  248. }).
  249. Debug("Updating token for user %s as deleted", u.Name)
  250. token, err := s.userManager.ChangeToken(u.ID, req.Token, req.Label, expires)
  251. if err != nil {
  252. return err
  253. }
  254. response := &apiAccountTokenResponse{
  255. Token: token.Value,
  256. Label: token.Label,
  257. LastAccess: token.LastAccess.Unix(),
  258. LastOrigin: token.LastOrigin.String(),
  259. Expires: token.Expires.Unix(),
  260. }
  261. return s.writeJSON(w, response)
  262. }
  263. func (s *Server) handleAccountTokenDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  264. u := v.User()
  265. token := readParam(r, "X-Token", "Token") // DELETEs cannot have a body, and we don't want it in the path
  266. if token == "" {
  267. token = u.Token
  268. if token == "" {
  269. return errHTTPBadRequestNoTokenProvided
  270. }
  271. }
  272. if err := s.userManager.RemoveToken(u.ID, token); err != nil {
  273. return err
  274. }
  275. logvr(v, r).
  276. Tag(tagAccount).
  277. Field("token", token).
  278. Debug("Deleted token for user %s", u.Name)
  279. return s.writeJSON(w, newSuccessResponse())
  280. }
  281. func (s *Server) handleAccountSettingsChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  282. newPrefs, err := readJSONWithLimit[user.Prefs](r.Body, jsonBodyBytesLimit, false)
  283. if err != nil {
  284. return err
  285. }
  286. u := v.User()
  287. if u.Prefs == nil {
  288. u.Prefs = &user.Prefs{}
  289. }
  290. prefs := u.Prefs
  291. if newPrefs.Language != nil {
  292. prefs.Language = newPrefs.Language
  293. }
  294. if newPrefs.Notification != nil {
  295. if prefs.Notification == nil {
  296. prefs.Notification = &user.NotificationPrefs{}
  297. }
  298. if newPrefs.Notification.DeleteAfter != nil {
  299. prefs.Notification.DeleteAfter = newPrefs.Notification.DeleteAfter
  300. }
  301. if newPrefs.Notification.Sound != nil {
  302. prefs.Notification.Sound = newPrefs.Notification.Sound
  303. }
  304. if newPrefs.Notification.MinPriority != nil {
  305. prefs.Notification.MinPriority = newPrefs.Notification.MinPriority
  306. }
  307. }
  308. logvr(v, r).Tag(tagAccount).Debug("Changing account settings for user %s", u.Name)
  309. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  310. return err
  311. }
  312. return s.writeJSON(w, newSuccessResponse())
  313. }
  314. func (s *Server) handleAccountSubscriptionAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  315. newSubscription, err := readJSONWithLimit[user.Subscription](r.Body, jsonBodyBytesLimit, false)
  316. if err != nil {
  317. return err
  318. }
  319. u := v.User()
  320. prefs := u.Prefs
  321. if prefs == nil {
  322. prefs = &user.Prefs{}
  323. }
  324. for _, subscription := range prefs.Subscriptions {
  325. if newSubscription.BaseURL == subscription.BaseURL && newSubscription.Topic == subscription.Topic {
  326. return errHTTPConflictSubscriptionExists
  327. }
  328. }
  329. prefs.Subscriptions = append(prefs.Subscriptions, newSubscription)
  330. logvr(v, r).Tag(tagAccount).With(newSubscription).Debug("Adding subscription for user %s", u.Name)
  331. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  332. return err
  333. }
  334. return s.writeJSON(w, newSubscription)
  335. }
  336. func (s *Server) handleAccountSubscriptionChange(w http.ResponseWriter, r *http.Request, v *visitor) error {
  337. updatedSubscription, err := readJSONWithLimit[user.Subscription](r.Body, jsonBodyBytesLimit, false)
  338. if err != nil {
  339. return err
  340. }
  341. u := v.User()
  342. prefs := u.Prefs
  343. if prefs == nil || prefs.Subscriptions == nil {
  344. return errHTTPNotFound
  345. }
  346. var subscription *user.Subscription
  347. for _, sub := range prefs.Subscriptions {
  348. if sub.BaseURL == updatedSubscription.BaseURL && sub.Topic == updatedSubscription.Topic {
  349. sub.DisplayName = updatedSubscription.DisplayName
  350. subscription = sub
  351. break
  352. }
  353. }
  354. if subscription == nil {
  355. return errHTTPNotFound
  356. }
  357. logvr(v, r).Tag(tagAccount).With(subscription).Debug("Changing subscription for user %s", u.Name)
  358. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  359. return err
  360. }
  361. return s.writeJSON(w, subscription)
  362. }
  363. func (s *Server) handleAccountSubscriptionDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  364. // DELETEs cannot have a body, and we don't want it in the path
  365. deleteBaseURL := readParam(r, "X-BaseURL", "BaseURL")
  366. deleteTopic := readParam(r, "X-Topic", "Topic")
  367. u := v.User()
  368. prefs := u.Prefs
  369. if prefs == nil || prefs.Subscriptions == nil {
  370. return nil
  371. }
  372. newSubscriptions := make([]*user.Subscription, 0)
  373. for _, sub := range u.Prefs.Subscriptions {
  374. if sub.BaseURL == deleteBaseURL && sub.Topic == deleteTopic {
  375. logvr(v, r).Tag(tagAccount).With(sub).Debug("Removing subscription for user %s", u.Name)
  376. } else {
  377. newSubscriptions = append(newSubscriptions, sub)
  378. }
  379. }
  380. if len(newSubscriptions) < len(prefs.Subscriptions) {
  381. prefs.Subscriptions = newSubscriptions
  382. if err := s.userManager.ChangeSettings(u.ID, prefs); err != nil {
  383. return err
  384. }
  385. }
  386. return s.writeJSON(w, newSuccessResponse())
  387. }
  388. // handleAccountReservationAdd adds a topic reservation for the logged-in user, but only if the user has a tier
  389. // with enough remaining reservations left, or if the user is an admin. Admins can always reserve a topic, unless
  390. // it is already reserved by someone else.
  391. func (s *Server) handleAccountReservationAdd(w http.ResponseWriter, r *http.Request, v *visitor) error {
  392. u := v.User()
  393. req, err := readJSONWithLimit[apiAccountReservationRequest](r.Body, jsonBodyBytesLimit, false)
  394. if err != nil {
  395. return err
  396. }
  397. if !topicRegex.MatchString(req.Topic) {
  398. return errHTTPBadRequestTopicInvalid
  399. }
  400. everyone, err := user.ParsePermission(req.Everyone)
  401. if err != nil {
  402. return errHTTPBadRequestPermissionInvalid
  403. }
  404. // Check if we are allowed to reserve this topic
  405. if u.IsUser() && u.Tier == nil {
  406. return errHTTPUnauthorized
  407. } else if err := s.userManager.AllowReservation(u.Name, req.Topic); err != nil {
  408. return errHTTPConflictTopicReserved
  409. } else if u.IsUser() {
  410. hasReservation, err := s.userManager.HasReservation(u.Name, req.Topic)
  411. if err != nil {
  412. return err
  413. }
  414. if !hasReservation {
  415. reservations, err := s.userManager.ReservationsCount(u.Name)
  416. if err != nil {
  417. return err
  418. } else if reservations >= u.Tier.ReservationLimit {
  419. return errHTTPTooManyRequestsLimitReservations
  420. }
  421. }
  422. }
  423. // Actually add the reservation
  424. logvr(v, r).
  425. Tag(tagAccount).
  426. Fields(log.Context{
  427. "topic": req.Topic,
  428. "everyone": everyone.String(),
  429. }).
  430. Debug("Adding topic reservation")
  431. if err := s.userManager.AddReservation(u.Name, req.Topic, everyone); err != nil {
  432. return err
  433. }
  434. // Kill existing subscribers
  435. t, err := s.topicFromID(req.Topic)
  436. if err != nil {
  437. return err
  438. }
  439. t.CancelSubscribers(u.ID)
  440. return s.writeJSON(w, newSuccessResponse())
  441. }
  442. // handleAccountReservationDelete deletes a topic reservation if it is owned by the current user
  443. func (s *Server) handleAccountReservationDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
  444. matches := apiAccountReservationSingleRegex.FindStringSubmatch(r.URL.Path)
  445. if len(matches) != 2 {
  446. return errHTTPInternalErrorInvalidPath
  447. }
  448. topic := matches[1]
  449. if !topicRegex.MatchString(topic) {
  450. return errHTTPBadRequestTopicInvalid
  451. }
  452. u := v.User()
  453. authorized, err := s.userManager.HasReservation(u.Name, topic)
  454. if err != nil {
  455. return err
  456. } else if !authorized {
  457. return errHTTPUnauthorized
  458. }
  459. deleteMessages := readBoolParam(r, false, "X-Delete-Messages", "Delete-Messages")
  460. logvr(v, r).
  461. Tag(tagAccount).
  462. Fields(log.Context{
  463. "topic": topic,
  464. "delete_messages": deleteMessages,
  465. }).
  466. Debug("Removing topic reservation")
  467. if err := s.userManager.RemoveReservations(u.Name, topic); err != nil {
  468. return err
  469. }
  470. if deleteMessages {
  471. if err := s.messageCache.ExpireMessages(topic); err != nil {
  472. return err
  473. }
  474. s.pruneMessages()
  475. }
  476. return s.writeJSON(w, newSuccessResponse())
  477. }
  478. // maybeRemoveMessagesAndExcessReservations deletes topic reservations for the given user (if too many for tier),
  479. // and marks associated messages for the topics as deleted. This also eventually deletes attachments.
  480. // The process relies on the manager to perform the actual deletions (see runManager).
  481. func (s *Server) maybeRemoveMessagesAndExcessReservations(r *http.Request, v *visitor, u *user.User, reservationsLimit int64) error {
  482. reservations, err := s.userManager.Reservations(u.Name)
  483. if err != nil {
  484. return err
  485. } else if int64(len(reservations)) <= reservationsLimit {
  486. logvr(v, r).Tag(tagAccount).Debug("No excess reservations to remove")
  487. return nil
  488. }
  489. topics := make([]string, 0)
  490. for i := int64(len(reservations)) - 1; i >= reservationsLimit; i-- {
  491. topics = append(topics, reservations[i].Topic)
  492. }
  493. logvr(v, r).Tag(tagAccount).Info("Removing excess reservations for topics %s", strings.Join(topics, ", "))
  494. if err := s.userManager.RemoveReservations(u.Name, topics...); err != nil {
  495. return err
  496. }
  497. if err := s.messageCache.ExpireMessages(topics...); err != nil {
  498. return err
  499. }
  500. go s.pruneMessages()
  501. return nil
  502. }
  503. // publishSyncEventAsync kicks of a Go routine to publish a sync message to the user's sync topic
  504. func (s *Server) publishSyncEventAsync(v *visitor) {
  505. go func() {
  506. if err := s.publishSyncEvent(v); err != nil {
  507. logv(v).Err(err).Trace("Error publishing to user's sync topic")
  508. }
  509. }()
  510. }
  511. // publishSyncEvent publishes a sync message to the user's sync topic
  512. func (s *Server) publishSyncEvent(v *visitor) error {
  513. u := v.User()
  514. if u == nil || u.SyncTopic == "" {
  515. return nil
  516. }
  517. logv(v).Field("sync_topic", u.SyncTopic).Trace("Publishing sync event to user's sync topic")
  518. syncTopic, err := s.topicFromID(u.SyncTopic)
  519. if err != nil {
  520. return err
  521. }
  522. messageBytes, err := json.Marshal(&apiAccountSyncTopicResponse{Event: syncTopicAccountSyncEvent})
  523. if err != nil {
  524. return err
  525. }
  526. m := newDefaultMessage(syncTopic.ID, string(messageBytes))
  527. if err := syncTopic.Publish(v, m); err != nil {
  528. return err
  529. }
  530. return nil
  531. }