2019-06-10 08:33:19 +00:00
|
|
|
package home
|
2019-04-23 08:48:30 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2021-05-21 11:55:42 +00:00
|
|
|
"io"
|
2019-04-23 08:48:30 +00:00
|
|
|
"net"
|
|
|
|
"net/http"
|
2019-12-16 12:48:11 +00:00
|
|
|
"os"
|
2019-04-23 08:48:30 +00:00
|
|
|
"os/exec"
|
2019-12-16 12:48:11 +00:00
|
|
|
"path/filepath"
|
2019-12-23 11:57:10 +00:00
|
|
|
"runtime"
|
2020-12-29 16:53:56 +00:00
|
|
|
"strings"
|
2021-01-26 16:44:19 +00:00
|
|
|
"time"
|
2019-04-23 08:48:30 +00:00
|
|
|
|
2021-12-16 17:54:59 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghhttp"
|
2021-03-16 16:42:15 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
|
2021-09-13 13:00:36 +00:00
|
|
|
"github.com/AdguardTeam/golibs/errors"
|
2019-04-23 08:48:30 +00:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
|
|
|
)
|
|
|
|
|
2021-01-21 16:55:41 +00:00
|
|
|
// getAddrsResponse is the response for /install/get_addresses endpoint.
|
|
|
|
type getAddrsResponse struct {
|
2021-12-24 17:14:36 +00:00
|
|
|
Interfaces map[string]*aghnet.NetInterface `json:"interfaces"`
|
2021-03-16 16:42:15 +00:00
|
|
|
WebPort int `json:"web_port"`
|
|
|
|
DNSPort int `json:"dns_port"`
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
2021-01-21 16:55:41 +00:00
|
|
|
// handleInstallGetAddresses is the handler for /install/get_addresses endpoint.
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) handleInstallGetAddresses(w http.ResponseWriter, r *http.Request) {
|
2021-12-24 17:14:36 +00:00
|
|
|
data := getAddrsResponse{
|
|
|
|
WebPort: defaultPortHTTP,
|
|
|
|
DNSPort: defaultPortDNS,
|
|
|
|
}
|
2019-04-23 08:48:30 +00:00
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
ifaces, err := aghnet.GetValidNetInterfacesForWeb()
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
data.Interfaces = make(map[string]*aghnet.NetInterface)
|
2019-04-23 08:48:30 +00:00
|
|
|
for _, iface := range ifaces {
|
2021-01-21 16:55:41 +00:00
|
|
|
data.Interfaces[iface.Name] = iface
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
err = json.NewEncoder(w).Encode(data)
|
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(
|
|
|
|
r,
|
|
|
|
w,
|
|
|
|
http.StatusInternalServerError,
|
|
|
|
"Unable to marshal default addresses to json: %s",
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type checkConfigReqEnt struct {
|
2021-01-20 14:27:53 +00:00
|
|
|
IP net.IP `json:"ip"`
|
2021-12-24 17:14:36 +00:00
|
|
|
Port int `json:"port"`
|
2019-04-23 08:48:30 +00:00
|
|
|
Autofix bool `json:"autofix"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
type checkConfigReq struct {
|
2020-02-13 15:42:07 +00:00
|
|
|
Web checkConfigReqEnt `json:"web"`
|
|
|
|
DNS checkConfigReqEnt `json:"dns"`
|
|
|
|
SetStaticIP bool `json:"set_static_ip"`
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type checkConfigRespEnt struct {
|
|
|
|
Status string `json:"status"`
|
|
|
|
CanAutofix bool `json:"can_autofix"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
type staticIPJSON struct {
|
|
|
|
Static string `json:"static"`
|
|
|
|
IP string `json:"ip"`
|
|
|
|
Error string `json:"error"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
type checkConfigResp struct {
|
2021-12-24 17:14:36 +00:00
|
|
|
StaticIP staticIPJSON `json:"static_ip"`
|
2020-02-13 15:42:07 +00:00
|
|
|
Web checkConfigRespEnt `json:"web"`
|
|
|
|
DNS checkConfigRespEnt `json:"dns"`
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check if ports are available, respond with results
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) handleInstallCheckConfig(w http.ResponseWriter, r *http.Request) {
|
2019-04-23 08:48:30 +00:00
|
|
|
reqData := checkConfigReq{}
|
|
|
|
respData := checkConfigResp{}
|
2021-12-16 17:54:59 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
err := json.NewDecoder(r.Body).Decode(&reqData)
|
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-16 17:54:59 +00:00
|
|
|
pm := portsMap{}
|
|
|
|
pm.add(config.BindPort, config.BetaBindPort, reqData.Web.Port)
|
|
|
|
if err = pm.validate(); err != nil {
|
|
|
|
respData.Web.Status = err.Error()
|
|
|
|
} else if reqData.Web.Port != 0 {
|
|
|
|
err = aghnet.CheckPort("tcp", reqData.Web.IP, reqData.Web.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
2021-01-15 17:30:48 +00:00
|
|
|
respData.Web.Status = err.Error()
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-12-16 17:54:59 +00:00
|
|
|
pm.add(reqData.DNS.Port)
|
|
|
|
if err = pm.validate(); err != nil {
|
|
|
|
respData.DNS.Status = err.Error()
|
|
|
|
} else if reqData.DNS.Port != 0 {
|
|
|
|
err = aghnet.CheckPort("udp", reqData.DNS.IP, reqData.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
|
2021-12-16 17:54:59 +00:00
|
|
|
if aghnet.IsAddrInUse(err) {
|
2019-04-23 08:48:30 +00:00
|
|
|
canAutofix := checkDNSStubListener()
|
|
|
|
if canAutofix && reqData.DNS.Autofix {
|
|
|
|
|
|
|
|
err = disableDNSStubListener()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Couldn't disable DNSStubListener: %s", err)
|
|
|
|
}
|
|
|
|
|
2021-12-16 17:54:59 +00:00
|
|
|
err = aghnet.CheckPort("udp", reqData.DNS.IP, reqData.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
canAutofix = false
|
|
|
|
}
|
|
|
|
|
|
|
|
respData.DNS.CanAutofix = canAutofix
|
|
|
|
}
|
|
|
|
|
|
|
|
if err == nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
err = aghnet.CheckPort("tcp", reqData.DNS.IP, reqData.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
2021-01-15 17:30:48 +00:00
|
|
|
respData.DNS.Status = err.Error()
|
2021-01-20 14:27:53 +00:00
|
|
|
} else if !reqData.DNS.IP.IsUnspecified() {
|
2020-02-13 15:42:07 +00:00
|
|
|
respData.StaticIP = handleStaticIP(reqData.DNS.IP, reqData.SetStaticIP)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
err = json.NewEncoder(w).Encode(respData)
|
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "Unable to marshal JSON: %s", err)
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
// handleStaticIP - handles static IP request
|
|
|
|
// It either checks if we have a static IP
|
|
|
|
// Or if set=true, it tries to set it
|
2021-01-20 14:27:53 +00:00
|
|
|
func handleStaticIP(ip net.IP, set bool) staticIPJSON {
|
2020-02-13 15:42:07 +00:00
|
|
|
resp := staticIPJSON{}
|
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
interfaceName := aghnet.GetInterfaceByIP(ip)
|
2020-02-13 15:42:07 +00:00
|
|
|
resp.Static = "no"
|
|
|
|
|
|
|
|
if len(interfaceName) == 0 {
|
|
|
|
resp.Static = "error"
|
|
|
|
resp.Error = fmt.Sprintf("Couldn't find network interface by IP %s", ip)
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
|
|
|
if set {
|
|
|
|
// Try to set static IP for the specified interface
|
2021-03-16 16:42:15 +00:00
|
|
|
err := aghnet.IfaceSetStaticIP(interfaceName)
|
2020-02-13 15:42:07 +00:00
|
|
|
if err != nil {
|
|
|
|
resp.Static = "error"
|
|
|
|
resp.Error = err.Error()
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fallthrough here even if we set static IP
|
|
|
|
// Check if we have a static IP and return the details
|
2021-03-16 16:42:15 +00:00
|
|
|
isStaticIP, err := aghnet.IfaceHasStaticIP(interfaceName)
|
2020-02-13 15:42:07 +00:00
|
|
|
if err != nil {
|
|
|
|
resp.Static = "error"
|
|
|
|
resp.Error = err.Error()
|
|
|
|
} else {
|
|
|
|
if isStaticIP {
|
|
|
|
resp.Static = "yes"
|
|
|
|
}
|
2021-03-16 16:42:15 +00:00
|
|
|
resp.IP = aghnet.GetSubnet(interfaceName).String()
|
2020-02-13 15:42:07 +00:00
|
|
|
}
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
// Check if DNSStubListener is active
|
|
|
|
func checkDNSStubListener() bool {
|
2019-12-23 11:57:10 +00:00
|
|
|
if runtime.GOOS != "linux" {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
cmd := exec.Command("systemctl", "is-enabled", "systemd-resolved")
|
|
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
|
|
_, err := cmd.Output()
|
|
|
|
if err != nil || cmd.ProcessState.ExitCode() != 0 {
|
2020-02-13 15:42:07 +00:00
|
|
|
log.Info("command %s has failed: %v code:%d",
|
2019-04-23 08:48:30 +00:00
|
|
|
cmd.Path, err, cmd.ProcessState.ExitCode())
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd = exec.Command("grep", "-E", "#?DNSStubListener=yes", "/etc/systemd/resolved.conf")
|
|
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
|
|
_, err = cmd.Output()
|
|
|
|
if err != nil || cmd.ProcessState.ExitCode() != 0 {
|
2020-02-13 15:42:07 +00:00
|
|
|
log.Info("command %s has failed: %v code:%d",
|
2019-04-23 08:48:30 +00:00
|
|
|
cmd.Path, err, cmd.ProcessState.ExitCode())
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2020-11-05 12:20:57 +00:00
|
|
|
const (
|
|
|
|
resolvedConfPath = "/etc/systemd/resolved.conf.d/adguardhome.conf"
|
|
|
|
resolvedConfData = `[Resolve]
|
2019-12-16 12:48:11 +00:00
|
|
|
DNS=127.0.0.1
|
|
|
|
DNSStubListener=no
|
|
|
|
`
|
2020-11-05 12:20:57 +00:00
|
|
|
)
|
2019-12-16 12:48:11 +00:00
|
|
|
const resolvConfPath = "/etc/resolv.conf"
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
// Deactivate DNSStubListener
|
|
|
|
func disableDNSStubListener() error {
|
2019-12-16 12:48:11 +00:00
|
|
|
dir := filepath.Dir(resolvedConfPath)
|
2020-11-05 12:20:57 +00:00
|
|
|
err := os.MkdirAll(dir, 0o755)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("os.MkdirAll: %s: %w", dir, err)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
2019-12-16 12:48:11 +00:00
|
|
|
|
2021-05-21 11:55:42 +00:00
|
|
|
err = os.WriteFile(resolvedConfPath, []byte(resolvedConfData), 0o644)
|
2019-12-16 12:48:11 +00:00
|
|
|
if err != nil {
|
2021-05-21 11:55:42 +00:00
|
|
|
return fmt.Errorf("os.WriteFile: %s: %w", resolvedConfPath, err)
|
2019-12-16 12:48:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
_ = os.Rename(resolvConfPath, resolvConfPath+".backup")
|
|
|
|
err = os.Symlink("/run/systemd/resolve/resolv.conf", resolvConfPath)
|
|
|
|
if err != nil {
|
|
|
|
_ = os.Remove(resolvedConfPath) // remove the file we've just created
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("os.Symlink: %s: %w", resolvConfPath, err)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
2019-12-16 12:48:11 +00:00
|
|
|
cmd := exec.Command("systemctl", "reload-or-restart", "systemd-resolved")
|
2019-04-23 08:48:30 +00:00
|
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
|
|
_, err = cmd.Output()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if cmd.ProcessState.ExitCode() != 0 {
|
|
|
|
return fmt.Errorf("process %s exited with an error: %d",
|
|
|
|
cmd.Path, cmd.ProcessState.ExitCode())
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type applyConfigReqEnt struct {
|
2021-01-20 14:27:53 +00:00
|
|
|
IP net.IP `json:"ip"`
|
2019-04-23 08:48:30 +00:00
|
|
|
Port int `json:"port"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
type applyConfigReq struct {
|
|
|
|
Web applyConfigReqEnt `json:"web"`
|
|
|
|
DNS applyConfigReqEnt `json:"dns"`
|
|
|
|
Username string `json:"username"`
|
|
|
|
Password string `json:"password"`
|
|
|
|
}
|
|
|
|
|
2021-09-14 15:03:14 +00:00
|
|
|
// copyInstallSettings copies the installation parameters between two
|
|
|
|
// configuration structures.
|
2020-12-07 13:04:53 +00:00
|
|
|
func copyInstallSettings(dst, src *configuration) {
|
2019-04-23 08:48:30 +00:00
|
|
|
dst.BindHost = src.BindHost
|
|
|
|
dst.BindPort = src.BindPort
|
2020-12-29 16:53:56 +00:00
|
|
|
dst.BetaBindPort = src.BetaBindPort
|
2021-03-23 09:32:07 +00:00
|
|
|
dst.DNS.BindHosts = src.DNS.BindHosts
|
2019-04-23 08:48:30 +00:00
|
|
|
dst.DNS.Port = src.DNS.Port
|
|
|
|
}
|
|
|
|
|
2021-01-26 16:44:19 +00:00
|
|
|
// shutdownTimeout is the timeout for shutting HTTP server down operation.
|
|
|
|
const shutdownTimeout = 5 * time.Second
|
|
|
|
|
2021-12-06 14:26:43 +00:00
|
|
|
func shutdownSrv(ctx context.Context, srv *http.Server) {
|
2021-05-24 14:28:11 +00:00
|
|
|
defer log.OnPanic("")
|
2021-03-12 11:32:08 +00:00
|
|
|
|
|
|
|
if srv == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
err := srv.Shutdown(ctx)
|
|
|
|
if err != nil {
|
2021-12-24 17:14:36 +00:00
|
|
|
const msgFmt = "shutting down http server %q: %s"
|
2021-12-24 14:29:57 +00:00
|
|
|
if errors.Is(err, context.Canceled) {
|
2021-12-24 17:14:36 +00:00
|
|
|
log.Debug(msgFmt, srv.Addr, err)
|
2021-12-24 14:29:57 +00:00
|
|
|
} else {
|
2021-12-24 17:14:36 +00:00
|
|
|
log.Error(msgFmt, srv.Addr, err)
|
2021-12-24 14:29:57 +00:00
|
|
|
}
|
2021-03-12 11:32:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
// Apply new configuration, start DNS server, restart Web server
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) handleInstallConfigure(w http.ResponseWriter, r *http.Request) {
|
2021-09-13 13:00:36 +00:00
|
|
|
req, restartHTTP, err := decodeApplyConfigReq(r.Body)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "%s", err)
|
2019-04-23 08:48:30 +00:00
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-16 17:54:59 +00:00
|
|
|
err = aghnet.CheckPort("udp", req.DNS.IP, req.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "%s", err)
|
2021-09-13 13:00:36 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-16 17:54:59 +00:00
|
|
|
err = aghnet.CheckPort("tcp", req.DNS.IP, req.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "%s", err)
|
2021-09-13 13:00:36 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-09-14 15:03:14 +00:00
|
|
|
curConfig := &configuration{}
|
2021-09-13 13:00:36 +00:00
|
|
|
copyInstallSettings(curConfig, config)
|
2019-04-23 08:48:30 +00:00
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.firstRun = false
|
2021-06-01 18:06:55 +00:00
|
|
|
config.BindHost = req.Web.IP
|
|
|
|
config.BindPort = req.Web.Port
|
|
|
|
config.DNS.BindHosts = []net.IP{req.DNS.IP}
|
|
|
|
config.DNS.Port = req.DNS.Port
|
2019-04-23 08:48:30 +00:00
|
|
|
|
2021-12-16 17:54:59 +00:00
|
|
|
// TODO(e.burkov): StartMods() should be put in a separate goroutine at the
|
|
|
|
// moment we'll allow setting up TLS in the initial configuration or the
|
|
|
|
// configuration itself will use HTTPS protocol, because the underlying
|
|
|
|
// functions potentially restart the HTTPS server.
|
2020-02-19 12:28:06 +00:00
|
|
|
err = StartMods()
|
|
|
|
if err != nil {
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.firstRun = true
|
2021-09-13 13:00:36 +00:00
|
|
|
copyInstallSettings(config, curConfig)
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "%s", err)
|
2021-09-13 13:00:36 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-16 17:54:59 +00:00
|
|
|
u := &User{
|
|
|
|
Name: req.Username,
|
|
|
|
}
|
|
|
|
Context.auth.UserAdd(u, req.Password)
|
2019-08-29 09:34:07 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
err = config.write()
|
|
|
|
if err != nil {
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.firstRun = true
|
2021-09-13 13:00:36 +00:00
|
|
|
copyInstallSettings(config, curConfig)
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "Couldn't write config: %s", err)
|
2021-09-13 13:00:36 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-04-08 16:08:35 +00:00
|
|
|
web.conf.firstRun = false
|
2021-06-01 18:06:55 +00:00
|
|
|
web.conf.BindHost = req.Web.IP
|
|
|
|
web.conf.BindPort = req.Web.Port
|
2020-04-08 16:08:35 +00:00
|
|
|
|
2020-02-18 16:27:09 +00:00
|
|
|
registerControlHandlers()
|
|
|
|
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.OK(w)
|
2020-04-24 12:50:57 +00:00
|
|
|
if f, ok := w.(http.Flusher); ok {
|
|
|
|
f.Flush()
|
|
|
|
}
|
|
|
|
|
2021-12-06 14:26:43 +00:00
|
|
|
if !restartHTTP {
|
|
|
|
return
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
2021-12-06 14:26:43 +00:00
|
|
|
|
|
|
|
// Method http.(*Server).Shutdown needs to be called in a separate goroutine
|
|
|
|
// and with its own context, because it waits until all requests are handled
|
|
|
|
// and will be blocked by it's own caller.
|
|
|
|
go func(timeout time.Duration) {
|
|
|
|
defer log.OnPanic("web")
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), timeout)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
shutdownSrv(ctx, web.httpServer)
|
|
|
|
shutdownSrv(ctx, web.httpServerBeta)
|
|
|
|
}(shutdownTimeout)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
2021-09-13 13:00:36 +00:00
|
|
|
// decodeApplyConfigReq decodes the configuration, validates some parameters,
|
|
|
|
// and returns it along with the boolean indicating whether or not the HTTP
|
|
|
|
// server must be restarted.
|
|
|
|
func decodeApplyConfigReq(r io.Reader) (req *applyConfigReq, restartHTTP bool, err error) {
|
|
|
|
req = &applyConfigReq{}
|
|
|
|
err = json.NewDecoder(r).Decode(&req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, false, fmt.Errorf("parsing request: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if req.Web.Port == 0 || req.DNS.Port == 0 {
|
|
|
|
return nil, false, errors.Error("ports cannot be 0")
|
|
|
|
}
|
|
|
|
|
|
|
|
restartHTTP = !config.BindHost.Equal(req.Web.IP) || config.BindPort != req.Web.Port
|
|
|
|
if restartHTTP {
|
2021-12-16 17:54:59 +00:00
|
|
|
err = aghnet.CheckPort("tcp", req.Web.IP, req.Web.Port)
|
2021-09-13 13:00:36 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, false, fmt.Errorf(
|
|
|
|
"checking address %s:%d: %w",
|
|
|
|
req.Web.IP.String(),
|
|
|
|
req.Web.Port,
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return req, restartHTTP, err
|
|
|
|
}
|
|
|
|
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) registerInstallHandlers() {
|
2020-11-25 12:50:59 +00:00
|
|
|
Context.mux.HandleFunc("/control/install/get_addresses", preInstall(ensureGET(web.handleInstallGetAddresses)))
|
|
|
|
Context.mux.HandleFunc("/control/install/check_config", preInstall(ensurePOST(web.handleInstallCheckConfig)))
|
|
|
|
Context.mux.HandleFunc("/control/install/configure", preInstall(ensurePOST(web.handleInstallConfigure)))
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
2020-12-29 16:53:56 +00:00
|
|
|
|
|
|
|
// checkConfigReqEntBeta is a struct representing new client's config check
|
|
|
|
// request entry. It supports multiple IP values unlike the checkConfigReqEnt.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default checkConfigReqEnt.
|
|
|
|
type checkConfigReqEntBeta struct {
|
2021-01-20 14:27:53 +00:00
|
|
|
IP []net.IP `json:"ip"`
|
2021-12-24 17:14:36 +00:00
|
|
|
Port int `json:"port"`
|
2020-12-29 16:53:56 +00:00
|
|
|
Autofix bool `json:"autofix"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// checkConfigReqBeta is a struct representing new client's config check request
|
|
|
|
// body. It uses checkConfigReqEntBeta instead of checkConfigReqEnt.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default checkConfigReq.
|
|
|
|
type checkConfigReqBeta struct {
|
|
|
|
Web checkConfigReqEntBeta `json:"web"`
|
|
|
|
DNS checkConfigReqEntBeta `json:"dns"`
|
|
|
|
SetStaticIP bool `json:"set_static_ip"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleInstallCheckConfigBeta is a substitution of /install/check_config
|
|
|
|
// handler for new client.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default handleInstallCheckConfig.
|
|
|
|
func (web *Web) handleInstallCheckConfigBeta(w http.ResponseWriter, r *http.Request) {
|
|
|
|
reqData := checkConfigReqBeta{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&reqData)
|
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
|
|
|
|
|
2020-12-29 16:53:56 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(reqData.DNS.IP) == 0 || len(reqData.Web.IP) == 0 {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, http.StatusText(http.StatusBadRequest))
|
|
|
|
|
2020-12-29 16:53:56 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
nonBetaReqData := checkConfigReq{
|
|
|
|
Web: checkConfigReqEnt{
|
|
|
|
IP: reqData.Web.IP[0],
|
2021-12-24 17:14:36 +00:00
|
|
|
Port: reqData.Web.Port,
|
2020-12-29 16:53:56 +00:00
|
|
|
Autofix: reqData.Web.Autofix,
|
|
|
|
},
|
|
|
|
DNS: checkConfigReqEnt{
|
|
|
|
IP: reqData.DNS.IP[0],
|
2021-12-24 17:14:36 +00:00
|
|
|
Port: reqData.DNS.Port,
|
2020-12-29 16:53:56 +00:00
|
|
|
Autofix: reqData.DNS.Autofix,
|
|
|
|
},
|
|
|
|
SetStaticIP: reqData.SetStaticIP,
|
|
|
|
}
|
|
|
|
|
|
|
|
nonBetaReqBody := &strings.Builder{}
|
|
|
|
|
|
|
|
err = json.NewEncoder(nonBetaReqBody).Encode(nonBetaReqData)
|
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(
|
|
|
|
r,
|
|
|
|
w,
|
|
|
|
http.StatusBadRequest,
|
|
|
|
"Failed to encode 'check_config' JSON data: %s",
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
|
2020-12-29 16:53:56 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
body := nonBetaReqBody.String()
|
2021-05-21 11:55:42 +00:00
|
|
|
r.Body = io.NopCloser(strings.NewReader(body))
|
2020-12-29 16:53:56 +00:00
|
|
|
r.ContentLength = int64(len(body))
|
|
|
|
|
|
|
|
web.handleInstallCheckConfig(w, r)
|
|
|
|
}
|
|
|
|
|
|
|
|
// applyConfigReqEntBeta is a struct representing new client's config setting
|
|
|
|
// request entry. It supports multiple IP values unlike the applyConfigReqEnt.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default applyConfigReqEnt.
|
|
|
|
type applyConfigReqEntBeta struct {
|
2021-01-20 14:27:53 +00:00
|
|
|
IP []net.IP `json:"ip"`
|
2020-12-29 16:53:56 +00:00
|
|
|
Port int `json:"port"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// applyConfigReqBeta is a struct representing new client's config setting
|
|
|
|
// request body. It uses applyConfigReqEntBeta instead of applyConfigReqEnt.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default applyConfigReq.
|
|
|
|
type applyConfigReqBeta struct {
|
|
|
|
Web applyConfigReqEntBeta `json:"web"`
|
|
|
|
DNS applyConfigReqEntBeta `json:"dns"`
|
|
|
|
Username string `json:"username"`
|
|
|
|
Password string `json:"password"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleInstallConfigureBeta is a substitution of /install/configure handler
|
|
|
|
// for new client.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default handleInstallConfigure.
|
|
|
|
func (web *Web) handleInstallConfigureBeta(w http.ResponseWriter, r *http.Request) {
|
|
|
|
reqData := applyConfigReqBeta{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&reqData)
|
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
|
|
|
|
|
2020-12-29 16:53:56 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(reqData.DNS.IP) == 0 || len(reqData.Web.IP) == 0 {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, http.StatusText(http.StatusBadRequest))
|
|
|
|
|
2020-12-29 16:53:56 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
nonBetaReqData := applyConfigReq{
|
|
|
|
Web: applyConfigReqEnt{
|
|
|
|
IP: reqData.Web.IP[0],
|
|
|
|
Port: reqData.Web.Port,
|
|
|
|
},
|
|
|
|
DNS: applyConfigReqEnt{
|
|
|
|
IP: reqData.DNS.IP[0],
|
|
|
|
Port: reqData.DNS.Port,
|
|
|
|
},
|
|
|
|
Username: reqData.Username,
|
|
|
|
Password: reqData.Password,
|
|
|
|
}
|
|
|
|
|
|
|
|
nonBetaReqBody := &strings.Builder{}
|
|
|
|
|
|
|
|
err = json.NewEncoder(nonBetaReqBody).Encode(nonBetaReqData)
|
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(
|
|
|
|
r,
|
|
|
|
w,
|
|
|
|
http.StatusBadRequest,
|
|
|
|
"Failed to encode 'check_config' JSON data: %s",
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
|
2020-12-29 16:53:56 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
body := nonBetaReqBody.String()
|
2021-05-21 11:55:42 +00:00
|
|
|
r.Body = io.NopCloser(strings.NewReader(body))
|
2020-12-29 16:53:56 +00:00
|
|
|
r.ContentLength = int64(len(body))
|
|
|
|
|
|
|
|
web.handleInstallConfigure(w, r)
|
|
|
|
}
|
|
|
|
|
2021-01-21 16:55:41 +00:00
|
|
|
// getAddrsResponseBeta is a struct representing new client's getting addresses
|
2020-12-29 16:53:56 +00:00
|
|
|
// request body. It uses array of structs instead of map.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default firstRunData.
|
2021-01-21 16:55:41 +00:00
|
|
|
type getAddrsResponseBeta struct {
|
2021-12-24 17:14:36 +00:00
|
|
|
Interfaces []*aghnet.NetInterface `json:"interfaces"`
|
2021-03-16 16:42:15 +00:00
|
|
|
WebPort int `json:"web_port"`
|
|
|
|
DNSPort int `json:"dns_port"`
|
2020-12-29 16:53:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// handleInstallConfigureBeta is a substitution of /install/get_addresses
|
|
|
|
// handler for new client.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default handleInstallGetAddresses.
|
|
|
|
func (web *Web) handleInstallGetAddressesBeta(w http.ResponseWriter, r *http.Request) {
|
2021-12-24 17:14:36 +00:00
|
|
|
data := getAddrsResponseBeta{
|
|
|
|
WebPort: defaultPortHTTP,
|
|
|
|
DNSPort: defaultPortDNS,
|
|
|
|
}
|
2020-12-29 16:53:56 +00:00
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
ifaces, err := aghnet.GetValidNetInterfacesForWeb()
|
2020-12-29 16:53:56 +00:00
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
|
|
|
|
|
2020-12-29 16:53:56 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-01-21 16:55:41 +00:00
|
|
|
data.Interfaces = ifaces
|
2020-12-29 16:53:56 +00:00
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
err = json.NewEncoder(w).Encode(data)
|
|
|
|
if err != nil {
|
2021-12-16 17:54:59 +00:00
|
|
|
aghhttp.Error(
|
|
|
|
r,
|
|
|
|
w,
|
|
|
|
http.StatusInternalServerError,
|
|
|
|
"Unable to marshal default addresses to json: %s",
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
|
2020-12-29 16:53:56 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// registerBetaInstallHandlers registers the install handlers for new client
|
|
|
|
// with the structures it supports.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default handlers.
|
|
|
|
func (web *Web) registerBetaInstallHandlers() {
|
|
|
|
Context.mux.HandleFunc("/control/install/get_addresses_beta", preInstall(ensureGET(web.handleInstallGetAddressesBeta)))
|
|
|
|
Context.mux.HandleFunc("/control/install/check_config_beta", preInstall(ensurePOST(web.handleInstallCheckConfigBeta)))
|
|
|
|
Context.mux.HandleFunc("/control/install/configure_beta", preInstall(ensurePOST(web.handleInstallConfigureBeta)))
|
|
|
|
}
|