2019-09-26 16:40:52 +03:00
|
|
|
package home
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2021-01-20 17:27:53 +03:00
|
|
|
"net"
|
2019-09-26 16:40:52 +03:00
|
|
|
"net/http"
|
2021-06-29 15:53:28 +03:00
|
|
|
|
|
|
|
"github.com/AdguardTeam/golibs/log"
|
2019-09-26 16:40:52 +03:00
|
|
|
)
|
|
|
|
|
2021-05-06 16:41:33 +03:00
|
|
|
// clientJSON is a common structure used by several handlers to deal with
|
|
|
|
// clients. Some of the fields are only necessary in one or two handlers and
|
|
|
|
// are thus made pointers with an omitempty tag.
|
|
|
|
//
|
|
|
|
// TODO(a.garipov): Consider using nullbool and an optional string here? Or
|
|
|
|
// split into several structs?
|
2019-09-26 16:40:52 +03:00
|
|
|
type clientJSON struct {
|
2021-05-06 16:41:33 +03:00
|
|
|
// Disallowed, if non-nil and false, means that the client's IP is
|
|
|
|
// allowed. Otherwise, the IP is blocked.
|
|
|
|
Disallowed *bool `json:"disallowed,omitempty"`
|
|
|
|
|
|
|
|
// DisallowedRule is the rule due to which the client is disallowed.
|
|
|
|
// If Disallowed is true and this string is empty, the client IP is
|
|
|
|
// disallowed by the "allowed IP list", that is it is not included in
|
|
|
|
// the allowlist.
|
|
|
|
DisallowedRule *string `json:"disallowed_rule,omitempty"`
|
|
|
|
|
2021-06-18 18:13:36 +03:00
|
|
|
WHOISInfo *RuntimeClientWHOISInfo `json:"whois_info,omitempty"`
|
2021-05-06 16:41:33 +03:00
|
|
|
|
|
|
|
Name string `json:"name"`
|
|
|
|
|
|
|
|
BlockedServices []string `json:"blocked_services"`
|
|
|
|
IDs []string `json:"ids"`
|
|
|
|
Tags []string `json:"tags"`
|
|
|
|
Upstreams []string `json:"upstreams"`
|
|
|
|
|
|
|
|
FilteringEnabled bool `json:"filtering_enabled"`
|
|
|
|
ParentalEnabled bool `json:"parental_enabled"`
|
|
|
|
SafeBrowsingEnabled bool `json:"safebrowsing_enabled"`
|
|
|
|
SafeSearchEnabled bool `json:"safesearch_enabled"`
|
|
|
|
UseGlobalBlockedServices bool `json:"use_global_blocked_services"`
|
|
|
|
UseGlobalSettings bool `json:"use_global_settings"`
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2021-04-02 17:30:39 +03:00
|
|
|
type runtimeClientJSON struct {
|
2021-06-18 18:13:36 +03:00
|
|
|
WHOISInfo *RuntimeClientWHOISInfo `json:"whois_info"`
|
2021-04-02 17:30:39 +03:00
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
Name string `json:"name"`
|
|
|
|
Source string `json:"source"`
|
2021-06-29 15:53:28 +03:00
|
|
|
IP net.IP `json:"ip"`
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
type clientListJSON struct {
|
2021-06-29 15:53:28 +03:00
|
|
|
Clients []*clientJSON `json:"clients"`
|
2021-04-02 17:30:39 +03:00
|
|
|
RuntimeClients []runtimeClientJSON `json:"auto_clients"`
|
|
|
|
Tags []string `json:"supported_tags"`
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// respond with information about configured clients
|
2020-09-08 13:56:45 +03:00
|
|
|
func (clients *clientsContainer) handleGetClients(w http.ResponseWriter, _ *http.Request) {
|
2019-09-26 16:40:52 +03:00
|
|
|
data := clientListJSON{}
|
|
|
|
|
2019-11-22 14:37:25 +03:00
|
|
|
clients.lock.Lock()
|
2021-04-02 17:30:39 +03:00
|
|
|
defer clients.lock.Unlock()
|
|
|
|
|
2019-11-22 14:37:25 +03:00
|
|
|
for _, c := range clients.list {
|
2019-09-26 16:40:52 +03:00
|
|
|
cj := clientToJSON(c)
|
|
|
|
data.Clients = append(data.Clients, cj)
|
|
|
|
}
|
2021-06-29 15:53:28 +03:00
|
|
|
|
|
|
|
clients.ipToRC.Range(func(ip net.IP, v interface{}) (cont bool) {
|
|
|
|
rc, ok := v.(*RuntimeClient)
|
|
|
|
if !ok {
|
|
|
|
log.Error("dns: bad type %T in ipToRC for %s", v, ip)
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2021-04-02 17:30:39 +03:00
|
|
|
cj := runtimeClientJSON{
|
2021-06-18 18:13:36 +03:00
|
|
|
WHOISInfo: rc.WHOISInfo,
|
2021-06-29 15:53:28 +03:00
|
|
|
|
|
|
|
Name: rc.Host,
|
|
|
|
IP: ip,
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
cj.Source = "etc/hosts"
|
2021-04-02 17:30:39 +03:00
|
|
|
switch rc.Source {
|
2019-09-26 16:40:52 +03:00
|
|
|
case ClientSourceDHCP:
|
|
|
|
cj.Source = "DHCP"
|
|
|
|
case ClientSourceRDNS:
|
|
|
|
cj.Source = "rDNS"
|
|
|
|
case ClientSourceARP:
|
|
|
|
cj.Source = "ARP"
|
|
|
|
case ClientSourceWHOIS:
|
|
|
|
cj.Source = "WHOIS"
|
|
|
|
}
|
|
|
|
|
2021-04-02 17:30:39 +03:00
|
|
|
data.RuntimeClients = append(data.RuntimeClients, cj)
|
2021-06-29 15:53:28 +03:00
|
|
|
|
|
|
|
return true
|
|
|
|
})
|
2019-09-26 16:40:52 +03:00
|
|
|
|
2020-01-28 14:06:52 +03:00
|
|
|
data.Tags = clientTags
|
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
e := json.NewEncoder(w).Encode(data)
|
|
|
|
if e != nil {
|
|
|
|
httpError(w, http.StatusInternalServerError, "Failed to encode to json: %v", e)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Convert JSON object to Client object
|
2020-12-07 16:04:53 +03:00
|
|
|
func jsonToClient(cj clientJSON) (c *Client) {
|
|
|
|
return &Client{
|
2019-09-26 16:40:52 +03:00
|
|
|
Name: cj.Name,
|
|
|
|
IDs: cj.IDs,
|
2020-01-28 14:06:52 +03:00
|
|
|
Tags: cj.Tags,
|
2019-09-26 16:40:52 +03:00
|
|
|
UseOwnSettings: !cj.UseGlobalSettings,
|
|
|
|
FilteringEnabled: cj.FilteringEnabled,
|
|
|
|
ParentalEnabled: cj.ParentalEnabled,
|
|
|
|
SafeSearchEnabled: cj.SafeSearchEnabled,
|
|
|
|
SafeBrowsingEnabled: cj.SafeBrowsingEnabled,
|
|
|
|
|
|
|
|
UseOwnBlockedServices: !cj.UseGlobalBlockedServices,
|
|
|
|
BlockedServices: cj.BlockedServices,
|
2019-11-06 17:24:15 +03:00
|
|
|
|
|
|
|
Upstreams: cj.Upstreams,
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Convert Client object to JSON
|
2021-06-29 15:53:28 +03:00
|
|
|
func clientToJSON(c *Client) (cj *clientJSON) {
|
|
|
|
return &clientJSON{
|
2019-09-26 16:40:52 +03:00
|
|
|
Name: c.Name,
|
|
|
|
IDs: c.IDs,
|
2020-01-28 14:06:52 +03:00
|
|
|
Tags: c.Tags,
|
2019-09-26 16:40:52 +03:00
|
|
|
UseGlobalSettings: !c.UseOwnSettings,
|
|
|
|
FilteringEnabled: c.FilteringEnabled,
|
|
|
|
ParentalEnabled: c.ParentalEnabled,
|
|
|
|
SafeSearchEnabled: c.SafeSearchEnabled,
|
|
|
|
SafeBrowsingEnabled: c.SafeBrowsingEnabled,
|
|
|
|
|
|
|
|
UseGlobalBlockedServices: !c.UseOwnBlockedServices,
|
|
|
|
BlockedServices: c.BlockedServices,
|
2019-11-06 17:24:15 +03:00
|
|
|
|
|
|
|
Upstreams: c.Upstreams,
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add a new client
|
2019-11-22 14:37:25 +03:00
|
|
|
func (clients *clientsContainer) handleAddClient(w http.ResponseWriter, r *http.Request) {
|
2019-09-26 16:40:52 +03:00
|
|
|
cj := clientJSON{}
|
2020-11-23 14:14:08 +03:00
|
|
|
err := json.NewDecoder(r.Body).Decode(&cj)
|
2019-09-26 16:40:52 +03:00
|
|
|
if err != nil {
|
2020-11-23 14:14:08 +03:00
|
|
|
httpError(w, http.StatusBadRequest, "failed to process request body: %s", err)
|
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-12-07 16:04:53 +03:00
|
|
|
c := jsonToClient(cj)
|
2021-01-27 18:32:13 +03:00
|
|
|
ok, err := clients.Add(c)
|
2019-09-26 16:40:52 +03:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "%s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if !ok {
|
|
|
|
httpError(w, http.StatusBadRequest, "Client already exists")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-10-30 11:52:58 +03:00
|
|
|
onConfigModified()
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Remove client
|
2019-11-22 14:37:25 +03:00
|
|
|
func (clients *clientsContainer) handleDelClient(w http.ResponseWriter, r *http.Request) {
|
2020-11-23 14:14:08 +03:00
|
|
|
cj := clientJSON{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&cj)
|
2019-09-26 16:40:52 +03:00
|
|
|
if err != nil {
|
2020-11-23 14:14:08 +03:00
|
|
|
httpError(w, http.StatusBadRequest, "failed to process request body: %s", err)
|
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-11-23 14:14:08 +03:00
|
|
|
if len(cj.Name) == 0 {
|
|
|
|
httpError(w, http.StatusBadRequest, "client's name must be non-empty")
|
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-11-22 14:37:25 +03:00
|
|
|
if !clients.Del(cj.Name) {
|
2019-09-26 16:40:52 +03:00
|
|
|
httpError(w, http.StatusBadRequest, "Client not found")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-10-30 11:52:58 +03:00
|
|
|
onConfigModified()
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
type updateJSON struct {
|
|
|
|
Name string `json:"name"`
|
|
|
|
Data clientJSON `json:"data"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update client's properties
|
2019-11-22 14:37:25 +03:00
|
|
|
func (clients *clientsContainer) handleUpdateClient(w http.ResponseWriter, r *http.Request) {
|
2020-11-23 14:14:08 +03:00
|
|
|
dj := updateJSON{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&dj)
|
2019-09-26 16:40:52 +03:00
|
|
|
if err != nil {
|
2020-11-23 14:14:08 +03:00
|
|
|
httpError(w, http.StatusBadRequest, "failed to process request body: %s", err)
|
2019-09-26 16:40:52 +03:00
|
|
|
|
|
|
|
return
|
|
|
|
}
|
2020-11-23 14:14:08 +03:00
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
if len(dj.Name) == 0 {
|
|
|
|
httpError(w, http.StatusBadRequest, "Invalid request")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-12-07 16:04:53 +03:00
|
|
|
c := jsonToClient(dj.Data)
|
2021-01-27 18:32:13 +03:00
|
|
|
err = clients.Update(dj.Name, c)
|
2019-09-26 16:40:52 +03:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "%s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-10-30 11:52:58 +03:00
|
|
|
onConfigModified()
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Get the list of clients by IP address list
|
2019-11-22 14:37:25 +03:00
|
|
|
func (clients *clientsContainer) handleFindClient(w http.ResponseWriter, r *http.Request) {
|
2019-09-26 16:40:52 +03:00
|
|
|
q := r.URL.Query()
|
2021-06-29 15:53:28 +03:00
|
|
|
data := []map[string]*clientJSON{}
|
2021-01-27 18:32:13 +03:00
|
|
|
for i := 0; i < len(q); i++ {
|
|
|
|
idStr := q.Get(fmt.Sprintf("ip%d", i))
|
|
|
|
if idStr == "" {
|
2019-09-26 16:40:52 +03:00
|
|
|
break
|
|
|
|
}
|
2021-01-15 20:30:48 +03:00
|
|
|
|
2021-01-27 18:32:13 +03:00
|
|
|
ip := net.ParseIP(idStr)
|
|
|
|
c, ok := clients.Find(idStr)
|
2021-06-29 15:53:28 +03:00
|
|
|
var cj *clientJSON
|
2019-09-26 16:40:52 +03:00
|
|
|
if !ok {
|
2021-06-29 15:53:28 +03:00
|
|
|
cj = clients.findRuntime(ip, idStr)
|
2019-09-26 16:40:52 +03:00
|
|
|
} else {
|
2021-01-27 18:32:13 +03:00
|
|
|
cj = clientToJSON(c)
|
2021-06-29 15:53:28 +03:00
|
|
|
disallowed, rule := clients.dnsServer.IsBlockedClient(ip, idStr)
|
2021-05-06 16:41:33 +03:00
|
|
|
cj.Disallowed, cj.DisallowedRule = &disallowed, &rule
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2021-06-29 15:53:28 +03:00
|
|
|
data = append(data, map[string]*clientJSON{
|
2021-01-27 18:32:13 +03:00
|
|
|
idStr: cj,
|
2021-01-22 15:00:45 +03:00
|
|
|
})
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
2021-01-22 15:00:45 +03:00
|
|
|
err := json.NewEncoder(w).Encode(data)
|
2019-09-26 16:40:52 +03:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusInternalServerError, "Couldn't write response: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-15 19:00:31 +03:00
|
|
|
// findRuntime looks up the IP in runtime and temporary storages, like
|
2021-06-29 15:53:28 +03:00
|
|
|
// /etc/hosts tables, DHCP leases, or blocklists. cj is guaranteed to be
|
|
|
|
// non-nil.
|
|
|
|
func (clients *clientsContainer) findRuntime(ip net.IP, idStr string) (cj *clientJSON) {
|
|
|
|
rc, ok := clients.FindRuntimeClient(ip)
|
2021-01-28 19:39:33 +03:00
|
|
|
if !ok {
|
2021-01-15 20:30:48 +03:00
|
|
|
// It is still possible that the IP used to be in the runtime
|
|
|
|
// clients list, but then the server was reloaded. So, check
|
|
|
|
// the DNS server's blocked IP list.
|
|
|
|
//
|
|
|
|
// See https://github.com/AdguardTeam/AdGuardHome/issues/2428.
|
2021-06-29 15:53:28 +03:00
|
|
|
disallowed, rule := clients.dnsServer.IsBlockedClient(ip, idStr)
|
|
|
|
cj = &clientJSON{
|
2021-01-27 18:32:13 +03:00
|
|
|
IDs: []string{idStr},
|
2021-05-06 16:41:33 +03:00
|
|
|
Disallowed: &disallowed,
|
|
|
|
DisallowedRule: &rule,
|
2021-06-18 18:13:36 +03:00
|
|
|
WHOISInfo: &RuntimeClientWHOISInfo{},
|
2021-01-15 20:30:48 +03:00
|
|
|
}
|
|
|
|
|
2021-06-29 15:53:28 +03:00
|
|
|
return cj
|
|
|
|
}
|
|
|
|
|
|
|
|
cj = &clientJSON{
|
|
|
|
Name: rc.Host,
|
|
|
|
IDs: []string{idStr},
|
|
|
|
WHOISInfo: rc.WHOISInfo,
|
2021-01-15 20:30:48 +03:00
|
|
|
}
|
|
|
|
|
2021-06-29 15:53:28 +03:00
|
|
|
disallowed, rule := clients.dnsServer.IsBlockedClient(ip, idStr)
|
2021-05-06 16:41:33 +03:00
|
|
|
cj.Disallowed, cj.DisallowedRule = &disallowed, &rule
|
2021-01-15 20:30:48 +03:00
|
|
|
|
2021-06-29 15:53:28 +03:00
|
|
|
return cj
|
2021-01-15 20:30:48 +03:00
|
|
|
}
|
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
// RegisterClientsHandlers registers HTTP handlers
|
2019-11-22 14:37:25 +03:00
|
|
|
func (clients *clientsContainer) registerWebHandlers() {
|
2021-02-04 14:15:34 +03:00
|
|
|
httpRegister(http.MethodGet, "/control/clients", clients.handleGetClients)
|
|
|
|
httpRegister(http.MethodPost, "/control/clients/add", clients.handleAddClient)
|
|
|
|
httpRegister(http.MethodPost, "/control/clients/delete", clients.handleDelClient)
|
|
|
|
httpRegister(http.MethodPost, "/control/clients/update", clients.handleUpdateClient)
|
|
|
|
httpRegister(http.MethodGet, "/control/clients/find", clients.handleFindClient)
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|