util.go 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194
  1. package server
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "io"
  7. "mime"
  8. "net/http"
  9. "net/netip"
  10. "regexp"
  11. "slices"
  12. "strings"
  13. "heckel.io/ntfy/v2/util"
  14. )
  15. var (
  16. mimeDecoder mime.WordDecoder
  17. // priorityHeaderIgnoreRegex matches specific patterns of the "Priority" header (RFC 9218), so that it can be ignored
  18. priorityHeaderIgnoreRegex = regexp.MustCompile(`^u=\d,\s*(i|\d)$|^u=\d$`)
  19. // forwardedHeaderRegex parses IPv4 and IPv6 addresses from the "Forwarded" header (RFC 7239)
  20. // IPv6 addresses in Forwarded header are enclosed in square brackets. The port is optional.
  21. //
  22. // Examples:
  23. // for="1.2.3.4"
  24. // for="[2001:db8::1]"; for=1.2.3.4:8080, by=phil
  25. // for="1.2.3.4:8080"
  26. forwardedHeaderRegex = regexp.MustCompile(`(?i)\bfor="?(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}|\[[0-9a-f:]+])(?::\d+)?"?`)
  27. )
  28. func readBoolParam(r *http.Request, defaultValue bool, names ...string) bool {
  29. value := strings.ToLower(readParam(r, names...))
  30. if value == "" {
  31. return defaultValue
  32. }
  33. return toBool(value)
  34. }
  35. func isBoolValue(value string) bool {
  36. return value == "1" || value == "yes" || value == "true" || value == "0" || value == "no" || value == "false"
  37. }
  38. func toBool(value string) bool {
  39. return value == "1" || value == "yes" || value == "true"
  40. }
  41. func readCommaSeparatedParam(r *http.Request, names ...string) []string {
  42. if paramStr := readParam(r, names...); paramStr != "" {
  43. return util.Map(util.SplitNoEmpty(paramStr, ","), strings.TrimSpace)
  44. }
  45. return []string{}
  46. }
  47. func readParam(r *http.Request, names ...string) string {
  48. value := readHeaderParam(r, names...)
  49. if value != "" {
  50. return value
  51. }
  52. return readQueryParam(r, names...)
  53. }
  54. func readHeaderParam(r *http.Request, names ...string) string {
  55. for _, name := range names {
  56. value := strings.TrimSpace(maybeDecodeHeader(name, r.Header.Get(name)))
  57. if value != "" {
  58. return value
  59. }
  60. }
  61. return ""
  62. }
  63. func readQueryParam(r *http.Request, names ...string) string {
  64. for _, name := range names {
  65. value := r.URL.Query().Get(strings.ToLower(name))
  66. if value != "" {
  67. return strings.TrimSpace(value)
  68. }
  69. }
  70. return ""
  71. }
  72. // extractIPAddress extracts the IP address of the visitor from the request,
  73. // either from the TCP socket or from a proxy header.
  74. func extractIPAddress(r *http.Request, behindProxy bool, proxyForwardedHeader string, proxyTrustedAddresses []string) netip.Addr {
  75. if behindProxy && proxyForwardedHeader != "" {
  76. if addr, err := extractIPAddressFromHeader(r, proxyForwardedHeader, proxyTrustedAddresses); err == nil {
  77. return addr
  78. }
  79. // Fall back to the remote address if the header is not found or invalid
  80. }
  81. addrPort, err := netip.ParseAddrPort(r.RemoteAddr)
  82. if err != nil {
  83. logr(r).Err(err).Warn("unable to parse IP (%s), new visitor with unspecified IP (0.0.0.0) created", r.RemoteAddr)
  84. return netip.IPv4Unspecified()
  85. }
  86. return addrPort.Addr()
  87. }
  88. // extractIPAddressFromHeader extracts the last IP address from the specified header.
  89. //
  90. // It supports multiple formats:
  91. // - single IP address
  92. // - comma-separated list
  93. // - RFC 7239-style list (Forwarded header)
  94. //
  95. // If there are multiple addresses, we first remove the trusted IP addresses from the list, and
  96. // then take the right-most address in the list (as this is the one added by our proxy server).
  97. // See https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For for details.
  98. func extractIPAddressFromHeader(r *http.Request, forwardedHeader string, trustedAddresses []string) (netip.Addr, error) {
  99. value := strings.TrimSpace(strings.ToLower(r.Header.Get(forwardedHeader)))
  100. if value == "" {
  101. return netip.IPv4Unspecified(), fmt.Errorf("no %s header found", forwardedHeader)
  102. }
  103. // Extract valid addresses
  104. addrsStrs := util.Map(util.SplitNoEmpty(value, ","), strings.TrimSpace)
  105. var validAddrs []netip.Addr
  106. for _, addrStr := range addrsStrs {
  107. // Handle Forwarded header with for="[IPv6]" or for="IPv4"
  108. if m := forwardedHeaderRegex.FindStringSubmatch(addrStr); len(m) == 2 {
  109. addrRaw := m[1]
  110. if strings.HasPrefix(addrRaw, "[") && strings.HasSuffix(addrRaw, "]") {
  111. addrRaw = addrRaw[1 : len(addrRaw)-1]
  112. }
  113. if addr, err := netip.ParseAddr(addrRaw); err == nil {
  114. validAddrs = append(validAddrs, addr)
  115. }
  116. } else if addr, err := netip.ParseAddr(addrStr); err == nil {
  117. validAddrs = append(validAddrs, addr)
  118. }
  119. }
  120. // Filter out proxy addresses
  121. clientAddrs := util.Filter(validAddrs, func(addr netip.Addr) bool {
  122. return !slices.Contains(trustedAddresses, addr.String())
  123. })
  124. if len(clientAddrs) == 0 {
  125. return netip.IPv4Unspecified(), fmt.Errorf("no client IP address found in %s header: %s", forwardedHeader, value)
  126. }
  127. return clientAddrs[len(clientAddrs)-1], nil
  128. }
  129. func readJSONWithLimit[T any](r io.ReadCloser, limit int, allowEmpty bool) (*T, error) {
  130. obj, err := util.UnmarshalJSONWithLimit[T](r, limit, allowEmpty)
  131. if errors.Is(err, util.ErrUnmarshalJSON) {
  132. return nil, errHTTPBadRequestJSONInvalid
  133. } else if errors.Is(err, util.ErrTooLargeJSON) {
  134. return nil, errHTTPEntityTooLargeJSONBody
  135. } else if err != nil {
  136. return nil, err
  137. }
  138. return obj, nil
  139. }
  140. func withContext(r *http.Request, ctx map[contextKey]any) *http.Request {
  141. c := r.Context()
  142. for k, v := range ctx {
  143. c = context.WithValue(c, k, v)
  144. }
  145. return r.WithContext(c)
  146. }
  147. func fromContext[T any](r *http.Request, key contextKey) (T, error) {
  148. t, ok := r.Context().Value(key).(T)
  149. if !ok {
  150. return t, fmt.Errorf("cannot find key %v in request context", key)
  151. }
  152. return t, nil
  153. }
  154. // maybeDecodeHeader decodes the given header value if it is MIME encoded, e.g. "=?utf-8?q?Hello_World?=",
  155. // or returns the original header value if it is not MIME encoded. It also calls maybeIgnoreSpecialHeader
  156. // to ignore the new HTTP "Priority" header.
  157. func maybeDecodeHeader(name, value string) string {
  158. decoded, err := mimeDecoder.DecodeHeader(value)
  159. if err != nil {
  160. return maybeIgnoreSpecialHeader(name, value)
  161. }
  162. return maybeIgnoreSpecialHeader(name, decoded)
  163. }
  164. // maybeIgnoreSpecialHeader ignores the new HTTP "Priority" header (RFC 9218, see https://datatracker.ietf.org/doc/html/rfc9218)
  165. //
  166. // Cloudflare (and potentially other providers) add this to requests when forwarding to the backend (ntfy),
  167. // so we just ignore it. If the "Priority" header is set to "u=*, i" or "u=*" (by Cloudflare), the header will be ignored.
  168. // Returning an empty string will allow the rest of the logic to continue searching for another header (x-priority, prio, p),
  169. // or in the Query parameters.
  170. func maybeIgnoreSpecialHeader(name, value string) string {
  171. if strings.ToLower(name) == "priority" && priorityHeaderIgnoreRegex.MatchString(strings.TrimSpace(value)) {
  172. return ""
  173. }
  174. return value
  175. }