2020-02-19 12:24:55 +00:00
|
|
|
package home
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/tls"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"strconv"
|
|
|
|
"sync"
|
2020-11-25 12:50:59 +00:00
|
|
|
"time"
|
2020-02-19 12:24:55 +00:00
|
|
|
|
2020-10-30 10:32:02 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/util"
|
2020-02-19 12:24:55 +00:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
|
|
|
"github.com/NYTimes/gziphandler"
|
|
|
|
"github.com/gobuffalo/packr"
|
|
|
|
)
|
|
|
|
|
2020-11-25 12:50:59 +00:00
|
|
|
const (
|
|
|
|
// ReadTimeout is the maximum duration for reading the entire request,
|
|
|
|
// including the body.
|
|
|
|
ReadTimeout = 10 * time.Second
|
|
|
|
|
|
|
|
// ReadHeaderTimeout is the amount of time allowed to read request
|
|
|
|
// headers.
|
|
|
|
ReadHeaderTimeout = 10 * time.Second
|
|
|
|
|
|
|
|
// WriteTimeout is the maximum duration before timing out writes of the
|
|
|
|
// response.
|
|
|
|
WriteTimeout = 10 * time.Second
|
|
|
|
)
|
|
|
|
|
2020-12-07 13:04:53 +00:00
|
|
|
type webConfig struct {
|
2020-12-29 16:53:56 +00:00
|
|
|
firstRun bool
|
2021-01-20 14:27:53 +00:00
|
|
|
BindHost net.IP
|
2020-12-29 16:53:56 +00:00
|
|
|
BindPort int
|
|
|
|
BetaBindPort int
|
|
|
|
PortHTTPS int
|
2020-11-25 12:50:59 +00:00
|
|
|
|
|
|
|
// ReadTimeout is an option to pass to http.Server for setting an
|
|
|
|
// appropriate field.
|
|
|
|
ReadTimeout time.Duration
|
|
|
|
|
|
|
|
// ReadHeaderTimeout is an option to pass to http.Server for setting an
|
|
|
|
// appropriate field.
|
|
|
|
ReadHeaderTimeout time.Duration
|
|
|
|
|
|
|
|
// WriteTimeout is an option to pass to http.Server for setting an
|
|
|
|
// appropriate field.
|
|
|
|
WriteTimeout time.Duration
|
2020-02-19 12:24:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// HTTPSServer - HTTPS Server
|
|
|
|
type HTTPSServer struct {
|
|
|
|
server *http.Server
|
|
|
|
cond *sync.Cond
|
|
|
|
condLock sync.Mutex
|
|
|
|
shutdown bool // if TRUE, don't restart the server
|
|
|
|
enabled bool
|
|
|
|
cert tls.Certificate
|
|
|
|
}
|
|
|
|
|
|
|
|
// Web - module object
|
|
|
|
type Web struct {
|
2020-12-07 13:04:53 +00:00
|
|
|
conf *webConfig
|
2020-02-19 12:24:55 +00:00
|
|
|
forceHTTPS bool
|
|
|
|
httpServer *http.Server // HTTP module
|
|
|
|
httpsServer HTTPSServer // HTTPS module
|
2020-12-29 16:53:56 +00:00
|
|
|
|
|
|
|
// handlerBeta is the handler for new client.
|
|
|
|
handlerBeta http.Handler
|
|
|
|
// installerBeta is the pre-install handler for new client.
|
|
|
|
installerBeta http.Handler
|
|
|
|
|
|
|
|
// httpServerBeta is a server for new client.
|
|
|
|
httpServerBeta *http.Server
|
2020-02-19 12:24:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// CreateWeb - create module
|
2020-12-07 13:04:53 +00:00
|
|
|
func CreateWeb(conf *webConfig) *Web {
|
2020-04-15 12:17:57 +00:00
|
|
|
log.Info("Initialize web module")
|
|
|
|
|
2020-02-19 12:24:55 +00:00
|
|
|
w := Web{}
|
|
|
|
w.conf = conf
|
|
|
|
|
|
|
|
// Initialize and run the admin Web interface
|
2020-10-30 10:32:02 +00:00
|
|
|
box := packr.NewBox("../../build/static")
|
2020-12-29 16:53:56 +00:00
|
|
|
boxBeta := packr.NewBox("../../build2/static")
|
2020-02-19 12:24:55 +00:00
|
|
|
|
|
|
|
// if not configured, redirect / to /install.html, otherwise redirect /install.html to /
|
2020-12-29 16:53:56 +00:00
|
|
|
Context.mux.Handle("/", withMiddlewares(http.FileServer(box), gziphandler.GzipHandler, optionalAuthHandler, postInstallHandler))
|
|
|
|
w.handlerBeta = withMiddlewares(http.FileServer(boxBeta), gziphandler.GzipHandler, optionalAuthHandler, postInstallHandler)
|
2020-02-19 12:24:55 +00:00
|
|
|
|
|
|
|
// add handlers for /install paths, we only need them when we're not configured yet
|
|
|
|
if conf.firstRun {
|
|
|
|
log.Info("This is the first launch of AdGuard Home, redirecting everything to /install.html ")
|
2020-11-25 12:50:59 +00:00
|
|
|
Context.mux.Handle("/install.html", preInstallHandler(http.FileServer(box)))
|
2020-12-29 16:53:56 +00:00
|
|
|
w.installerBeta = preInstallHandler(http.FileServer(boxBeta))
|
2020-02-19 12:24:55 +00:00
|
|
|
w.registerInstallHandlers()
|
2020-12-29 16:53:56 +00:00
|
|
|
// This must be removed in API v1.
|
|
|
|
w.registerBetaInstallHandlers()
|
2020-02-19 12:24:55 +00:00
|
|
|
} else {
|
|
|
|
registerControlHandlers()
|
|
|
|
}
|
|
|
|
|
|
|
|
w.httpsServer.cond = sync.NewCond(&w.httpsServer.condLock)
|
|
|
|
return &w
|
|
|
|
}
|
|
|
|
|
|
|
|
// WebCheckPortAvailable - check if port is available
|
|
|
|
// BUT: if we are already using this port, no need
|
|
|
|
func WebCheckPortAvailable(port int) bool {
|
|
|
|
alreadyRunning := false
|
|
|
|
if Context.web.httpsServer.server != nil {
|
|
|
|
alreadyRunning = true
|
|
|
|
}
|
|
|
|
if !alreadyRunning {
|
|
|
|
err := util.CheckPortAvailable(config.BindHost, port)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2021-01-26 16:44:19 +00:00
|
|
|
// TLSConfigChanged updates the TLS configuration and restarts the HTTPS server
|
|
|
|
// if necessary.
|
|
|
|
func (web *Web) TLSConfigChanged(ctx context.Context, tlsConf tlsConfigSettings) {
|
2020-02-19 12:24:55 +00:00
|
|
|
log.Debug("Web: applying new TLS configuration")
|
2020-04-05 15:34:43 +00:00
|
|
|
web.conf.PortHTTPS = tlsConf.PortHTTPS
|
|
|
|
web.forceHTTPS = (tlsConf.ForceHTTPS && tlsConf.Enabled && tlsConf.PortHTTPS != 0)
|
2020-02-19 12:24:55 +00:00
|
|
|
|
|
|
|
enabled := tlsConf.Enabled &&
|
|
|
|
tlsConf.PortHTTPS != 0 &&
|
|
|
|
len(tlsConf.PrivateKeyData) != 0 &&
|
|
|
|
len(tlsConf.CertificateChainData) != 0
|
|
|
|
var cert tls.Certificate
|
|
|
|
var err error
|
|
|
|
if enabled {
|
|
|
|
cert, err = tls.X509KeyPair(tlsConf.CertificateChainData, tlsConf.PrivateKeyData)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-05 15:34:43 +00:00
|
|
|
web.httpsServer.cond.L.Lock()
|
|
|
|
if web.httpsServer.server != nil {
|
2021-01-26 16:44:19 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, shutdownTimeout)
|
|
|
|
err = web.httpsServer.server.Shutdown(ctx)
|
|
|
|
cancel()
|
|
|
|
if err != nil {
|
|
|
|
log.Debug("error while shutting down HTTP server: %s", err)
|
|
|
|
}
|
2020-02-19 12:24:55 +00:00
|
|
|
}
|
2020-04-05 15:34:43 +00:00
|
|
|
web.httpsServer.enabled = enabled
|
|
|
|
web.httpsServer.cert = cert
|
|
|
|
web.httpsServer.cond.Broadcast()
|
|
|
|
web.httpsServer.cond.L.Unlock()
|
2020-02-19 12:24:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start - start serving HTTP requests
|
2020-04-05 15:34:43 +00:00
|
|
|
func (web *Web) Start() {
|
2020-02-19 12:24:55 +00:00
|
|
|
// for https, we have a separate goroutine loop
|
2020-05-27 09:17:05 +00:00
|
|
|
go web.tlsServerLoop()
|
2020-02-19 12:24:55 +00:00
|
|
|
|
|
|
|
// this loop is used as an ability to change listening host and/or port
|
2020-04-05 15:34:43 +00:00
|
|
|
for !web.httpsServer.shutdown {
|
2020-02-19 12:24:55 +00:00
|
|
|
printHTTPAddresses("http")
|
2020-12-29 16:53:56 +00:00
|
|
|
errs := make(chan error, 2)
|
2020-02-19 12:24:55 +00:00
|
|
|
|
2021-01-20 14:27:53 +00:00
|
|
|
hostStr := web.conf.BindHost.String()
|
2020-02-19 12:24:55 +00:00
|
|
|
// we need to have new instance, because after Shutdown() the Server is not usable
|
2020-04-05 15:34:43 +00:00
|
|
|
web.httpServer = &http.Server{
|
2020-12-07 13:04:53 +00:00
|
|
|
ErrorLog: log.StdLog("web: http", log.DEBUG),
|
2021-01-20 14:27:53 +00:00
|
|
|
Addr: net.JoinHostPort(hostStr, strconv.Itoa(web.conf.BindPort)),
|
2020-11-25 12:50:59 +00:00
|
|
|
Handler: withMiddlewares(Context.mux, limitRequestBody),
|
|
|
|
ReadTimeout: web.conf.ReadTimeout,
|
|
|
|
ReadHeaderTimeout: web.conf.ReadHeaderTimeout,
|
|
|
|
WriteTimeout: web.conf.WriteTimeout,
|
2020-02-19 12:24:55 +00:00
|
|
|
}
|
2020-12-29 16:53:56 +00:00
|
|
|
go func() {
|
|
|
|
errs <- web.httpServer.ListenAndServe()
|
|
|
|
}()
|
|
|
|
|
|
|
|
if web.conf.BetaBindPort != 0 {
|
|
|
|
web.httpServerBeta = &http.Server{
|
|
|
|
ErrorLog: log.StdLog("web: http", log.DEBUG),
|
2021-01-20 14:27:53 +00:00
|
|
|
Addr: net.JoinHostPort(hostStr, strconv.Itoa(web.conf.BetaBindPort)),
|
2020-12-29 16:53:56 +00:00
|
|
|
Handler: withMiddlewares(Context.mux, limitRequestBody, web.wrapIndexBeta),
|
|
|
|
ReadTimeout: web.conf.ReadTimeout,
|
|
|
|
ReadHeaderTimeout: web.conf.ReadHeaderTimeout,
|
|
|
|
WriteTimeout: web.conf.WriteTimeout,
|
|
|
|
}
|
|
|
|
go func() {
|
|
|
|
errs <- web.httpServerBeta.ListenAndServe()
|
|
|
|
}()
|
|
|
|
}
|
2020-12-07 13:04:53 +00:00
|
|
|
|
2020-12-29 16:53:56 +00:00
|
|
|
err := <-errs
|
2020-02-19 12:24:55 +00:00
|
|
|
if err != http.ErrServerClosed {
|
|
|
|
cleanupAlways()
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
// We use ErrServerClosed as a sign that we need to rebind on new address, so go back to the start of the loop
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-26 16:44:19 +00:00
|
|
|
// Close gracefully shuts down the HTTP servers.
|
|
|
|
func (web *Web) Close(ctx context.Context) {
|
2020-02-19 12:24:55 +00:00
|
|
|
log.Info("Stopping HTTP server...")
|
2020-04-05 15:34:43 +00:00
|
|
|
web.httpsServer.cond.L.Lock()
|
|
|
|
web.httpsServer.shutdown = true
|
|
|
|
web.httpsServer.cond.L.Unlock()
|
2021-01-26 16:44:19 +00:00
|
|
|
|
|
|
|
shut := func(srv *http.Server) {
|
|
|
|
if srv == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx, cancel := context.WithTimeout(ctx, shutdownTimeout)
|
|
|
|
defer cancel()
|
|
|
|
if err := srv.Shutdown(ctx); err != nil {
|
|
|
|
log.Debug("error while shutting down HTTP server: %s", err)
|
|
|
|
}
|
2020-12-29 16:53:56 +00:00
|
|
|
}
|
2020-02-19 12:24:55 +00:00
|
|
|
|
2021-01-26 16:44:19 +00:00
|
|
|
shut(web.httpsServer.server)
|
|
|
|
shut(web.httpServer)
|
|
|
|
shut(web.httpServerBeta)
|
|
|
|
|
2020-02-19 12:24:55 +00:00
|
|
|
log.Info("Stopped HTTP server")
|
|
|
|
}
|
|
|
|
|
2020-05-27 09:17:05 +00:00
|
|
|
func (web *Web) tlsServerLoop() {
|
2020-02-19 12:24:55 +00:00
|
|
|
for {
|
2020-04-05 15:34:43 +00:00
|
|
|
web.httpsServer.cond.L.Lock()
|
|
|
|
if web.httpsServer.shutdown {
|
|
|
|
web.httpsServer.cond.L.Unlock()
|
2020-02-19 12:24:55 +00:00
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
// this mechanism doesn't let us through until all conditions are met
|
2020-04-05 15:34:43 +00:00
|
|
|
for !web.httpsServer.enabled { // sleep until necessary data is supplied
|
|
|
|
web.httpsServer.cond.Wait()
|
|
|
|
if web.httpsServer.shutdown {
|
|
|
|
web.httpsServer.cond.L.Unlock()
|
2020-02-19 12:24:55 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-05 15:34:43 +00:00
|
|
|
web.httpsServer.cond.L.Unlock()
|
2020-02-19 12:24:55 +00:00
|
|
|
|
|
|
|
// prepare HTTPS server
|
2021-01-20 14:27:53 +00:00
|
|
|
address := net.JoinHostPort(web.conf.BindHost.String(), strconv.Itoa(web.conf.PortHTTPS))
|
2020-04-05 15:34:43 +00:00
|
|
|
web.httpsServer.server = &http.Server{
|
2020-12-07 13:04:53 +00:00
|
|
|
ErrorLog: log.StdLog("web: https", log.DEBUG),
|
2020-05-27 09:17:05 +00:00
|
|
|
Addr: address,
|
2020-02-19 12:24:55 +00:00
|
|
|
TLSConfig: &tls.Config{
|
2020-04-05 15:34:43 +00:00
|
|
|
Certificates: []tls.Certificate{web.httpsServer.cert},
|
2020-02-19 12:24:55 +00:00
|
|
|
MinVersion: tls.VersionTLS12,
|
|
|
|
RootCAs: Context.tlsRoots,
|
2020-03-23 07:23:34 +00:00
|
|
|
CipherSuites: Context.tlsCiphers,
|
2020-02-19 12:24:55 +00:00
|
|
|
},
|
2021-02-11 11:10:42 +00:00
|
|
|
Handler: withMiddlewares(Context.mux, limitRequestBody),
|
2020-11-25 12:50:59 +00:00
|
|
|
ReadTimeout: web.conf.ReadTimeout,
|
|
|
|
ReadHeaderTimeout: web.conf.ReadHeaderTimeout,
|
|
|
|
WriteTimeout: web.conf.WriteTimeout,
|
2020-02-19 12:24:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
printHTTPAddresses("https")
|
2020-04-05 15:34:43 +00:00
|
|
|
err := web.httpsServer.server.ListenAndServeTLS("", "")
|
2020-02-19 12:24:55 +00:00
|
|
|
if err != http.ErrServerClosed {
|
|
|
|
cleanupAlways()
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|