serve.go 44 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687
  1. //go:build !noserver
  2. package cmd
  3. import (
  4. "errors"
  5. "fmt"
  6. "io/fs"
  7. "math"
  8. "net"
  9. "net/netip"
  10. "net/url"
  11. "os"
  12. "os/signal"
  13. "strings"
  14. "syscall"
  15. "text/template"
  16. "time"
  17. "github.com/urfave/cli/v2"
  18. "github.com/urfave/cli/v2/altsrc"
  19. "heckel.io/ntfy/v2/log"
  20. "heckel.io/ntfy/v2/payments"
  21. "heckel.io/ntfy/v2/server"
  22. "heckel.io/ntfy/v2/user"
  23. "heckel.io/ntfy/v2/util"
  24. )
  25. func init() {
  26. commands = append(commands, cmdServe)
  27. }
  28. var flagsServe = append(
  29. append([]cli.Flag{}, flagsDefault...),
  30. &cli.StringFlag{Name: "config", Aliases: []string{"c"}, EnvVars: []string{"NTFY_CONFIG_FILE"}, Value: server.DefaultConfigFile, Usage: "config file"},
  31. altsrc.NewStringFlag(&cli.StringFlag{Name: "base-url", Aliases: []string{"base_url", "B"}, EnvVars: []string{"NTFY_BASE_URL"}, Usage: "externally visible base URL for this host (e.g. https://ntfy.sh)"}),
  32. altsrc.NewStringFlag(&cli.StringFlag{Name: "listen-http", Aliases: []string{"listen_http", "l"}, EnvVars: []string{"NTFY_LISTEN_HTTP"}, Value: server.DefaultListenHTTP, Usage: "ip:port used as HTTP listen address"}),
  33. altsrc.NewStringFlag(&cli.StringFlag{Name: "listen-https", Aliases: []string{"listen_https", "L"}, EnvVars: []string{"NTFY_LISTEN_HTTPS"}, Usage: "ip:port used as HTTPS listen address"}),
  34. altsrc.NewStringFlag(&cli.StringFlag{Name: "listen-unix", Aliases: []string{"listen_unix", "U"}, EnvVars: []string{"NTFY_LISTEN_UNIX"}, Usage: "listen on unix socket path"}),
  35. altsrc.NewIntFlag(&cli.IntFlag{Name: "listen-unix-mode", Aliases: []string{"listen_unix_mode"}, EnvVars: []string{"NTFY_LISTEN_UNIX_MODE"}, DefaultText: "system default", Usage: "file permissions of unix socket, e.g. 0700"}),
  36. altsrc.NewStringFlag(&cli.StringFlag{Name: "key-file", Aliases: []string{"key_file", "K"}, EnvVars: []string{"NTFY_KEY_FILE"}, Usage: "private key file, if listen-https is set"}),
  37. altsrc.NewStringFlag(&cli.StringFlag{Name: "cert-file", Aliases: []string{"cert_file", "E"}, EnvVars: []string{"NTFY_CERT_FILE"}, Usage: "certificate file, if listen-https is set"}),
  38. altsrc.NewStringFlag(&cli.StringFlag{Name: "firebase-key-file", Aliases: []string{"firebase_key_file", "F"}, EnvVars: []string{"NTFY_FIREBASE_KEY_FILE"}, Usage: "Firebase credentials file; if set additionally publish to FCM topic"}),
  39. altsrc.NewStringFlag(&cli.StringFlag{Name: "cache-file", Aliases: []string{"cache_file", "C"}, EnvVars: []string{"NTFY_CACHE_FILE"}, Usage: "cache file used for message caching"}),
  40. altsrc.NewStringFlag(&cli.StringFlag{Name: "cache-duration", Aliases: []string{"cache_duration", "b"}, EnvVars: []string{"NTFY_CACHE_DURATION"}, Value: util.FormatDuration(server.DefaultCacheDuration), Usage: "buffer messages for this time to allow `since` requests"}),
  41. altsrc.NewIntFlag(&cli.IntFlag{Name: "cache-batch-size", Aliases: []string{"cache_batch_size"}, EnvVars: []string{"NTFY_BATCH_SIZE"}, Usage: "max size of messages to batch together when writing to message cache (if zero, writes are synchronous)"}),
  42. altsrc.NewStringFlag(&cli.StringFlag{Name: "cache-batch-timeout", Aliases: []string{"cache_batch_timeout"}, EnvVars: []string{"NTFY_CACHE_BATCH_TIMEOUT"}, Value: util.FormatDuration(server.DefaultCacheBatchTimeout), Usage: "timeout for batched async writes to the message cache (if zero, writes are synchronous)"}),
  43. altsrc.NewStringFlag(&cli.StringFlag{Name: "cache-startup-queries", Aliases: []string{"cache_startup_queries"}, EnvVars: []string{"NTFY_CACHE_STARTUP_QUERIES"}, Usage: "queries run when the cache database is initialized"}),
  44. altsrc.NewStringFlag(&cli.StringFlag{Name: "auth-file", Aliases: []string{"auth_file", "H"}, EnvVars: []string{"NTFY_AUTH_FILE"}, Usage: "auth database file used for access control"}),
  45. altsrc.NewStringFlag(&cli.StringFlag{Name: "auth-startup-queries", Aliases: []string{"auth_startup_queries"}, EnvVars: []string{"NTFY_AUTH_STARTUP_QUERIES"}, Usage: "queries run when the auth database is initialized"}),
  46. altsrc.NewStringFlag(&cli.StringFlag{Name: "auth-default-access", Aliases: []string{"auth_default_access", "p"}, EnvVars: []string{"NTFY_AUTH_DEFAULT_ACCESS"}, Value: "read-write", Usage: "default permissions if no matching entries in the auth database are found"}),
  47. altsrc.NewStringSliceFlag(&cli.StringSliceFlag{Name: "auth-users", Aliases: []string{"auth_users"}, EnvVars: []string{"NTFY_AUTH_USERS"}, Usage: "pre-provisioned declarative users"}),
  48. altsrc.NewStringSliceFlag(&cli.StringSliceFlag{Name: "auth-access", Aliases: []string{"auth_access"}, EnvVars: []string{"NTFY_AUTH_ACCESS"}, Usage: "pre-provisioned declarative access control entries"}),
  49. altsrc.NewStringSliceFlag(&cli.StringSliceFlag{Name: "auth-tokens", Aliases: []string{"auth_tokens"}, EnvVars: []string{"NTFY_AUTH_TOKENS"}, Usage: "pre-provisioned declarative access tokens"}),
  50. altsrc.NewStringFlag(&cli.StringFlag{Name: "attachment-cache-dir", Aliases: []string{"attachment_cache_dir"}, EnvVars: []string{"NTFY_ATTACHMENT_CACHE_DIR"}, Usage: "cache directory for attached files"}),
  51. altsrc.NewStringFlag(&cli.StringFlag{Name: "attachment-total-size-limit", Aliases: []string{"attachment_total_size_limit", "A"}, EnvVars: []string{"NTFY_ATTACHMENT_TOTAL_SIZE_LIMIT"}, Value: util.FormatSize(server.DefaultAttachmentTotalSizeLimit), Usage: "limit of the on-disk attachment cache"}),
  52. altsrc.NewStringFlag(&cli.StringFlag{Name: "attachment-file-size-limit", Aliases: []string{"attachment_file_size_limit", "Y"}, EnvVars: []string{"NTFY_ATTACHMENT_FILE_SIZE_LIMIT"}, Value: util.FormatSize(server.DefaultAttachmentFileSizeLimit), Usage: "per-file attachment size limit (e.g. 300k, 2M, 100M)"}),
  53. altsrc.NewStringFlag(&cli.StringFlag{Name: "attachment-expiry-duration", Aliases: []string{"attachment_expiry_duration", "X"}, EnvVars: []string{"NTFY_ATTACHMENT_EXPIRY_DURATION"}, Value: util.FormatDuration(server.DefaultAttachmentExpiryDuration), Usage: "duration after which uploaded attachments will be deleted (e.g. 3h, 20h)"}),
  54. altsrc.NewStringFlag(&cli.StringFlag{Name: "template-dir", Aliases: []string{"template_dir"}, EnvVars: []string{"NTFY_TEMPLATE_DIR"}, Value: server.DefaultTemplateDir, Usage: "directory to load named message templates from"}),
  55. altsrc.NewStringFlag(&cli.StringFlag{Name: "keepalive-interval", Aliases: []string{"keepalive_interval", "k"}, EnvVars: []string{"NTFY_KEEPALIVE_INTERVAL"}, Value: util.FormatDuration(server.DefaultKeepaliveInterval), Usage: "interval of keepalive messages"}),
  56. altsrc.NewStringFlag(&cli.StringFlag{Name: "manager-interval", Aliases: []string{"manager_interval", "m"}, EnvVars: []string{"NTFY_MANAGER_INTERVAL"}, Value: util.FormatDuration(server.DefaultManagerInterval), Usage: "interval of for message pruning and stats printing"}),
  57. altsrc.NewStringSliceFlag(&cli.StringSliceFlag{Name: "disallowed-topics", Aliases: []string{"disallowed_topics"}, EnvVars: []string{"NTFY_DISALLOWED_TOPICS"}, Usage: "topics that are not allowed to be used"}),
  58. altsrc.NewStringFlag(&cli.StringFlag{Name: "web-root", Aliases: []string{"web_root"}, EnvVars: []string{"NTFY_WEB_ROOT"}, Value: "/", Usage: "sets root of the web app (e.g. /, or /app), or disables it (disable)"}),
  59. altsrc.NewBoolFlag(&cli.BoolFlag{Name: "enable-signup", Aliases: []string{"enable_signup"}, EnvVars: []string{"NTFY_ENABLE_SIGNUP"}, Value: false, Usage: "allows users to sign up via the web app, or API"}),
  60. altsrc.NewBoolFlag(&cli.BoolFlag{Name: "enable-login", Aliases: []string{"enable_login"}, EnvVars: []string{"NTFY_ENABLE_LOGIN"}, Value: false, Usage: "allows users to log in via the web app, or API"}),
  61. altsrc.NewBoolFlag(&cli.BoolFlag{Name: "enable-reservations", Aliases: []string{"enable_reservations"}, EnvVars: []string{"NTFY_ENABLE_RESERVATIONS"}, Value: false, Usage: "allows users to reserve topics (if their tier allows it)"}),
  62. altsrc.NewBoolFlag(&cli.BoolFlag{Name: "require-login", Aliases: []string{"require_login"}, EnvVars: []string{"NTFY_REQUIRE_LOGIN"}, Value: false, Usage: "all actions via the web app requires a login"}),
  63. altsrc.NewStringFlag(&cli.StringFlag{Name: "upstream-base-url", Aliases: []string{"upstream_base_url"}, EnvVars: []string{"NTFY_UPSTREAM_BASE_URL"}, Value: "", Usage: "forward poll request to an upstream server, this is needed for iOS push notifications for self-hosted servers"}),
  64. altsrc.NewStringFlag(&cli.StringFlag{Name: "upstream-access-token", Aliases: []string{"upstream_access_token"}, EnvVars: []string{"NTFY_UPSTREAM_ACCESS_TOKEN"}, Value: "", Usage: "access token to use for the upstream server; needed only if upstream rate limits are exceeded or upstream server requires auth"}),
  65. altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-sender-addr", Aliases: []string{"smtp_sender_addr"}, EnvVars: []string{"NTFY_SMTP_SENDER_ADDR"}, Usage: "SMTP server address (host:port) for outgoing emails"}),
  66. altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-sender-user", Aliases: []string{"smtp_sender_user"}, EnvVars: []string{"NTFY_SMTP_SENDER_USER"}, Usage: "SMTP user (if e-mail sending is enabled)"}),
  67. altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-sender-pass", Aliases: []string{"smtp_sender_pass"}, EnvVars: []string{"NTFY_SMTP_SENDER_PASS"}, Usage: "SMTP password (if e-mail sending is enabled)"}),
  68. altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-sender-from", Aliases: []string{"smtp_sender_from"}, EnvVars: []string{"NTFY_SMTP_SENDER_FROM"}, Usage: "SMTP sender address (if e-mail sending is enabled)"}),
  69. altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-server-listen", Aliases: []string{"smtp_server_listen"}, EnvVars: []string{"NTFY_SMTP_SERVER_LISTEN"}, Usage: "SMTP server address (ip:port) for incoming emails, e.g. :25"}),
  70. altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-server-domain", Aliases: []string{"smtp_server_domain"}, EnvVars: []string{"NTFY_SMTP_SERVER_DOMAIN"}, Usage: "SMTP domain for incoming e-mail, e.g. ntfy.sh"}),
  71. altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-server-addr-prefix", Aliases: []string{"smtp_server_addr_prefix"}, EnvVars: []string{"NTFY_SMTP_SERVER_ADDR_PREFIX"}, Usage: "SMTP email address prefix for topics to prevent spam (e.g. 'ntfy-')"}),
  72. altsrc.NewStringFlag(&cli.StringFlag{Name: "twilio-account", Aliases: []string{"twilio_account"}, EnvVars: []string{"NTFY_TWILIO_ACCOUNT"}, Usage: "Twilio account SID, used for phone calls, e.g. AC123..."}),
  73. altsrc.NewStringFlag(&cli.StringFlag{Name: "twilio-auth-token", Aliases: []string{"twilio_auth_token"}, EnvVars: []string{"NTFY_TWILIO_AUTH_TOKEN"}, Usage: "Twilio auth token"}),
  74. altsrc.NewStringFlag(&cli.StringFlag{Name: "twilio-phone-number", Aliases: []string{"twilio_phone_number"}, EnvVars: []string{"NTFY_TWILIO_PHONE_NUMBER"}, Usage: "Twilio number to use for outgoing calls"}),
  75. altsrc.NewStringFlag(&cli.StringFlag{Name: "twilio-verify-service", Aliases: []string{"twilio_verify_service"}, EnvVars: []string{"NTFY_TWILIO_VERIFY_SERVICE"}, Usage: "Twilio Verify service ID, used for phone number verification"}),
  76. altsrc.NewStringFlag(&cli.StringFlag{Name: "twilio-call-format", Aliases: []string{"twilio_call_format"}, EnvVars: []string{"NTFY_TWILIO_CALL_FORMAT"}, Usage: "Twilio/TwiML format string for phone calls"}),
  77. altsrc.NewStringFlag(&cli.StringFlag{Name: "message-size-limit", Aliases: []string{"message_size_limit"}, EnvVars: []string{"NTFY_MESSAGE_SIZE_LIMIT"}, Value: util.FormatSize(server.DefaultMessageSizeLimit), Usage: "size limit for the message (see docs for limitations)"}),
  78. altsrc.NewStringFlag(&cli.StringFlag{Name: "message-delay-limit", Aliases: []string{"message_delay_limit"}, EnvVars: []string{"NTFY_MESSAGE_DELAY_LIMIT"}, Value: util.FormatDuration(server.DefaultMessageDelayMax), Usage: "max duration a message can be scheduled into the future"}),
  79. altsrc.NewIntFlag(&cli.IntFlag{Name: "global-topic-limit", Aliases: []string{"global_topic_limit", "T"}, EnvVars: []string{"NTFY_GLOBAL_TOPIC_LIMIT"}, Value: server.DefaultTotalTopicLimit, Usage: "total number of topics allowed"}),
  80. altsrc.NewIntFlag(&cli.IntFlag{Name: "visitor-subscription-limit", Aliases: []string{"visitor_subscription_limit"}, EnvVars: []string{"NTFY_VISITOR_SUBSCRIPTION_LIMIT"}, Value: server.DefaultVisitorSubscriptionLimit, Usage: "number of subscriptions per visitor"}),
  81. altsrc.NewBoolFlag(&cli.BoolFlag{Name: "visitor-subscriber-rate-limiting", Aliases: []string{"visitor_subscriber_rate_limiting"}, EnvVars: []string{"NTFY_VISITOR_SUBSCRIBER_RATE_LIMITING"}, Value: false, Usage: "enables subscriber-based rate limiting"}),
  82. altsrc.NewStringFlag(&cli.StringFlag{Name: "visitor-attachment-total-size-limit", Aliases: []string{"visitor_attachment_total_size_limit"}, EnvVars: []string{"NTFY_VISITOR_ATTACHMENT_TOTAL_SIZE_LIMIT"}, Value: util.FormatSize(server.DefaultVisitorAttachmentTotalSizeLimit), Usage: "total storage limit used for attachments per visitor"}),
  83. altsrc.NewStringFlag(&cli.StringFlag{Name: "visitor-attachment-daily-bandwidth-limit", Aliases: []string{"visitor_attachment_daily_bandwidth_limit"}, EnvVars: []string{"NTFY_VISITOR_ATTACHMENT_DAILY_BANDWIDTH_LIMIT"}, Value: "500M", Usage: "total daily attachment download/upload bandwidth limit per visitor"}),
  84. altsrc.NewIntFlag(&cli.IntFlag{Name: "visitor-request-limit-burst", Aliases: []string{"visitor_request_limit_burst"}, EnvVars: []string{"NTFY_VISITOR_REQUEST_LIMIT_BURST"}, Value: server.DefaultVisitorRequestLimitBurst, Usage: "initial limit of requests per visitor"}),
  85. altsrc.NewStringFlag(&cli.StringFlag{Name: "visitor-request-limit-replenish", Aliases: []string{"visitor_request_limit_replenish"}, EnvVars: []string{"NTFY_VISITOR_REQUEST_LIMIT_REPLENISH"}, Value: util.FormatDuration(server.DefaultVisitorRequestLimitReplenish), Usage: "interval at which burst limit is replenished (one per x)"}),
  86. altsrc.NewStringFlag(&cli.StringFlag{Name: "visitor-request-limit-exempt-hosts", Aliases: []string{"visitor_request_limit_exempt_hosts"}, EnvVars: []string{"NTFY_VISITOR_REQUEST_LIMIT_EXEMPT_HOSTS"}, Value: "", Usage: "hostnames and/or IP addresses of hosts that will be exempt from the visitor request limit"}),
  87. altsrc.NewIntFlag(&cli.IntFlag{Name: "visitor-message-daily-limit", Aliases: []string{"visitor_message_daily_limit"}, EnvVars: []string{"NTFY_VISITOR_MESSAGE_DAILY_LIMIT"}, Value: server.DefaultVisitorMessageDailyLimit, Usage: "max messages per visitor per day, derived from request limit if unset"}),
  88. altsrc.NewIntFlag(&cli.IntFlag{Name: "visitor-email-limit-burst", Aliases: []string{"visitor_email_limit_burst"}, EnvVars: []string{"NTFY_VISITOR_EMAIL_LIMIT_BURST"}, Value: server.DefaultVisitorEmailLimitBurst, Usage: "initial limit of e-mails per visitor"}),
  89. altsrc.NewStringFlag(&cli.StringFlag{Name: "visitor-email-limit-replenish", Aliases: []string{"visitor_email_limit_replenish"}, EnvVars: []string{"NTFY_VISITOR_EMAIL_LIMIT_REPLENISH"}, Value: util.FormatDuration(server.DefaultVisitorEmailLimitReplenish), Usage: "interval at which burst limit is replenished (one per x)"}),
  90. altsrc.NewIntFlag(&cli.IntFlag{Name: "visitor-prefix-bits-ipv4", Aliases: []string{"visitor_prefix_bits_ipv4"}, EnvVars: []string{"NTFY_VISITOR_PREFIX_BITS_IPV4"}, Value: server.DefaultVisitorPrefixBitsIPv4, Usage: "number of bits of the IPv4 address to use for rate limiting (default: 32, full address)"}),
  91. altsrc.NewIntFlag(&cli.IntFlag{Name: "visitor-prefix-bits-ipv6", Aliases: []string{"visitor_prefix_bits_ipv6"}, EnvVars: []string{"NTFY_VISITOR_PREFIX_BITS_IPV6"}, Value: server.DefaultVisitorPrefixBitsIPv6, Usage: "number of bits of the IPv6 address to use for rate limiting (default: 64, /64 subnet)"}),
  92. altsrc.NewBoolFlag(&cli.BoolFlag{Name: "behind-proxy", Aliases: []string{"behind_proxy", "P"}, EnvVars: []string{"NTFY_BEHIND_PROXY"}, Value: false, Usage: "if set, use forwarded header (e.g. X-Forwarded-For, X-Client-IP) to determine visitor IP address (for rate limiting)"}),
  93. altsrc.NewStringFlag(&cli.StringFlag{Name: "proxy-forwarded-header", Aliases: []string{"proxy_forwarded_header"}, EnvVars: []string{"NTFY_PROXY_FORWARDED_HEADER"}, Value: "X-Forwarded-For", Usage: "use specified header to determine visitor IP address (for rate limiting)"}),
  94. altsrc.NewStringFlag(&cli.StringFlag{Name: "proxy-trusted-hosts", Aliases: []string{"proxy_trusted_hosts"}, EnvVars: []string{"NTFY_PROXY_TRUSTED_HOSTS"}, Value: "", Usage: "comma-separated list of trusted IP addresses, hosts, or CIDRs to remove from forwarded header"}),
  95. altsrc.NewStringFlag(&cli.StringFlag{Name: "stripe-secret-key", Aliases: []string{"stripe_secret_key"}, EnvVars: []string{"NTFY_STRIPE_SECRET_KEY"}, Value: "", Usage: "key used for the Stripe API communication, this enables payments"}),
  96. altsrc.NewStringFlag(&cli.StringFlag{Name: "stripe-webhook-key", Aliases: []string{"stripe_webhook_key"}, EnvVars: []string{"NTFY_STRIPE_WEBHOOK_KEY"}, Value: "", Usage: "key required to validate the authenticity of incoming webhooks from Stripe"}),
  97. altsrc.NewStringFlag(&cli.StringFlag{Name: "billing-contact", Aliases: []string{"billing_contact"}, EnvVars: []string{"NTFY_BILLING_CONTACT"}, Value: "", Usage: "e-mail or website to display in upgrade dialog (only if payments are enabled)"}),
  98. altsrc.NewBoolFlag(&cli.BoolFlag{Name: "enable-metrics", Aliases: []string{"enable_metrics"}, EnvVars: []string{"NTFY_ENABLE_METRICS"}, Value: false, Usage: "if set, Prometheus metrics are exposed via the /metrics endpoint"}),
  99. altsrc.NewStringFlag(&cli.StringFlag{Name: "metrics-listen-http", Aliases: []string{"metrics_listen_http"}, EnvVars: []string{"NTFY_METRICS_LISTEN_HTTP"}, Usage: "ip:port used to expose the metrics endpoint (implicitly enables metrics)"}),
  100. altsrc.NewStringFlag(&cli.StringFlag{Name: "profile-listen-http", Aliases: []string{"profile_listen_http"}, EnvVars: []string{"NTFY_PROFILE_LISTEN_HTTP"}, Usage: "ip:port used to expose the profiling endpoints (implicitly enables profiling)"}),
  101. altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-public-key", Aliases: []string{"web_push_public_key"}, EnvVars: []string{"NTFY_WEB_PUSH_PUBLIC_KEY"}, Usage: "public key used for web push notifications"}),
  102. altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-private-key", Aliases: []string{"web_push_private_key"}, EnvVars: []string{"NTFY_WEB_PUSH_PRIVATE_KEY"}, Usage: "private key used for web push notifications"}),
  103. altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-file", Aliases: []string{"web_push_file"}, EnvVars: []string{"NTFY_WEB_PUSH_FILE"}, Usage: "file used to store web push subscriptions"}),
  104. altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-email-address", Aliases: []string{"web_push_email_address"}, EnvVars: []string{"NTFY_WEB_PUSH_EMAIL_ADDRESS"}, Usage: "e-mail address of sender, required to use browser push services"}),
  105. altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-startup-queries", Aliases: []string{"web_push_startup_queries"}, EnvVars: []string{"NTFY_WEB_PUSH_STARTUP_QUERIES"}, Usage: "queries run when the web push database is initialized"}),
  106. altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-expiry-duration", Aliases: []string{"web_push_expiry_duration"}, EnvVars: []string{"NTFY_WEB_PUSH_EXPIRY_DURATION"}, Value: util.FormatDuration(server.DefaultWebPushExpiryDuration), Usage: "automatically expire unused subscriptions after this time"}),
  107. altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-expiry-warning-duration", Aliases: []string{"web_push_expiry_warning_duration"}, EnvVars: []string{"NTFY_WEB_PUSH_EXPIRY_WARNING_DURATION"}, Value: util.FormatDuration(server.DefaultWebPushExpiryWarningDuration), Usage: "send web push warning notification after this time before expiring unused subscriptions"}),
  108. )
  109. var cmdServe = &cli.Command{
  110. Name: "serve",
  111. Usage: "Run the ntfy server",
  112. UsageText: "ntfy serve [OPTIONS..]",
  113. Action: execServe,
  114. Category: categoryServer,
  115. Flags: flagsServe,
  116. Before: initConfigFileInputSourceFunc("config", flagsServe, initLogFunc),
  117. Description: `Run the ntfy server and listen for incoming requests
  118. The command will load the configuration from /etc/ntfy/server.yml. Config options can
  119. be overridden using the command line options.
  120. Examples:
  121. ntfy serve # Starts server in the foreground (on port 80)
  122. ntfy serve --listen-http :8080 # Starts server with alternate port`,
  123. }
  124. func execServe(c *cli.Context) error {
  125. if c.NArg() > 0 {
  126. return errors.New("no arguments expected, see 'ntfy serve --help' for help")
  127. }
  128. // Read all the options
  129. config := c.String("config")
  130. baseURL := strings.TrimSuffix(c.String("base-url"), "/")
  131. listenHTTP := c.String("listen-http")
  132. listenHTTPS := c.String("listen-https")
  133. listenUnix := c.String("listen-unix")
  134. listenUnixMode := c.Int("listen-unix-mode")
  135. keyFile := c.String("key-file")
  136. certFile := c.String("cert-file")
  137. firebaseKeyFile := c.String("firebase-key-file")
  138. webPushPrivateKey := c.String("web-push-private-key")
  139. webPushPublicKey := c.String("web-push-public-key")
  140. webPushFile := c.String("web-push-file")
  141. webPushEmailAddress := c.String("web-push-email-address")
  142. webPushStartupQueries := c.String("web-push-startup-queries")
  143. webPushExpiryDurationStr := c.String("web-push-expiry-duration")
  144. webPushExpiryWarningDurationStr := c.String("web-push-expiry-warning-duration")
  145. cacheFile := c.String("cache-file")
  146. cacheDurationStr := c.String("cache-duration")
  147. cacheStartupQueries := c.String("cache-startup-queries")
  148. cacheBatchSize := c.Int("cache-batch-size")
  149. cacheBatchTimeoutStr := c.String("cache-batch-timeout")
  150. authFile := c.String("auth-file")
  151. authStartupQueries := c.String("auth-startup-queries")
  152. authDefaultAccess := c.String("auth-default-access")
  153. authUsersRaw := c.StringSlice("auth-users")
  154. authAccessRaw := c.StringSlice("auth-access")
  155. authTokensRaw := c.StringSlice("auth-tokens")
  156. attachmentCacheDir := c.String("attachment-cache-dir")
  157. attachmentTotalSizeLimitStr := c.String("attachment-total-size-limit")
  158. attachmentFileSizeLimitStr := c.String("attachment-file-size-limit")
  159. attachmentExpiryDurationStr := c.String("attachment-expiry-duration")
  160. templateDir := c.String("template-dir")
  161. keepaliveIntervalStr := c.String("keepalive-interval")
  162. managerIntervalStr := c.String("manager-interval")
  163. disallowedTopics := c.StringSlice("disallowed-topics")
  164. webRoot := c.String("web-root")
  165. enableSignup := c.Bool("enable-signup")
  166. enableLogin := c.Bool("enable-login")
  167. requireLogin := c.Bool("require-login")
  168. enableReservations := c.Bool("enable-reservations")
  169. upstreamBaseURL := c.String("upstream-base-url")
  170. upstreamAccessToken := c.String("upstream-access-token")
  171. smtpSenderAddr := c.String("smtp-sender-addr")
  172. smtpSenderUser := c.String("smtp-sender-user")
  173. smtpSenderPass := c.String("smtp-sender-pass")
  174. smtpSenderFrom := c.String("smtp-sender-from")
  175. smtpServerListen := c.String("smtp-server-listen")
  176. smtpServerDomain := c.String("smtp-server-domain")
  177. smtpServerAddrPrefix := c.String("smtp-server-addr-prefix")
  178. twilioAccount := c.String("twilio-account")
  179. twilioAuthToken := c.String("twilio-auth-token")
  180. twilioPhoneNumber := c.String("twilio-phone-number")
  181. twilioVerifyService := c.String("twilio-verify-service")
  182. twilioCallFormat := c.String("twilio-call-format")
  183. messageSizeLimitStr := c.String("message-size-limit")
  184. messageDelayLimitStr := c.String("message-delay-limit")
  185. totalTopicLimit := c.Int("global-topic-limit")
  186. visitorSubscriptionLimit := c.Int("visitor-subscription-limit")
  187. visitorSubscriberRateLimiting := c.Bool("visitor-subscriber-rate-limiting")
  188. visitorAttachmentTotalSizeLimitStr := c.String("visitor-attachment-total-size-limit")
  189. visitorAttachmentDailyBandwidthLimitStr := c.String("visitor-attachment-daily-bandwidth-limit")
  190. visitorRequestLimitBurst := c.Int("visitor-request-limit-burst")
  191. visitorRequestLimitReplenishStr := c.String("visitor-request-limit-replenish")
  192. visitorRequestLimitExemptHosts := util.SplitNoEmpty(c.String("visitor-request-limit-exempt-hosts"), ",")
  193. visitorMessageDailyLimit := c.Int("visitor-message-daily-limit")
  194. visitorEmailLimitBurst := c.Int("visitor-email-limit-burst")
  195. visitorEmailLimitReplenishStr := c.String("visitor-email-limit-replenish")
  196. visitorPrefixBitsIPv4 := c.Int("visitor-prefix-bits-ipv4")
  197. visitorPrefixBitsIPv6 := c.Int("visitor-prefix-bits-ipv6")
  198. behindProxy := c.Bool("behind-proxy")
  199. proxyForwardedHeader := c.String("proxy-forwarded-header")
  200. proxyTrustedHosts := util.SplitNoEmpty(c.String("proxy-trusted-hosts"), ",")
  201. stripeSecretKey := c.String("stripe-secret-key")
  202. stripeWebhookKey := c.String("stripe-webhook-key")
  203. billingContact := c.String("billing-contact")
  204. metricsListenHTTP := c.String("metrics-listen-http")
  205. enableMetrics := c.Bool("enable-metrics") || metricsListenHTTP != ""
  206. profileListenHTTP := c.String("profile-listen-http")
  207. // Convert durations
  208. cacheDuration, err := util.ParseDuration(cacheDurationStr)
  209. if err != nil {
  210. return fmt.Errorf("invalid cache duration: %s", cacheDurationStr)
  211. }
  212. cacheBatchTimeout, err := util.ParseDuration(cacheBatchTimeoutStr)
  213. if err != nil {
  214. return fmt.Errorf("invalid cache batch timeout: %s", cacheBatchTimeoutStr)
  215. }
  216. attachmentExpiryDuration, err := util.ParseDuration(attachmentExpiryDurationStr)
  217. if err != nil {
  218. return fmt.Errorf("invalid attachment expiry duration: %s", attachmentExpiryDurationStr)
  219. }
  220. keepaliveInterval, err := util.ParseDuration(keepaliveIntervalStr)
  221. if err != nil {
  222. return fmt.Errorf("invalid keepalive interval: %s", keepaliveIntervalStr)
  223. }
  224. managerInterval, err := util.ParseDuration(managerIntervalStr)
  225. if err != nil {
  226. return fmt.Errorf("invalid manager interval: %s", managerIntervalStr)
  227. }
  228. messageDelayLimit, err := util.ParseDuration(messageDelayLimitStr)
  229. if err != nil {
  230. return fmt.Errorf("invalid message delay limit: %s", messageDelayLimitStr)
  231. }
  232. visitorRequestLimitReplenish, err := util.ParseDuration(visitorRequestLimitReplenishStr)
  233. if err != nil {
  234. return fmt.Errorf("invalid visitor request limit replenish: %s", visitorRequestLimitReplenishStr)
  235. }
  236. visitorEmailLimitReplenish, err := util.ParseDuration(visitorEmailLimitReplenishStr)
  237. if err != nil {
  238. return fmt.Errorf("invalid visitor email limit replenish: %s", visitorEmailLimitReplenishStr)
  239. }
  240. webPushExpiryDuration, err := util.ParseDuration(webPushExpiryDurationStr)
  241. if err != nil {
  242. return fmt.Errorf("invalid web push expiry duration: %s", webPushExpiryDurationStr)
  243. }
  244. webPushExpiryWarningDuration, err := util.ParseDuration(webPushExpiryWarningDurationStr)
  245. if err != nil {
  246. return fmt.Errorf("invalid web push expiry warning duration: %s", webPushExpiryWarningDurationStr)
  247. }
  248. // Convert sizes to bytes
  249. messageSizeLimit, err := util.ParseSize(messageSizeLimitStr)
  250. if err != nil {
  251. return fmt.Errorf("invalid message size limit: %s", messageSizeLimitStr)
  252. }
  253. attachmentTotalSizeLimit, err := util.ParseSize(attachmentTotalSizeLimitStr)
  254. if err != nil {
  255. return fmt.Errorf("invalid attachment total size limit: %s", attachmentTotalSizeLimitStr)
  256. }
  257. attachmentFileSizeLimit, err := util.ParseSize(attachmentFileSizeLimitStr)
  258. if err != nil {
  259. return fmt.Errorf("invalid attachment file size limit: %s", attachmentFileSizeLimitStr)
  260. }
  261. visitorAttachmentTotalSizeLimit, err := util.ParseSize(visitorAttachmentTotalSizeLimitStr)
  262. if err != nil {
  263. return fmt.Errorf("invalid visitor attachment total size limit: %s", visitorAttachmentTotalSizeLimitStr)
  264. }
  265. visitorAttachmentDailyBandwidthLimit, err := util.ParseSize(visitorAttachmentDailyBandwidthLimitStr)
  266. if err != nil {
  267. return fmt.Errorf("invalid visitor attachment daily bandwidth limit: %s", visitorAttachmentDailyBandwidthLimitStr)
  268. } else if visitorAttachmentDailyBandwidthLimit > math.MaxInt {
  269. return fmt.Errorf("config option visitor-attachment-daily-bandwidth-limit must be lower than %d", math.MaxInt)
  270. }
  271. // Check values
  272. if firebaseKeyFile != "" && !util.FileExists(firebaseKeyFile) {
  273. return errors.New("if set, FCM key file must exist")
  274. } else if firebaseKeyFile != "" && !server.FirebaseAvailable {
  275. return errors.New("cannot set firebase-key-file, support for Firebase is not available (nofirebase)")
  276. } else if webPushPublicKey != "" && (webPushPrivateKey == "" || webPushFile == "" || webPushEmailAddress == "" || baseURL == "") {
  277. return errors.New("if web push is enabled, web-push-private-key, web-push-public-key, web-push-file, web-push-email-address, and base-url should be set. run 'ntfy webpush keys' to generate keys")
  278. } else if keepaliveInterval < 5*time.Second {
  279. return errors.New("keepalive interval cannot be lower than five seconds")
  280. } else if managerInterval < 5*time.Second {
  281. return errors.New("manager interval cannot be lower than five seconds")
  282. } else if cacheDuration > 0 && cacheDuration < managerInterval {
  283. return errors.New("cache duration cannot be lower than manager interval")
  284. } else if keyFile != "" && !util.FileExists(keyFile) {
  285. return errors.New("if set, key file must exist")
  286. } else if certFile != "" && !util.FileExists(certFile) {
  287. return errors.New("if set, certificate file must exist")
  288. } else if listenHTTPS != "" && (keyFile == "" || certFile == "") {
  289. return errors.New("if listen-https is set, both key-file and cert-file must be set")
  290. } else if smtpSenderAddr != "" && (baseURL == "" || smtpSenderFrom == "") {
  291. return errors.New("if smtp-sender-addr is set, base-url, and smtp-sender-from must also be set")
  292. } else if smtpServerListen != "" && smtpServerDomain == "" {
  293. return errors.New("if smtp-server-listen is set, smtp-server-domain must also be set")
  294. } else if attachmentCacheDir != "" && baseURL == "" {
  295. return errors.New("if attachment-cache-dir is set, base-url must also be set")
  296. } else if baseURL != "" {
  297. u, err := url.Parse(baseURL)
  298. if err != nil {
  299. return fmt.Errorf("if set, base-url must be a valid URL, e.g. https://ntfy.mydomain.com: %v", err)
  300. } else if u.Scheme != "http" && u.Scheme != "https" {
  301. return errors.New("if set, base-url must be a valid URL starting with http:// or https://, e.g. https://ntfy.mydomain.com")
  302. } else if u.Path != "" {
  303. return fmt.Errorf("if set, base-url must not have a path (%s), as hosting ntfy on a sub-path is not supported, e.g. https://ntfy.mydomain.com", u.Path)
  304. }
  305. } else if upstreamBaseURL != "" && !strings.HasPrefix(upstreamBaseURL, "http://") && !strings.HasPrefix(upstreamBaseURL, "https://") {
  306. return errors.New("if set, upstream-base-url must start with http:// or https://")
  307. } else if upstreamBaseURL != "" && strings.HasSuffix(upstreamBaseURL, "/") {
  308. return errors.New("if set, upstream-base-url must not end with a slash (/)")
  309. } else if upstreamBaseURL != "" && baseURL == "" {
  310. return errors.New("if upstream-base-url is set, base-url must also be set")
  311. } else if upstreamBaseURL != "" && baseURL != "" && baseURL == upstreamBaseURL {
  312. return errors.New("base-url and upstream-base-url cannot be identical, you'll likely want to set upstream-base-url to https://ntfy.sh, see https://ntfy.sh/docs/config/#ios-instant-notifications")
  313. } else if authFile == "" && (enableSignup || enableLogin || requireLogin || enableReservations || stripeSecretKey != "") {
  314. return errors.New("cannot set enable-signup, enable-login, require-login, enable-reserve-topics, or stripe-secret-key if auth-file is not set")
  315. } else if enableSignup && !enableLogin {
  316. return errors.New("cannot set enable-signup without also setting enable-login")
  317. } else if requireLogin && !enableLogin {
  318. return errors.New("cannot set require-login without also setting enable-login")
  319. } else if !payments.Available && (stripeSecretKey != "" || stripeWebhookKey != "") {
  320. return errors.New("cannot set stripe-secret-key or stripe-webhook-key, support for payments is not available in this build (nopayments)")
  321. } else if stripeSecretKey != "" && (stripeWebhookKey == "" || baseURL == "") {
  322. return errors.New("if stripe-secret-key is set, stripe-webhook-key and base-url must also be set")
  323. } else if twilioAccount != "" && (twilioAuthToken == "" || twilioPhoneNumber == "" || twilioVerifyService == "" || baseURL == "" || authFile == "") {
  324. return errors.New("if twilio-account is set, twilio-auth-token, twilio-phone-number, twilio-verify-service, base-url, and auth-file must also be set")
  325. } else if messageSizeLimit > server.DefaultMessageSizeLimit {
  326. log.Warn("message-size-limit is greater than 4K, this is not recommended and largely untested, and may lead to issues with some clients")
  327. if messageSizeLimit > 5*1024*1024 {
  328. return errors.New("message-size-limit cannot be higher than 5M")
  329. }
  330. } else if !server.WebPushAvailable && (webPushPrivateKey != "" || webPushPublicKey != "" || webPushFile != "") {
  331. return errors.New("cannot enable WebPush, support is not available in this build (nowebpush)")
  332. } else if webPushExpiryWarningDuration > 0 && webPushExpiryWarningDuration > webPushExpiryDuration {
  333. return errors.New("web push expiry warning duration cannot be higher than web push expiry duration")
  334. } else if behindProxy && proxyForwardedHeader == "" {
  335. return errors.New("if behind-proxy is set, proxy-forwarded-header must also be set")
  336. } else if visitorPrefixBitsIPv4 < 1 || visitorPrefixBitsIPv4 > 32 {
  337. return errors.New("visitor-prefix-bits-ipv4 must be between 1 and 32")
  338. } else if visitorPrefixBitsIPv6 < 1 || visitorPrefixBitsIPv6 > 128 {
  339. return errors.New("visitor-prefix-bits-ipv6 must be between 1 and 128")
  340. }
  341. // Backwards compatibility
  342. if webRoot == "app" {
  343. webRoot = "/"
  344. } else if webRoot == "home" {
  345. webRoot = "/app"
  346. } else if webRoot == "disable" {
  347. webRoot = ""
  348. } else if !strings.HasPrefix(webRoot, "/") {
  349. webRoot = "/" + webRoot
  350. }
  351. // Convert default auth permission, read provisioned users
  352. authDefault, err := user.ParsePermission(authDefaultAccess)
  353. if err != nil {
  354. return errors.New("if set, auth-default-access must start set to 'read-write', 'read-only', 'write-only' or 'deny-all'")
  355. }
  356. authUsers, err := parseUsers(authUsersRaw)
  357. if err != nil {
  358. return err
  359. }
  360. authAccess, err := parseAccess(authUsers, authAccessRaw)
  361. if err != nil {
  362. return err
  363. }
  364. authTokens, err := parseTokens(authUsers, authTokensRaw)
  365. if err != nil {
  366. return err
  367. }
  368. // Special case: Unset default
  369. if listenHTTP == "-" {
  370. listenHTTP = ""
  371. }
  372. // Resolve hosts
  373. visitorRequestLimitExemptPrefixes := make([]netip.Prefix, 0)
  374. for _, host := range visitorRequestLimitExemptHosts {
  375. prefixes, err := parseIPHostPrefix(host)
  376. if err != nil {
  377. log.Warn("cannot resolve host %s: %s, ignoring visitor request exemption", host, err.Error())
  378. continue
  379. }
  380. visitorRequestLimitExemptPrefixes = append(visitorRequestLimitExemptPrefixes, prefixes...)
  381. }
  382. // Parse trusted prefixes
  383. trustedProxyPrefixes := make([]netip.Prefix, 0)
  384. for _, host := range proxyTrustedHosts {
  385. prefixes, err := parseIPHostPrefix(host)
  386. if err != nil {
  387. return fmt.Errorf("cannot resolve trusted proxy host %s: %s", host, err.Error())
  388. }
  389. trustedProxyPrefixes = append(trustedProxyPrefixes, prefixes...)
  390. }
  391. // Stripe things
  392. if stripeSecretKey != "" {
  393. payments.Setup(stripeSecretKey)
  394. }
  395. // Add default forbidden topics
  396. disallowedTopics = append(disallowedTopics, server.DefaultDisallowedTopics...)
  397. // Run server
  398. conf := server.NewConfig()
  399. conf.File = config
  400. conf.BaseURL = baseURL
  401. conf.ListenHTTP = listenHTTP
  402. conf.ListenHTTPS = listenHTTPS
  403. conf.ListenUnix = listenUnix
  404. conf.ListenUnixMode = fs.FileMode(listenUnixMode)
  405. conf.KeyFile = keyFile
  406. conf.CertFile = certFile
  407. conf.FirebaseKeyFile = firebaseKeyFile
  408. conf.CacheFile = cacheFile
  409. conf.CacheDuration = cacheDuration
  410. conf.CacheStartupQueries = cacheStartupQueries
  411. conf.CacheBatchSize = cacheBatchSize
  412. conf.CacheBatchTimeout = cacheBatchTimeout
  413. conf.AuthFile = authFile
  414. conf.AuthStartupQueries = authStartupQueries
  415. conf.AuthDefault = authDefault
  416. conf.AuthUsers = authUsers
  417. conf.AuthAccess = authAccess
  418. conf.AuthTokens = authTokens
  419. conf.AttachmentCacheDir = attachmentCacheDir
  420. conf.AttachmentTotalSizeLimit = attachmentTotalSizeLimit
  421. conf.AttachmentFileSizeLimit = attachmentFileSizeLimit
  422. conf.AttachmentExpiryDuration = attachmentExpiryDuration
  423. conf.TemplateDir = templateDir
  424. conf.KeepaliveInterval = keepaliveInterval
  425. conf.ManagerInterval = managerInterval
  426. conf.DisallowedTopics = disallowedTopics
  427. conf.WebRoot = webRoot
  428. conf.UpstreamBaseURL = upstreamBaseURL
  429. conf.UpstreamAccessToken = upstreamAccessToken
  430. conf.SMTPSenderAddr = smtpSenderAddr
  431. conf.SMTPSenderUser = smtpSenderUser
  432. conf.SMTPSenderPass = smtpSenderPass
  433. conf.SMTPSenderFrom = smtpSenderFrom
  434. conf.SMTPServerListen = smtpServerListen
  435. conf.SMTPServerDomain = smtpServerDomain
  436. conf.SMTPServerAddrPrefix = smtpServerAddrPrefix
  437. conf.TwilioAccount = twilioAccount
  438. conf.TwilioAuthToken = twilioAuthToken
  439. conf.TwilioPhoneNumber = twilioPhoneNumber
  440. conf.TwilioVerifyService = twilioVerifyService
  441. if twilioCallFormat != "" {
  442. tmpl, err := template.New("twiml").Parse(twilioCallFormat)
  443. if err != nil {
  444. return fmt.Errorf("failed to parse twilio-call-format template: %w", err)
  445. }
  446. conf.TwilioCallFormat = tmpl
  447. }
  448. conf.MessageSizeLimit = int(messageSizeLimit)
  449. conf.MessageDelayMax = messageDelayLimit
  450. conf.TotalTopicLimit = totalTopicLimit
  451. conf.VisitorSubscriptionLimit = visitorSubscriptionLimit
  452. conf.VisitorSubscriberRateLimiting = visitorSubscriberRateLimiting
  453. conf.VisitorAttachmentTotalSizeLimit = visitorAttachmentTotalSizeLimit
  454. conf.VisitorAttachmentDailyBandwidthLimit = visitorAttachmentDailyBandwidthLimit
  455. conf.VisitorRequestLimitBurst = visitorRequestLimitBurst
  456. conf.VisitorRequestLimitReplenish = visitorRequestLimitReplenish
  457. conf.VisitorRequestExemptPrefixes = visitorRequestLimitExemptPrefixes
  458. conf.VisitorMessageDailyLimit = visitorMessageDailyLimit
  459. conf.VisitorEmailLimitBurst = visitorEmailLimitBurst
  460. conf.VisitorEmailLimitReplenish = visitorEmailLimitReplenish
  461. conf.VisitorPrefixBitsIPv4 = visitorPrefixBitsIPv4
  462. conf.VisitorPrefixBitsIPv6 = visitorPrefixBitsIPv6
  463. conf.BehindProxy = behindProxy
  464. conf.ProxyForwardedHeader = proxyForwardedHeader
  465. conf.ProxyTrustedPrefixes = trustedProxyPrefixes
  466. conf.StripeSecretKey = stripeSecretKey
  467. conf.StripeWebhookKey = stripeWebhookKey
  468. conf.BillingContact = billingContact
  469. conf.EnableSignup = enableSignup
  470. conf.EnableLogin = enableLogin
  471. conf.RequireLogin = requireLogin
  472. conf.EnableReservations = enableReservations
  473. conf.EnableMetrics = enableMetrics
  474. conf.MetricsListenHTTP = metricsListenHTTP
  475. conf.ProfileListenHTTP = profileListenHTTP
  476. conf.WebPushPrivateKey = webPushPrivateKey
  477. conf.WebPushPublicKey = webPushPublicKey
  478. conf.WebPushFile = webPushFile
  479. conf.WebPushEmailAddress = webPushEmailAddress
  480. conf.WebPushStartupQueries = webPushStartupQueries
  481. conf.WebPushExpiryDuration = webPushExpiryDuration
  482. conf.WebPushExpiryWarningDuration = webPushExpiryWarningDuration
  483. conf.Version = c.App.Version
  484. // Set up hot-reloading of config
  485. go sigHandlerConfigReload(config)
  486. // Run server
  487. s, err := server.New(conf)
  488. if err != nil {
  489. log.Fatal("%s", err.Error())
  490. } else if err := s.Run(); err != nil {
  491. log.Fatal("%s", err.Error())
  492. }
  493. log.Info("Exiting.")
  494. return nil
  495. }
  496. func sigHandlerConfigReload(config string) {
  497. sigs := make(chan os.Signal, 1)
  498. signal.Notify(sigs, syscall.SIGHUP)
  499. for range sigs {
  500. log.Info("Partially hot reloading configuration ...")
  501. inputSource, err := newYamlSourceFromFile(config, flagsServe)
  502. if err != nil {
  503. log.Warn("Hot reload failed: %s", err.Error())
  504. continue
  505. }
  506. if err := reloadLogLevel(inputSource); err != nil {
  507. log.Warn("Reloading log level failed: %s", err.Error())
  508. }
  509. }
  510. }
  511. func parseIPHostPrefix(host string) (prefixes []netip.Prefix, err error) {
  512. // Try parsing as prefix, e.g. 10.0.1.0/24 or 2001:db8::/32
  513. prefix, err := netip.ParsePrefix(host)
  514. if err == nil {
  515. prefixes = append(prefixes, prefix.Masked())
  516. return prefixes, nil
  517. }
  518. // Not a prefix, parse as host or IP (LookupHost passes through an IP as is)
  519. ips, err := net.LookupHost(host)
  520. if err != nil {
  521. return nil, err
  522. }
  523. for _, ipStr := range ips {
  524. ip, err := netip.ParseAddr(ipStr)
  525. if err == nil {
  526. prefix, err := ip.Prefix(ip.BitLen())
  527. if err != nil {
  528. return nil, fmt.Errorf("%s successfully parsed but unable to make prefix: %s", ip.String(), err.Error())
  529. }
  530. prefixes = append(prefixes, prefix.Masked())
  531. }
  532. }
  533. return
  534. }
  535. func parseUsers(usersRaw []string) ([]*user.User, error) {
  536. users := make([]*user.User, 0)
  537. for _, userLine := range usersRaw {
  538. parts := strings.Split(userLine, ":")
  539. if len(parts) != 3 {
  540. return nil, fmt.Errorf("invalid auth-users: %s, expected format: 'name:hash:role'", userLine)
  541. }
  542. username := strings.TrimSpace(parts[0])
  543. passwordHash := strings.TrimSpace(parts[1])
  544. role := user.Role(strings.TrimSpace(parts[2]))
  545. if !user.AllowedUsername(username) {
  546. return nil, fmt.Errorf("invalid auth-users: %s, username invalid", userLine)
  547. } else if err := user.ValidPasswordHash(passwordHash, user.DefaultUserPasswordBcryptCost); err != nil {
  548. return nil, fmt.Errorf("invalid auth-users: %s, password hash invalid, %s", userLine, err.Error())
  549. } else if !user.AllowedRole(role) {
  550. return nil, fmt.Errorf("invalid auth-users: %s, role %s is not allowed, allowed roles are 'admin' or 'user'", userLine, role)
  551. }
  552. users = append(users, &user.User{
  553. Name: username,
  554. Hash: passwordHash,
  555. Role: role,
  556. Provisioned: true,
  557. })
  558. }
  559. return users, nil
  560. }
  561. func parseAccess(users []*user.User, accessRaw []string) (map[string][]*user.Grant, error) {
  562. access := make(map[string][]*user.Grant)
  563. for _, accessLine := range accessRaw {
  564. parts := strings.Split(accessLine, ":")
  565. if len(parts) != 3 {
  566. return nil, fmt.Errorf("invalid auth-access: %s, expected format: 'user:topic:permission'", accessLine)
  567. }
  568. username := strings.TrimSpace(parts[0])
  569. if username == userEveryone {
  570. username = user.Everyone
  571. }
  572. u, exists := util.Find(users, func(u *user.User) bool {
  573. return u.Name == username
  574. })
  575. if username != user.Everyone {
  576. if !exists {
  577. return nil, fmt.Errorf("invalid auth-access: %s, user %s is not provisioned", accessLine, username)
  578. } else if !user.AllowedUsername(username) {
  579. return nil, fmt.Errorf("invalid auth-access: %s, username %s invalid", accessLine, username)
  580. } else if u.Role != user.RoleUser {
  581. return nil, fmt.Errorf("invalid auth-access: %s, user %s is not a regular user, only regular users can have ACL entries", accessLine, username)
  582. }
  583. }
  584. topic := strings.TrimSpace(parts[1])
  585. if !user.AllowedTopicPattern(topic) {
  586. return nil, fmt.Errorf("invalid auth-access: %s, topic pattern %s invalid", accessLine, topic)
  587. }
  588. permission, err := user.ParsePermission(strings.TrimSpace(parts[2]))
  589. if err != nil {
  590. return nil, fmt.Errorf("invalid auth-access: %s, permission %s invalid, %s", accessLine, parts[2], err.Error())
  591. }
  592. if _, exists := access[username]; !exists {
  593. access[username] = make([]*user.Grant, 0)
  594. }
  595. access[username] = append(access[username], &user.Grant{
  596. TopicPattern: topic,
  597. Permission: permission,
  598. Provisioned: true,
  599. })
  600. }
  601. return access, nil
  602. }
  603. func parseTokens(users []*user.User, tokensRaw []string) (map[string][]*user.Token, error) {
  604. tokens := make(map[string][]*user.Token)
  605. for _, tokenLine := range tokensRaw {
  606. parts := strings.Split(tokenLine, ":")
  607. if len(parts) < 2 || len(parts) > 3 {
  608. return nil, fmt.Errorf("invalid auth-tokens: %s, expected format: 'user:token[:label]'", tokenLine)
  609. }
  610. username := strings.TrimSpace(parts[0])
  611. _, exists := util.Find(users, func(u *user.User) bool {
  612. return u.Name == username
  613. })
  614. if !exists {
  615. return nil, fmt.Errorf("invalid auth-tokens: %s, user %s is not provisioned", tokenLine, username)
  616. } else if !user.AllowedUsername(username) {
  617. return nil, fmt.Errorf("invalid auth-tokens: %s, username %s invalid", tokenLine, username)
  618. }
  619. token := strings.TrimSpace(parts[1])
  620. if !user.ValidToken(token) {
  621. return nil, fmt.Errorf("invalid auth-tokens: %s, token %s invalid, use 'ntfy token generate' to generate a random token", tokenLine, token)
  622. }
  623. var label string
  624. if len(parts) > 2 {
  625. label = parts[2]
  626. }
  627. if _, exists := tokens[username]; !exists {
  628. tokens[username] = make([]*user.Token, 0)
  629. }
  630. tokens[username] = append(tokens[username], &user.Token{
  631. Value: token,
  632. Label: label,
  633. Provisioned: true,
  634. })
  635. }
  636. return tokens, nil
  637. }
  638. func reloadLogLevel(inputSource altsrc.InputSourceContext) error {
  639. newLevelStr, err := inputSource.String("log-level")
  640. if err != nil {
  641. return fmt.Errorf("cannot load log level: %s", err.Error())
  642. }
  643. overrides, err := inputSource.StringSlice("log-level-overrides")
  644. if err != nil {
  645. return fmt.Errorf("cannot load log level overrides (1): %s", err.Error())
  646. }
  647. log.ResetLevelOverrides()
  648. if err := applyLogLevelOverrides(overrides); err != nil {
  649. return fmt.Errorf("cannot load log level overrides (2): %s", err.Error())
  650. }
  651. log.SetLevel(log.ToLevel(newLevelStr))
  652. if len(overrides) > 0 {
  653. log.Info("Log level is %v, %d override(s) in place", strings.ToUpper(newLevelStr), len(overrides))
  654. } else {
  655. log.Info("Log level is %v", strings.ToUpper(newLevelStr))
  656. }
  657. return nil
  658. }