mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2024-12-16 20:24:15 +03:00
7a3eda02ce
Squashed commit of the following: commit57466233cb
Merge:2df5f281
867bf545
Author: Andrey Meshkov <am@adguard.com> Date: Thu Feb 13 18:39:15 2020 +0300 Merge branch 'master' into 1069-install-static-ip commit2df5f281c4
Author: Andrey Meshkov <am@adguard.com> Date: Thu Feb 13 18:35:54 2020 +0300 *: lang fix commitb4649a6b27
Merge:c2785253
f61d5f0f
Author: Andrey Meshkov <am@adguard.com> Date: Thu Feb 13 16:47:30 2020 +0300 *(home): fixed issues with setting static IP on Mac commitc27852537d
Author: Andrey Meshkov <am@adguard.com> Date: Thu Feb 13 14:14:30 2020 +0300 +(dhcpd): added static IP for MacOS commitf61d5f0f85
Author: Ildar Kamalov <i.kamalov@adguard.com> Date: Thu Feb 13 14:13:35 2020 +0300 + client: show confirm before setting static IP commit7afa16fbe7
Author: Ildar Kamalov <i.kamalov@adguard.com> Date: Thu Feb 13 13:51:52 2020 +0300 - client: fix text commit019bff0851
Author: Ildar Kamalov <i.kamalov@adguard.com> Date: Thu Feb 13 13:49:16 2020 +0300 - client: pass all params to the check_config request commit194bed72f5
Author: Andrey Meshkov <am@adguard.com> Date: Wed Feb 12 17:12:16 2020 +0300 *: fix home_test commit9359f6b55f
Merge:ae299058
c5ca2a77
Author: Andrey Meshkov <am@adguard.com> Date: Wed Feb 12 15:54:54 2020 +0300 Merge with master commitae2990582d
Author: Andrey Meshkov <am@adguard.com> Date: Wed Feb 12 15:53:36 2020 +0300 *(global): refactoring - moved runtime properties to Context commitd8d48c5386
Author: Andrey Meshkov <am@adguard.com> Date: Wed Feb 12 15:04:25 2020 +0300 *(dhcpd): refactoring, use dhcpd/network_utils where possible commit8d039c572f
Author: Ildar Kamalov <i.kamalov@adguard.com> Date: Fri Feb 7 18:37:39 2020 +0300 - client: fix button position commit26c47e59dd
Author: Ildar Kamalov <i.kamalov@adguard.com> Date: Fri Feb 7 18:08:56 2020 +0300 - client: fix static ip description commitcb12babc46
Author: Andrey Meshkov <am@adguard.com> Date: Fri Feb 7 17:08:39 2020 +0300 *: lower log level for some commands commitd9001ff848
Author: Andrey Meshkov <am@adguard.com> Date: Fri Feb 7 16:17:59 2020 +0300 *(documentation): updated openapi commit1d213d53c8
Merge:8406d7d2
80861860
Author: Andrey Meshkov <am@adguard.com> Date: Fri Feb 7 15:16:46 2020 +0300 *: merge with master commit8406d7d288
Author: Ildar Kamalov <i.kamalov@adguard.com> Date: Fri Jan 31 16:52:22 2020 +0300 - client: fix locales commitfb476b0117
Author: Simon Zolin <s.zolin@adguard.com> Date: Fri Jan 31 13:29:03 2020 +0300 linter commit84b5708e71
Author: Simon Zolin <s.zolin@adguard.com> Date: Fri Jan 31 13:27:53 2020 +0300 linter commit143a86a28a
Author: Simon Zolin <s.zolin@adguard.com> Date: Fri Jan 31 13:26:47 2020 +0300 linter ... and 7 more commits
375 lines
10 KiB
Go
375 lines
10 KiB
Go
package home
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net"
|
|
"net/http"
|
|
"os"
|
|
"os/exec"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strconv"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/util"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/dhcpd"
|
|
|
|
"github.com/AdguardTeam/golibs/log"
|
|
)
|
|
|
|
type firstRunData struct {
|
|
WebPort int `json:"web_port"`
|
|
DNSPort int `json:"dns_port"`
|
|
Interfaces map[string]interface{} `json:"interfaces"`
|
|
}
|
|
|
|
type netInterfaceJSON struct {
|
|
Name string `json:"name"`
|
|
MTU int `json:"mtu"`
|
|
HardwareAddr string `json:"hardware_address"`
|
|
Addresses []string `json:"ip_addresses"`
|
|
Flags string `json:"flags"`
|
|
}
|
|
|
|
// Get initial installation settings
|
|
func handleInstallGetAddresses(w http.ResponseWriter, r *http.Request) {
|
|
data := firstRunData{}
|
|
data.WebPort = 80
|
|
data.DNSPort = 53
|
|
|
|
ifaces, err := util.GetValidNetInterfacesForWeb()
|
|
if err != nil {
|
|
httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
|
|
return
|
|
}
|
|
|
|
data.Interfaces = make(map[string]interface{})
|
|
for _, iface := range ifaces {
|
|
ifaceJSON := netInterfaceJSON{
|
|
Name: iface.Name,
|
|
MTU: iface.MTU,
|
|
HardwareAddr: iface.HardwareAddr,
|
|
Addresses: iface.Addresses,
|
|
Flags: iface.Flags,
|
|
}
|
|
data.Interfaces[iface.Name] = ifaceJSON
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
err = json.NewEncoder(w).Encode(data)
|
|
if err != nil {
|
|
httpError(w, http.StatusInternalServerError, "Unable to marshal default addresses to json: %s", err)
|
|
return
|
|
}
|
|
}
|
|
|
|
type checkConfigReqEnt struct {
|
|
Port int `json:"port"`
|
|
IP string `json:"ip"`
|
|
Autofix bool `json:"autofix"`
|
|
}
|
|
type checkConfigReq struct {
|
|
Web checkConfigReqEnt `json:"web"`
|
|
DNS checkConfigReqEnt `json:"dns"`
|
|
SetStaticIP bool `json:"set_static_ip"`
|
|
}
|
|
|
|
type checkConfigRespEnt struct {
|
|
Status string `json:"status"`
|
|
CanAutofix bool `json:"can_autofix"`
|
|
}
|
|
type staticIPJSON struct {
|
|
Static string `json:"static"`
|
|
IP string `json:"ip"`
|
|
Error string `json:"error"`
|
|
}
|
|
type checkConfigResp struct {
|
|
Web checkConfigRespEnt `json:"web"`
|
|
DNS checkConfigRespEnt `json:"dns"`
|
|
StaticIP staticIPJSON `json:"static_ip"`
|
|
}
|
|
|
|
// Check if ports are available, respond with results
|
|
func handleInstallCheckConfig(w http.ResponseWriter, r *http.Request) {
|
|
reqData := checkConfigReq{}
|
|
respData := checkConfigResp{}
|
|
err := json.NewDecoder(r.Body).Decode(&reqData)
|
|
if err != nil {
|
|
httpError(w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
|
|
return
|
|
}
|
|
|
|
if reqData.Web.Port != 0 && reqData.Web.Port != config.BindPort {
|
|
err = util.CheckPortAvailable(reqData.Web.IP, reqData.Web.Port)
|
|
if err != nil {
|
|
respData.Web.Status = fmt.Sprintf("%v", err)
|
|
}
|
|
}
|
|
|
|
if reqData.DNS.Port != 0 {
|
|
err = util.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
|
|
|
|
if util.ErrorIsAddrInUse(err) {
|
|
canAutofix := checkDNSStubListener()
|
|
if canAutofix && reqData.DNS.Autofix {
|
|
|
|
err = disableDNSStubListener()
|
|
if err != nil {
|
|
log.Error("Couldn't disable DNSStubListener: %s", err)
|
|
}
|
|
|
|
err = util.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
|
|
canAutofix = false
|
|
}
|
|
|
|
respData.DNS.CanAutofix = canAutofix
|
|
}
|
|
|
|
if err == nil {
|
|
err = util.CheckPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
|
|
}
|
|
|
|
if err != nil {
|
|
respData.DNS.Status = fmt.Sprintf("%v", err)
|
|
} else {
|
|
respData.StaticIP = handleStaticIP(reqData.DNS.IP, reqData.SetStaticIP)
|
|
}
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
err = json.NewEncoder(w).Encode(respData)
|
|
if err != nil {
|
|
httpError(w, http.StatusInternalServerError, "Unable to marshal JSON: %s", err)
|
|
return
|
|
}
|
|
}
|
|
|
|
// handleStaticIP - handles static IP request
|
|
// It either checks if we have a static IP
|
|
// Or if set=true, it tries to set it
|
|
func handleStaticIP(ip string, set bool) staticIPJSON {
|
|
resp := staticIPJSON{}
|
|
|
|
interfaceName := util.GetInterfaceByIP(ip)
|
|
resp.Static = "no"
|
|
|
|
if len(interfaceName) == 0 {
|
|
resp.Static = "error"
|
|
resp.Error = fmt.Sprintf("Couldn't find network interface by IP %s", ip)
|
|
return resp
|
|
}
|
|
|
|
if set {
|
|
// Try to set static IP for the specified interface
|
|
err := dhcpd.SetStaticIP(interfaceName)
|
|
if err != nil {
|
|
resp.Static = "error"
|
|
resp.Error = err.Error()
|
|
return resp
|
|
}
|
|
}
|
|
|
|
// Fallthrough here even if we set static IP
|
|
// Check if we have a static IP and return the details
|
|
isStaticIP, err := dhcpd.HasStaticIP(interfaceName)
|
|
if err != nil {
|
|
resp.Static = "error"
|
|
resp.Error = err.Error()
|
|
} else {
|
|
if isStaticIP {
|
|
resp.Static = "yes"
|
|
}
|
|
resp.IP = util.GetSubnet(interfaceName)
|
|
}
|
|
return resp
|
|
}
|
|
|
|
// Check if DNSStubListener is active
|
|
func checkDNSStubListener() bool {
|
|
if runtime.GOOS != "linux" {
|
|
return false
|
|
}
|
|
|
|
cmd := exec.Command("systemctl", "is-enabled", "systemd-resolved")
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
_, err := cmd.Output()
|
|
if err != nil || cmd.ProcessState.ExitCode() != 0 {
|
|
log.Info("command %s has failed: %v code:%d",
|
|
cmd.Path, err, cmd.ProcessState.ExitCode())
|
|
return false
|
|
}
|
|
|
|
cmd = exec.Command("grep", "-E", "#?DNSStubListener=yes", "/etc/systemd/resolved.conf")
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
_, err = cmd.Output()
|
|
if err != nil || cmd.ProcessState.ExitCode() != 0 {
|
|
log.Info("command %s has failed: %v code:%d",
|
|
cmd.Path, err, cmd.ProcessState.ExitCode())
|
|
return false
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
const resolvedConfPath = "/etc/systemd/resolved.conf.d/adguardhome.conf"
|
|
const resolvedConfData = `[Resolve]
|
|
DNS=127.0.0.1
|
|
DNSStubListener=no
|
|
`
|
|
const resolvConfPath = "/etc/resolv.conf"
|
|
|
|
// Deactivate DNSStubListener
|
|
func disableDNSStubListener() error {
|
|
dir := filepath.Dir(resolvedConfPath)
|
|
err := os.MkdirAll(dir, 0755)
|
|
if err != nil {
|
|
return fmt.Errorf("os.MkdirAll: %s: %s", dir, err)
|
|
}
|
|
|
|
err = ioutil.WriteFile(resolvedConfPath, []byte(resolvedConfData), 0644)
|
|
if err != nil {
|
|
return fmt.Errorf("ioutil.WriteFile: %s: %s", resolvedConfPath, err)
|
|
}
|
|
|
|
_ = os.Rename(resolvConfPath, resolvConfPath+".backup")
|
|
err = os.Symlink("/run/systemd/resolve/resolv.conf", resolvConfPath)
|
|
if err != nil {
|
|
_ = os.Remove(resolvedConfPath) // remove the file we've just created
|
|
return fmt.Errorf("os.Symlink: %s: %s", resolvConfPath, err)
|
|
}
|
|
|
|
cmd := exec.Command("systemctl", "reload-or-restart", "systemd-resolved")
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
_, err = cmd.Output()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if cmd.ProcessState.ExitCode() != 0 {
|
|
return fmt.Errorf("process %s exited with an error: %d",
|
|
cmd.Path, cmd.ProcessState.ExitCode())
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
type applyConfigReqEnt struct {
|
|
IP string `json:"ip"`
|
|
Port int `json:"port"`
|
|
}
|
|
type applyConfigReq struct {
|
|
Web applyConfigReqEnt `json:"web"`
|
|
DNS applyConfigReqEnt `json:"dns"`
|
|
Username string `json:"username"`
|
|
Password string `json:"password"`
|
|
}
|
|
|
|
// Copy installation parameters between two configuration objects
|
|
func copyInstallSettings(dst *configuration, src *configuration) {
|
|
dst.BindHost = src.BindHost
|
|
dst.BindPort = src.BindPort
|
|
dst.DNS.BindHost = src.DNS.BindHost
|
|
dst.DNS.Port = src.DNS.Port
|
|
}
|
|
|
|
// Apply new configuration, start DNS server, restart Web server
|
|
func handleInstallConfigure(w http.ResponseWriter, r *http.Request) {
|
|
newSettings := applyConfigReq{}
|
|
err := json.NewDecoder(r.Body).Decode(&newSettings)
|
|
if err != nil {
|
|
httpError(w, http.StatusBadRequest, "Failed to parse 'configure' JSON: %s", err)
|
|
return
|
|
}
|
|
|
|
if newSettings.Web.Port == 0 || newSettings.DNS.Port == 0 {
|
|
httpError(w, http.StatusBadRequest, "port value can't be 0")
|
|
return
|
|
}
|
|
|
|
restartHTTP := true
|
|
if config.BindHost == newSettings.Web.IP && config.BindPort == newSettings.Web.Port {
|
|
// no need to rebind
|
|
restartHTTP = false
|
|
}
|
|
|
|
// validate that hosts and ports are bindable
|
|
if restartHTTP {
|
|
err = util.CheckPortAvailable(newSettings.Web.IP, newSettings.Web.Port)
|
|
if err != nil {
|
|
httpError(w, http.StatusBadRequest, "Impossible to listen on IP:port %s due to %s",
|
|
net.JoinHostPort(newSettings.Web.IP, strconv.Itoa(newSettings.Web.Port)), err)
|
|
return
|
|
}
|
|
}
|
|
|
|
err = util.CheckPacketPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
|
|
if err != nil {
|
|
httpError(w, http.StatusBadRequest, "%s", err)
|
|
return
|
|
}
|
|
|
|
err = util.CheckPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
|
|
if err != nil {
|
|
httpError(w, http.StatusBadRequest, "%s", err)
|
|
return
|
|
}
|
|
|
|
var curConfig configuration
|
|
copyInstallSettings(&curConfig, &config)
|
|
|
|
Context.firstRun = false
|
|
config.BindHost = newSettings.Web.IP
|
|
config.BindPort = newSettings.Web.Port
|
|
config.DNS.BindHost = newSettings.DNS.IP
|
|
config.DNS.Port = newSettings.DNS.Port
|
|
|
|
err = initDNSServer()
|
|
var err2 error
|
|
if err == nil {
|
|
err2 = startDNSServer()
|
|
if err2 != nil {
|
|
closeDNSServer()
|
|
}
|
|
}
|
|
if err != nil || err2 != nil {
|
|
Context.firstRun = true
|
|
copyInstallSettings(&config, &curConfig)
|
|
if err != nil {
|
|
httpError(w, http.StatusInternalServerError, "Couldn't initialize DNS server: %s", err)
|
|
} else {
|
|
httpError(w, http.StatusInternalServerError, "Couldn't start DNS server: %s", err2)
|
|
}
|
|
return
|
|
}
|
|
|
|
u := User{}
|
|
u.Name = newSettings.Username
|
|
Context.auth.UserAdd(&u, newSettings.Password)
|
|
|
|
err = config.write()
|
|
if err != nil {
|
|
Context.firstRun = true
|
|
copyInstallSettings(&config, &curConfig)
|
|
httpError(w, http.StatusInternalServerError, "Couldn't write config: %s", err)
|
|
return
|
|
}
|
|
|
|
// this needs to be done in a goroutine because Shutdown() is a blocking call, and it will block
|
|
// until all requests are finished, and _we_ are inside a request right now, so it will block indefinitely
|
|
if restartHTTP {
|
|
go func() {
|
|
_ = Context.httpServer.Shutdown(context.TODO())
|
|
}()
|
|
}
|
|
|
|
returnOK(w)
|
|
}
|
|
|
|
func registerInstallHandlers() {
|
|
http.HandleFunc("/control/install/get_addresses", preInstall(ensureGET(handleInstallGetAddresses)))
|
|
http.HandleFunc("/control/install/check_config", preInstall(ensurePOST(handleInstallCheckConfig)))
|
|
http.HandleFunc("/control/install/configure", preInstall(ensurePOST(handleInstallConfigure)))
|
|
}
|