util.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107
  1. package server
  2. import (
  3. "io"
  4. "net/http"
  5. "net/netip"
  6. "strings"
  7. "heckel.io/ntfy/log"
  8. "heckel.io/ntfy/util"
  9. )
  10. func readBoolParam(r *http.Request, defaultValue bool, names ...string) bool {
  11. value := strings.ToLower(readParam(r, names...))
  12. if value == "" {
  13. return defaultValue
  14. }
  15. return value == "1" || value == "yes" || value == "true"
  16. }
  17. func readCommaSeperatedParam(r *http.Request, names ...string) (params []string) {
  18. paramStr := readParam(r, names...)
  19. if paramStr != "" {
  20. params = make([]string, 0)
  21. for _, s := range util.SplitNoEmpty(paramStr, ",") {
  22. params = append(params, strings.TrimSpace(s))
  23. }
  24. }
  25. return params
  26. }
  27. func readParam(r *http.Request, names ...string) string {
  28. value := readHeaderParam(r, names...)
  29. if value != "" {
  30. return value
  31. }
  32. return readQueryParam(r, names...)
  33. }
  34. func readHeaderParam(r *http.Request, names ...string) string {
  35. for _, name := range names {
  36. value := r.Header.Get(name)
  37. if value != "" {
  38. return strings.TrimSpace(value)
  39. }
  40. }
  41. return ""
  42. }
  43. func readHeaderParamValues(r *http.Request, names ...string) (values []string) {
  44. for _, name := range names {
  45. values = append(values, r.Header.Values(name)...)
  46. }
  47. return
  48. }
  49. func readQueryParam(r *http.Request, names ...string) string {
  50. for _, name := range names {
  51. value := r.URL.Query().Get(strings.ToLower(name))
  52. if value != "" {
  53. return strings.TrimSpace(value)
  54. }
  55. }
  56. return ""
  57. }
  58. func extractIPAddress(r *http.Request, behindProxy bool) netip.Addr {
  59. remoteAddr := r.RemoteAddr
  60. addrPort, err := netip.ParseAddrPort(remoteAddr)
  61. ip := addrPort.Addr()
  62. if err != nil {
  63. // This should not happen in real life; only in tests. So, using falling back to 0.0.0.0 if address unspecified
  64. ip, err = netip.ParseAddr(remoteAddr)
  65. if err != nil {
  66. ip = netip.IPv4Unspecified()
  67. if remoteAddr != "@" || !behindProxy { // RemoteAddr is @ when unix socket is used
  68. log.Warn("unable to parse IP (%s), new visitor with unspecified IP (0.0.0.0) created %s", remoteAddr, err)
  69. }
  70. }
  71. }
  72. if behindProxy && strings.TrimSpace(r.Header.Get("X-Forwarded-For")) != "" {
  73. // X-Forwarded-For can contain multiple addresses (see #328). If we are behind a proxy,
  74. // only the right-most address can be trusted (as this is the one added by our proxy server).
  75. // See https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For for details.
  76. ips := util.SplitNoEmpty(r.Header.Get("X-Forwarded-For"), ",")
  77. realIP, err := netip.ParseAddr(strings.TrimSpace(util.LastString(ips, remoteAddr)))
  78. if err != nil {
  79. log.Error("invalid IP address %s received in X-Forwarded-For header: %s", ip, err.Error())
  80. // Fall back to regular remote address if X-Forwarded-For is damaged
  81. } else {
  82. ip = realIP
  83. }
  84. }
  85. return ip
  86. }
  87. func readJSONWithLimit[T any](r io.ReadCloser, limit int, allowEmpty bool) (*T, error) {
  88. obj, err := util.UnmarshalJSONWithLimit[T](r, limit, allowEmpty)
  89. if err == util.ErrUnmarshalJSON {
  90. return nil, errHTTPBadRequestJSONInvalid
  91. } else if err == util.ErrTooLargeJSON {
  92. return nil, errHTTPEntityTooLargeJSONBody
  93. } else if err != nil {
  94. return nil, err
  95. }
  96. return obj, nil
  97. }