2019-06-10 08:33:19 +00:00
|
|
|
package home
|
2019-04-23 08:48:30 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2019-12-16 12:48:11 +00:00
|
|
|
"io/ioutil"
|
2019-04-23 08:48:30 +00:00
|
|
|
"net"
|
|
|
|
"net/http"
|
2019-12-16 12:48:11 +00:00
|
|
|
"os"
|
2019-04-23 08:48:30 +00:00
|
|
|
"os/exec"
|
2019-12-16 12:48:11 +00:00
|
|
|
"path/filepath"
|
2019-12-23 11:57:10 +00:00
|
|
|
"runtime"
|
2019-04-23 08:48:30 +00:00
|
|
|
"strconv"
|
|
|
|
|
2020-10-30 10:32:02 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/util"
|
2020-02-13 15:42:07 +00:00
|
|
|
|
2020-12-07 16:48:24 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/sysutil"
|
2020-02-13 15:42:07 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
|
|
|
)
|
|
|
|
|
|
|
|
type firstRunData struct {
|
|
|
|
WebPort int `json:"web_port"`
|
|
|
|
DNSPort int `json:"dns_port"`
|
|
|
|
Interfaces map[string]interface{} `json:"interfaces"`
|
|
|
|
}
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
type netInterfaceJSON struct {
|
|
|
|
Name string `json:"name"`
|
|
|
|
MTU int `json:"mtu"`
|
|
|
|
HardwareAddr string `json:"hardware_address"`
|
|
|
|
Addresses []string `json:"ip_addresses"`
|
|
|
|
Flags string `json:"flags"`
|
|
|
|
}
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
// Get initial installation settings
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) handleInstallGetAddresses(w http.ResponseWriter, r *http.Request) {
|
2019-04-23 08:48:30 +00:00
|
|
|
data := firstRunData{}
|
|
|
|
data.WebPort = 80
|
|
|
|
data.DNSPort = 53
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
ifaces, err := util.GetValidNetInterfacesForWeb()
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
data.Interfaces = make(map[string]interface{})
|
|
|
|
for _, iface := range ifaces {
|
2020-02-13 15:42:07 +00:00
|
|
|
ifaceJSON := netInterfaceJSON{
|
|
|
|
Name: iface.Name,
|
|
|
|
MTU: iface.MTU,
|
|
|
|
HardwareAddr: iface.HardwareAddr,
|
|
|
|
Addresses: iface.Addresses,
|
|
|
|
Flags: iface.Flags,
|
|
|
|
}
|
|
|
|
data.Interfaces[iface.Name] = ifaceJSON
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
err = json.NewEncoder(w).Encode(data)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusInternalServerError, "Unable to marshal default addresses to json: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type checkConfigReqEnt struct {
|
|
|
|
Port int `json:"port"`
|
|
|
|
IP string `json:"ip"`
|
|
|
|
Autofix bool `json:"autofix"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
type checkConfigReq struct {
|
2020-02-13 15:42:07 +00:00
|
|
|
Web checkConfigReqEnt `json:"web"`
|
|
|
|
DNS checkConfigReqEnt `json:"dns"`
|
|
|
|
SetStaticIP bool `json:"set_static_ip"`
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type checkConfigRespEnt struct {
|
|
|
|
Status string `json:"status"`
|
|
|
|
CanAutofix bool `json:"can_autofix"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
type staticIPJSON struct {
|
|
|
|
Static string `json:"static"`
|
|
|
|
IP string `json:"ip"`
|
|
|
|
Error string `json:"error"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
type checkConfigResp struct {
|
2020-02-13 15:42:07 +00:00
|
|
|
Web checkConfigRespEnt `json:"web"`
|
|
|
|
DNS checkConfigRespEnt `json:"dns"`
|
|
|
|
StaticIP staticIPJSON `json:"static_ip"`
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check if ports are available, respond with results
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) handleInstallCheckConfig(w http.ResponseWriter, r *http.Request) {
|
2019-04-23 08:48:30 +00:00
|
|
|
reqData := checkConfigReq{}
|
|
|
|
respData := checkConfigResp{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&reqData)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if reqData.Web.Port != 0 && reqData.Web.Port != config.BindPort {
|
2020-02-13 15:42:07 +00:00
|
|
|
err = util.CheckPortAvailable(reqData.Web.IP, reqData.Web.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
|
|
|
respData.Web.Status = fmt.Sprintf("%v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if reqData.DNS.Port != 0 {
|
2020-02-13 15:42:07 +00:00
|
|
|
err = util.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
if util.ErrorIsAddrInUse(err) {
|
2019-04-23 08:48:30 +00:00
|
|
|
canAutofix := checkDNSStubListener()
|
|
|
|
if canAutofix && reqData.DNS.Autofix {
|
|
|
|
|
|
|
|
err = disableDNSStubListener()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Couldn't disable DNSStubListener: %s", err)
|
|
|
|
}
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
err = util.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
canAutofix = false
|
|
|
|
}
|
|
|
|
|
|
|
|
respData.DNS.CanAutofix = canAutofix
|
|
|
|
}
|
|
|
|
|
|
|
|
if err == nil {
|
2020-02-13 15:42:07 +00:00
|
|
|
err = util.CheckPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
respData.DNS.Status = fmt.Sprintf("%v", err)
|
2020-09-02 12:50:09 +00:00
|
|
|
} else if reqData.DNS.IP != "0.0.0.0" {
|
2020-02-13 15:42:07 +00:00
|
|
|
respData.StaticIP = handleStaticIP(reqData.DNS.IP, reqData.SetStaticIP)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
err = json.NewEncoder(w).Encode(respData)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusInternalServerError, "Unable to marshal JSON: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
// handleStaticIP - handles static IP request
|
|
|
|
// It either checks if we have a static IP
|
|
|
|
// Or if set=true, it tries to set it
|
|
|
|
func handleStaticIP(ip string, set bool) staticIPJSON {
|
|
|
|
resp := staticIPJSON{}
|
|
|
|
|
|
|
|
interfaceName := util.GetInterfaceByIP(ip)
|
|
|
|
resp.Static = "no"
|
|
|
|
|
|
|
|
if len(interfaceName) == 0 {
|
|
|
|
resp.Static = "error"
|
|
|
|
resp.Error = fmt.Sprintf("Couldn't find network interface by IP %s", ip)
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
|
|
|
if set {
|
|
|
|
// Try to set static IP for the specified interface
|
2020-12-07 16:48:24 +00:00
|
|
|
err := sysutil.IfaceSetStaticIP(interfaceName)
|
2020-02-13 15:42:07 +00:00
|
|
|
if err != nil {
|
|
|
|
resp.Static = "error"
|
|
|
|
resp.Error = err.Error()
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fallthrough here even if we set static IP
|
|
|
|
// Check if we have a static IP and return the details
|
2020-12-07 16:48:24 +00:00
|
|
|
isStaticIP, err := sysutil.IfaceHasStaticIP(interfaceName)
|
2020-02-13 15:42:07 +00:00
|
|
|
if err != nil {
|
|
|
|
resp.Static = "error"
|
|
|
|
resp.Error = err.Error()
|
|
|
|
} else {
|
|
|
|
if isStaticIP {
|
|
|
|
resp.Static = "yes"
|
|
|
|
}
|
|
|
|
resp.IP = util.GetSubnet(interfaceName)
|
|
|
|
}
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
// Check if DNSStubListener is active
|
|
|
|
func checkDNSStubListener() bool {
|
2019-12-23 11:57:10 +00:00
|
|
|
if runtime.GOOS != "linux" {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
cmd := exec.Command("systemctl", "is-enabled", "systemd-resolved")
|
|
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
|
|
_, err := cmd.Output()
|
|
|
|
if err != nil || cmd.ProcessState.ExitCode() != 0 {
|
2020-02-13 15:42:07 +00:00
|
|
|
log.Info("command %s has failed: %v code:%d",
|
2019-04-23 08:48:30 +00:00
|
|
|
cmd.Path, err, cmd.ProcessState.ExitCode())
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd = exec.Command("grep", "-E", "#?DNSStubListener=yes", "/etc/systemd/resolved.conf")
|
|
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
|
|
_, err = cmd.Output()
|
|
|
|
if err != nil || cmd.ProcessState.ExitCode() != 0 {
|
2020-02-13 15:42:07 +00:00
|
|
|
log.Info("command %s has failed: %v code:%d",
|
2019-04-23 08:48:30 +00:00
|
|
|
cmd.Path, err, cmd.ProcessState.ExitCode())
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2020-11-05 12:20:57 +00:00
|
|
|
const (
|
|
|
|
resolvedConfPath = "/etc/systemd/resolved.conf.d/adguardhome.conf"
|
|
|
|
resolvedConfData = `[Resolve]
|
2019-12-16 12:48:11 +00:00
|
|
|
DNS=127.0.0.1
|
|
|
|
DNSStubListener=no
|
|
|
|
`
|
2020-11-05 12:20:57 +00:00
|
|
|
)
|
2019-12-16 12:48:11 +00:00
|
|
|
const resolvConfPath = "/etc/resolv.conf"
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
// Deactivate DNSStubListener
|
|
|
|
func disableDNSStubListener() error {
|
2019-12-16 12:48:11 +00:00
|
|
|
dir := filepath.Dir(resolvedConfPath)
|
2020-11-05 12:20:57 +00:00
|
|
|
err := os.MkdirAll(dir, 0o755)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("os.MkdirAll: %s: %w", dir, err)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
2019-12-16 12:48:11 +00:00
|
|
|
|
2020-11-05 12:20:57 +00:00
|
|
|
err = ioutil.WriteFile(resolvedConfPath, []byte(resolvedConfData), 0o644)
|
2019-12-16 12:48:11 +00:00
|
|
|
if err != nil {
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("ioutil.WriteFile: %s: %w", resolvedConfPath, err)
|
2019-12-16 12:48:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
_ = os.Rename(resolvConfPath, resolvConfPath+".backup")
|
|
|
|
err = os.Symlink("/run/systemd/resolve/resolv.conf", resolvConfPath)
|
|
|
|
if err != nil {
|
|
|
|
_ = os.Remove(resolvedConfPath) // remove the file we've just created
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("os.Symlink: %s: %w", resolvConfPath, err)
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|
|
|
|
|
2019-12-16 12:48:11 +00:00
|
|
|
cmd := exec.Command("systemctl", "reload-or-restart", "systemd-resolved")
|
2019-04-23 08:48:30 +00:00
|
|
|
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
|
|
|
|
_, err = cmd.Output()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if cmd.ProcessState.ExitCode() != 0 {
|
|
|
|
return fmt.Errorf("process %s exited with an error: %d",
|
|
|
|
cmd.Path, cmd.ProcessState.ExitCode())
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type applyConfigReqEnt struct {
|
|
|
|
IP string `json:"ip"`
|
|
|
|
Port int `json:"port"`
|
|
|
|
}
|
2020-11-05 12:20:57 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
type applyConfigReq struct {
|
|
|
|
Web applyConfigReqEnt `json:"web"`
|
|
|
|
DNS applyConfigReqEnt `json:"dns"`
|
|
|
|
Username string `json:"username"`
|
|
|
|
Password string `json:"password"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Copy installation parameters between two configuration objects
|
2020-12-07 13:04:53 +00:00
|
|
|
func copyInstallSettings(dst, src *configuration) {
|
2019-04-23 08:48:30 +00:00
|
|
|
dst.BindHost = src.BindHost
|
|
|
|
dst.BindPort = src.BindPort
|
|
|
|
dst.DNS.BindHost = src.DNS.BindHost
|
|
|
|
dst.DNS.Port = src.DNS.Port
|
|
|
|
}
|
|
|
|
|
|
|
|
// Apply new configuration, start DNS server, restart Web server
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) handleInstallConfigure(w http.ResponseWriter, r *http.Request) {
|
2019-04-23 08:48:30 +00:00
|
|
|
newSettings := applyConfigReq{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&newSettings)
|
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "Failed to parse 'configure' JSON: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if newSettings.Web.Port == 0 || newSettings.DNS.Port == 0 {
|
|
|
|
httpError(w, http.StatusBadRequest, "port value can't be 0")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
restartHTTP := true
|
|
|
|
if config.BindHost == newSettings.Web.IP && config.BindPort == newSettings.Web.Port {
|
|
|
|
// no need to rebind
|
|
|
|
restartHTTP = false
|
|
|
|
}
|
|
|
|
|
|
|
|
// validate that hosts and ports are bindable
|
|
|
|
if restartHTTP {
|
2020-02-13 15:42:07 +00:00
|
|
|
err = util.CheckPortAvailable(newSettings.Web.IP, newSettings.Web.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "Impossible to listen on IP:port %s due to %s",
|
|
|
|
net.JoinHostPort(newSettings.Web.IP, strconv.Itoa(newSettings.Web.Port)), err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
err = util.CheckPacketPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "%s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
err = util.CheckPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
|
2019-04-23 08:48:30 +00:00
|
|
|
if err != nil {
|
|
|
|
httpError(w, http.StatusBadRequest, "%s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var curConfig configuration
|
|
|
|
copyInstallSettings(&curConfig, &config)
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.firstRun = false
|
2019-04-23 08:48:30 +00:00
|
|
|
config.BindHost = newSettings.Web.IP
|
|
|
|
config.BindPort = newSettings.Web.Port
|
|
|
|
config.DNS.BindHost = newSettings.DNS.IP
|
|
|
|
config.DNS.Port = newSettings.DNS.Port
|
|
|
|
|
2020-02-19 12:28:06 +00:00
|
|
|
err = StartMods()
|
|
|
|
if err != nil {
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.firstRun = true
|
2019-04-23 08:48:30 +00:00
|
|
|
copyInstallSettings(&config, &curConfig)
|
2020-02-19 12:28:06 +00:00
|
|
|
httpError(w, http.StatusInternalServerError, "%s", err)
|
2019-04-23 08:48:30 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-08-29 09:34:07 +00:00
|
|
|
u := User{}
|
|
|
|
u.Name = newSettings.Username
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.auth.UserAdd(&u, newSettings.Password)
|
2019-08-29 09:34:07 +00:00
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
err = config.write()
|
|
|
|
if err != nil {
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.firstRun = true
|
2019-04-23 08:48:30 +00:00
|
|
|
copyInstallSettings(&config, &curConfig)
|
|
|
|
httpError(w, http.StatusInternalServerError, "Couldn't write config: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-04-08 16:08:35 +00:00
|
|
|
web.conf.firstRun = false
|
|
|
|
web.conf.BindHost = newSettings.Web.IP
|
|
|
|
web.conf.BindPort = newSettings.Web.Port
|
|
|
|
|
2020-02-18 16:27:09 +00:00
|
|
|
registerControlHandlers()
|
|
|
|
|
2020-04-24 12:50:57 +00:00
|
|
|
returnOK(w)
|
|
|
|
if f, ok := w.(http.Flusher); ok {
|
|
|
|
f.Flush()
|
|
|
|
}
|
|
|
|
|
2019-04-23 08:48:30 +00:00
|
|
|
// this needs to be done in a goroutine because Shutdown() is a blocking call, and it will block
|
|
|
|
// until all requests are finished, and _we_ are inside a request right now, so it will block indefinitely
|
|
|
|
if restartHTTP {
|
|
|
|
go func() {
|
2020-02-19 12:24:55 +00:00
|
|
|
_ = Context.web.httpServer.Shutdown(context.TODO())
|
2019-04-23 08:48:30 +00:00
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-19 12:28:06 +00:00
|
|
|
func (web *Web) registerInstallHandlers() {
|
2020-11-25 12:50:59 +00:00
|
|
|
Context.mux.HandleFunc("/control/install/get_addresses", preInstall(ensureGET(web.handleInstallGetAddresses)))
|
|
|
|
Context.mux.HandleFunc("/control/install/check_config", preInstall(ensurePOST(web.handleInstallCheckConfig)))
|
|
|
|
Context.mux.HandleFunc("/control/install/configure", preInstall(ensurePOST(web.handleInstallConfigure)))
|
2019-04-23 08:48:30 +00:00
|
|
|
}
|