2019-06-10 11:33:19 +03:00
|
|
|
package home
|
2019-04-25 14:57:03 +03:00
|
|
|
|
|
|
|
import (
|
2021-01-26 19:44:19 +03:00
|
|
|
"context"
|
2019-04-25 14:57:03 +03:00
|
|
|
"encoding/json"
|
2022-04-25 18:41:39 +03:00
|
|
|
"fmt"
|
2019-04-25 14:57:03 +03:00
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"os/exec"
|
|
|
|
"runtime"
|
|
|
|
"syscall"
|
2020-12-22 13:59:09 +03:00
|
|
|
"time"
|
2019-04-25 14:57:03 +03:00
|
|
|
|
2022-06-09 17:47:05 +03:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghalg"
|
2021-12-16 20:54:59 +03:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghhttp"
|
2021-06-28 17:02:45 +03:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
|
2021-01-13 16:18:51 +03:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/updater"
|
2021-05-24 17:28:11 +03:00
|
|
|
"github.com/AdguardTeam/golibs/errors"
|
2019-04-25 14:57:03 +03:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
|
|
|
)
|
|
|
|
|
2020-12-25 12:54:22 +03:00
|
|
|
// temporaryError is the interface for temporary errors from the Go standard
|
2020-12-24 21:44:36 +03:00
|
|
|
// library.
|
2020-12-25 12:54:22 +03:00
|
|
|
type temporaryError interface {
|
2020-12-24 21:44:36 +03:00
|
|
|
error
|
|
|
|
Temporary() (ok bool)
|
|
|
|
}
|
|
|
|
|
2019-04-25 14:57:03 +03:00
|
|
|
// Get the latest available version from the Internet
|
|
|
|
func handleGetVersionJSON(w http.ResponseWriter, r *http.Request) {
|
2022-04-25 18:41:39 +03:00
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
|
2021-01-21 19:55:41 +03:00
|
|
|
resp := &versionResponse{}
|
2020-02-13 18:42:07 +03:00
|
|
|
if Context.disableUpdate {
|
2021-01-21 19:55:41 +03:00
|
|
|
resp.Disabled = true
|
2022-04-25 18:41:39 +03:00
|
|
|
err := json.NewEncoder(w).Encode(resp)
|
|
|
|
if err != nil {
|
|
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "writing body: %s", err)
|
|
|
|
}
|
|
|
|
|
2019-05-27 18:48:33 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-01-21 19:55:41 +03:00
|
|
|
req := &struct {
|
|
|
|
Recheck bool `json:"recheck_now"`
|
|
|
|
}{}
|
|
|
|
|
2020-07-10 22:20:30 +03:00
|
|
|
var err error
|
|
|
|
if r.ContentLength != 0 {
|
2021-01-21 19:55:41 +03:00
|
|
|
err = json.NewDecoder(r.Body).Decode(req)
|
2020-07-10 22:20:30 +03:00
|
|
|
if err != nil {
|
2022-04-25 18:41:39 +03:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "parsing request: %s", err)
|
2021-12-16 20:54:59 +03:00
|
|
|
|
2020-07-10 22:20:30 +03:00
|
|
|
return
|
|
|
|
}
|
2019-06-25 15:55:09 +03:00
|
|
|
}
|
|
|
|
|
2022-04-25 18:41:39 +03:00
|
|
|
err = requestVersionInfo(resp, req.Recheck)
|
|
|
|
if err != nil {
|
|
|
|
// Don't wrap the error, because it's informative enough as is.
|
|
|
|
aghhttp.Error(r, w, http.StatusBadGateway, "%s", err)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
2020-12-24 21:44:36 +03:00
|
|
|
|
2022-04-25 18:41:39 +03:00
|
|
|
err = resp.setAllowedToAutoUpdate()
|
|
|
|
if err != nil {
|
|
|
|
// Don't wrap the error, because it's informative enough as is.
|
|
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "%s", err)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
err = json.NewEncoder(w).Encode(resp)
|
|
|
|
if err != nil {
|
|
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "writing body: %s", err)
|
|
|
|
}
|
|
|
|
}
|
2020-12-24 21:44:36 +03:00
|
|
|
|
2022-04-25 18:41:39 +03:00
|
|
|
// requestVersionInfo sets the VersionInfo field of resp if it can reach the
|
|
|
|
// update server.
|
|
|
|
func requestVersionInfo(resp *versionResponse, recheck bool) (err error) {
|
|
|
|
for i := 0; i != 3; i++ {
|
|
|
|
resp.VersionInfo, err = Context.updater.VersionInfo(recheck)
|
2020-12-24 21:44:36 +03:00
|
|
|
if err != nil {
|
2020-12-25 12:54:22 +03:00
|
|
|
var terr temporaryError
|
2020-12-24 21:44:36 +03:00
|
|
|
if errors.As(err, &terr) && terr.Temporary() {
|
2022-04-25 18:41:39 +03:00
|
|
|
// Temporary network error. This case may happen while we're
|
|
|
|
// restarting our DNS server. Log and sleep for some time.
|
2020-12-24 21:44:36 +03:00
|
|
|
//
|
|
|
|
// See https://github.com/AdguardTeam/AdGuardHome/issues/934.
|
|
|
|
d := time.Duration(i) * time.Second
|
2022-04-25 18:41:39 +03:00
|
|
|
log.Info("update: temp net error: %q; sleeping for %s and retrying", err, d)
|
2020-12-24 21:44:36 +03:00
|
|
|
time.Sleep(d)
|
|
|
|
|
|
|
|
continue
|
|
|
|
}
|
2019-08-26 16:02:56 +03:00
|
|
|
}
|
2020-12-24 21:44:36 +03:00
|
|
|
|
2019-08-26 16:02:56 +03:00
|
|
|
break
|
|
|
|
}
|
2022-04-25 18:41:39 +03:00
|
|
|
|
2019-04-25 14:57:03 +03:00
|
|
|
if err != nil {
|
2021-01-13 16:18:51 +03:00
|
|
|
vcu := Context.updater.VersionCheckURL()
|
|
|
|
|
2022-04-25 18:41:39 +03:00
|
|
|
return fmt.Errorf("getting version info from %s: %s", vcu, err)
|
2019-04-25 14:57:03 +03:00
|
|
|
}
|
|
|
|
|
2022-04-25 18:41:39 +03:00
|
|
|
return nil
|
2019-04-25 14:57:03 +03:00
|
|
|
}
|
|
|
|
|
2021-01-26 19:44:19 +03:00
|
|
|
// handleUpdate performs an update to the latest available version procedure.
|
2021-12-16 20:54:59 +03:00
|
|
|
func handleUpdate(w http.ResponseWriter, r *http.Request) {
|
2021-01-13 16:18:51 +03:00
|
|
|
if Context.updater.NewVersion() == "" {
|
2021-12-16 20:54:59 +03:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "/update request isn't allowed now")
|
|
|
|
|
2020-07-09 19:54:53 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-01-13 16:18:51 +03:00
|
|
|
err := Context.updater.Update()
|
2020-07-09 19:54:53 +03:00
|
|
|
if err != nil {
|
2021-12-16 20:54:59 +03:00
|
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "%s", err)
|
|
|
|
|
2020-07-09 19:54:53 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-16 20:54:59 +03:00
|
|
|
aghhttp.OK(w)
|
2020-07-09 19:54:53 +03:00
|
|
|
if f, ok := w.(http.Flusher); ok {
|
|
|
|
f.Flush()
|
|
|
|
}
|
|
|
|
|
2021-01-26 19:44:19 +03:00
|
|
|
// The background context is used because the underlying functions wrap
|
|
|
|
// it with timeout and shut down the server, which handles current
|
|
|
|
// request. It also should be done in a separate goroutine due to the
|
|
|
|
// same reason.
|
|
|
|
go func() {
|
|
|
|
finishUpdate(context.Background())
|
|
|
|
}()
|
2020-07-09 19:54:53 +03:00
|
|
|
}
|
|
|
|
|
2021-01-21 19:55:41 +03:00
|
|
|
// versionResponse is the response for /control/version.json endpoint.
|
|
|
|
type versionResponse struct {
|
|
|
|
updater.VersionInfo
|
2022-04-25 18:41:39 +03:00
|
|
|
Disabled bool `json:"disabled"`
|
2021-01-21 19:55:41 +03:00
|
|
|
}
|
2020-07-09 19:54:53 +03:00
|
|
|
|
2022-04-25 18:41:39 +03:00
|
|
|
// setAllowedToAutoUpdate sets CanAutoUpdate to true if AdGuard Home is actually
|
|
|
|
// allowed to perform an automatic update by the OS.
|
|
|
|
func (vr *versionResponse) setAllowedToAutoUpdate() (err error) {
|
2022-06-09 17:47:05 +03:00
|
|
|
if vr.CanAutoUpdate != aghalg.NBTrue {
|
|
|
|
return nil
|
2022-04-25 18:41:39 +03:00
|
|
|
}
|
2020-07-09 19:54:53 +03:00
|
|
|
|
2022-04-25 18:41:39 +03:00
|
|
|
tlsConf := &tlsConfigSettings{}
|
|
|
|
Context.tls.WriteDiskConfig(tlsConf)
|
2020-07-09 19:54:53 +03:00
|
|
|
|
2022-04-25 18:41:39 +03:00
|
|
|
canUpdate := true
|
|
|
|
if tlsConfUsesPrivilegedPorts(tlsConf) || config.BindPort < 1024 || config.DNS.Port < 1024 {
|
|
|
|
canUpdate, err = aghnet.CanBindPrivilegedPorts()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("checking ability to bind privileged ports: %w", err)
|
2020-07-09 19:54:53 +03:00
|
|
|
}
|
|
|
|
}
|
2022-04-25 18:41:39 +03:00
|
|
|
|
2022-06-09 17:47:05 +03:00
|
|
|
vr.CanAutoUpdate = aghalg.BoolToNullBool(canUpdate)
|
2022-04-25 18:41:39 +03:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// tlsConfUsesPrivilegedPorts returns true if the provided TLS configuration
|
|
|
|
// indicates that privileged ports are used.
|
|
|
|
func tlsConfUsesPrivilegedPorts(c *tlsConfigSettings) (ok bool) {
|
|
|
|
return c.Enabled && (c.PortHTTPS < 1024 || c.PortDNSOverTLS < 1024 || c.PortDNSOverQUIC < 1024)
|
2020-07-09 19:54:53 +03:00
|
|
|
}
|
|
|
|
|
2021-01-26 19:44:19 +03:00
|
|
|
// finishUpdate completes an update procedure.
|
|
|
|
func finishUpdate(ctx context.Context) {
|
2019-04-25 14:57:03 +03:00
|
|
|
log.Info("Stopping all tasks")
|
2021-01-26 19:44:19 +03:00
|
|
|
cleanup(ctx)
|
2019-04-25 14:57:03 +03:00
|
|
|
cleanupAlways()
|
|
|
|
|
2022-07-07 19:49:47 +03:00
|
|
|
curBinName, err := os.Executable()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("executable path request failed: %s", err)
|
2020-07-22 14:20:14 +03:00
|
|
|
}
|
|
|
|
|
2019-04-25 14:57:03 +03:00
|
|
|
if runtime.GOOS == "windows" {
|
2020-02-13 18:42:07 +03:00
|
|
|
if Context.runningAsService {
|
2019-04-25 14:57:03 +03:00
|
|
|
// Note:
|
|
|
|
// we can't restart the service via "kardianos/service" package - it kills the process first
|
|
|
|
// we can't start a new instance - Windows doesn't allow it
|
|
|
|
cmd := exec.Command("cmd", "/c", "net stop AdGuardHome & net start AdGuardHome")
|
2022-07-07 19:49:47 +03:00
|
|
|
err = cmd.Start()
|
2019-04-25 14:57:03 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("exec.Command() failed: %s", err)
|
|
|
|
}
|
|
|
|
os.Exit(0)
|
|
|
|
}
|
|
|
|
|
2020-07-22 14:20:14 +03:00
|
|
|
cmd := exec.Command(curBinName, os.Args[1:]...)
|
2019-04-25 14:57:03 +03:00
|
|
|
log.Info("Restarting: %v", cmd.Args)
|
|
|
|
cmd.Stdin = os.Stdin
|
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stderr
|
2022-07-07 19:49:47 +03:00
|
|
|
err = cmd.Start()
|
2019-04-25 14:57:03 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("exec.Command() failed: %s", err)
|
|
|
|
}
|
|
|
|
os.Exit(0)
|
|
|
|
} else {
|
|
|
|
log.Info("Restarting: %v", os.Args)
|
2022-07-07 19:49:47 +03:00
|
|
|
err = syscall.Exec(curBinName, os.Args, os.Environ())
|
2019-04-25 14:57:03 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("syscall.Exec() failed: %s", err)
|
|
|
|
}
|
|
|
|
// Unreachable code
|
|
|
|
}
|
|
|
|
}
|