forked from mirrors/ntfy
1
0
Fork 0
ntfy/server/server_middleware.go

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

124 lines
3.1 KiB
Go
Raw Normal View History

package server
import (
"net/http"
2023-02-22 04:40:15 +00:00
"heckel.io/ntfy/util"
)
2023-02-23 03:26:43 +00:00
type contextKey int
const (
contextRateVisitor contextKey = iota + 2586
contextTopic
2023-03-04 03:22:07 +00:00
contextMatrixPushKey
2023-02-23 03:26:43 +00:00
)
2023-02-08 20:20:44 +00:00
func (s *Server) limitRequests(next handleFunc) handleFunc {
return func(w http.ResponseWriter, r *http.Request, v *visitor) error {
if util.ContainsIP(s.config.VisitorRequestExemptIPAddrs, v.ip) {
return next(w, r, v)
} else if !v.RequestAllowed() {
return errHTTPTooManyRequestsLimitRequests
}
return next(w, r, v)
}
}
2023-02-22 04:40:15 +00:00
// limitRequestsWithTopic limits requests with a topic and stores the rate-limiting-subscriber and topic into request.Context
func (s *Server) limitRequestsWithTopic(next handleFunc) handleFunc {
return func(w http.ResponseWriter, r *http.Request, v *visitor) error {
t, err := s.topicFromPath(r.URL.Path)
if err != nil {
return err
}
2023-02-23 02:00:56 +00:00
vrate := v
2023-02-23 02:33:18 +00:00
if rateVisitor := t.RateVisitor(); rateVisitor != nil {
vrate = rateVisitor
2023-02-22 04:40:15 +00:00
}
2023-02-23 03:26:43 +00:00
r = withContext(r, map[contextKey]any{
contextRateVisitor: vrate,
contextTopic: t,
})
2023-02-22 04:40:15 +00:00
if util.ContainsIP(s.config.VisitorRequestExemptIPAddrs, v.ip) {
return next(w, r, v)
2023-02-23 02:00:56 +00:00
} else if !vrate.RequestAllowed() {
2023-02-22 04:40:15 +00:00
return errHTTPTooManyRequestsLimitRequests
}
return next(w, r, v)
}
}
func (s *Server) ensureWebEnabled(next handleFunc) handleFunc {
return func(w http.ResponseWriter, r *http.Request, v *visitor) error {
2023-05-01 15:58:49 +00:00
if s.config.WebRoot == "" {
return errHTTPNotFound
}
return next(w, r, v)
}
}
func (s *Server) ensureUserManager(next handleFunc) handleFunc {
return func(w http.ResponseWriter, r *http.Request, v *visitor) error {
if s.userManager == nil {
return errHTTPNotFound
}
return next(w, r, v)
}
}
func (s *Server) ensureUser(next handleFunc) handleFunc {
return s.ensureUserManager(func(w http.ResponseWriter, r *http.Request, v *visitor) error {
2023-01-29 01:43:06 +00:00
if v.User() == nil {
return errHTTPUnauthorized
}
return next(w, r, v)
})
}
2023-05-13 18:39:31 +00:00
func (s *Server) ensureAdmin(next handleFunc) handleFunc {
return s.ensureUserManager(func(w http.ResponseWriter, r *http.Request, v *visitor) error {
if !v.User().IsAdmin() {
return errHTTPUnauthorized
}
return next(w, r, v)
})
}
2023-05-16 18:15:58 +00:00
func (s *Server) ensureCallsEnabled(next handleFunc) handleFunc {
return func(w http.ResponseWriter, r *http.Request, v *visitor) error {
2023-05-17 15:19:48 +00:00
if s.config.TwilioAccount == "" || s.userManager == nil {
2023-05-16 18:15:58 +00:00
return errHTTPNotFound
}
return next(w, r, v)
}
}
func (s *Server) ensurePaymentsEnabled(next handleFunc) handleFunc {
return func(w http.ResponseWriter, r *http.Request, v *visitor) error {
2023-01-19 04:01:26 +00:00
if s.config.StripeSecretKey == "" || s.stripe == nil {
return errHTTPNotFound
}
return next(w, r, v)
}
}
func (s *Server) ensureStripeCustomer(next handleFunc) handleFunc {
return s.ensureUser(func(w http.ResponseWriter, r *http.Request, v *visitor) error {
2023-01-29 01:43:06 +00:00
if v.User().Billing.StripeCustomerID == "" {
return errHTTPBadRequestNotAPaidUser
}
return next(w, r, v)
})
}
func (s *Server) withAccountSync(next handleFunc) handleFunc {
return func(w http.ResponseWriter, r *http.Request, v *visitor) error {
err := next(w, r, v)
if err == nil {
s.publishSyncEventAsync(v)
}
return err
}
}