2023-01-16 05:29:46 +01:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
2023-01-17 16:09:37 +01:00
|
|
|
"fmt"
|
2023-01-16 05:29:46 +01:00
|
|
|
"github.com/stripe/stripe-go/v74"
|
|
|
|
portalsession "github.com/stripe/stripe-go/v74/billingportal/session"
|
|
|
|
"github.com/stripe/stripe-go/v74/checkout/session"
|
2023-01-16 22:35:37 +01:00
|
|
|
"github.com/stripe/stripe-go/v74/customer"
|
2023-01-17 16:09:37 +01:00
|
|
|
"github.com/stripe/stripe-go/v74/price"
|
2023-01-16 05:29:46 +01:00
|
|
|
"github.com/stripe/stripe-go/v74/subscription"
|
|
|
|
"github.com/stripe/stripe-go/v74/webhook"
|
|
|
|
"github.com/tidwall/gjson"
|
|
|
|
"heckel.io/ntfy/log"
|
2023-01-17 16:09:37 +01:00
|
|
|
"heckel.io/ntfy/user"
|
2023-01-16 05:29:46 +01:00
|
|
|
"heckel.io/ntfy/util"
|
|
|
|
"net/http"
|
2023-01-16 22:35:37 +01:00
|
|
|
"net/netip"
|
2023-01-16 05:29:46 +01:00
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
stripeBodyBytesLimit = 16384
|
|
|
|
)
|
|
|
|
|
2023-01-18 01:40:03 +01:00
|
|
|
var (
|
|
|
|
errNotAPaidTier = errors.New("tier does not have Stripe price identifier")
|
|
|
|
)
|
|
|
|
|
2023-01-17 16:09:37 +01:00
|
|
|
func (s *Server) handleAccountBillingTiersGet(w http.ResponseWriter, r *http.Request, v *visitor) error {
|
|
|
|
tiers, err := v.userManager.Tiers()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-01-18 01:40:03 +01:00
|
|
|
freeTier := defaultVisitorLimits(s.config)
|
|
|
|
response := []*apiAccountBillingTier{
|
|
|
|
{
|
|
|
|
// Free tier: no code, name or price
|
|
|
|
Limits: &apiAccountLimits{
|
|
|
|
Messages: freeTier.MessagesLimit,
|
|
|
|
MessagesExpiryDuration: int64(freeTier.MessagesExpiryDuration.Seconds()),
|
|
|
|
Emails: freeTier.EmailsLimit,
|
|
|
|
Reservations: freeTier.ReservationsLimit,
|
|
|
|
AttachmentTotalSize: freeTier.AttachmentTotalSizeLimit,
|
|
|
|
AttachmentFileSize: freeTier.AttachmentFileSizeLimit,
|
|
|
|
AttachmentExpiryDuration: int64(freeTier.AttachmentExpiryDuration.Seconds()),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2023-01-17 16:09:37 +01:00
|
|
|
for _, tier := range tiers {
|
|
|
|
if tier.StripePriceID == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
priceStr, ok := s.priceCache[tier.StripePriceID]
|
|
|
|
if !ok {
|
|
|
|
p, err := price.Get(tier.StripePriceID, nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if p.UnitAmount%100 == 0 {
|
|
|
|
priceStr = fmt.Sprintf("$%d", p.UnitAmount/100)
|
|
|
|
} else {
|
|
|
|
priceStr = fmt.Sprintf("$%.2f", float64(p.UnitAmount)/100)
|
|
|
|
}
|
|
|
|
s.priceCache[tier.StripePriceID] = priceStr // FIXME race, make this sync.Map or something
|
|
|
|
}
|
|
|
|
response = append(response, &apiAccountBillingTier{
|
2023-01-18 01:40:03 +01:00
|
|
|
Code: tier.Code,
|
|
|
|
Name: tier.Name,
|
|
|
|
Price: priceStr,
|
|
|
|
Limits: &apiAccountLimits{
|
|
|
|
Messages: tier.MessagesLimit,
|
|
|
|
MessagesExpiryDuration: int64(tier.MessagesExpiryDuration.Seconds()),
|
|
|
|
Emails: tier.EmailsLimit,
|
|
|
|
Reservations: tier.ReservationsLimit,
|
|
|
|
AttachmentTotalSize: tier.AttachmentTotalSizeLimit,
|
|
|
|
AttachmentFileSize: tier.AttachmentFileSizeLimit,
|
|
|
|
AttachmentExpiryDuration: int64(tier.AttachmentExpiryDuration.Seconds()),
|
|
|
|
},
|
2023-01-17 16:09:37 +01:00
|
|
|
})
|
|
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
|
|
|
|
if err := json.NewEncoder(w).Encode(response); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-01-16 22:35:37 +01:00
|
|
|
// handleAccountBillingSubscriptionCreate creates a Stripe checkout flow to create a user subscription. The tier
|
|
|
|
// will be updated by a subsequent webhook from Stripe, once the subscription becomes active.
|
|
|
|
func (s *Server) handleAccountBillingSubscriptionCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
|
|
|
|
if v.user.Billing.StripeSubscriptionID != "" {
|
|
|
|
return errors.New("subscription already exists") //FIXME
|
|
|
|
}
|
|
|
|
req, err := readJSONWithLimit[apiAccountBillingSubscriptionChangeRequest](r.Body, jsonBodyBytesLimit)
|
2023-01-16 05:29:46 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
tier, err := s.userManager.Tier(req.Tier)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2023-01-18 01:40:03 +01:00
|
|
|
} else if tier.StripePriceID == "" {
|
|
|
|
return errNotAPaidTier
|
2023-01-16 05:29:46 +01:00
|
|
|
}
|
|
|
|
log.Info("Stripe: No existing subscription, creating checkout flow")
|
|
|
|
var stripeCustomerID *string
|
|
|
|
if v.user.Billing.StripeCustomerID != "" {
|
|
|
|
stripeCustomerID = &v.user.Billing.StripeCustomerID
|
2023-01-16 22:35:37 +01:00
|
|
|
stripeCustomer, err := customer.Get(v.user.Billing.StripeCustomerID, nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if stripeCustomer.Subscriptions != nil && len(stripeCustomer.Subscriptions.Data) > 0 {
|
|
|
|
return errors.New("customer cannot have more than one subscription") //FIXME
|
|
|
|
}
|
2023-01-16 05:29:46 +01:00
|
|
|
}
|
2023-01-17 16:09:37 +01:00
|
|
|
successURL := s.config.BaseURL + apiAccountBillingSubscriptionCheckoutSuccessTemplate
|
2023-01-16 05:29:46 +01:00
|
|
|
params := &stripe.CheckoutSessionParams{
|
2023-01-18 01:40:03 +01:00
|
|
|
Customer: stripeCustomerID, // A user may have previously deleted their subscription
|
|
|
|
ClientReferenceID: &v.user.Name,
|
|
|
|
SuccessURL: &successURL,
|
|
|
|
Mode: stripe.String(string(stripe.CheckoutSessionModeSubscription)),
|
|
|
|
AllowPromotionCodes: stripe.Bool(true),
|
2023-01-16 05:29:46 +01:00
|
|
|
LineItems: []*stripe.CheckoutSessionLineItemParams{
|
|
|
|
{
|
|
|
|
Price: stripe.String(tier.StripePriceID),
|
|
|
|
Quantity: stripe.Int64(1),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
/*AutomaticTax: &stripe.CheckoutSessionAutomaticTaxParams{
|
|
|
|
Enabled: stripe.Bool(true),
|
|
|
|
},*/
|
|
|
|
}
|
|
|
|
sess, err := session.New(params)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-01-17 16:09:37 +01:00
|
|
|
response := &apiAccountBillingSubscriptionCreateResponse{
|
2023-01-16 05:29:46 +01:00
|
|
|
RedirectURL: sess.URL,
|
|
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
|
|
|
|
if err := json.NewEncoder(w).Encode(response); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-01-16 22:35:37 +01:00
|
|
|
func (s *Server) handleAccountBillingSubscriptionCreateSuccess(w http.ResponseWriter, r *http.Request, _ *visitor) error {
|
2023-01-16 05:29:46 +01:00
|
|
|
// We don't have a v.user in this endpoint, only a userManager!
|
2023-01-17 16:09:37 +01:00
|
|
|
matches := apiAccountBillingSubscriptionCheckoutSuccessRegex.FindStringSubmatch(r.URL.Path)
|
2023-01-16 05:29:46 +01:00
|
|
|
if len(matches) != 2 {
|
|
|
|
return errHTTPInternalErrorInvalidPath
|
|
|
|
}
|
|
|
|
sessionID := matches[1]
|
2023-01-17 16:09:37 +01:00
|
|
|
sess, err := session.Get(sessionID, nil) // FIXME how do I rate limit this?
|
2023-01-16 05:29:46 +01:00
|
|
|
if err != nil {
|
|
|
|
log.Warn("Stripe: %s", err)
|
|
|
|
return errHTTPBadRequestInvalidStripeRequest
|
|
|
|
} else if sess.Customer == nil || sess.Subscription == nil || sess.ClientReferenceID == "" {
|
2023-01-17 16:09:37 +01:00
|
|
|
return wrapErrHTTP(errHTTPBadRequestInvalidStripeRequest, "customer or subscription not found")
|
2023-01-16 05:29:46 +01:00
|
|
|
}
|
|
|
|
sub, err := subscription.Get(sess.Subscription.ID, nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if sub.Items == nil || len(sub.Items.Data) != 1 || sub.Items.Data[0].Price == nil {
|
2023-01-17 16:09:37 +01:00
|
|
|
return wrapErrHTTP(errHTTPBadRequestInvalidStripeRequest, "more than one line item in existing subscription")
|
2023-01-16 05:29:46 +01:00
|
|
|
}
|
2023-01-17 16:09:37 +01:00
|
|
|
tier, err := s.userManager.TierByStripePrice(sub.Items.Data[0].Price.ID)
|
2023-01-16 05:29:46 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
u, err := s.userManager.User(sess.ClientReferenceID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-01-17 16:09:37 +01:00
|
|
|
if err := s.updateSubscriptionAndTier(u, sess.Customer.ID, sub.ID, string(sub.Status), sub.CurrentPeriodEnd, sub.CancelAt, tier.Code); err != nil {
|
2023-01-16 05:29:46 +01:00
|
|
|
return err
|
|
|
|
}
|
2023-01-17 16:09:37 +01:00
|
|
|
http.Redirect(w, r, s.config.BaseURL+accountPath, http.StatusSeeOther)
|
2023-01-16 05:29:46 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-01-16 22:35:37 +01:00
|
|
|
// handleAccountBillingSubscriptionUpdate updates an existing Stripe subscription to a new price, and updates
|
|
|
|
// a user's tier accordingly. This endpoint only works if there is an existing subscription.
|
|
|
|
func (s *Server) handleAccountBillingSubscriptionUpdate(w http.ResponseWriter, r *http.Request, v *visitor) error {
|
2023-01-17 16:09:37 +01:00
|
|
|
if v.user.Billing.StripeSubscriptionID == "" {
|
2023-01-16 22:35:37 +01:00
|
|
|
return errors.New("no existing subscription for user")
|
|
|
|
}
|
|
|
|
req, err := readJSONWithLimit[apiAccountBillingSubscriptionChangeRequest](r.Body, jsonBodyBytesLimit)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
tier, err := s.userManager.Tier(req.Tier)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
log.Info("Stripe: Changing tier and subscription to %s", tier.Code)
|
|
|
|
sub, err := subscription.Get(v.user.Billing.StripeSubscriptionID, nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
params := &stripe.SubscriptionParams{
|
|
|
|
CancelAtPeriodEnd: stripe.Bool(false),
|
|
|
|
ProrationBehavior: stripe.String(string(stripe.SubscriptionSchedulePhaseProrationBehaviorCreateProrations)),
|
|
|
|
Items: []*stripe.SubscriptionItemsParams{
|
|
|
|
{
|
|
|
|
ID: stripe.String(sub.Items.Data[0].ID),
|
|
|
|
Price: stripe.String(tier.StripePriceID),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
_, err = subscription.Update(sub.ID, params)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
|
2023-01-17 16:09:37 +01:00
|
|
|
if err := json.NewEncoder(w).Encode(newSuccessResponse()); err != nil {
|
2023-01-16 22:35:37 +01:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleAccountBillingSubscriptionDelete facilitates downgrading a paid user to a tier-less user,
|
|
|
|
// and cancelling the Stripe subscription entirely
|
|
|
|
func (s *Server) handleAccountBillingSubscriptionDelete(w http.ResponseWriter, r *http.Request, v *visitor) error {
|
|
|
|
if v.user.Billing.StripeCustomerID == "" {
|
|
|
|
return errHTTPBadRequestNotAPaidUser
|
|
|
|
}
|
|
|
|
if v.user.Billing.StripeSubscriptionID != "" {
|
|
|
|
params := &stripe.SubscriptionParams{
|
|
|
|
CancelAtPeriodEnd: stripe.Bool(true),
|
|
|
|
}
|
|
|
|
_, err := subscription.Update(v.user.Billing.StripeSubscriptionID, params)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2023-01-18 01:40:03 +01:00
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
|
|
|
|
if err := json.NewEncoder(w).Encode(newSuccessResponse()); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-01-16 22:35:37 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-01-16 05:29:46 +01:00
|
|
|
func (s *Server) handleAccountBillingPortalSessionCreate(w http.ResponseWriter, r *http.Request, v *visitor) error {
|
|
|
|
if v.user.Billing.StripeCustomerID == "" {
|
|
|
|
return errHTTPBadRequestNotAPaidUser
|
|
|
|
}
|
|
|
|
params := &stripe.BillingPortalSessionParams{
|
|
|
|
Customer: stripe.String(v.user.Billing.StripeCustomerID),
|
|
|
|
ReturnURL: stripe.String(s.config.BaseURL),
|
|
|
|
}
|
|
|
|
ps, err := portalsession.New(params)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
response := &apiAccountBillingPortalRedirectResponse{
|
|
|
|
RedirectURL: ps.URL,
|
|
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
w.Header().Set("Access-Control-Allow-Origin", "*") // FIXME remove this
|
|
|
|
if err := json.NewEncoder(w).Encode(response); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-01-16 22:35:37 +01:00
|
|
|
func (s *Server) handleAccountBillingWebhook(w http.ResponseWriter, r *http.Request, _ *visitor) error {
|
|
|
|
// Note that the visitor (v) in this endpoint is the Stripe API, so we don't have v.user available
|
2023-01-16 05:29:46 +01:00
|
|
|
stripeSignature := r.Header.Get("Stripe-Signature")
|
|
|
|
if stripeSignature == "" {
|
|
|
|
return errHTTPBadRequestInvalidStripeRequest
|
|
|
|
}
|
|
|
|
body, err := util.Peek(r.Body, stripeBodyBytesLimit)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if body.LimitReached {
|
|
|
|
return errHTTPEntityTooLargeJSONBody
|
|
|
|
}
|
|
|
|
event, err := webhook.ConstructEvent(body.PeekedBytes, stripeSignature, s.config.StripeWebhookKey)
|
|
|
|
if err != nil {
|
|
|
|
return errHTTPBadRequestInvalidStripeRequest
|
|
|
|
} else if event.Data == nil || event.Data.Raw == nil {
|
|
|
|
return errHTTPBadRequestInvalidStripeRequest
|
|
|
|
}
|
|
|
|
log.Info("Stripe: webhook event %s received", event.Type)
|
|
|
|
switch event.Type {
|
|
|
|
case "customer.subscription.updated":
|
2023-01-16 22:35:37 +01:00
|
|
|
return s.handleAccountBillingWebhookSubscriptionUpdated(event.Data.Raw)
|
2023-01-16 05:29:46 +01:00
|
|
|
case "customer.subscription.deleted":
|
2023-01-16 22:35:37 +01:00
|
|
|
return s.handleAccountBillingWebhookSubscriptionDeleted(event.Data.Raw)
|
2023-01-16 05:29:46 +01:00
|
|
|
default:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-16 22:35:37 +01:00
|
|
|
func (s *Server) handleAccountBillingWebhookSubscriptionUpdated(event json.RawMessage) error {
|
|
|
|
subscriptionID := gjson.GetBytes(event, "id")
|
|
|
|
customerID := gjson.GetBytes(event, "customer")
|
2023-01-16 05:29:46 +01:00
|
|
|
status := gjson.GetBytes(event, "status")
|
|
|
|
currentPeriodEnd := gjson.GetBytes(event, "current_period_end")
|
2023-01-16 16:35:12 +01:00
|
|
|
cancelAt := gjson.GetBytes(event, "cancel_at")
|
2023-01-16 05:29:46 +01:00
|
|
|
priceID := gjson.GetBytes(event, "items.data.0.price.id")
|
2023-01-16 22:35:37 +01:00
|
|
|
if !subscriptionID.Exists() || !status.Exists() || !currentPeriodEnd.Exists() || !cancelAt.Exists() || !priceID.Exists() {
|
2023-01-16 05:29:46 +01:00
|
|
|
return errHTTPBadRequestInvalidStripeRequest
|
|
|
|
}
|
2023-01-17 16:09:37 +01:00
|
|
|
log.Info("Stripe: customer %s: Updating subscription to status %s, with price %s", customerID.String(), status, priceID)
|
2023-01-16 22:35:37 +01:00
|
|
|
u, err := s.userManager.UserByStripeCustomer(customerID.String())
|
2023-01-16 05:29:46 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
tier, err := s.userManager.TierByStripePrice(priceID.String())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-01-17 16:09:37 +01:00
|
|
|
if err := s.updateSubscriptionAndTier(u, customerID.String(), subscriptionID.String(), status.String(), currentPeriodEnd.Int(), cancelAt.Int(), tier.Code); err != nil {
|
2023-01-16 05:29:46 +01:00
|
|
|
return err
|
|
|
|
}
|
2023-01-16 22:35:37 +01:00
|
|
|
s.publishSyncEventAsync(s.visitorFromUser(u, netip.IPv4Unspecified()))
|
2023-01-16 05:29:46 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-01-16 22:35:37 +01:00
|
|
|
func (s *Server) handleAccountBillingWebhookSubscriptionDeleted(event json.RawMessage) error {
|
2023-01-17 16:09:37 +01:00
|
|
|
customerID := gjson.GetBytes(event, "customer")
|
|
|
|
if !customerID.Exists() {
|
2023-01-16 05:29:46 +01:00
|
|
|
return errHTTPBadRequestInvalidStripeRequest
|
|
|
|
}
|
2023-01-17 16:09:37 +01:00
|
|
|
log.Info("Stripe: customer %s: subscription deleted, downgrading to unpaid tier", customerID.String())
|
|
|
|
u, err := s.userManager.UserByStripeCustomer(customerID.String())
|
2023-01-16 05:29:46 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-01-17 16:09:37 +01:00
|
|
|
if err := s.updateSubscriptionAndTier(u, customerID.String(), "", "", 0, 0, ""); err != nil {
|
2023-01-16 05:29:46 +01:00
|
|
|
return err
|
|
|
|
}
|
2023-01-17 16:09:37 +01:00
|
|
|
s.publishSyncEventAsync(s.visitorFromUser(u, netip.IPv4Unspecified()))
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) updateSubscriptionAndTier(u *user.User, customerID, subscriptionID, status string, paidUntil, cancelAt int64, tier string) error {
|
|
|
|
u.Billing.StripeCustomerID = customerID
|
|
|
|
u.Billing.StripeSubscriptionID = subscriptionID
|
|
|
|
u.Billing.StripeSubscriptionStatus = stripe.SubscriptionStatus(status)
|
|
|
|
u.Billing.StripeSubscriptionPaidUntil = time.Unix(paidUntil, 0)
|
|
|
|
u.Billing.StripeSubscriptionCancelAt = time.Unix(cancelAt, 0)
|
|
|
|
if tier == "" {
|
|
|
|
if err := s.userManager.ResetTier(u.Name); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if err := s.userManager.ChangeTier(u.Name, tier); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2023-01-16 05:29:46 +01:00
|
|
|
if err := s.userManager.ChangeBilling(u); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|