mirror of
https://github.com/binwiederhier/ntfy.git
synced 2026-05-09 08:26:00 +02:00
[GH-ISSUE #742] ACL by IP address #542
Labels
No labels
ai-generated
android-app
android-app
android-app
🪲 bug
build
build
dependencies
docs
enhancement
enhancement
🔥 HOT
in-progress 🏃
ios
prio:low
prio:low
pull-request
question
🔒 security
server
server
unified-push
web-app
website
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/ntfy#542
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @xylle on GitHub (May 23, 2023).
Original GitHub issue: https://github.com/binwiederhier/ntfy/issues/742
💡 Idea
i would like to make ACL by ip address ou network address.
💻 Target components
ntfy server
@binwiederhier commented on GitHub (May 23, 2023):
I don't hate the idea, which is the best compliment you'll get from me.
Do you have thoughts on how the CLI and web app would look like?
@xylle commented on GitHub (May 24, 2023):
I didn't really think about the problem.
I imagine make a bypass of the authentication according to the IP address or the network of the client.
Don't change anything for the rest.
Thank you for the compliment, I am a fan of this style of compliment.
@waltmck commented on GitHub (Apr 26, 2025):
I am also interested in this feature---my specific use-case is that I want all of the devices on my VPN subnet to be able to push/listen from NTFY without worrying about distributing a shared key. I need to expose NTFY publicly in order to use UnifiedPush, but there is no way I could find to set more restrictive permissions for out-of-network IPs than for in-network IPs.
The easiest way to add my desired functionality is probably a
listen-http-trustedconfig field that functions likelisten-httpexcept it does not check passwords. In my case, I would setlisten-httpsto my server's public network IP andlisten-http-trustedto my server's VPN IP.