Adding upstream version 0.28.1.
Signed-off-by: Daniel Baumann <daniel@debian.org>
This commit is contained in:
parent
88f1d47ab6
commit
e28c88ef14
933 changed files with 194711 additions and 0 deletions
197
core/event_request.go
Normal file
197
core/event_request.go
Normal file
|
@ -0,0 +1,197 @@
|
|||
package core
|
||||
|
||||
import (
|
||||
"maps"
|
||||
"net/netip"
|
||||
"strings"
|
||||
"sync"
|
||||
|
||||
"github.com/pocketbase/pocketbase/tools/inflector"
|
||||
"github.com/pocketbase/pocketbase/tools/router"
|
||||
)
|
||||
|
||||
// Common request store keys used by the middlewares and api handlers.
|
||||
const (
|
||||
RequestEventKeyInfoContext = "infoContext"
|
||||
)
|
||||
|
||||
// RequestEvent defines the PocketBase router handler event.
|
||||
type RequestEvent struct {
|
||||
App App
|
||||
|
||||
cachedRequestInfo *RequestInfo
|
||||
|
||||
Auth *Record
|
||||
|
||||
router.Event
|
||||
|
||||
mu sync.Mutex
|
||||
}
|
||||
|
||||
// RealIP returns the "real" IP address from the configured trusted proxy headers.
|
||||
//
|
||||
// If Settings.TrustedProxy is not configured or the found IP is empty,
|
||||
// it fallbacks to e.RemoteIP().
|
||||
//
|
||||
// NB!
|
||||
// Be careful when used in a security critical context as it relies on
|
||||
// the trusted proxy to be properly configured and your app to be accessible only through it.
|
||||
// If you are not sure, use e.RemoteIP().
|
||||
func (e *RequestEvent) RealIP() string {
|
||||
settings := e.App.Settings()
|
||||
|
||||
for _, h := range settings.TrustedProxy.Headers {
|
||||
headerValues := e.Request.Header.Values(h)
|
||||
if len(headerValues) == 0 {
|
||||
continue
|
||||
}
|
||||
|
||||
// extract the last header value as it is expected to be the one controlled by the proxy
|
||||
ipsList := headerValues[len(headerValues)-1]
|
||||
if ipsList == "" {
|
||||
continue
|
||||
}
|
||||
|
||||
ips := strings.Split(ipsList, ",")
|
||||
|
||||
if settings.TrustedProxy.UseLeftmostIP {
|
||||
for _, ip := range ips {
|
||||
parsed, err := netip.ParseAddr(strings.TrimSpace(ip))
|
||||
if err == nil {
|
||||
return parsed.StringExpanded()
|
||||
}
|
||||
}
|
||||
} else {
|
||||
for i := len(ips) - 1; i >= 0; i-- {
|
||||
parsed, err := netip.ParseAddr(strings.TrimSpace(ips[i]))
|
||||
if err == nil {
|
||||
return parsed.StringExpanded()
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return e.RemoteIP()
|
||||
}
|
||||
|
||||
// HasSuperuserAuth checks whether the current RequestEvent has superuser authentication loaded.
|
||||
func (e *RequestEvent) HasSuperuserAuth() bool {
|
||||
return e.Auth != nil && e.Auth.IsSuperuser()
|
||||
}
|
||||
|
||||
// RequestInfo parses the current request into RequestInfo instance.
|
||||
//
|
||||
// Note that the returned result is cached to avoid copying the request data multiple times
|
||||
// but the auth state and other common store items are always refreshed in case they were changed by another handler.
|
||||
func (e *RequestEvent) RequestInfo() (*RequestInfo, error) {
|
||||
e.mu.Lock()
|
||||
defer e.mu.Unlock()
|
||||
|
||||
if e.cachedRequestInfo != nil {
|
||||
e.cachedRequestInfo.Auth = e.Auth
|
||||
|
||||
infoCtx, _ := e.Get(RequestEventKeyInfoContext).(string)
|
||||
if infoCtx != "" {
|
||||
e.cachedRequestInfo.Context = infoCtx
|
||||
} else {
|
||||
e.cachedRequestInfo.Context = RequestInfoContextDefault
|
||||
}
|
||||
} else {
|
||||
// (re)init e.cachedRequestInfo based on the current request event
|
||||
if err := e.initRequestInfo(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
|
||||
return e.cachedRequestInfo, nil
|
||||
}
|
||||
|
||||
func (e *RequestEvent) initRequestInfo() error {
|
||||
infoCtx, _ := e.Get(RequestEventKeyInfoContext).(string)
|
||||
if infoCtx == "" {
|
||||
infoCtx = RequestInfoContextDefault
|
||||
}
|
||||
|
||||
info := &RequestInfo{
|
||||
Context: infoCtx,
|
||||
Method: e.Request.Method,
|
||||
Query: map[string]string{},
|
||||
Headers: map[string]string{},
|
||||
Body: map[string]any{},
|
||||
}
|
||||
|
||||
if err := e.BindBody(&info.Body); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
// extract the first value of all query params
|
||||
query := e.Request.URL.Query()
|
||||
for k, v := range query {
|
||||
if len(v) > 0 {
|
||||
info.Query[k] = v[0]
|
||||
}
|
||||
}
|
||||
|
||||
// extract the first value of all headers and normalizes the keys
|
||||
// ("X-Token" is converted to "x_token")
|
||||
for k, v := range e.Request.Header {
|
||||
if len(v) > 0 {
|
||||
info.Headers[inflector.Snakecase(k)] = v[0]
|
||||
}
|
||||
}
|
||||
|
||||
info.Auth = e.Auth
|
||||
|
||||
e.cachedRequestInfo = info
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// -------------------------------------------------------------------
|
||||
|
||||
const (
|
||||
RequestInfoContextDefault = "default"
|
||||
RequestInfoContextExpand = "expand"
|
||||
RequestInfoContextRealtime = "realtime"
|
||||
RequestInfoContextProtectedFile = "protectedFile"
|
||||
RequestInfoContextBatch = "batch"
|
||||
RequestInfoContextOAuth2 = "oauth2"
|
||||
RequestInfoContextOTP = "otp"
|
||||
RequestInfoContextPasswordAuth = "password"
|
||||
)
|
||||
|
||||
// RequestInfo defines a HTTP request data struct, usually used
|
||||
// as part of the `@request.*` filter resolver.
|
||||
//
|
||||
// The Query and Headers fields contains only the first value for each found entry.
|
||||
type RequestInfo struct {
|
||||
Query map[string]string `json:"query"`
|
||||
Headers map[string]string `json:"headers"`
|
||||
Body map[string]any `json:"body"`
|
||||
Auth *Record `json:"auth"`
|
||||
Method string `json:"method"`
|
||||
Context string `json:"context"`
|
||||
}
|
||||
|
||||
// HasSuperuserAuth checks whether the current RequestInfo instance
|
||||
// has superuser authentication loaded.
|
||||
func (info *RequestInfo) HasSuperuserAuth() bool {
|
||||
return info.Auth != nil && info.Auth.IsSuperuser()
|
||||
}
|
||||
|
||||
// Clone creates a new shallow copy of the current RequestInfo and its Auth record (if any).
|
||||
func (info *RequestInfo) Clone() *RequestInfo {
|
||||
clone := &RequestInfo{
|
||||
Method: info.Method,
|
||||
Context: info.Context,
|
||||
Query: maps.Clone(info.Query),
|
||||
Body: maps.Clone(info.Body),
|
||||
Headers: maps.Clone(info.Headers),
|
||||
}
|
||||
|
||||
if info.Auth != nil {
|
||||
clone.Auth = info.Auth.Fresh()
|
||||
}
|
||||
|
||||
return clone
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue