| package config |
|
|
| import ( |
| "fmt" |
| "net/http" |
| "net/url" |
| "strings" |
|
|
| "github.com/pkg/errors" |
| "github.com/target/goalert/validation" |
| "github.com/target/goalert/validation/validate" |
| ) |
|
|
| |
| const SchemaVersion = 1 |
|
|
| |
| type Config struct { |
| data []byte |
| fallbackURL string |
| explicitURL string |
|
|
| intEmailDomain string |
|
|
| General struct { |
| ApplicationName string `public:"true" info:"The name used in messaging and page titles. Defaults to \"GoAlert\"."` |
| PublicURL string `public:"true" info:"Publicly routable URL for UI links and API calls." deprecated:"Use --public-url flag instead, which takes precedence."` |
| GoogleAnalyticsID string `public:"true" info:"If set, will post user metrics to the corresponding data stream in Google Analytics 4."` |
| NotificationDisclaimer string `public:"true" info:"Disclaimer text for receiving pre-recorded notifications (appears on profile page)."` |
| DisableMessageBundles bool `public:"true" info:"Disable bundling status updates and alert notifications."` |
| ShortURL string `public:"true" info:"If set, messages will contain a shorter URL using this as a prefix (e.g. http://example.com). It should point to GoAlert and can be the same as the PublicURL."` |
| DisableSMSLinks bool `public:"true" info:"If set, SMS messages will not contain a URL pointing to GoAlert."` |
| DisableLabelCreation bool `public:"true" info:"Disables the ability to create new labels for services."` |
| DisableCalendarSubscriptions bool `public:"true" info:"If set, disables all active calendar subscriptions as well as the ability to create new calendar subscriptions."` |
| } |
|
|
| Services struct { |
| RequiredLabels []string `public:"true" info:"List of label names to require new services to define."` |
| } |
|
|
| Maintenance struct { |
| AlertCleanupDays int `public:"true" info:"Closed alerts will be deleted after this many days (0 means disable cleanup)."` |
| AlertAutoCloseDays int `public:"true" info:"Unacknowledged alerts will automatically be closed after this many days of inactivity. (0 means disable auto-close)."` |
| AutoCloseAckedAlerts bool `public:"true" info:"If set, alerts that are acknowledged will also be automatically closed after the configured number of days of inactivity."` |
| APIKeyExpireDays int `public:"true" info:"Unused calendar API keys will be disabled after this many days (0 means disable cleanup)."` |
| ScheduleCleanupDays int `public:"true" info:"Schedule on-call history will be deleted after this many days (0 means disable cleanup)."` |
| } |
|
|
| Auth struct { |
| RefererURLs []string `info:"Allowed referer URLs for auth and redirects." deprecated:"Use --public-url flag instead, which takes precedence."` |
| DisableBasic bool `public:"true" info:"Disallow username/password login."` |
| } |
|
|
| GitHub struct { |
| Enable bool `public:"true" info:"Enable GitHub authentication."` |
|
|
| NewUsers bool `info:"Allow new user creation via GitHub authentication."` |
|
|
| ClientID string |
| ClientSecret string `password:"true"` |
|
|
| AllowedUsers []string `info:"Allow any of the listed GitHub usernames to authenticate. Use '*' to allow any user."` |
| AllowedOrgs []string `info:"Allow any member of any listed GitHub org (or team, using the format 'org/team') to authenticate."` |
|
|
| EnterpriseURL string `info:"GitHub URL (without /api) when used with GitHub Enterprise."` |
| } |
|
|
| OIDC struct { |
| Enable bool `public:"true" info:"Enable OpenID Connect authentication."` |
|
|
| NewUsers bool `info:"Allow new user creation via OIDC authentication."` |
| OverrideName string `info:"Set the name/label on the login page to something other than OIDC."` |
|
|
| IssuerURL string |
| ClientID string |
| ClientSecret string `password:"true"` |
|
|
| Scopes string `info:"Requested scopes for authentication. If left blank, openid, profile, and email will be used."` |
| UserInfoEmailPath string `info:"JMESPath expression to find email address in UserInfo. If set, the email claim will be ignored in favor of this. (suggestion: email)."` |
| UserInfoEmailVerifiedPath string `info:"JMESPath expression to find email verification state in UserInfo. If set, the email_verified claim will be ignored in favor of this. (suggestion: email_verified)."` |
| UserInfoNamePath string `info:"JMESPath expression to find full name in UserInfo. If set, the name claim will be ignored in favor of this. (suggestion: name || cn || join(' ', [firstname, lastname]))"` |
| } |
|
|
| Mailgun struct { |
| Enable bool `public:"true"` |
|
|
| APIKey string `password:"true"` |
| EmailDomain string `info:"The TO address for all incoming alerts."` |
| } |
|
|
| Slack struct { |
| Enable bool `public:"true"` |
|
|
| ClientID string |
| ClientSecret string `password:"true"` |
|
|
| |
| |
| AccessToken string `password:"true" info:"Slack app bot user OAuth access token (should start with xoxb-)."` |
|
|
| SigningSecret string `password:"true" info:"Signing secret to verify requests from slack."` |
| InteractiveMessages bool `info:"Enable interactive messages (e.g. buttons)."` |
| } |
|
|
| Twilio struct { |
| Enable bool `public:"true" info:"Enables sending and processing of Voice and SMS messages through the Twilio notification provider."` |
|
|
| VoiceName string `info:"The Twilio voice to use for Text To Speech for phone calls. See https://www.twilio.com/docs/voice/twiml/say/text-speech#polly-standard-and-neural-voices"` |
| VoiceLanguage string `info:"The Twilio voice language to use for Text To Speech for phone calls. See https://www.twilio.com/docs/voice/twiml/say/text-speech#polly-standard-and-neural-voices"` |
|
|
| AccountSID string |
| AuthToken string `password:"true" info:"The primary Auth Token for Twilio. Must be primary unless Alternate Auth Token is set. This token is used for outgoing requests."` |
| AlternateAuthToken string `password:"true" info:"An alternate Auth Token for validating incoming requests. During a key change, set this to the Primary, and Auth Token to the Secondary, then promote and clear this field."` |
|
|
| FromNumber string `public:"true" info:"The Twilio number to use for outgoing notifications."` |
|
|
| MessagingServiceSID string `public:"true" info:"If set, replaces the use of From Number for SMS notifications."` |
|
|
| RCSSenderID string `info:"The sender ID for RCS messages. Required if RCS is enabled for the MessagingServiceSID."` |
|
|
| DisableTwoWaySMS bool `info:"Disables SMS reply codes for alert messages."` |
| SMSCarrierLookup bool `info:"Perform carrier lookup of SMS contact methods (required for SMSFromNumberOverride). Extra charges may apply."` |
| SMSFromNumberOverride []string `info:"List of 'carrier=number' pairs, SMS messages to numbers of the provided carrier string (exact match) will use the alternate From Number."` |
| } |
|
|
| SMTP struct { |
| Enable bool `public:"true" info:"Enables email as a contact method."` |
|
|
| From string `public:"true" info:"The email address messages should be sent from."` |
|
|
| Address string `info:"The server address to use for sending email. Port is optional and defaults to 465, or 25 if Disable TLS is set. Common ports are: 25 or 587 for STARTTLS (or unencrypted) and 465 for TLS."` |
| DisableTLS bool `info:"Disables TLS on the connection (STARTTLS will still be used if supported)."` |
| SkipVerify bool `info:"Disables certificate validation for TLS/STARTTLS (insecure)."` |
|
|
| Username string `info:"Username for authentication."` |
| Password string `password:"true" info:"Password for authentication."` |
| } |
|
|
| Webhook struct { |
| Enable bool `public:"true" info:"Enables webhook as a contact method."` |
| AllowedURLs []string `public:"true" info:"If set, allows webhooks for these domains only."` |
| } |
|
|
| Feedback struct { |
| Enable bool `public:"true" info:"Enables Feedback link in nav bar."` |
| OverrideURL string `public:"true" info:"Use a custom URL for Feedback link in nav bar."` |
| } |
| } |
|
|
| |
| func (cfg Config) EmailIngressEnabled() bool { |
| if (cfg.Mailgun.Enable && cfg.Mailgun.EmailDomain != "") || cfg.intEmailDomain != "" { |
| return true |
| } |
| return false |
| } |
|
|
| |
| func (cfg Config) EmailIngressDomain() string { |
| if cfg.intEmailDomain != "" { |
| |
| return cfg.intEmailDomain |
| } |
| if cfg.Mailgun.EmailDomain != "" { |
| return cfg.Mailgun.EmailDomain |
| } |
| return "" |
| } |
|
|
| |
| func (cfg Config) TwilioSMSFromNumber(carrier string) string { |
| if carrier != "" { |
| for _, s := range cfg.Twilio.SMSFromNumberOverride { |
| parts := strings.SplitN(s, "=", 2) |
| if len(parts) != 2 { |
| continue |
| } |
| if parts[0] != carrier { |
| continue |
| } |
| return parts[1] |
| } |
| } |
|
|
| if cfg.Twilio.MessagingServiceSID != "" { |
| return cfg.Twilio.MessagingServiceSID |
| } |
|
|
| return cfg.Twilio.FromNumber |
| } |
|
|
| |
| func RequestURL(req *http.Request) string { |
| cfg := FromContext(req.Context()) |
| if !cfg.ShouldUsePublicURL() { |
| |
| u, err := url.ParseRequestURI(req.RequestURI) |
| if err != nil { |
| panic(errors.Wrap(err, "parse RequestURI")) |
| } |
| u.Host = req.Host |
| u.Scheme = req.URL.Scheme |
| return u.String() |
| } |
|
|
| base, err := url.Parse(cfg.PublicURL()) |
| if err != nil { |
| panic(errors.Wrap(err, "parse PublicURL")) |
| } |
|
|
| base.Path = strings.TrimSuffix(base.Path, "/") + req.URL.Path |
| base.RawQuery = req.URL.RawQuery |
|
|
| return base.String() |
| } |
|
|
| func (cfg Config) rawCallbackURL(path string, mergeParams ...url.Values) *url.URL { |
| base, err := url.Parse(cfg.PublicURL()) |
| if err != nil { |
| panic(errors.Wrap(err, "parse PublicURL")) |
| } |
|
|
| next, err := url.Parse(path) |
| if err != nil { |
| panic(errors.Wrap(err, "parse path")) |
| } |
|
|
| base.Path = strings.TrimSuffix(base.Path, "/") + "/" + strings.TrimPrefix(next.Path, "/") |
|
|
| params := base.Query() |
| nx := next.Query() |
| |
| for name, val := range nx { |
| params[name] = val |
| } |
|
|
| |
| for _, merge := range mergeParams { |
| for name, val := range merge { |
| params[name] = val |
| } |
| } |
|
|
| base.RawQuery = params.Encode() |
| return base |
| } |
|
|
| |
| |
| |
| |
| func (cfg Config) CallbackURL(path string, mergeParams ...url.Values) string { |
| base := cfg.rawCallbackURL(path, mergeParams...) |
|
|
| newPath := ShortPath(base.Path) |
| if newPath != "" && cfg.General.ShortURL != "" { |
| short, err := url.Parse(cfg.General.ShortURL) |
| if err != nil { |
| panic(errors.Wrap(err, "parse ShortURL")) |
| } |
| base.Path = newPath |
| base.Host = short.Host |
| base.Scheme = short.Scheme |
| } |
|
|
| return base.String() |
| } |
|
|
| |
| func MatchURL(baseURL, testURL string) (bool, error) { |
| compareQueryValues := func(baseVal, testVal url.Values) bool { |
| for name := range baseVal { |
| if baseVal.Get(name) == testVal.Get(name) { |
| continue |
| } |
| return false |
| } |
| return true |
| } |
|
|
| addImplicitPort := func(u *url.URL) { |
| if strings.Contains(u.Host, ":") { |
| return |
| } |
| switch strings.ToLower(u.Scheme) { |
| case "http": |
| u.Host += ":80" |
| case "https": |
| u.Host += ":443" |
| } |
| } |
| base, err := url.Parse(baseURL) |
| if err != nil { |
| return false, err |
| } |
|
|
| test, err := url.Parse(testURL) |
| if err != nil { |
| return false, err |
| } |
|
|
| addImplicitPort(base) |
| addImplicitPort(test) |
|
|
| |
| if !strings.EqualFold(base.Host, test.Host) { |
| return false, nil |
| } |
|
|
| |
| if !strings.EqualFold(base.Scheme, test.Scheme) { |
| return false, nil |
| } |
|
|
| |
| if len(base.Path) > 1 && !strings.HasPrefix(test.Path, base.Path) { |
| return false, nil |
| } |
|
|
| |
| if !compareQueryValues(base.Query(), test.Query()) { |
| return false, nil |
| } |
|
|
| return true, nil |
| } |
|
|
| |
| func (cfg Config) ValidWebhookURL(testURL string) bool { |
| if len(cfg.Webhook.AllowedURLs) == 0 { |
| return true |
| } |
| for _, baseU := range cfg.Webhook.AllowedURLs { |
| matched, err := MatchURL(baseU, testURL) |
| if err != nil { |
| return false |
| } |
| if matched { |
| return true |
| } |
| } |
| return false |
| } |
|
|
| |
| |
| func (cfg Config) ShouldUsePublicURL() bool { return cfg.explicitURL != "" } |
|
|
| |
| func (cfg Config) ValidReferer(reqURL, ref string) bool { |
| |
| if cfg.explicitURL != "" { |
| valid, _ := MatchURL(cfg.explicitURL, ref) |
| return valid |
| } |
|
|
| pubURL := cfg.PublicURL() |
| if pubURL != "" && strings.HasPrefix(ref, pubURL) { |
| return true |
| } |
|
|
| if len(cfg.Auth.RefererURLs) == 0 { |
| u, err := url.Parse(reqURL) |
| if err != nil { |
| return false |
| } |
| |
| u.Path = "" |
| u.RawQuery = "" |
| matched, err := MatchURL(u.String(), ref) |
| if err != nil { |
| return false |
| } |
| return matched |
| } |
|
|
| for _, u := range cfg.Auth.RefererURLs { |
| matched, err := MatchURL(u, ref) |
| if err != nil { |
| return false |
| } |
| if matched { |
| return true |
| } |
| } |
|
|
| return false |
| } |
|
|
| |
| func (cfg Config) ApplicationName() string { |
| if cfg.General.ApplicationName == "" { |
| return "GoAlert" |
| } |
| return cfg.General.ApplicationName |
| } |
|
|
| |
| func (cfg Config) PublicURL() string { |
| switch { |
| case cfg.explicitURL != "": |
| return strings.TrimSuffix(cfg.explicitURL, "/") |
| case cfg.General.PublicURL != "": |
| return strings.TrimSuffix(cfg.General.PublicURL, "/") |
| } |
|
|
| return strings.TrimSuffix(cfg.fallbackURL, "/") |
| } |
|
|
| func validateEnable(prefix string, isEnabled bool, vals ...string) error { |
| if !isEnabled { |
| return nil |
| } |
|
|
| var err error |
| for i := 0; i < len(vals); i += 2 { |
| if vals[i+1] != "" { |
| continue |
| } |
| err = validate.Many( |
| err, |
| validation.NewFieldError(prefix+".Enable", fmt.Sprintf("requires %s.%s to be set ", prefix, vals[i])), |
| validation.NewFieldError(fmt.Sprintf("%s.%s", prefix, vals[i]), "required to enable "+prefix), |
| ) |
| } |
|
|
| return err |
| } |
|
|
| |
| func (cfg Config) Validate() error { |
| var err error |
| if cfg.General.PublicURL != "" { |
| err = validate.Many( |
| err, |
| validate.AbsoluteURL("General.PublicURL", cfg.General.PublicURL), |
| ) |
| } |
|
|
| if cfg.General.ApplicationName != "" { |
| err = validate.Many(err, validate.ASCII("General.ApplicationName", cfg.General.ApplicationName, 0, 32)) |
| } |
|
|
| validateKey := func(fname, val string) error { return validate.ASCII(fname, val, 0, 128) } |
| validatePath := func(fname, val string) error { |
| if val == "" { |
| return nil |
| } |
| return validate.JMESPath(fname, val) |
| } |
| validateScopes := func(fname, val string) error { |
| if val == "" { |
| return nil |
| } |
| return validate.OAuthScope(fname, val, "openid") |
| } |
| validateLabels := func(fname string, vals []string) (err error) { |
| for i, v := range vals { |
| err = validate.Many(err, validate.LabelKey(fmt.Sprintf("%s[%d]", fname, i), v)) |
| } |
| return err |
| } |
|
|
| err = validate.Many( |
| err, |
| validate.Text("General.NotificationDisclaimer", cfg.General.NotificationDisclaimer, 0, 500), |
| validateKey("Mailgun.APIKey", cfg.Mailgun.APIKey), |
| validateKey("Slack.ClientID", cfg.Slack.ClientID), |
| validateKey("Slack.ClientSecret", cfg.Slack.ClientSecret), |
| validateKey("Twilio.AccountSID", cfg.Twilio.AccountSID), |
| validateKey("Twilio.AuthToken", cfg.Twilio.AuthToken), |
| validateLabels("Services.RequiredLabels", cfg.Services.RequiredLabels), |
| validateKey("Twilio.AlternateAuthToken", cfg.Twilio.AlternateAuthToken), |
| validate.ASCII("Twilio.VoiceName", cfg.Twilio.VoiceName, 0, 50), |
| validate.ASCII("Twilio.VoiceLanguage", cfg.Twilio.VoiceLanguage, 0, 10), |
| validateKey("GitHub.ClientID", cfg.GitHub.ClientID), |
| validateKey("GitHub.ClientSecret", cfg.GitHub.ClientSecret), |
| validateKey("Slack.AccessToken", cfg.Slack.AccessToken), |
| validate.Range("Maintenance.AlertCleanupDays", cfg.Maintenance.AlertCleanupDays, 0, 9000), |
| validate.Range("Maintenance.AlertAutoCloseDays", cfg.Maintenance.AlertAutoCloseDays, 0, 9000), |
| validate.Range("Maintenance.APIKeyExpireDays", cfg.Maintenance.APIKeyExpireDays, 0, 9000), |
| validate.Range("Maintenance.ScheduleCleanupDays", cfg.Maintenance.ScheduleCleanupDays, 0, 9000), |
| validateScopes("OIDC.Scopes", cfg.OIDC.Scopes), |
| validatePath("OIDC.UserInfoEmailPath", cfg.OIDC.UserInfoEmailPath), |
| validatePath("OIDC.UserInfoEmailVerifiedPath", cfg.OIDC.UserInfoEmailVerifiedPath), |
| validatePath("OIDC.UserInfoNamePath", cfg.OIDC.UserInfoNamePath), |
| validateKey("Slack.SigningSecret", cfg.Slack.SigningSecret), |
| ) |
|
|
| if cfg.General.GoogleAnalyticsID != "" { |
| err = validate.Many(err, validate.MeasurementID("General.GoogleAnalyticsID", cfg.General.GoogleAnalyticsID)) |
| } |
|
|
| if cfg.Twilio.VoiceName != "" && cfg.Twilio.VoiceLanguage == "" { |
| err = validate.Many(err, validation.NewFieldError("Twilio.VoiceLanguage", "required when Twilio.VoiceName is set")) |
| } |
|
|
| if cfg.OIDC.IssuerURL != "" { |
| err = validate.Many(err, validate.AbsoluteURL("OIDC.IssuerURL", cfg.OIDC.IssuerURL)) |
| } |
| if cfg.OIDC.Scopes != "" { |
| err = validate.Many(err, validateScopes("OIDC.Scopes", cfg.OIDC.Scopes)) |
| } |
| if cfg.GitHub.EnterpriseURL != "" { |
| err = validate.Many(err, validate.AbsoluteURL("GitHub.EnterpriseURL", cfg.GitHub.EnterpriseURL)) |
| } |
| if cfg.Twilio.FromNumber != "" { |
| err = validate.Many(err, validate.Phone("Twilio.FromNumber", cfg.Twilio.FromNumber)) |
| } |
| if cfg.Twilio.MessagingServiceSID != "" { |
| err = validate.Many(err, validate.TwilioSID("Twilio.MessagingServiceSID", "MG", cfg.Twilio.MessagingServiceSID)) |
| } |
| if cfg.Twilio.RCSSenderID != "" { |
| err = validate.Many(err, validate.ASCII("Twilio.RCSSenderSID", cfg.Twilio.RCSSenderID, 1, 255)) |
| if cfg.Twilio.MessagingServiceSID == "" { |
| err = validate.Many(err, validation.NewFieldError("Twilio.MessagingServiceSID", "required when Twilio.RCSSenderID is set")) |
| } |
| } |
|
|
| if cfg.Mailgun.EmailDomain != "" { |
| err = validate.Many(err, validate.Email("Mailgun.EmailDomain", "example@"+cfg.Mailgun.EmailDomain)) |
| } |
| if cfg.SMTP.From != "" { |
| err = validate.Many(err, validate.Email("SMTP.From", cfg.SMTP.From)) |
| } |
| if cfg.Slack.InteractiveMessages && cfg.Slack.SigningSecret == "" { |
| err = validate.Many(err, validation.NewFieldError("Slack.SigningSecret", "required to enable Slack interactive messages")) |
| } |
|
|
| err = validate.Many( |
| err, |
|
|
| validateEnable("Mailgun", cfg.Mailgun.Enable, |
| "APIKey", cfg.Mailgun.APIKey, |
| "EmailDomain", cfg.Mailgun.EmailDomain, |
| ), |
|
|
| validateEnable("Slack", cfg.Slack.Enable, |
| "ClientID", cfg.Slack.ClientID, |
| "ClientSecret", cfg.Slack.ClientSecret, |
| ), |
|
|
| validateEnable("Twilio", cfg.Twilio.Enable, |
| "AccountSID", cfg.Twilio.AccountSID, |
| "AuthToken", cfg.Twilio.AuthToken, |
| "FromNumber", cfg.Twilio.FromNumber, |
| ), |
|
|
| validateEnable("GitHub", cfg.GitHub.Enable, |
| "ClientID", cfg.GitHub.ClientID, |
| "ClientSecret", cfg.GitHub.ClientSecret, |
| ), |
|
|
| validateEnable("OIDC", cfg.OIDC.Enable, |
| "IssuerURL", cfg.OIDC.IssuerURL, |
| "ClientID", cfg.OIDC.ClientID, |
| "ClientSecret", cfg.OIDC.ClientSecret, |
| ), |
| validateEnable("SMTP", cfg.SMTP.Enable, |
| "From", cfg.SMTP.From, |
| "Address", cfg.SMTP.Address, |
| ), |
| ) |
|
|
| if cfg.Feedback.OverrideURL != "" { |
| err = validate.Many( |
| err, |
| validate.AbsoluteURL("Feedback.OverrideURL", cfg.Feedback.OverrideURL), |
| ) |
| } |
|
|
| if cfg.General.ShortURL != "" { |
| err = validate.Many( |
| err, |
| validate.AbsoluteURL("General.ShortURL", cfg.General.ShortURL), |
| ) |
| } |
|
|
| for i, urlStr := range cfg.Auth.RefererURLs { |
| field := fmt.Sprintf("Auth.RefererURLs[%d]", i) |
| err = validate.Many( |
| err, |
| validate.AbsoluteURL(field, urlStr), |
| ) |
| } |
|
|
| for i, urlStr := range cfg.Webhook.AllowedURLs { |
| field := fmt.Sprintf("Webhook.AllowedURLs[%d]", i) |
| err = validate.Many(err, validate.AbsoluteURL(field, urlStr)) |
| } |
|
|
| m := make(map[string]bool) |
| for i, str := range cfg.Twilio.SMSFromNumberOverride { |
| parts := strings.SplitN(str, "=", 2) |
| fname := fmt.Sprintf("Twilio.SMSFromNumberOverride[%d]", i) |
| if len(parts) != 2 { |
| err = validate.Many(err, validation.NewFieldError( |
| fname, |
| "must be in the format 'carrier=number'", |
| )) |
| continue |
| } |
| err = validate.Many(err, |
| validate.ASCII(fname+".Carrier", parts[0], 1, 255), |
| validate.Phone(fname+".Phone", parts[1]), |
| ) |
| if m[parts[0]] { |
| err = validate.Many(err, validation.NewFieldError(fname, fmt.Sprintf("carrier override '%s' already set", parts[0]))) |
| } |
| m[parts[0]] = true |
| } |
|
|
| return err |
| } |
|
|