util.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687
  1. package server
  2. import (
  3. "heckel.io/ntfy/util"
  4. "io"
  5. "net/http"
  6. "net/netip"
  7. "strings"
  8. )
  9. func readBoolParam(r *http.Request, defaultValue bool, names ...string) bool {
  10. value := strings.ToLower(readParam(r, names...))
  11. if value == "" {
  12. return defaultValue
  13. }
  14. return value == "1" || value == "yes" || value == "true"
  15. }
  16. func readParam(r *http.Request, names ...string) string {
  17. value := readHeaderParam(r, names...)
  18. if value != "" {
  19. return value
  20. }
  21. return readQueryParam(r, names...)
  22. }
  23. func readHeaderParam(r *http.Request, names ...string) string {
  24. for _, name := range names {
  25. value := r.Header.Get(name)
  26. if value != "" {
  27. return strings.TrimSpace(value)
  28. }
  29. }
  30. return ""
  31. }
  32. func readQueryParam(r *http.Request, names ...string) string {
  33. for _, name := range names {
  34. value := r.URL.Query().Get(strings.ToLower(name))
  35. if value != "" {
  36. return strings.TrimSpace(value)
  37. }
  38. }
  39. return ""
  40. }
  41. func extractIPAddress(r *http.Request, behindProxy bool) netip.Addr {
  42. remoteAddr := r.RemoteAddr
  43. addrPort, err := netip.ParseAddrPort(remoteAddr)
  44. ip := addrPort.Addr()
  45. if err != nil {
  46. // This should not happen in real life; only in tests. So, using falling back to 0.0.0.0 if address unspecified
  47. ip, err = netip.ParseAddr(remoteAddr)
  48. if err != nil {
  49. ip = netip.IPv4Unspecified()
  50. if remoteAddr != "@" || !behindProxy { // RemoteAddr is @ when unix socket is used
  51. logr(r).Err(err).Warn("unable to parse IP (%s), new visitor with unspecified IP (0.0.0.0) created", remoteAddr)
  52. }
  53. }
  54. }
  55. if behindProxy && strings.TrimSpace(r.Header.Get("X-Forwarded-For")) != "" {
  56. // X-Forwarded-For can contain multiple addresses (see #328). If we are behind a proxy,
  57. // only the right-most address can be trusted (as this is the one added by our proxy server).
  58. // See https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For for details.
  59. ips := util.SplitNoEmpty(r.Header.Get("X-Forwarded-For"), ",")
  60. realIP, err := netip.ParseAddr(strings.TrimSpace(util.LastString(ips, remoteAddr)))
  61. if err != nil {
  62. logr(r).Err(err).Error("invalid IP address %s received in X-Forwarded-For header", ip)
  63. // Fall back to regular remote address if X-Forwarded-For is damaged
  64. } else {
  65. ip = realIP
  66. }
  67. }
  68. return ip
  69. }
  70. func readJSONWithLimit[T any](r io.ReadCloser, limit int, allowEmpty bool) (*T, error) {
  71. obj, err := util.UnmarshalJSONWithLimit[T](r, limit, allowEmpty)
  72. if err == util.ErrUnmarshalJSON {
  73. return nil, errHTTPBadRequestJSONInvalid
  74. } else if err == util.ErrTooLargeJSON {
  75. return nil, errHTTPEntityTooLargeJSONBody
  76. } else if err != nil {
  77. return nil, err
  78. }
  79. return obj, nil
  80. }