1
0
Fork 0
mirror of https://github.com/binwiederhier/ntfy.git synced 2024-11-24 04:09:13 +01:00
ntfy/cmd/serve.go

513 lines
35 KiB
Go
Raw Normal View History

//go:build !noserver
2021-12-17 02:33:01 +01:00
package cmd
import (
"errors"
2022-01-13 00:52:07 +01:00
"fmt"
2023-01-14 12:43:44 +01:00
"github.com/stripe/stripe-go/v74"
2024-03-07 17:53:12 +01:00
"github.com/urfave/cli/v2"
"github.com/urfave/cli/v2/altsrc"
"heckel.io/ntfy/v2/log"
"heckel.io/ntfy/v2/server"
2023-11-17 02:54:58 +01:00
"heckel.io/ntfy/v2/user"
2024-03-07 17:53:12 +01:00
"heckel.io/ntfy/v2/util"
2022-07-04 01:33:01 +02:00
"io/fs"
2022-01-13 00:52:07 +01:00
"math"
2022-02-14 22:09:59 +01:00
"net"
"net/netip"
2024-03-07 18:44:31 +01:00
"net/url"
2022-06-01 22:57:35 +02:00
"os"
"os/signal"
2022-01-20 19:20:04 +01:00
"strings"
2022-06-01 22:57:35 +02:00
"syscall"
2021-12-17 02:33:01 +01:00
"time"
)
2022-05-09 17:03:40 +02:00
func init() {
commands = append(commands, cmdServe)
}
2022-06-01 22:57:35 +02:00
const (
defaultServerConfigFile = "/etc/ntfy/server.yml"
)
2022-05-30 04:14:14 +02:00
var flagsServe = append(
2023-02-06 05:34:27 +01:00
append([]cli.Flag{}, flagsDefault...),
2024-03-07 17:53:12 +01:00
&cli.StringFlag{Name: "config", Aliases: []string{"c"}, EnvVars: []string{"NTFY_CONFIG_FILE"}, Value: defaultServerConfigFile, Usage: "config file"},
altsrc.NewStringFlag(&cli.StringFlag{Name: "base-url", Aliases: []string{"base_url", "B"}, EnvVars: []string{"NTFY_BASE_URL"}, Usage: "externally visible base URL for this host (e.g. https://ntfy.sh)"}),
2023-03-07 04:16:10 +01:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "listen-http", Aliases: []string{"listen_http", "l"}, EnvVars: []string{"NTFY_LISTEN_HTTP"}, Value: server.DefaultListenHTTP, Usage: "ip:port used as HTTP listen address"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "listen-https", Aliases: []string{"listen_https", "L"}, EnvVars: []string{"NTFY_LISTEN_HTTPS"}, Usage: "ip:port used as HTTPS listen address"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "listen-unix", Aliases: []string{"listen_unix", "U"}, EnvVars: []string{"NTFY_LISTEN_UNIX"}, Usage: "listen on unix socket path"}),
2022-07-04 01:33:01 +02:00
altsrc.NewIntFlag(&cli.IntFlag{Name: "listen-unix-mode", Aliases: []string{"listen_unix_mode"}, EnvVars: []string{"NTFY_LISTEN_UNIX_MODE"}, DefaultText: "system default", Usage: "file permissions of unix socket, e.g. 0700"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "key-file", Aliases: []string{"key_file", "K"}, EnvVars: []string{"NTFY_KEY_FILE"}, Usage: "private key file, if listen-https is set"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "cert-file", Aliases: []string{"cert_file", "E"}, EnvVars: []string{"NTFY_CERT_FILE"}, Usage: "certificate file, if listen-https is set"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "firebase-key-file", Aliases: []string{"firebase_key_file", "F"}, EnvVars: []string{"NTFY_FIREBASE_KEY_FILE"}, Usage: "Firebase credentials file; if set additionally publish to FCM topic"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "cache-file", Aliases: []string{"cache_file", "C"}, EnvVars: []string{"NTFY_CACHE_FILE"}, Usage: "cache file used for message caching"}),
2024-03-07 17:53:12 +01:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "cache-duration", Aliases: []string{"cache_duration", "b"}, EnvVars: []string{"NTFY_CACHE_DURATION"}, Value: util.FormatDuration(server.DefaultCacheDuration), Usage: "buffer messages for this time to allow `since` requests"}),
2022-11-16 16:28:20 +01:00
altsrc.NewIntFlag(&cli.IntFlag{Name: "cache-batch-size", Aliases: []string{"cache_batch_size"}, EnvVars: []string{"NTFY_BATCH_SIZE"}, Usage: "max size of messages to batch together when writing to message cache (if zero, writes are synchronous)"}),
2024-03-07 18:22:35 +01:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "cache-batch-timeout", Aliases: []string{"cache_batch_timeout"}, EnvVars: []string{"NTFY_CACHE_BATCH_TIMEOUT"}, Value: util.FormatDuration(server.DefaultCacheBatchTimeout), Usage: "timeout for batched async writes to the message cache (if zero, writes are synchronous)"}),
2022-06-23 17:02:45 +02:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "cache-startup-queries", Aliases: []string{"cache_startup_queries"}, EnvVars: []string{"NTFY_CACHE_STARTUP_QUERIES"}, Usage: "queries run when the cache database is initialized"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "auth-file", Aliases: []string{"auth_file", "H"}, EnvVars: []string{"NTFY_AUTH_FILE"}, Usage: "auth database file used for access control"}),
2023-01-05 21:20:44 +01:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "auth-startup-queries", Aliases: []string{"auth_startup_queries"}, EnvVars: []string{"NTFY_AUTH_STARTUP_QUERIES"}, Usage: "queries run when the auth database is initialized"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "auth-default-access", Aliases: []string{"auth_default_access", "p"}, EnvVars: []string{"NTFY_AUTH_DEFAULT_ACCESS"}, Value: "read-write", Usage: "default permissions if no matching entries in the auth database are found"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "attachment-cache-dir", Aliases: []string{"attachment_cache_dir"}, EnvVars: []string{"NTFY_ATTACHMENT_CACHE_DIR"}, Usage: "cache directory for attached files"}),
2024-03-07 17:53:12 +01:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "attachment-total-size-limit", Aliases: []string{"attachment_total_size_limit", "A"}, EnvVars: []string{"NTFY_ATTACHMENT_TOTAL_SIZE_LIMIT"}, Value: util.FormatSize(server.DefaultAttachmentTotalSizeLimit), Usage: "limit of the on-disk attachment cache"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "attachment-file-size-limit", Aliases: []string{"attachment_file_size_limit", "Y"}, EnvVars: []string{"NTFY_ATTACHMENT_FILE_SIZE_LIMIT"}, Value: util.FormatSize(server.DefaultAttachmentFileSizeLimit), Usage: "per-file attachment size limit (e.g. 300k, 2M, 100M)"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "attachment-expiry-duration", Aliases: []string{"attachment_expiry_duration", "X"}, EnvVars: []string{"NTFY_ATTACHMENT_EXPIRY_DURATION"}, Value: util.FormatDuration(server.DefaultAttachmentExpiryDuration), Usage: "duration after which uploaded attachments will be deleted (e.g. 3h, 20h)"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "keepalive-interval", Aliases: []string{"keepalive_interval", "k"}, EnvVars: []string{"NTFY_KEEPALIVE_INTERVAL"}, Value: util.FormatDuration(server.DefaultKeepaliveInterval), Usage: "interval of keepalive messages"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "manager-interval", Aliases: []string{"manager_interval", "m"}, EnvVars: []string{"NTFY_MANAGER_INTERVAL"}, Value: util.FormatDuration(server.DefaultManagerInterval), Usage: "interval of for message pruning and stats printing"}),
2023-02-09 14:32:51 +01:00
altsrc.NewStringSliceFlag(&cli.StringSliceFlag{Name: "disallowed-topics", Aliases: []string{"disallowed_topics"}, EnvVars: []string{"NTFY_DISALLOWED_TOPICS"}, Usage: "topics that are not allowed to be used"}),
2023-05-01 17:58:49 +02:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "web-root", Aliases: []string{"web_root"}, EnvVars: []string{"NTFY_WEB_ROOT"}, Value: "/", Usage: "sets root of the web app (e.g. /, or /app), or disables it (disable)"}),
2023-01-12 18:04:18 +01:00
altsrc.NewBoolFlag(&cli.BoolFlag{Name: "enable-signup", Aliases: []string{"enable_signup"}, EnvVars: []string{"NTFY_ENABLE_SIGNUP"}, Value: false, Usage: "allows users to sign up via the web app, or API"}),
altsrc.NewBoolFlag(&cli.BoolFlag{Name: "enable-login", Aliases: []string{"enable_login"}, EnvVars: []string{"NTFY_ENABLE_LOGIN"}, Value: false, Usage: "allows users to log in via the web app, or API"}),
altsrc.NewBoolFlag(&cli.BoolFlag{Name: "enable-reservations", Aliases: []string{"enable_reservations"}, EnvVars: []string{"NTFY_ENABLE_RESERVATIONS"}, Value: false, Usage: "allows users to reserve topics (if their tier allows it)"}),
2022-05-28 02:30:20 +02:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "upstream-base-url", Aliases: []string{"upstream_base_url"}, EnvVars: []string{"NTFY_UPSTREAM_BASE_URL"}, Value: "", Usage: "forward poll request to an upstream server, this is needed for iOS push notifications for self-hosted servers"}),
2023-05-18 19:08:10 +02:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "upstream-access-token", Aliases: []string{"upstream_access_token"}, EnvVars: []string{"NTFY_UPSTREAM_ACCESS_TOKEN"}, Value: "", Usage: "access token to use for the upstream server; needed only if upstream rate limits are exceeded or upstream server requires auth"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-sender-addr", Aliases: []string{"smtp_sender_addr"}, EnvVars: []string{"NTFY_SMTP_SENDER_ADDR"}, Usage: "SMTP server address (host:port) for outgoing emails"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-sender-user", Aliases: []string{"smtp_sender_user"}, EnvVars: []string{"NTFY_SMTP_SENDER_USER"}, Usage: "SMTP user (if e-mail sending is enabled)"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-sender-pass", Aliases: []string{"smtp_sender_pass"}, EnvVars: []string{"NTFY_SMTP_SENDER_PASS"}, Usage: "SMTP password (if e-mail sending is enabled)"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-sender-from", Aliases: []string{"smtp_sender_from"}, EnvVars: []string{"NTFY_SMTP_SENDER_FROM"}, Usage: "SMTP sender address (if e-mail sending is enabled)"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-server-listen", Aliases: []string{"smtp_server_listen"}, EnvVars: []string{"NTFY_SMTP_SERVER_LISTEN"}, Usage: "SMTP server address (ip:port) for incoming emails, e.g. :25"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-server-domain", Aliases: []string{"smtp_server_domain"}, EnvVars: []string{"NTFY_SMTP_SERVER_DOMAIN"}, Usage: "SMTP domain for incoming e-mail, e.g. ntfy.sh"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "smtp-server-addr-prefix", Aliases: []string{"smtp_server_addr_prefix"}, EnvVars: []string{"NTFY_SMTP_SERVER_ADDR_PREFIX"}, Usage: "SMTP email address prefix for topics to prevent spam (e.g. 'ntfy-')"}),
2023-05-13 02:01:12 +02:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "twilio-account", Aliases: []string{"twilio_account"}, EnvVars: []string{"NTFY_TWILIO_ACCOUNT"}, Usage: "Twilio account SID, used for phone calls, e.g. AC123..."}),
2023-05-05 22:22:54 +02:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "twilio-auth-token", Aliases: []string{"twilio_auth_token"}, EnvVars: []string{"NTFY_TWILIO_AUTH_TOKEN"}, Usage: "Twilio auth token"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "twilio-phone-number", Aliases: []string{"twilio_phone_number"}, EnvVars: []string{"NTFY_TWILIO_PHONE_NUMBER"}, Usage: "Twilio number to use for outgoing calls"}),
2023-05-11 19:50:10 +02:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "twilio-verify-service", Aliases: []string{"twilio_verify_service"}, EnvVars: []string{"NTFY_TWILIO_VERIFY_SERVICE"}, Usage: "Twilio Verify service ID, used for phone number verification"}),
2024-03-07 17:53:12 +01:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "message-size-limit", Aliases: []string{"message_size_limit"}, EnvVars: []string{"NTFY_MESSAGE_SIZE_LIMIT"}, Value: util.FormatSize(server.DefaultMessageSizeLimit), Usage: "size limit for the message (see docs for limitations)"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "message-delay-limit", Aliases: []string{"message_delay_limit"}, EnvVars: []string{"NTFY_MESSAGE_DELAY_LIMIT"}, Value: util.FormatDuration(server.DefaultMessageDelayMax), Usage: "max duration a message can be scheduled into the future"}),
altsrc.NewIntFlag(&cli.IntFlag{Name: "global-topic-limit", Aliases: []string{"global_topic_limit", "T"}, EnvVars: []string{"NTFY_GLOBAL_TOPIC_LIMIT"}, Value: server.DefaultTotalTopicLimit, Usage: "total number of topics allowed"}),
altsrc.NewIntFlag(&cli.IntFlag{Name: "visitor-subscription-limit", Aliases: []string{"visitor_subscription_limit"}, EnvVars: []string{"NTFY_VISITOR_SUBSCRIPTION_LIMIT"}, Value: server.DefaultVisitorSubscriptionLimit, Usage: "number of subscriptions per visitor"}),
2024-03-07 17:53:12 +01:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "visitor-attachment-total-size-limit", Aliases: []string{"visitor_attachment_total_size_limit"}, EnvVars: []string{"NTFY_VISITOR_ATTACHMENT_TOTAL_SIZE_LIMIT"}, Value: util.FormatSize(server.DefaultVisitorAttachmentTotalSizeLimit), Usage: "total storage limit used for attachments per visitor"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "visitor-attachment-daily-bandwidth-limit", Aliases: []string{"visitor_attachment_daily_bandwidth_limit"}, EnvVars: []string{"NTFY_VISITOR_ATTACHMENT_DAILY_BANDWIDTH_LIMIT"}, Value: "500M", Usage: "total daily attachment download/upload bandwidth limit per visitor"}),
altsrc.NewIntFlag(&cli.IntFlag{Name: "visitor-request-limit-burst", Aliases: []string{"visitor_request_limit_burst"}, EnvVars: []string{"NTFY_VISITOR_REQUEST_LIMIT_BURST"}, Value: server.DefaultVisitorRequestLimitBurst, Usage: "initial limit of requests per visitor"}),
2024-03-07 17:53:12 +01:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "visitor-request-limit-replenish", Aliases: []string{"visitor_request_limit_replenish"}, EnvVars: []string{"NTFY_VISITOR_REQUEST_LIMIT_REPLENISH"}, Value: util.FormatDuration(server.DefaultVisitorRequestLimitReplenish), Usage: "interval at which burst limit is replenished (one per x)"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "visitor-request-limit-exempt-hosts", Aliases: []string{"visitor_request_limit_exempt_hosts"}, EnvVars: []string{"NTFY_VISITOR_REQUEST_LIMIT_EXEMPT_HOSTS"}, Value: "", Usage: "hostnames and/or IP addresses of hosts that will be exempt from the visitor request limit"}),
2023-01-27 04:57:18 +01:00
altsrc.NewIntFlag(&cli.IntFlag{Name: "visitor-message-daily-limit", Aliases: []string{"visitor_message_daily_limit"}, EnvVars: []string{"NTFY_VISITOR_MESSAGE_DAILY_LIMIT"}, Value: server.DefaultVisitorMessageDailyLimit, Usage: "max messages per visitor per day, derived from request limit if unset"}),
altsrc.NewIntFlag(&cli.IntFlag{Name: "visitor-email-limit-burst", Aliases: []string{"visitor_email_limit_burst"}, EnvVars: []string{"NTFY_VISITOR_EMAIL_LIMIT_BURST"}, Value: server.DefaultVisitorEmailLimitBurst, Usage: "initial limit of e-mails per visitor"}),
2024-03-07 17:53:12 +01:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "visitor-email-limit-replenish", Aliases: []string{"visitor_email_limit_replenish"}, EnvVars: []string{"NTFY_VISITOR_EMAIL_LIMIT_REPLENISH"}, Value: util.FormatDuration(server.DefaultVisitorEmailLimitReplenish), Usage: "interval at which burst limit is replenished (one per x)"}),
2023-03-04 15:24:19 +01:00
altsrc.NewBoolFlag(&cli.BoolFlag{Name: "visitor-subscriber-rate-limiting", Aliases: []string{"visitor_subscriber_rate_limiting"}, EnvVars: []string{"NTFY_VISITOR_SUBSCRIBER_RATE_LIMITING"}, Value: false, Usage: "enables subscriber-based rate limiting"}),
altsrc.NewBoolFlag(&cli.BoolFlag{Name: "behind-proxy", Aliases: []string{"behind_proxy", "P"}, EnvVars: []string{"NTFY_BEHIND_PROXY"}, Value: false, Usage: "if set, use X-Forwarded-For header to determine visitor IP address (for rate limiting)"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "stripe-secret-key", Aliases: []string{"stripe_secret_key"}, EnvVars: []string{"NTFY_STRIPE_SECRET_KEY"}, Value: "", Usage: "key used for the Stripe API communication, this enables payments"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "stripe-webhook-key", Aliases: []string{"stripe_webhook_key"}, EnvVars: []string{"NTFY_STRIPE_WEBHOOK_KEY"}, Value: "", Usage: "key required to validate the authenticity of incoming webhooks from Stripe"}),
2023-02-28 20:38:31 +01:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "billing-contact", Aliases: []string{"billing_contact"}, EnvVars: []string{"NTFY_BILLING_CONTACT"}, Value: "", Usage: "e-mail or website to display in upgrade dialog (only if payments are enabled)"}),
altsrc.NewBoolFlag(&cli.BoolFlag{Name: "enable-metrics", Aliases: []string{"enable_metrics"}, EnvVars: []string{"NTFY_ENABLE_METRICS"}, Value: false, Usage: "if set, Prometheus metrics are exposed via the /metrics endpoint"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "metrics-listen-http", Aliases: []string{"metrics_listen_http"}, EnvVars: []string{"NTFY_METRICS_LISTEN_HTTP"}, Usage: "ip:port used to expose the metrics endpoint (implicitly enables metrics)"}),
2023-03-28 20:41:16 +02:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "profile-listen-http", Aliases: []string{"profile_listen_http"}, EnvVars: []string{"NTFY_PROFILE_LISTEN_HTTP"}, Usage: "ip:port used to expose the profiling endpoints (implicitly enables profiling)"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-public-key", Aliases: []string{"web_push_public_key"}, EnvVars: []string{"NTFY_WEB_PUSH_PUBLIC_KEY"}, Usage: "public key used for web push notifications"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-private-key", Aliases: []string{"web_push_private_key"}, EnvVars: []string{"NTFY_WEB_PUSH_PRIVATE_KEY"}, Usage: "private key used for web push notifications"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-file", Aliases: []string{"web_push_file"}, EnvVars: []string{"NTFY_WEB_PUSH_FILE"}, Usage: "file used to store web push subscriptions"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-email-address", Aliases: []string{"web_push_email_address"}, EnvVars: []string{"NTFY_WEB_PUSH_EMAIL_ADDRESS"}, Usage: "e-mail address of sender, required to use browser push services"}),
2023-06-24 20:10:33 +02:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-startup-queries", Aliases: []string{"web_push_startup_queries"}, EnvVars: []string{"NTFY_WEB_PUSH_STARTUP_QUERIES"}, Usage: "queries run when the web push database is initialized"}),
2024-11-02 13:50:57 +01:00
altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-expiry-duration", Aliases: []string{"web_push_expiry_duration"}, EnvVars: []string{"NTFY_WEB_PUSH_EXPIRY_DURATION"}, Value: util.FormatDuration(server.DefaultWebPushExpiryDuration), Usage: "automatically expire unused subscriptions after this time"}),
altsrc.NewStringFlag(&cli.StringFlag{Name: "web-push-expiry-warning-duration", Aliases: []string{"web_push_expiry_warning_duration"}, EnvVars: []string{"NTFY_WEB_PUSH_EXPIRY_WARNING_DURATION"}, Value: util.FormatDuration(server.DefaultWebPushExpiryWarningDuration), Usage: "send web push warning notification after this time before expiring unused subscriptions"}),
2022-05-30 04:14:14 +02:00
)
2021-12-17 02:33:01 +01:00
var cmdServe = &cli.Command{
Name: "serve",
Usage: "Run the ntfy server",
UsageText: "ntfy serve [OPTIONS..]",
Action: execServe,
2022-01-23 07:00:38 +01:00
Category: categoryServer,
2021-12-17 02:33:01 +01:00
Flags: flagsServe,
2022-06-01 22:57:35 +02:00
Before: initConfigFileInputSourceFunc("config", flagsServe, initLogFunc),
2021-12-17 02:33:01 +01:00
Description: `Run the ntfy server and listen for incoming requests
2021-12-19 04:02:36 +01:00
The command will load the configuration from /etc/ntfy/server.yml. Config options can
2021-12-17 02:33:01 +01:00
be overridden using the command line options.
Examples:
ntfy serve # Starts server in the foreground (on port 80)
ntfy serve --listen-http :8080 # Starts server with alternate port`,
}
func execServe(c *cli.Context) error {
if c.NArg() > 0 {
return errors.New("no arguments expected, see 'ntfy serve --help' for help")
}
2021-12-17 02:33:01 +01:00
// Read all the options
2022-06-01 22:57:35 +02:00
config := c.String("config")
2024-03-07 18:44:31 +01:00
baseURL := strings.TrimSuffix(c.String("base-url"), "/")
2021-12-17 02:33:01 +01:00
listenHTTP := c.String("listen-http")
listenHTTPS := c.String("listen-https")
2022-01-10 22:28:13 +01:00
listenUnix := c.String("listen-unix")
2022-07-03 21:20:58 +02:00
listenUnixMode := c.Int("listen-unix-mode")
2021-12-17 02:33:01 +01:00
keyFile := c.String("key-file")
certFile := c.String("cert-file")
firebaseKeyFile := c.String("firebase-key-file")
webPushPrivateKey := c.String("web-push-private-key")
webPushPublicKey := c.String("web-push-public-key")
webPushFile := c.String("web-push-file")
webPushEmailAddress := c.String("web-push-email-address")
2023-06-18 20:20:22 +02:00
webPushStartupQueries := c.String("web-push-startup-queries")
webPushExpiryDurationStr := c.String("web-push-expiry-duration")
webPushExpiryWarningDurationStr := c.String("web-push-expiry-warning-duration")
2021-12-17 02:33:01 +01:00
cacheFile := c.String("cache-file")
2024-03-07 17:53:12 +01:00
cacheDurationStr := c.String("cache-duration")
2022-06-23 17:02:45 +02:00
cacheStartupQueries := c.String("cache-startup-queries")
2022-11-16 16:28:20 +01:00
cacheBatchSize := c.Int("cache-batch-size")
2024-03-07 17:53:12 +01:00
cacheBatchTimeoutStr := c.String("cache-batch-timeout")
2022-01-23 05:01:20 +01:00
authFile := c.String("auth-file")
2023-01-05 21:20:44 +01:00
authStartupQueries := c.String("auth-startup-queries")
2022-01-23 07:00:38 +01:00
authDefaultAccess := c.String("auth-default-access")
2022-01-02 23:56:12 +01:00
attachmentCacheDir := c.String("attachment-cache-dir")
attachmentTotalSizeLimitStr := c.String("attachment-total-size-limit")
attachmentFileSizeLimitStr := c.String("attachment-file-size-limit")
2024-03-07 17:53:12 +01:00
attachmentExpiryDurationStr := c.String("attachment-expiry-duration")
keepaliveIntervalStr := c.String("keepalive-interval")
managerIntervalStr := c.String("manager-interval")
2023-02-09 14:32:51 +01:00
disallowedTopics := c.StringSlice("disallowed-topics")
2022-03-06 03:28:25 +01:00
webRoot := c.String("web-root")
2023-01-12 18:04:18 +01:00
enableSignup := c.Bool("enable-signup")
enableLogin := c.Bool("enable-login")
enableReservations := c.Bool("enable-reservations")
2022-05-28 02:30:20 +02:00
upstreamBaseURL := c.String("upstream-base-url")
2023-05-18 19:08:10 +02:00
upstreamAccessToken := c.String("upstream-access-token")
2021-12-27 22:27:01 +01:00
smtpSenderAddr := c.String("smtp-sender-addr")
smtpSenderUser := c.String("smtp-sender-user")
smtpSenderPass := c.String("smtp-sender-pass")
smtpSenderFrom := c.String("smtp-sender-from")
2021-12-27 16:39:28 +01:00
smtpServerListen := c.String("smtp-server-listen")
smtpServerDomain := c.String("smtp-server-domain")
smtpServerAddrPrefix := c.String("smtp-server-addr-prefix")
2023-05-05 22:22:54 +02:00
twilioAccount := c.String("twilio-account")
twilioAuthToken := c.String("twilio-auth-token")
twilioPhoneNumber := c.String("twilio-phone-number")
2023-05-11 19:50:10 +02:00
twilioVerifyService := c.String("twilio-verify-service")
2024-03-07 17:53:12 +01:00
messageSizeLimitStr := c.String("message-size-limit")
messageDelayLimitStr := c.String("message-delay-limit")
totalTopicLimit := c.Int("global-topic-limit")
2021-12-17 02:33:01 +01:00
visitorSubscriptionLimit := c.Int("visitor-subscription-limit")
2023-03-04 02:23:18 +01:00
visitorSubscriberRateLimiting := c.Bool("visitor-subscriber-rate-limiting")
visitorAttachmentTotalSizeLimitStr := c.String("visitor-attachment-total-size-limit")
2022-01-13 03:24:48 +01:00
visitorAttachmentDailyBandwidthLimitStr := c.String("visitor-attachment-daily-bandwidth-limit")
2021-12-17 02:33:01 +01:00
visitorRequestLimitBurst := c.Int("visitor-request-limit-burst")
2024-03-07 17:53:12 +01:00
visitorRequestLimitReplenishStr := c.String("visitor-request-limit-replenish")
2022-02-14 22:09:59 +01:00
visitorRequestLimitExemptHosts := util.SplitNoEmpty(c.String("visitor-request-limit-exempt-hosts"), ",")
2023-01-27 04:57:18 +01:00
visitorMessageDailyLimit := c.Int("visitor-message-daily-limit")
2021-12-24 00:03:04 +01:00
visitorEmailLimitBurst := c.Int("visitor-email-limit-burst")
2024-03-07 17:53:12 +01:00
visitorEmailLimitReplenishStr := c.String("visitor-email-limit-replenish")
2021-12-17 02:33:01 +01:00
behindProxy := c.Bool("behind-proxy")
stripeSecretKey := c.String("stripe-secret-key")
2023-01-14 12:43:44 +01:00
stripeWebhookKey := c.String("stripe-webhook-key")
2023-02-28 20:38:31 +01:00
billingContact := c.String("billing-contact")
metricsListenHTTP := c.String("metrics-listen-http")
enableMetrics := c.Bool("enable-metrics") || metricsListenHTTP != ""
2023-03-28 20:41:16 +02:00
profileListenHTTP := c.String("profile-listen-http")
2024-03-07 17:53:12 +01:00
// Convert durations
cacheDuration, err := util.ParseDuration(cacheDurationStr)
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid cache duration: %s", cacheDurationStr)
2024-03-07 17:53:12 +01:00
}
cacheBatchTimeout, err := util.ParseDuration(cacheBatchTimeoutStr)
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid cache batch timeout: %s", cacheBatchTimeoutStr)
2024-03-07 17:53:12 +01:00
}
attachmentExpiryDuration, err := util.ParseDuration(attachmentExpiryDurationStr)
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid attachment expiry duration: %s", attachmentExpiryDurationStr)
2024-03-07 17:53:12 +01:00
}
keepaliveInterval, err := util.ParseDuration(keepaliveIntervalStr)
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid keepalive interval: %s", keepaliveIntervalStr)
2024-03-07 17:53:12 +01:00
}
managerInterval, err := util.ParseDuration(managerIntervalStr)
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid manager interval: %s", managerIntervalStr)
2024-03-07 17:53:12 +01:00
}
messageDelayLimit, err := util.ParseDuration(messageDelayLimitStr)
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid message delay limit: %s", messageDelayLimitStr)
2024-03-07 17:53:12 +01:00
}
visitorRequestLimitReplenish, err := util.ParseDuration(visitorRequestLimitReplenishStr)
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid visitor request limit replenish: %s", visitorRequestLimitReplenishStr)
2024-03-07 17:53:12 +01:00
}
visitorEmailLimitReplenish, err := util.ParseDuration(visitorEmailLimitReplenishStr)
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid visitor email limit replenish: %s", visitorEmailLimitReplenishStr)
2024-03-07 17:53:12 +01:00
}
webPushExpiryDuration, err := util.ParseDuration(webPushExpiryDurationStr)
if err != nil {
return fmt.Errorf("invalid web push expiry duration: %s", webPushExpiryDurationStr)
}
webPushExpiryWarningDuration, err := util.ParseDuration(webPushExpiryWarningDurationStr)
if err != nil {
return fmt.Errorf("invalid web push expiry warning duration: %s", webPushExpiryWarningDurationStr)
}
2024-03-07 17:53:12 +01:00
// Convert sizes to bytes
2024-03-07 18:22:35 +01:00
messageSizeLimit, err := util.ParseSize(messageSizeLimitStr)
2024-03-07 17:53:12 +01:00
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid message size limit: %s", messageSizeLimitStr)
2024-03-07 17:53:12 +01:00
}
2024-03-07 18:22:35 +01:00
attachmentTotalSizeLimit, err := util.ParseSize(attachmentTotalSizeLimitStr)
2024-03-07 17:53:12 +01:00
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid attachment total size limit: %s", attachmentTotalSizeLimitStr)
2024-03-07 17:53:12 +01:00
}
2024-03-07 18:22:35 +01:00
attachmentFileSizeLimit, err := util.ParseSize(attachmentFileSizeLimitStr)
2024-03-07 17:53:12 +01:00
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid attachment file size limit: %s", attachmentFileSizeLimitStr)
2024-03-07 17:53:12 +01:00
}
2024-03-07 18:22:35 +01:00
visitorAttachmentTotalSizeLimit, err := util.ParseSize(visitorAttachmentTotalSizeLimitStr)
2024-03-07 17:53:12 +01:00
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid visitor attachment total size limit: %s", visitorAttachmentTotalSizeLimitStr)
2024-03-07 17:53:12 +01:00
}
2024-03-07 18:22:35 +01:00
visitorAttachmentDailyBandwidthLimit, err := util.ParseSize(visitorAttachmentDailyBandwidthLimitStr)
2024-03-07 17:53:12 +01:00
if err != nil {
2024-03-07 18:22:35 +01:00
return fmt.Errorf("invalid visitor attachment daily bandwidth limit: %s", visitorAttachmentDailyBandwidthLimitStr)
2024-03-07 17:53:12 +01:00
} else if visitorAttachmentDailyBandwidthLimit > math.MaxInt {
return fmt.Errorf("config option visitor-attachment-daily-bandwidth-limit must be lower than %d", math.MaxInt)
}
2021-12-17 02:33:01 +01:00
// Check values
if firebaseKeyFile != "" && !util.FileExists(firebaseKeyFile) {
return errors.New("if set, FCM key file must exist")
} else if webPushPublicKey != "" && (webPushPrivateKey == "" || webPushFile == "" || webPushEmailAddress == "" || baseURL == "") {
2023-06-18 21:17:49 +02:00
return errors.New("if web push is enabled, web-push-private-key, web-push-public-key, web-push-file, web-push-email-address, and base-url should be set. run 'ntfy webpush keys' to generate keys")
2021-12-17 02:33:01 +01:00
} else if keepaliveInterval < 5*time.Second {
return errors.New("keepalive interval cannot be lower than five seconds")
} else if managerInterval < 5*time.Second {
return errors.New("manager interval cannot be lower than five seconds")
} else if cacheDuration > 0 && cacheDuration < managerInterval {
return errors.New("cache duration cannot be lower than manager interval")
} else if keyFile != "" && !util.FileExists(keyFile) {
return errors.New("if set, key file must exist")
} else if certFile != "" && !util.FileExists(certFile) {
return errors.New("if set, certificate file must exist")
} else if listenHTTPS != "" && (keyFile == "" || certFile == "") {
return errors.New("if listen-https is set, both key-file and cert-file must be set")
2023-03-03 02:25:13 +01:00
} else if smtpSenderAddr != "" && (baseURL == "" || smtpSenderFrom == "") {
return errors.New("if smtp-sender-addr is set, base-url, and smtp-sender-from must also be set")
2021-12-28 17:36:12 +01:00
} else if smtpServerListen != "" && smtpServerDomain == "" {
return errors.New("if smtp-server-listen is set, smtp-server-domain must also be set")
2022-01-13 06:08:26 +01:00
} else if attachmentCacheDir != "" && baseURL == "" {
return errors.New("if attachment-cache-dir is set, base-url must also be set")
2024-03-07 18:44:31 +01:00
} else if baseURL != "" {
u, err := url.Parse(baseURL)
if err != nil {
return fmt.Errorf("if set, base-url must be a valid URL, e.g. https://ntfy.mydomain.com: %v", err)
} else if u.Scheme != "http" && u.Scheme != "https" {
return errors.New("if set, base-url must be a valid URL starting with http:// or https://, e.g. https://ntfy.mydomain.com")
} else if u.Path != "" {
return fmt.Errorf("if set, base-url must not have a path (%s), as hosting ntfy on a sub-path is not supported, e.g. https://ntfy.mydomain.com", u.Path)
}
2022-05-28 02:30:20 +02:00
} else if upstreamBaseURL != "" && !strings.HasPrefix(upstreamBaseURL, "http://") && !strings.HasPrefix(upstreamBaseURL, "https://") {
return errors.New("if set, upstream-base-url must start with http:// or https://")
2022-10-01 21:23:14 +02:00
} else if upstreamBaseURL != "" && strings.HasSuffix(upstreamBaseURL, "/") {
return errors.New("if set, upstream-base-url must not end with a slash (/)")
2022-05-29 02:20:46 +02:00
} else if upstreamBaseURL != "" && baseURL == "" {
return errors.New("if upstream-base-url is set, base-url must also be set")
} else if upstreamBaseURL != "" && baseURL != "" && baseURL == upstreamBaseURL {
return errors.New("base-url and upstream-base-url cannot be identical, you'll likely want to set upstream-base-url to https://ntfy.sh, see https://ntfy.sh/docs/config/#ios-instant-notifications")
} else if authFile == "" && (enableSignup || enableLogin || enableReservations || stripeSecretKey != "") {
return errors.New("cannot set enable-signup, enable-login, enable-reserve-topics, or stripe-secret-key if auth-file is not set")
2023-01-12 18:04:18 +01:00
} else if enableSignup && !enableLogin {
return errors.New("cannot set enable-signup without also setting enable-login")
} else if stripeSecretKey != "" && (stripeWebhookKey == "" || baseURL == "") {
return errors.New("if stripe-secret-key is set, stripe-webhook-key and base-url must also be set")
} else if twilioAccount != "" && (twilioAuthToken == "" || twilioPhoneNumber == "" || twilioVerifyService == "" || baseURL == "" || authFile == "") {
return errors.New("if twilio-account is set, twilio-auth-token, twilio-phone-number, twilio-verify-service, base-url, and auth-file must also be set")
2024-03-07 18:22:35 +01:00
} else if messageSizeLimit > server.DefaultMessageSizeLimit {
log.Warn("message-size-limit is greater than 4K, this is not recommended and largely untested, and may lead to issues with some clients")
2024-03-07 17:53:12 +01:00
if messageSizeLimit > 5*1024*1024 {
return errors.New("message-size-limit cannot be higher than 5M")
}
} else if webPushExpiryWarningDuration > 0 && webPushExpiryWarningDuration > webPushExpiryDuration {
return errors.New("web push expiry warning duration cannot be higher than web push expiry duration")
2021-12-17 02:33:01 +01:00
}
2023-05-01 17:58:49 +02:00
// Backwards compatibility
if webRoot == "app" {
webRoot = "/"
} else if webRoot == "home" {
webRoot = "/app"
} else if webRoot == "disable" {
webRoot = ""
} else if !strings.HasPrefix(webRoot, "/") {
webRoot = "/" + webRoot
}
// Default auth permissions
authDefault, err := user.ParsePermission(authDefaultAccess)
if err != nil {
return errors.New("if set, auth-default-access must start set to 'read-write', 'read-only', 'write-only' or 'deny-all'")
}
2022-01-23 05:01:20 +01:00
2022-01-15 02:16:12 +01:00
// Special case: Unset default
if listenHTTP == "-" {
listenHTTP = ""
}
2022-02-14 22:09:59 +01:00
// Resolve hosts
visitorRequestLimitExemptIPs := make([]netip.Prefix, 0)
2022-02-14 22:09:59 +01:00
for _, host := range visitorRequestLimitExemptHosts {
ips, err := parseIPHostPrefix(host)
2022-02-14 22:09:59 +01:00
if err != nil {
2022-05-30 04:14:14 +02:00
log.Warn("cannot resolve host %s: %s, ignoring visitor request exemption", host, err.Error())
2022-02-14 22:09:59 +01:00
continue
}
2022-10-08 03:36:01 +02:00
visitorRequestLimitExemptIPs = append(visitorRequestLimitExemptIPs, ips...)
2022-02-14 22:09:59 +01:00
}
2023-01-14 12:43:44 +01:00
// Stripe things
if stripeSecretKey != "" {
2023-02-22 21:49:51 +01:00
stripe.EnableTelemetry = false // Whoa!
stripe.Key = stripeSecretKey
2023-01-14 12:43:44 +01:00
}
2023-02-09 14:32:51 +01:00
// Add default forbidden topics
disallowedTopics = append(disallowedTopics, server.DefaultDisallowedTopics...)
2021-12-17 02:33:01 +01:00
// Run server
2021-12-22 14:17:50 +01:00
conf := server.NewConfig()
2023-02-08 21:20:44 +01:00
conf.File = config
2021-12-25 00:13:09 +01:00
conf.BaseURL = baseURL
2021-12-22 14:17:50 +01:00
conf.ListenHTTP = listenHTTP
2021-12-17 02:33:01 +01:00
conf.ListenHTTPS = listenHTTPS
2022-01-10 22:28:13 +01:00
conf.ListenUnix = listenUnix
2022-07-03 21:20:58 +02:00
conf.ListenUnixMode = fs.FileMode(listenUnixMode)
2021-12-17 02:33:01 +01:00
conf.KeyFile = keyFile
conf.CertFile = certFile
conf.FirebaseKeyFile = firebaseKeyFile
conf.CacheFile = cacheFile
conf.CacheDuration = cacheDuration
2022-06-23 17:02:45 +02:00
conf.CacheStartupQueries = cacheStartupQueries
2022-11-16 16:28:20 +01:00
conf.CacheBatchSize = cacheBatchSize
conf.CacheBatchTimeout = cacheBatchTimeout
2022-01-23 05:01:20 +01:00
conf.AuthFile = authFile
2023-01-05 21:20:44 +01:00
conf.AuthStartupQueries = authStartupQueries
conf.AuthDefault = authDefault
2022-01-02 23:56:12 +01:00
conf.AttachmentCacheDir = attachmentCacheDir
conf.AttachmentTotalSizeLimit = attachmentTotalSizeLimit
conf.AttachmentFileSizeLimit = attachmentFileSizeLimit
2022-01-10 21:36:12 +01:00
conf.AttachmentExpiryDuration = attachmentExpiryDuration
2021-12-17 02:33:01 +01:00
conf.KeepaliveInterval = keepaliveInterval
conf.ManagerInterval = managerInterval
2023-02-09 14:32:51 +01:00
conf.DisallowedTopics = disallowedTopics
2023-05-01 17:58:49 +02:00
conf.WebRoot = webRoot
2022-05-28 02:30:20 +02:00
conf.UpstreamBaseURL = upstreamBaseURL
2023-05-18 19:08:10 +02:00
conf.UpstreamAccessToken = upstreamAccessToken
2021-12-27 16:39:28 +01:00
conf.SMTPSenderAddr = smtpSenderAddr
conf.SMTPSenderUser = smtpSenderUser
conf.SMTPSenderPass = smtpSenderPass
conf.SMTPSenderFrom = smtpSenderFrom
conf.SMTPServerListen = smtpServerListen
conf.SMTPServerDomain = smtpServerDomain
conf.SMTPServerAddrPrefix = smtpServerAddrPrefix
2023-05-05 22:22:54 +02:00
conf.TwilioAccount = twilioAccount
conf.TwilioAuthToken = twilioAuthToken
conf.TwilioPhoneNumber = twilioPhoneNumber
2023-05-11 19:50:10 +02:00
conf.TwilioVerifyService = twilioVerifyService
2024-03-07 17:53:12 +01:00
conf.MessageSizeLimit = int(messageSizeLimit)
conf.MessageDelayMax = messageDelayLimit
conf.TotalTopicLimit = totalTopicLimit
2021-12-17 02:33:01 +01:00
conf.VisitorSubscriptionLimit = visitorSubscriptionLimit
conf.VisitorAttachmentTotalSizeLimit = visitorAttachmentTotalSizeLimit
conf.VisitorAttachmentDailyBandwidthLimit = visitorAttachmentDailyBandwidthLimit
2021-12-17 02:33:01 +01:00
conf.VisitorRequestLimitBurst = visitorRequestLimitBurst
conf.VisitorRequestLimitReplenish = visitorRequestLimitReplenish
2022-02-14 22:09:59 +01:00
conf.VisitorRequestExemptIPAddrs = visitorRequestLimitExemptIPs
2023-01-27 04:57:18 +01:00
conf.VisitorMessageDailyLimit = visitorMessageDailyLimit
2021-12-24 00:03:04 +01:00
conf.VisitorEmailLimitBurst = visitorEmailLimitBurst
conf.VisitorEmailLimitReplenish = visitorEmailLimitReplenish
2023-03-04 02:23:18 +01:00
conf.VisitorSubscriberRateLimiting = visitorSubscriberRateLimiting
2021-12-17 02:33:01 +01:00
conf.BehindProxy = behindProxy
conf.StripeSecretKey = stripeSecretKey
2023-01-14 12:43:44 +01:00
conf.StripeWebhookKey = stripeWebhookKey
2023-02-28 20:38:31 +01:00
conf.BillingContact = billingContact
2022-12-15 05:11:22 +01:00
conf.EnableSignup = enableSignup
conf.EnableLogin = enableLogin
2023-01-10 02:37:13 +01:00
conf.EnableReservations = enableReservations
conf.EnableMetrics = enableMetrics
conf.MetricsListenHTTP = metricsListenHTTP
2023-03-28 20:41:16 +02:00
conf.ProfileListenHTTP = profileListenHTTP
conf.Version = c.App.Version
conf.WebPushPrivateKey = webPushPrivateKey
conf.WebPushPublicKey = webPushPublicKey
conf.WebPushFile = webPushFile
conf.WebPushEmailAddress = webPushEmailAddress
2023-06-18 20:20:22 +02:00
conf.WebPushStartupQueries = webPushStartupQueries
conf.WebPushExpiryDuration = webPushExpiryDuration
conf.WebPushExpiryWarningDuration = webPushExpiryWarningDuration
2022-06-01 22:57:35 +02:00
// Set up hot-reloading of config
go sigHandlerConfigReload(config)
// Run server
2021-12-17 02:33:01 +01:00
s, err := server.New(conf)
if err != nil {
2023-02-04 04:21:50 +01:00
log.Fatal(err.Error())
2022-06-01 22:57:35 +02:00
} else if err := s.Run(); err != nil {
2023-02-04 04:21:50 +01:00
log.Fatal(err.Error())
2021-12-17 02:33:01 +01:00
}
2022-05-30 04:14:14 +02:00
log.Info("Exiting.")
2021-12-17 02:33:01 +01:00
return nil
}
2022-06-01 22:57:35 +02:00
func sigHandlerConfigReload(config string) {
sigs := make(chan os.Signal, 1)
signal.Notify(sigs, syscall.SIGHUP)
for range sigs {
log.Info("Partially hot reloading configuration ...")
inputSource, err := newYamlSourceFromFile(config, flagsServe)
if err != nil {
log.Warn("Hot reload failed: %s", err.Error())
continue
}
2023-02-04 04:21:50 +01:00
if err := reloadLogLevel(inputSource); err != nil {
log.Warn("Reloading log level failed: %s", err.Error())
}
2022-06-01 22:57:35 +02:00
}
}
func parseIPHostPrefix(host string) (prefixes []netip.Prefix, err error) {
2022-10-08 23:58:05 +02:00
// Try parsing as prefix, e.g. 10.0.1.0/24
2022-10-07 23:16:20 +02:00
prefix, err := netip.ParsePrefix(host)
if err == nil {
2022-10-08 23:58:05 +02:00
prefixes = append(prefixes, prefix.Masked())
return prefixes, nil
2022-10-07 23:16:20 +02:00
}
2022-10-08 23:58:05 +02:00
// Not a prefix, parse as host or IP (LookupHost passes through an IP as is)
2022-10-07 23:16:20 +02:00
ips, err := net.LookupHost(host)
2022-10-07 23:24:11 +02:00
if err != nil {
return nil, err
}
2022-10-08 23:58:05 +02:00
for _, ipStr := range ips {
ip, err := netip.ParseAddr(ipStr)
2022-10-07 23:24:11 +02:00
if err == nil {
prefix, err := ip.Prefix(ip.BitLen())
if err != nil {
return nil, fmt.Errorf("%s successfully parsed but unable to make prefix: %s", ip.String(), err.Error())
2022-10-07 23:16:20 +02:00
}
2022-10-08 23:58:05 +02:00
prefixes = append(prefixes, prefix.Masked())
2022-10-07 23:16:20 +02:00
}
}
return
}
2023-02-04 04:21:50 +01:00
func reloadLogLevel(inputSource altsrc.InputSourceContext) error {
2022-06-01 22:57:35 +02:00
newLevelStr, err := inputSource.String("log-level")
if err != nil {
2023-02-04 04:21:50 +01:00
return fmt.Errorf("cannot load log level: %s", err.Error())
}
overrides, err := inputSource.StringSlice("log-level-overrides")
if err != nil {
return fmt.Errorf("cannot load log level overrides (1): %s", err.Error())
2022-06-01 22:57:35 +02:00
}
2023-02-06 05:34:27 +01:00
log.ResetLevelOverrides()
2023-02-04 04:21:50 +01:00
if err := applyLogLevelOverrides(overrides); err != nil {
return fmt.Errorf("cannot load log level overrides (2): %s", err.Error())
}
log.SetLevel(log.ToLevel(newLevelStr))
if len(overrides) > 0 {
log.Info("Log level is %v, %d override(s) in place", strings.ToUpper(newLevelStr), len(overrides))
} else {
log.Info("Log level is %v", strings.ToUpper(newLevelStr))
}
return nil
2022-06-01 22:57:35 +02:00
}