2019-06-10 08:33:19 +00:00
|
|
|
package home
|
2019-04-23 08:48:30 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2019-12-16 12:48:11 +00:00
|
|
|
"io/ioutil"
|
2019-04-23 08:48:30 +00:00
|
|
|
"net"
|
|
|
|
"net/http"
|
2019-12-16 12:48:11 +00:00
|
|
|
"os"
|
2019-04-23 08:48:30 +00:00
|
|
|
"os/exec"
|
2019-12-16 12:48:11 +00:00
|
|
|
"path/filepath"
|
2019-12-23 11:57:10 +00:00
|
|
|
"runtime"
|
2019-04-23 08:48:30 +00:00
|
|
|
"strconv"
|
2020-12-29 16:53:56 +00:00
|
|
|
"strings"
|
2021-01-26 16:44:19 +00:00
|
|
|
"time"
|
2019-04-23 08:48:30 +00:00
|
|
|
|
2021-03-22 13:46:36 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/agherr"
|
2021-03-16 16:42:15 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
|
2020-02-13 15:42:07 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
|
|
|
)
|
|
|
|
|
2021-01-21 16:55:41 +00:00
|
|
|
// getAddrsResponse is the response for /install/get_addresses endpoint.
|
|
|
|
type getAddrsResponse struct {
|
2021-03-16 16:42:15 +00:00
|
|
|
WebPort int `json:"web_port"`
|
|
|
|
DNSPort int `json:"dns_port"`
|
|
|
|
Interfaces map[string]*aghnet.NetInterface `json:"interfaces"`
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
2021-01-21 16:55:41 +00:00
|
|
|
// handleInstallGetAddresses is the handler for /install/get_addresses endpoint.
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) handleInstallGetAddresses(w http.ResponseWriter, r *http.Request) {
|
2021-01-21 16:55:41 +00:00
|
|
|
data := getAddrsResponse{}
|
2019-04-23 08:48:30 +00:00
|
|
|
data.WebPort = 80
|
|
|
|
data.DNSPort = 53
|
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
ifaces, err := aghnet.GetValidNetInterfacesForWeb()
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
data.Interfaces = make(map[string]*aghnet.NetInterface)
|
2019-04-23 08:48:30 +00:00
|
|
|
for _, iface := range ifaces {
|
2021-01-21 16:55:41 +00:00
|
|
|
data.Interfaces[iface.Name] = iface
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
err = json.NewEncoder(w).Encode(data)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusInternalServerError, "Unable to marshal default addresses to json: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type checkConfigReqEnt struct {
|
|
|
|
Port int `json:"port"`
|
2021-01-20 14:27:53 +00:00
|
|
|
IP net.IP `json:"ip"`
|
2019-04-23 08:48:30 +00:00
|
|
|
Autofix bool `json:"autofix"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
type checkConfigReq struct {
|
2020-02-13 15:42:07 +00:00
|
|
|
Web checkConfigReqEnt `json:"web"`
|
|
|
|
DNS checkConfigReqEnt `json:"dns"`
|
|
|
|
SetStaticIP bool `json:"set_static_ip"`
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type checkConfigRespEnt struct {
|
|
|
|
Status string `json:"status"`
|
|
|
|
CanAutofix bool `json:"can_autofix"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
type staticIPJSON struct {
|
|
|
|
Static string `json:"static"`
|
|
|
|
IP string `json:"ip"`
|
|
|
|
Error string `json:"error"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
type checkConfigResp struct {
|
2020-02-13 15:42:07 +00:00
|
|
|
Web checkConfigRespEnt `json:"web"`
|
|
|
|
DNS checkConfigRespEnt `json:"dns"`
|
|
|
|
StaticIP staticIPJSON `json:"static_ip"`
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check if ports are available, respond with results
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) handleInstallCheckConfig(w http.ResponseWriter, r *http.Request) {
|
2019-04-23 08:48:30 +00:00
|
|
|
reqData := checkConfigReq{}
|
|
|
|
respData := checkConfigResp{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&reqData)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-12-29 16:53:56 +00:00
|
|
|
if reqData.Web.Port != 0 && reqData.Web.Port != config.BindPort && reqData.Web.Port != config.BetaBindPort {
|
2021-03-16 16:42:15 +00:00
|
|
|
err = aghnet.CheckPortAvailable(reqData.Web.IP, reqData.Web.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
2021-01-15 17:30:48 +00:00
|
|
|
respData.Web.Status = err.Error()
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if reqData.DNS.Port != 0 {
|
2021-03-16 16:42:15 +00:00
|
|
|
err = aghnet.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
if aghnet.ErrorIsAddrInUse(err) {
|
2019-04-23 08:48:30 +00:00
|
|
|
canAutofix := checkDNSStubListener()
|
|
|
|
if canAutofix && reqData.DNS.Autofix {
|
|
|
|
|
|
|
|
err = disableDNSStubListener()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Couldn't disable DNSStubListener: %s", err)
|
|
|
|
}
|
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
err = aghnet.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
canAutofix = false
|
|
|
|
}
|
|
|
|
|
|
|
|
respData.DNS.CanAutofix = canAutofix
|
|
|
|
}
|
|
|
|
|
|
|
|
if err == nil {
|
2021-03-16 16:42:15 +00:00
|
|
|
err = aghnet.CheckPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
2021-01-15 17:30:48 +00:00
|
|
|
respData.DNS.Status = err.Error()
|
2021-01-20 14:27:53 +00:00
|
|
|
} else if !reqData.DNS.IP.IsUnspecified() {
|
2020-02-13 15:42:07 +00:00
|
|
|
respData.StaticIP = handleStaticIP(reqData.DNS.IP, reqData.SetStaticIP)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
err = json.NewEncoder(w).Encode(respData)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusInternalServerError, "Unable to marshal JSON: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
// handleStaticIP - handles static IP request
|
|
|
|
// It either checks if we have a static IP
|
|
|
|
// Or if set=true, it tries to set it
|
2021-01-20 14:27:53 +00:00
|
|
|
func handleStaticIP(ip net.IP, set bool) staticIPJSON {
|
2020-02-13 15:42:07 +00:00
|
|
|
resp := staticIPJSON{}
|
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
interfaceName := aghnet.GetInterfaceByIP(ip)
|
2020-02-13 15:42:07 +00:00
|
|
|
resp.Static = "no"
|
|
|
|
|
|
|
|
if len(interfaceName) == 0 {
|
|
|
|
resp.Static = "error"
|
|
|
|
resp.Error = fmt.Sprintf("Couldn't find network interface by IP %s", ip)
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
|
|
|
if set {
|
|
|
|
// Try to set static IP for the specified interface
|
2021-03-16 16:42:15 +00:00
|
|
|
err := aghnet.IfaceSetStaticIP(interfaceName)
|
2020-02-13 15:42:07 +00:00
|
|
|
if err != nil {
|
|
|
|
resp.Static = "error"
|
|
|
|
resp.Error = err.Error()
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fallthrough here even if we set static IP
|
|
|
|
// Check if we have a static IP and return the details
|
2021-03-16 16:42:15 +00:00
|
|
|
isStaticIP, err := aghnet.IfaceHasStaticIP(interfaceName)
|
2020-02-13 15:42:07 +00:00
|
|
|
if err != nil {
|
|
|
|
resp.Static = "error"
|
|
|
|
resp.Error = err.Error()
|
|
|
|
} else {
|
|
|
|
if isStaticIP {
|
|
|
|
resp.Static = "yes"
|
|
|
|
}
|
2021-03-16 16:42:15 +00:00
|
|
|
resp.IP = aghnet.GetSubnet(interfaceName).String()
|
2020-02-13 15:42:07 +00:00
|
|
|
}
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
// Check if DNSStubListener is active
|
|
|
|
func checkDNSStubListener() bool {
|
2019-12-23 11:57:10 +00:00
|
|
|
if runtime.GOOS != "linux" {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
cmd := exec.Command("systemctl", "is-enabled", "systemd-resolved")
|
|
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
|
|
_, err := cmd.Output()
|
|
|
|
if err != nil || cmd.ProcessState.ExitCode() != 0 {
|
2020-02-13 15:42:07 +00:00
|
|
|
log.Info("command %s has failed: %v code:%d",
|
2019-04-23 08:48:30 +00:00
|
|
|
cmd.Path, err, cmd.ProcessState.ExitCode())
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd = exec.Command("grep", "-E", "#?DNSStubListener=yes", "/etc/systemd/resolved.conf")
|
|
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
|
|
_, err = cmd.Output()
|
|
|
|
if err != nil || cmd.ProcessState.ExitCode() != 0 {
|
2020-02-13 15:42:07 +00:00
|
|
|
log.Info("command %s has failed: %v code:%d",
|
2019-04-23 08:48:30 +00:00
|
|
|
cmd.Path, err, cmd.ProcessState.ExitCode())
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2020-11-05 12:20:57 +00:00
|
|
|
const (
|
|
|
|
resolvedConfPath = "/etc/systemd/resolved.conf.d/adguardhome.conf"
|
|
|
|
resolvedConfData = `[Resolve]
|
2019-12-16 12:48:11 +00:00
|
|
|
DNS=127.0.0.1
|
|
|
|
DNSStubListener=no
|
|
|
|
`
|
2020-11-05 12:20:57 +00:00
|
|
|
)
|
2019-12-16 12:48:11 +00:00
|
|
|
const resolvConfPath = "/etc/resolv.conf"
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
// Deactivate DNSStubListener
|
|
|
|
func disableDNSStubListener() error {
|
2019-12-16 12:48:11 +00:00
|
|
|
dir := filepath.Dir(resolvedConfPath)
|
2020-11-05 12:20:57 +00:00
|
|
|
err := os.MkdirAll(dir, 0o755)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("os.MkdirAll: %s: %w", dir, err)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
2019-12-16 12:48:11 +00:00
|
|
|
|
2020-11-05 12:20:57 +00:00
|
|
|
err = ioutil.WriteFile(resolvedConfPath, []byte(resolvedConfData), 0o644)
|
2019-12-16 12:48:11 +00:00
|
|
|
if err != nil {
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("ioutil.WriteFile: %s: %w", resolvedConfPath, err)
|
2019-12-16 12:48:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
_ = os.Rename(resolvConfPath, resolvConfPath+".backup")
|
|
|
|
err = os.Symlink("/run/systemd/resolve/resolv.conf", resolvConfPath)
|
|
|
|
if err != nil {
|
|
|
|
_ = os.Remove(resolvedConfPath) // remove the file we've just created
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("os.Symlink: %s: %w", resolvConfPath, err)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
2019-12-16 12:48:11 +00:00
|
|
|
cmd := exec.Command("systemctl", "reload-or-restart", "systemd-resolved")
|
2019-04-23 08:48:30 +00:00
|
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
|
|
_, err = cmd.Output()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if cmd.ProcessState.ExitCode() != 0 {
|
|
|
|
return fmt.Errorf("process %s exited with an error: %d",
|
|
|
|
cmd.Path, cmd.ProcessState.ExitCode())
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type applyConfigReqEnt struct {
|
2021-01-20 14:27:53 +00:00
|
|
|
IP net.IP `json:"ip"`
|
2019-04-23 08:48:30 +00:00
|
|
|
Port int `json:"port"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
type applyConfigReq struct {
|
|
|
|
Web applyConfigReqEnt `json:"web"`
|
|
|
|
DNS applyConfigReqEnt `json:"dns"`
|
|
|
|
Username string `json:"username"`
|
|
|
|
Password string `json:"password"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Copy installation parameters between two configuration objects
|
2020-12-07 13:04:53 +00:00
|
|
|
func copyInstallSettings(dst, src *configuration) {
|
2019-04-23 08:48:30 +00:00
|
|
|
dst.BindHost = src.BindHost
|
|
|
|
dst.BindPort = src.BindPort
|
2020-12-29 16:53:56 +00:00
|
|
|
dst.BetaBindPort = src.BetaBindPort
|
2019-04-23 08:48:30 +00:00
|
|
|
dst.DNS.BindHost = src.DNS.BindHost
|
|
|
|
dst.DNS.Port = src.DNS.Port
|
|
|
|
}
|
|
|
|
|
2021-01-26 16:44:19 +00:00
|
|
|
// shutdownTimeout is the timeout for shutting HTTP server down operation.
|
|
|
|
const shutdownTimeout = 5 * time.Second
|
|
|
|
|
2021-03-12 11:32:08 +00:00
|
|
|
func shutdownSrv(ctx context.Context, cancel context.CancelFunc, srv *http.Server) {
|
2021-03-22 13:46:36 +00:00
|
|
|
defer agherr.LogPanic("")
|
2021-03-12 11:32:08 +00:00
|
|
|
|
|
|
|
if srv == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
err := srv.Shutdown(ctx)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("error while shutting down http server %q: %s", srv.Addr, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
// Apply new configuration, start DNS server, restart Web server
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) handleInstallConfigure(w http.ResponseWriter, r *http.Request) {
|
2019-04-23 08:48:30 +00:00
|
|
|
newSettings := applyConfigReq{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&newSettings)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "Failed to parse 'configure' JSON: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if newSettings.Web.Port == 0 || newSettings.DNS.Port == 0 {
|
|
|
|
httpError(w, http.StatusBadRequest, "port value can't be 0")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
restartHTTP := true
|
2021-01-20 14:27:53 +00:00
|
|
|
if config.BindHost.Equal(newSettings.Web.IP) && config.BindPort == newSettings.Web.Port {
|
2019-04-23 08:48:30 +00:00
|
|
|
// no need to rebind
|
|
|
|
restartHTTP = false
|
|
|
|
}
|
|
|
|
|
|
|
|
// validate that hosts and ports are bindable
|
|
|
|
if restartHTTP {
|
2021-03-16 16:42:15 +00:00
|
|
|
err = aghnet.CheckPortAvailable(newSettings.Web.IP, newSettings.Web.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "Impossible to listen on IP:port %s due to %s",
|
2021-01-20 14:27:53 +00:00
|
|
|
net.JoinHostPort(newSettings.Web.IP.String(), strconv.Itoa(newSettings.Web.Port)), err)
|
2019-04-23 08:48:30 +00:00
|
|
|
return
|
|
|
|
}
|
2020-12-29 16:53:56 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
err = aghnet.CheckPacketPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "%s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
err = aghnet.CheckPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "%s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var curConfig configuration
|
|
|
|
copyInstallSettings(&curConfig, &config)
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.firstRun = false
|
2019-04-23 08:48:30 +00:00
|
|
|
config.BindHost = newSettings.Web.IP
|
|
|
|
config.BindPort = newSettings.Web.Port
|
|
|
|
config.DNS.BindHost = newSettings.DNS.IP
|
|
|
|
config.DNS.Port = newSettings.DNS.Port
|
|
|
|
|
2021-01-26 16:44:19 +00:00
|
|
|
// TODO(e.burkov): StartMods() should be put in a separate goroutine at
|
|
|
|
// the moment we'll allow setting up TLS in the initial configuration or
|
|
|
|
// the configuration itself will use HTTPS protocol, because the
|
|
|
|
// underlying functions potentially restart the HTTPS server.
|
2020-02-19 12:28:06 +00:00
|
|
|
err = StartMods()
|
|
|
|
if err != nil {
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.firstRun = true
|
2019-04-23 08:48:30 +00:00
|
|
|
copyInstallSettings(&config, &curConfig)
|
2020-02-19 12:28:06 +00:00
|
|
|
httpError(w, http.StatusInternalServerError, "%s", err)
|
2019-04-23 08:48:30 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-08-29 09:34:07 +00:00
|
|
|
u := User{}
|
|
|
|
u.Name = newSettings.Username
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.auth.UserAdd(&u, newSettings.Password)
|
2019-08-29 09:34:07 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
err = config.write()
|
|
|
|
if err != nil {
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.firstRun = true
|
2019-04-23 08:48:30 +00:00
|
|
|
copyInstallSettings(&config, &curConfig)
|
|
|
|
httpError(w, http.StatusInternalServerError, "Couldn't write config: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-04-08 16:08:35 +00:00
|
|
|
web.conf.firstRun = false
|
|
|
|
web.conf.BindHost = newSettings.Web.IP
|
|
|
|
web.conf.BindPort = newSettings.Web.Port
|
|
|
|
|
2020-02-18 16:27:09 +00:00
|
|
|
registerControlHandlers()
|
|
|
|
|
2020-04-24 12:50:57 +00:00
|
|
|
returnOK(w)
|
|
|
|
if f, ok := w.(http.Flusher); ok {
|
|
|
|
f.Flush()
|
|
|
|
}
|
|
|
|
|
2021-03-12 11:32:08 +00:00
|
|
|
// Method http.(*Server).Shutdown needs to be called in a separate
|
|
|
|
// goroutine and with its own context, because it waits until all
|
|
|
|
// requests are handled and will be blocked by it's own caller.
|
2019-04-23 08:48:30 +00:00
|
|
|
if restartHTTP {
|
2021-01-26 16:44:19 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), shutdownTimeout)
|
2021-03-12 11:32:08 +00:00
|
|
|
go shutdownSrv(ctx, cancel, web.httpServer)
|
|
|
|
go shutdownSrv(ctx, cancel, web.httpServerBeta)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) registerInstallHandlers() {
|
2020-11-25 12:50:59 +00:00
|
|
|
Context.mux.HandleFunc("/control/install/get_addresses", preInstall(ensureGET(web.handleInstallGetAddresses)))
|
|
|
|
Context.mux.HandleFunc("/control/install/check_config", preInstall(ensurePOST(web.handleInstallCheckConfig)))
|
|
|
|
Context.mux.HandleFunc("/control/install/configure", preInstall(ensurePOST(web.handleInstallConfigure)))
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
2020-12-29 16:53:56 +00:00
|
|
|
|
|
|
|
// checkConfigReqEntBeta is a struct representing new client's config check
|
|
|
|
// request entry. It supports multiple IP values unlike the checkConfigReqEnt.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default checkConfigReqEnt.
|
|
|
|
type checkConfigReqEntBeta struct {
|
|
|
|
Port int `json:"port"`
|
2021-01-20 14:27:53 +00:00
|
|
|
IP []net.IP `json:"ip"`
|
2020-12-29 16:53:56 +00:00
|
|
|
Autofix bool `json:"autofix"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// checkConfigReqBeta is a struct representing new client's config check request
|
|
|
|
// body. It uses checkConfigReqEntBeta instead of checkConfigReqEnt.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default checkConfigReq.
|
|
|
|
type checkConfigReqBeta struct {
|
|
|
|
Web checkConfigReqEntBeta `json:"web"`
|
|
|
|
DNS checkConfigReqEntBeta `json:"dns"`
|
|
|
|
SetStaticIP bool `json:"set_static_ip"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleInstallCheckConfigBeta is a substitution of /install/check_config
|
|
|
|
// handler for new client.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default handleInstallCheckConfig.
|
|
|
|
func (web *Web) handleInstallCheckConfigBeta(w http.ResponseWriter, r *http.Request) {
|
|
|
|
reqData := checkConfigReqBeta{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&reqData)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(reqData.DNS.IP) == 0 || len(reqData.Web.IP) == 0 {
|
|
|
|
httpError(w, http.StatusBadRequest, http.StatusText(http.StatusBadRequest))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
nonBetaReqData := checkConfigReq{
|
|
|
|
Web: checkConfigReqEnt{
|
|
|
|
Port: reqData.Web.Port,
|
|
|
|
IP: reqData.Web.IP[0],
|
|
|
|
Autofix: reqData.Web.Autofix,
|
|
|
|
},
|
|
|
|
DNS: checkConfigReqEnt{
|
|
|
|
Port: reqData.DNS.Port,
|
|
|
|
IP: reqData.DNS.IP[0],
|
|
|
|
Autofix: reqData.DNS.Autofix,
|
|
|
|
},
|
|
|
|
SetStaticIP: reqData.SetStaticIP,
|
|
|
|
}
|
|
|
|
|
|
|
|
nonBetaReqBody := &strings.Builder{}
|
|
|
|
|
|
|
|
err = json.NewEncoder(nonBetaReqBody).Encode(nonBetaReqData)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "Failed to encode 'check_config' JSON data: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
body := nonBetaReqBody.String()
|
|
|
|
r.Body = ioutil.NopCloser(strings.NewReader(body))
|
|
|
|
r.ContentLength = int64(len(body))
|
|
|
|
|
|
|
|
web.handleInstallCheckConfig(w, r)
|
|
|
|
}
|
|
|
|
|
|
|
|
// applyConfigReqEntBeta is a struct representing new client's config setting
|
|
|
|
// request entry. It supports multiple IP values unlike the applyConfigReqEnt.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default applyConfigReqEnt.
|
|
|
|
type applyConfigReqEntBeta struct {
|
2021-01-20 14:27:53 +00:00
|
|
|
IP []net.IP `json:"ip"`
|
2020-12-29 16:53:56 +00:00
|
|
|
Port int `json:"port"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// applyConfigReqBeta is a struct representing new client's config setting
|
|
|
|
// request body. It uses applyConfigReqEntBeta instead of applyConfigReqEnt.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default applyConfigReq.
|
|
|
|
type applyConfigReqBeta struct {
|
|
|
|
Web applyConfigReqEntBeta `json:"web"`
|
|
|
|
DNS applyConfigReqEntBeta `json:"dns"`
|
|
|
|
Username string `json:"username"`
|
|
|
|
Password string `json:"password"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleInstallConfigureBeta is a substitution of /install/configure handler
|
|
|
|
// for new client.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default handleInstallConfigure.
|
|
|
|
func (web *Web) handleInstallConfigureBeta(w http.ResponseWriter, r *http.Request) {
|
|
|
|
reqData := applyConfigReqBeta{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&reqData)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(reqData.DNS.IP) == 0 || len(reqData.Web.IP) == 0 {
|
|
|
|
httpError(w, http.StatusBadRequest, http.StatusText(http.StatusBadRequest))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
nonBetaReqData := applyConfigReq{
|
|
|
|
Web: applyConfigReqEnt{
|
|
|
|
IP: reqData.Web.IP[0],
|
|
|
|
Port: reqData.Web.Port,
|
|
|
|
},
|
|
|
|
DNS: applyConfigReqEnt{
|
|
|
|
IP: reqData.DNS.IP[0],
|
|
|
|
Port: reqData.DNS.Port,
|
|
|
|
},
|
|
|
|
Username: reqData.Username,
|
|
|
|
Password: reqData.Password,
|
|
|
|
}
|
|
|
|
|
|
|
|
nonBetaReqBody := &strings.Builder{}
|
|
|
|
|
|
|
|
err = json.NewEncoder(nonBetaReqBody).Encode(nonBetaReqData)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "Failed to encode 'check_config' JSON data: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
body := nonBetaReqBody.String()
|
|
|
|
r.Body = ioutil.NopCloser(strings.NewReader(body))
|
|
|
|
r.ContentLength = int64(len(body))
|
|
|
|
|
|
|
|
web.handleInstallConfigure(w, r)
|
|
|
|
}
|
|
|
|
|
2021-01-21 16:55:41 +00:00
|
|
|
// getAddrsResponseBeta is a struct representing new client's getting addresses
|
2020-12-29 16:53:56 +00:00
|
|
|
// request body. It uses array of structs instead of map.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default firstRunData.
|
2021-01-21 16:55:41 +00:00
|
|
|
type getAddrsResponseBeta struct {
|
2021-03-16 16:42:15 +00:00
|
|
|
WebPort int `json:"web_port"`
|
|
|
|
DNSPort int `json:"dns_port"`
|
|
|
|
Interfaces []*aghnet.NetInterface `json:"interfaces"`
|
2020-12-29 16:53:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// handleInstallConfigureBeta is a substitution of /install/get_addresses
|
|
|
|
// handler for new client.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default handleInstallGetAddresses.
|
|
|
|
func (web *Web) handleInstallGetAddressesBeta(w http.ResponseWriter, r *http.Request) {
|
2021-01-21 16:55:41 +00:00
|
|
|
data := getAddrsResponseBeta{}
|
2020-12-29 16:53:56 +00:00
|
|
|
data.WebPort = 80
|
|
|
|
data.DNSPort = 53
|
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
ifaces, err := aghnet.GetValidNetInterfacesForWeb()
|
2020-12-29 16:53:56 +00:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-01-21 16:55:41 +00:00
|
|
|
data.Interfaces = ifaces
|
2020-12-29 16:53:56 +00:00
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
err = json.NewEncoder(w).Encode(data)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusInternalServerError, "Unable to marshal default addresses to json: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// registerBetaInstallHandlers registers the install handlers for new client
|
|
|
|
// with the structures it supports.
|
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): This should removed with the API v1 when the appropriate
|
2020-12-29 16:53:56 +00:00
|
|
|
// functionality will appear in default handlers.
|
|
|
|
func (web *Web) registerBetaInstallHandlers() {
|
|
|
|
Context.mux.HandleFunc("/control/install/get_addresses_beta", preInstall(ensureGET(web.handleInstallGetAddressesBeta)))
|
|
|
|
Context.mux.HandleFunc("/control/install/check_config_beta", preInstall(ensurePOST(web.handleInstallCheckConfigBeta)))
|
|
|
|
Context.mux.HandleFunc("/control/install/configure_beta", preInstall(ensurePOST(web.handleInstallConfigureBeta)))
|
|
|
|
}
|