2022-01-16 07:17:46 +03:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2023-02-23 06:26:43 +03:00
|
|
|
"context"
|
2023-02-24 04:46:53 +03:00
|
|
|
"fmt"
|
2022-06-20 04:25:35 +03:00
|
|
|
"heckel.io/ntfy/util"
|
2022-12-29 17:57:42 +03:00
|
|
|
"io"
|
2023-04-22 01:45:27 +03:00
|
|
|
"mime"
|
2022-01-16 07:17:46 +03:00
|
|
|
"net/http"
|
2022-12-22 05:55:39 +03:00
|
|
|
"net/netip"
|
2022-01-16 07:17:46 +03:00
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
2023-04-22 01:45:27 +03:00
|
|
|
var mimeDecoder mime.WordDecoder
|
|
|
|
|
2022-01-16 07:17:46 +03:00
|
|
|
func readBoolParam(r *http.Request, defaultValue bool, names ...string) bool {
|
|
|
|
value := strings.ToLower(readParam(r, names...))
|
|
|
|
if value == "" {
|
|
|
|
return defaultValue
|
|
|
|
}
|
2023-05-13 19:26:14 +03:00
|
|
|
return toBool(value)
|
|
|
|
}
|
|
|
|
|
|
|
|
func isBoolValue(value string) bool {
|
|
|
|
return value == "1" || value == "yes" || value == "true" || value == "0" || value == "no" || value == "false"
|
|
|
|
}
|
|
|
|
|
|
|
|
func toBool(value string) bool {
|
2022-01-16 07:17:46 +03:00
|
|
|
return value == "1" || value == "yes" || value == "true"
|
|
|
|
}
|
|
|
|
|
2023-02-23 05:33:18 +03:00
|
|
|
func readCommaSeparatedParam(r *http.Request, names ...string) (params []string) {
|
2023-02-22 05:04:56 +03:00
|
|
|
paramStr := readParam(r, names...)
|
|
|
|
if paramStr != "" {
|
|
|
|
params = make([]string, 0)
|
|
|
|
for _, s := range util.SplitNoEmpty(paramStr, ",") {
|
|
|
|
params = append(params, strings.TrimSpace(s))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return params
|
|
|
|
}
|
|
|
|
|
2022-01-16 07:17:46 +03:00
|
|
|
func readParam(r *http.Request, names ...string) string {
|
2022-02-26 07:25:04 +03:00
|
|
|
value := readHeaderParam(r, names...)
|
|
|
|
if value != "" {
|
|
|
|
return value
|
|
|
|
}
|
|
|
|
return readQueryParam(r, names...)
|
|
|
|
}
|
|
|
|
|
|
|
|
func readHeaderParam(r *http.Request, names ...string) string {
|
2022-01-16 07:17:46 +03:00
|
|
|
for _, name := range names {
|
2023-05-22 03:56:56 +03:00
|
|
|
value := maybeDecodeHeader(r.Header.Get(name))
|
2022-01-16 07:17:46 +03:00
|
|
|
if value != "" {
|
|
|
|
return strings.TrimSpace(value)
|
|
|
|
}
|
|
|
|
}
|
2022-02-26 07:25:04 +03:00
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func readQueryParam(r *http.Request, names ...string) string {
|
2022-01-16 07:17:46 +03:00
|
|
|
for _, name := range names {
|
|
|
|
value := r.URL.Query().Get(strings.ToLower(name))
|
|
|
|
if value != "" {
|
|
|
|
return strings.TrimSpace(value)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
2022-06-02 06:24:44 +03:00
|
|
|
|
2022-12-22 05:55:39 +03:00
|
|
|
func extractIPAddress(r *http.Request, behindProxy bool) netip.Addr {
|
|
|
|
remoteAddr := r.RemoteAddr
|
|
|
|
addrPort, err := netip.ParseAddrPort(remoteAddr)
|
|
|
|
ip := addrPort.Addr()
|
|
|
|
if err != nil {
|
|
|
|
// This should not happen in real life; only in tests. So, using falling back to 0.0.0.0 if address unspecified
|
|
|
|
ip, err = netip.ParseAddr(remoteAddr)
|
|
|
|
if err != nil {
|
|
|
|
ip = netip.IPv4Unspecified()
|
2022-12-23 17:37:47 +03:00
|
|
|
if remoteAddr != "@" || !behindProxy { // RemoteAddr is @ when unix socket is used
|
2023-02-15 18:55:01 +03:00
|
|
|
logr(r).Err(err).Warn("unable to parse IP (%s), new visitor with unspecified IP (0.0.0.0) created", remoteAddr)
|
2022-12-23 17:37:47 +03:00
|
|
|
}
|
2022-12-22 05:55:39 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if behindProxy && strings.TrimSpace(r.Header.Get("X-Forwarded-For")) != "" {
|
|
|
|
// X-Forwarded-For can contain multiple addresses (see #328). If we are behind a proxy,
|
|
|
|
// only the right-most address can be trusted (as this is the one added by our proxy server).
|
|
|
|
// See https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For for details.
|
|
|
|
ips := util.SplitNoEmpty(r.Header.Get("X-Forwarded-For"), ",")
|
|
|
|
realIP, err := netip.ParseAddr(strings.TrimSpace(util.LastString(ips, remoteAddr)))
|
|
|
|
if err != nil {
|
2023-02-15 18:55:01 +03:00
|
|
|
logr(r).Err(err).Error("invalid IP address %s received in X-Forwarded-For header", ip)
|
2022-12-22 05:55:39 +03:00
|
|
|
// Fall back to regular remote address if X-Forwarded-For is damaged
|
|
|
|
} else {
|
|
|
|
ip = realIP
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ip
|
|
|
|
}
|
2022-12-29 17:57:42 +03:00
|
|
|
|
2023-01-28 07:10:59 +03:00
|
|
|
func readJSONWithLimit[T any](r io.ReadCloser, limit int, allowEmpty bool) (*T, error) {
|
|
|
|
obj, err := util.UnmarshalJSONWithLimit[T](r, limit, allowEmpty)
|
2023-01-01 00:08:49 +03:00
|
|
|
if err == util.ErrUnmarshalJSON {
|
2022-12-29 17:57:42 +03:00
|
|
|
return nil, errHTTPBadRequestJSONInvalid
|
|
|
|
} else if err == util.ErrTooLargeJSON {
|
|
|
|
return nil, errHTTPEntityTooLargeJSONBody
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return obj, nil
|
|
|
|
}
|
2023-02-23 06:26:43 +03:00
|
|
|
|
|
|
|
func withContext(r *http.Request, ctx map[contextKey]any) *http.Request {
|
|
|
|
c := r.Context()
|
|
|
|
for k, v := range ctx {
|
|
|
|
c = context.WithValue(c, k, v)
|
|
|
|
}
|
|
|
|
return r.WithContext(c)
|
|
|
|
}
|
2023-02-24 04:46:53 +03:00
|
|
|
|
2023-03-14 17:19:15 +03:00
|
|
|
func fromContext[T any](r *http.Request, key contextKey) (T, error) {
|
2023-03-04 06:22:07 +03:00
|
|
|
t, ok := r.Context().Value(key).(T)
|
2023-02-24 04:46:53 +03:00
|
|
|
if !ok {
|
2023-03-14 17:19:15 +03:00
|
|
|
return t, fmt.Errorf("cannot find key %v in request context", key)
|
2023-02-24 04:46:53 +03:00
|
|
|
}
|
2023-03-14 17:19:15 +03:00
|
|
|
return t, nil
|
2023-02-24 04:46:53 +03:00
|
|
|
}
|
2023-04-22 04:07:07 +03:00
|
|
|
|
|
|
|
func maybeDecodeHeader(header string) string {
|
|
|
|
decoded, err := mimeDecoder.DecodeHeader(header)
|
|
|
|
if err != nil {
|
|
|
|
return header
|
|
|
|
}
|
|
|
|
return decoded
|
|
|
|
}
|