2019-06-10 08:33:19 +00:00
|
|
|
package home
|
2018-08-30 14:25:33 +00:00
|
|
|
|
|
|
|
import (
|
2021-04-16 07:32:41 +00:00
|
|
|
"fmt"
|
2021-01-20 14:27:53 +00:00
|
|
|
"net"
|
2018-08-30 14:25:33 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"sync"
|
2018-10-30 14:16:20 +00:00
|
|
|
|
2020-10-30 10:32:02 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
|
2021-05-21 13:15:47 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/filtering"
|
2020-10-30 10:32:02 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/querylog"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/stats"
|
2021-01-13 13:18:51 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/version"
|
2021-08-27 17:16:07 +00:00
|
|
|
"github.com/AdguardTeam/dnsproxy/fastip"
|
2021-05-24 14:28:11 +00:00
|
|
|
"github.com/AdguardTeam/golibs/errors"
|
2019-02-25 13:44:22 +00:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
2021-09-30 18:17:54 +00:00
|
|
|
"github.com/AdguardTeam/golibs/timeutil"
|
2021-04-06 17:48:36 +00:00
|
|
|
"github.com/google/renameio/maybe"
|
2019-01-25 13:01:27 +00:00
|
|
|
yaml "gopkg.in/yaml.v2"
|
2018-08-30 14:25:33 +00:00
|
|
|
)
|
|
|
|
|
2018-11-27 17:51:12 +00:00
|
|
|
const (
|
2018-12-05 17:29:00 +00:00
|
|
|
dataDir = "data" // data storage
|
|
|
|
filterDir = "filters" // cache location for downloaded filters, it's under DataDir
|
2018-11-27 17:51:12 +00:00
|
|
|
)
|
2018-10-30 14:16:20 +00:00
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// logSettings
|
|
|
|
type logSettings struct {
|
2020-06-02 11:20:12 +00:00
|
|
|
LogCompress bool `yaml:"log_compress"` // Compress determines if the rotated log files should be compressed using gzip (default: false)
|
|
|
|
LogLocalTime bool `yaml:"log_localtime"` // If the time used for formatting the timestamps in is the computer's local time (default: false [UTC])
|
|
|
|
LogMaxBackups int `yaml:"log_max_backups"` // Maximum number of old log files to retain (MaxAge may still cause them to get deleted)
|
|
|
|
LogMaxSize int `yaml:"log_max_size"` // Maximum size in megabytes of the log file before it gets rotated (default 100 MB)
|
|
|
|
LogMaxAge int `yaml:"log_max_age"` // MaxAge is the maximum number of days to retain old log files
|
|
|
|
LogFile string `yaml:"log_file"` // Path to the log file. If empty, write to stdout. If "syslog", writes to syslog
|
|
|
|
Verbose bool `yaml:"verbose"` // If true, verbose logging is enabled
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
|
|
|
|
2021-06-04 13:35:34 +00:00
|
|
|
// osConfig contains OS-related configuration.
|
|
|
|
type osConfig struct {
|
|
|
|
// Group is the name of the group which AdGuard Home must switch to on
|
|
|
|
// startup. Empty string means no switching.
|
|
|
|
Group string `yaml:"group"`
|
|
|
|
// User is the name of the user which AdGuard Home must switch to on
|
|
|
|
// startup. Empty string means no switching.
|
|
|
|
User string `yaml:"user"`
|
|
|
|
// RlimitNoFile is the maximum number of opened fd's per process. Zero
|
|
|
|
// means use the default value.
|
|
|
|
RlimitNoFile uint64 `yaml:"rlimit_nofile"`
|
|
|
|
}
|
|
|
|
|
2018-08-30 14:25:33 +00:00
|
|
|
// configuration is loaded from YAML
|
2018-11-27 17:51:12 +00:00
|
|
|
// field ordering is important -- yaml fields will mirror ordering from here
|
2018-08-30 14:25:33 +00:00
|
|
|
type configuration struct {
|
2019-04-30 11:38:24 +00:00
|
|
|
// Raw file data to avoid re-reading of configuration file
|
|
|
|
// It's reset after config is parsed
|
|
|
|
fileData []byte
|
|
|
|
|
2021-01-20 14:27:53 +00:00
|
|
|
BindHost net.IP `yaml:"bind_host"` // BindHost is the IP address of the HTTP server to bind to
|
2020-12-29 16:53:56 +00:00
|
|
|
BindPort int `yaml:"bind_port"` // BindPort is the port the HTTP server
|
|
|
|
BetaBindPort int `yaml:"beta_bind_port"` // BetaBindPort is the port for new client
|
|
|
|
Users []User `yaml:"users"` // Users that can access HTTP server
|
2021-04-27 15:56:32 +00:00
|
|
|
// AuthAttempts is the maximum number of failed login attempts a user
|
|
|
|
// can do before being blocked.
|
|
|
|
AuthAttempts uint `yaml:"auth_attempts"`
|
|
|
|
// AuthBlockMin is the duration, in minutes, of the block of new login
|
|
|
|
// attempts after AuthAttempts unsuccessful login attempts.
|
|
|
|
AuthBlockMin uint `yaml:"block_auth_min"`
|
2021-06-04 13:35:34 +00:00
|
|
|
ProxyURL string `yaml:"http_proxy"` // Proxy address for our HTTP client
|
|
|
|
Language string `yaml:"language"` // two-letter ISO 639-1 language code
|
|
|
|
DebugPProf bool `yaml:"debug_pprof"` // Enable pprof HTTP server on port 6060
|
2019-03-27 14:09:48 +00:00
|
|
|
|
2019-11-12 11:23:00 +00:00
|
|
|
// TTL for a web session (in hours)
|
|
|
|
// An active session is automatically refreshed once a day.
|
|
|
|
WebSessionTTLHours uint32 `yaml:"web_session_ttl"`
|
|
|
|
|
2020-02-19 12:28:06 +00:00
|
|
|
DNS dnsConfig `yaml:"dns"`
|
|
|
|
TLS tlsConfigSettings `yaml:"tls"`
|
2020-02-26 16:58:25 +00:00
|
|
|
|
|
|
|
Filters []filter `yaml:"filters"`
|
|
|
|
WhitelistFilters []filter `yaml:"whitelist_filters"`
|
|
|
|
UserRules []string `yaml:"user_rules"`
|
|
|
|
|
|
|
|
DHCP dhcpd.ServerConfig `yaml:"dhcp"`
|
2018-08-30 14:25:33 +00:00
|
|
|
|
2019-04-26 13:04:22 +00:00
|
|
|
// Note: this array is filled only before file read/write and then it's cleared
|
|
|
|
Clients []clientObject `yaml:"clients"`
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
logSettings `yaml:",inline"`
|
|
|
|
|
2021-06-04 13:35:34 +00:00
|
|
|
OSConfig *osConfig `yaml:"os"`
|
|
|
|
|
2018-10-06 21:58:59 +00:00
|
|
|
sync.RWMutex `yaml:"-"`
|
2018-11-27 17:51:12 +00:00
|
|
|
|
|
|
|
SchemaVersion int `yaml:"schema_version"` // keeping last so that users will be less tempted to change it -- used when upgrading between versions
|
2018-08-30 14:25:33 +00:00
|
|
|
}
|
|
|
|
|
2018-11-27 17:51:12 +00:00
|
|
|
// field ordering is important -- yaml fields will mirror ordering from here
|
2018-12-05 17:29:00 +00:00
|
|
|
type dnsConfig struct {
|
2021-03-23 09:32:07 +00:00
|
|
|
BindHosts []net.IP `yaml:"bind_hosts"`
|
|
|
|
Port int `yaml:"port"`
|
2018-11-28 15:24:04 +00:00
|
|
|
|
2019-08-08 09:41:00 +00:00
|
|
|
// time interval for statistics (in days)
|
2019-09-10 14:59:10 +00:00
|
|
|
StatsInterval uint32 `yaml:"statistics_interval"`
|
2019-08-08 09:41:00 +00:00
|
|
|
|
2021-07-01 15:50:28 +00:00
|
|
|
QueryLogEnabled bool `yaml:"querylog_enabled"` // if true, query log is enabled
|
|
|
|
QueryLogFileEnabled bool `yaml:"querylog_file_enabled"` // if true, query log will be written to a file
|
|
|
|
// QueryLogInterval is the interval for query log's files rotation.
|
2021-09-30 18:17:54 +00:00
|
|
|
QueryLogInterval timeutil.Duration `yaml:"querylog_interval"`
|
|
|
|
QueryLogMemSize uint32 `yaml:"querylog_size_memory"` // number of entries kept in memory before they are flushed to disk
|
|
|
|
AnonymizeClientIP bool `yaml:"anonymize_client_ip"` // anonymize clients' IP addresses in logs and stats
|
2019-10-30 08:52:58 +00:00
|
|
|
|
2018-11-28 15:24:04 +00:00
|
|
|
dnsforward.FilteringConfig `yaml:",inline"`
|
|
|
|
|
2019-10-30 08:52:58 +00:00
|
|
|
FilteringEnabled bool `yaml:"filtering_enabled"` // whether or not use filter lists
|
|
|
|
FiltersUpdateIntervalHours uint32 `yaml:"filters_update_interval"` // time period to update filters (in hours)
|
2021-05-21 13:15:47 +00:00
|
|
|
DnsfilterConf filtering.Config `yaml:",inline"`
|
2021-03-25 13:00:27 +00:00
|
|
|
|
2021-06-15 14:36:49 +00:00
|
|
|
// UpstreamTimeout is the timeout for querying upstream servers.
|
2021-09-30 18:17:54 +00:00
|
|
|
UpstreamTimeout timeutil.Duration `yaml:"upstream_timeout"`
|
2021-06-15 14:36:49 +00:00
|
|
|
|
2021-04-15 16:00:31 +00:00
|
|
|
// LocalDomainName is the domain name used for known internal hosts.
|
2021-03-25 13:00:27 +00:00
|
|
|
// For example, a machine called "myhost" can be addressed as
|
2021-04-15 16:00:31 +00:00
|
|
|
// "myhost.lan" when LocalDomainName is "lan".
|
|
|
|
LocalDomainName string `yaml:"local_domain_name"`
|
2021-04-07 17:16:06 +00:00
|
|
|
|
|
|
|
// ResolveClients enables and disables resolving clients with RDNS.
|
|
|
|
ResolveClients bool `yaml:"resolve_clients"`
|
|
|
|
|
2021-05-26 14:55:19 +00:00
|
|
|
// UsePrivateRDNS defines if the PTR requests for unknown addresses from
|
|
|
|
// locally-served networks should be resolved via private PTR resolvers.
|
|
|
|
UsePrivateRDNS bool `yaml:"use_private_ptr_resolvers"`
|
|
|
|
|
2021-04-07 17:16:06 +00:00
|
|
|
// LocalPTRResolvers is the slice of addresses to be used as upstreams
|
|
|
|
// for PTR queries for locally-served networks.
|
|
|
|
LocalPTRResolvers []string `yaml:"local_ptr_upstreams"`
|
2018-08-30 14:25:33 +00:00
|
|
|
}
|
|
|
|
|
2019-02-13 08:08:07 +00:00
|
|
|
type tlsConfigSettings struct {
|
2021-06-18 15:13:36 +00:00
|
|
|
Enabled bool `yaml:"enabled" json:"enabled"` // Enabled is the encryption (DoT/DoH/HTTPS) status
|
2020-08-27 12:03:07 +00:00
|
|
|
ServerName string `yaml:"server_name" json:"server_name,omitempty"` // ServerName is the hostname of your HTTPS/TLS server
|
2021-12-13 10:48:08 +00:00
|
|
|
ForceHTTPS bool `yaml:"force_https" json:"force_https"` // ForceHTTPS: if true, forces HTTP->HTTPS redirect
|
2020-08-27 12:03:07 +00:00
|
|
|
PortHTTPS int `yaml:"port_https" json:"port_https,omitempty"` // HTTPS port. If 0, HTTPS will be disabled
|
2021-06-18 15:13:36 +00:00
|
|
|
PortDNSOverTLS int `yaml:"port_dns_over_tls" json:"port_dns_over_tls,omitempty"` // DNS-over-TLS port. If 0, DoT will be disabled
|
2021-03-23 09:32:07 +00:00
|
|
|
PortDNSOverQUIC int `yaml:"port_dns_over_quic" json:"port_dns_over_quic,omitempty"` // DNS-over-QUIC port. If 0, DoQ will be disabled
|
2019-02-12 14:23:38 +00:00
|
|
|
|
2020-12-07 14:58:33 +00:00
|
|
|
// PortDNSCrypt is the port for DNSCrypt requests. If it's zero,
|
|
|
|
// DNSCrypt is disabled.
|
|
|
|
PortDNSCrypt int `yaml:"port_dnscrypt" json:"port_dnscrypt"`
|
|
|
|
// DNSCryptConfigFile is the path to the DNSCrypt config file. Must be
|
|
|
|
// set if PortDNSCrypt is not zero.
|
|
|
|
//
|
|
|
|
// See https://github.com/AdguardTeam/dnsproxy and
|
|
|
|
// https://github.com/ameshkov/dnscrypt.
|
|
|
|
DNSCryptConfigFile string `yaml:"dnscrypt_config_file" json:"dnscrypt_config_file"`
|
|
|
|
|
2021-06-18 15:13:36 +00:00
|
|
|
// Allow DoH queries via unencrypted HTTP (e.g. for reverse proxying)
|
|
|
|
AllowUnencryptedDoH bool `yaml:"allow_unencrypted_doh" json:"allow_unencrypted_doh"`
|
2019-12-13 12:59:36 +00:00
|
|
|
|
2019-02-12 14:23:38 +00:00
|
|
|
dnsforward.TLSConfig `yaml:",inline" json:",inline"`
|
2019-02-13 08:08:07 +00:00
|
|
|
}
|
|
|
|
|
2021-09-13 13:00:36 +00:00
|
|
|
// config is the global configuration structure.
|
|
|
|
//
|
|
|
|
// TODO(a.garipov, e.burkov): This global is afwul and must be removed.
|
|
|
|
var config = &configuration{
|
2020-12-29 16:53:56 +00:00
|
|
|
BindPort: 3000,
|
|
|
|
BetaBindPort: 0,
|
2021-01-20 14:27:53 +00:00
|
|
|
BindHost: net.IP{0, 0, 0, 0},
|
2021-04-27 15:56:32 +00:00
|
|
|
AuthAttempts: 5,
|
|
|
|
AuthBlockMin: 15,
|
2018-12-05 17:29:00 +00:00
|
|
|
DNS: dnsConfig{
|
2021-03-23 09:32:07 +00:00
|
|
|
BindHosts: []net.IP{{0, 0, 0, 0}},
|
2021-09-17 15:31:07 +00:00
|
|
|
Port: defaultPortDNS,
|
2019-11-08 09:31:50 +00:00
|
|
|
StatsInterval: 1,
|
2018-11-28 15:24:04 +00:00
|
|
|
FilteringConfig: dnsforward.FilteringConfig{
|
2021-05-21 13:15:47 +00:00
|
|
|
ProtectionEnabled: true, // whether or not use any of filtering features
|
2020-01-17 12:24:33 +00:00
|
|
|
BlockingMode: "default", // mode how to answer filtered requests
|
2019-12-11 14:54:34 +00:00
|
|
|
BlockedResponseTTL: 10, // in seconds
|
2019-10-30 08:52:58 +00:00
|
|
|
Ratelimit: 20,
|
|
|
|
RefuseAny: true,
|
|
|
|
AllServers: false,
|
2021-09-30 18:17:54 +00:00
|
|
|
FastestTimeout: timeutil.Duration{
|
2021-08-27 17:16:07 +00:00
|
|
|
Duration: fastip.DefaultPingWaitTimeout,
|
|
|
|
},
|
2020-11-05 10:26:13 +00:00
|
|
|
|
2021-07-26 16:30:35 +00:00
|
|
|
TrustedProxies: []string{"127.0.0.0/8", "::1/128"},
|
|
|
|
|
2020-11-05 10:26:13 +00:00
|
|
|
// set default maximum concurrent queries to 300
|
|
|
|
// we introduced a default limit due to this:
|
|
|
|
// https://github.com/AdguardTeam/AdGuardHome/issues/2015#issuecomment-674041912
|
|
|
|
// was later increased to 300 due to https://github.com/AdguardTeam/AdGuardHome/issues/2257
|
|
|
|
MaxGoroutines: 300,
|
2018-11-28 15:24:04 +00:00
|
|
|
},
|
2019-10-30 08:52:58 +00:00
|
|
|
FilteringEnabled: true, // whether or not use filter lists
|
|
|
|
FiltersUpdateIntervalHours: 24,
|
2021-09-30 18:17:54 +00:00
|
|
|
UpstreamTimeout: timeutil.Duration{Duration: dnsforward.DefaultTimeout},
|
2021-04-15 16:00:31 +00:00
|
|
|
LocalDomainName: "lan",
|
2021-04-07 17:16:06 +00:00
|
|
|
ResolveClients: true,
|
2021-05-26 14:55:19 +00:00
|
|
|
UsePrivateRDNS: true,
|
2018-08-30 14:25:33 +00:00
|
|
|
},
|
2020-02-19 12:28:06 +00:00
|
|
|
TLS: tlsConfigSettings{
|
2021-09-17 15:31:07 +00:00
|
|
|
PortHTTPS: defaultPortHTTPS,
|
|
|
|
PortDNSOverTLS: defaultPortTLS, // needs to be passed through to dnsproxy
|
|
|
|
PortDNSOverQUIC: defaultPortQUIC,
|
2019-02-11 18:52:39 +00:00
|
|
|
},
|
2020-06-02 11:20:12 +00:00
|
|
|
logSettings: logSettings{
|
|
|
|
LogCompress: false,
|
|
|
|
LogLocalTime: false,
|
|
|
|
LogMaxBackups: 0,
|
|
|
|
LogMaxSize: 100,
|
2020-06-05 14:58:42 +00:00
|
|
|
LogMaxAge: 3,
|
2020-06-02 11:20:12 +00:00
|
|
|
},
|
2021-06-04 13:35:34 +00:00
|
|
|
OSConfig: &osConfig{},
|
2018-12-05 21:29:38 +00:00
|
|
|
SchemaVersion: currentSchemaVersion,
|
2018-08-30 14:25:33 +00:00
|
|
|
}
|
|
|
|
|
2019-07-09 15:37:24 +00:00
|
|
|
// initConfig initializes default configuration for the current OS&ARCH
|
|
|
|
func initConfig() {
|
2019-11-12 11:23:00 +00:00
|
|
|
config.WebSessionTTLHours = 30 * 24
|
|
|
|
|
2019-11-08 09:31:50 +00:00
|
|
|
config.DNS.QueryLogEnabled = true
|
2020-05-28 12:29:36 +00:00
|
|
|
config.DNS.QueryLogFileEnabled = true
|
2021-09-30 18:17:54 +00:00
|
|
|
config.DNS.QueryLogInterval = timeutil.Duration{Duration: 90 * timeutil.Day}
|
2019-11-08 09:31:50 +00:00
|
|
|
config.DNS.QueryLogMemSize = 1000
|
|
|
|
|
2019-08-22 12:09:43 +00:00
|
|
|
config.DNS.CacheSize = 4 * 1024 * 1024
|
2019-10-09 16:51:26 +00:00
|
|
|
config.DNS.DnsfilterConf.SafeBrowsingCacheSize = 1 * 1024 * 1024
|
|
|
|
config.DNS.DnsfilterConf.SafeSearchCacheSize = 1 * 1024 * 1024
|
|
|
|
config.DNS.DnsfilterConf.ParentalCacheSize = 1 * 1024 * 1024
|
|
|
|
config.DNS.DnsfilterConf.CacheTime = 30
|
2019-09-04 11:12:00 +00:00
|
|
|
config.Filters = defaultFilters()
|
2020-07-03 15:20:01 +00:00
|
|
|
|
2021-11-24 10:57:50 +00:00
|
|
|
config.DHCP.Conf4.LeaseDuration = dhcpd.DefaultDHCPLeaseTTL
|
|
|
|
config.DHCP.Conf4.ICMPTimeout = dhcpd.DefaultDHCPTimeoutICMP
|
|
|
|
config.DHCP.Conf6.LeaseDuration = dhcpd.DefaultDHCPLeaseTTL
|
2020-12-29 16:53:56 +00:00
|
|
|
|
2021-01-25 11:09:29 +00:00
|
|
|
if ch := version.Channel(); ch == version.ChannelEdge || ch == version.ChannelDevelopment {
|
2020-12-29 16:53:56 +00:00
|
|
|
config.BetaBindPort = 3001
|
|
|
|
}
|
2019-02-27 09:41:37 +00:00
|
|
|
}
|
|
|
|
|
2019-02-05 17:35:48 +00:00
|
|
|
// getConfigFilename returns path to the current config file
|
|
|
|
func (c *configuration) getConfigFilename() string {
|
2020-02-13 15:42:07 +00:00
|
|
|
configFile, err := filepath.EvalSymlinks(Context.configFilename)
|
2019-03-14 15:06:53 +00:00
|
|
|
if err != nil {
|
2021-01-27 15:32:13 +00:00
|
|
|
if !errors.Is(err, os.ErrNotExist) {
|
2019-03-14 15:06:53 +00:00
|
|
|
log.Error("unexpected error while config file path evaluation: %s", err)
|
|
|
|
}
|
2020-02-13 15:42:07 +00:00
|
|
|
configFile = Context.configFilename
|
2019-03-14 15:06:53 +00:00
|
|
|
}
|
2019-02-05 17:35:48 +00:00
|
|
|
if !filepath.IsAbs(configFile) {
|
2020-02-13 15:42:07 +00:00
|
|
|
configFile = filepath.Join(Context.workDir, configFile)
|
2019-02-05 17:35:48 +00:00
|
|
|
}
|
|
|
|
return configFile
|
|
|
|
}
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// getLogSettings reads logging settings from the config file.
|
|
|
|
// we do it in a separate method in order to configure logger before the actual configuration is parsed and applied.
|
|
|
|
func getLogSettings() logSettings {
|
|
|
|
l := logSettings{}
|
|
|
|
yamlFile, err := readConfigFile()
|
2019-04-30 11:38:24 +00:00
|
|
|
if err != nil {
|
2019-02-04 10:54:53 +00:00
|
|
|
return l
|
|
|
|
}
|
|
|
|
err = yaml.Unmarshal(yamlFile, &l)
|
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't get logging settings from the configuration: %s", err)
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
|
|
|
return l
|
|
|
|
}
|
|
|
|
|
|
|
|
// parseConfig loads configuration from the YAML file
|
2018-08-30 14:25:33 +00:00
|
|
|
func parseConfig() error {
|
2019-02-05 17:35:48 +00:00
|
|
|
configFile := config.getConfigFilename()
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Debug("Reading config file: %s", configFile)
|
2019-02-04 10:54:53 +00:00
|
|
|
yamlFile, err := readConfigFile()
|
2018-08-30 14:25:33 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-04-30 11:38:24 +00:00
|
|
|
config.fileData = nil
|
2018-08-30 14:25:33 +00:00
|
|
|
err = yaml.Unmarshal(yamlFile, &config)
|
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't parse config file: %s", err)
|
2018-08-30 14:25:33 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-09-04 11:12:00 +00:00
|
|
|
if !checkFiltersUpdateIntervalHours(config.DNS.FiltersUpdateIntervalHours) {
|
|
|
|
config.DNS.FiltersUpdateIntervalHours = 24
|
|
|
|
}
|
2019-08-08 09:41:00 +00:00
|
|
|
|
2021-06-15 14:36:49 +00:00
|
|
|
if config.DNS.UpstreamTimeout.Duration == 0 {
|
2021-09-30 18:17:54 +00:00
|
|
|
config.DNS.UpstreamTimeout = timeutil.Duration{Duration: dnsforward.DefaultTimeout}
|
2021-06-15 14:36:49 +00:00
|
|
|
}
|
|
|
|
|
2018-08-30 14:25:33 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// readConfigFile reads config file contents if it exists
|
|
|
|
func readConfigFile() ([]byte, error) {
|
2019-04-30 11:38:24 +00:00
|
|
|
if len(config.fileData) != 0 {
|
|
|
|
return config.fileData, nil
|
|
|
|
}
|
|
|
|
|
2019-02-05 17:35:48 +00:00
|
|
|
configFile := config.getConfigFilename()
|
2021-05-21 11:55:42 +00:00
|
|
|
d, err := os.ReadFile(configFile)
|
2019-04-30 11:38:24 +00:00
|
|
|
if err != nil {
|
2021-04-16 07:32:41 +00:00
|
|
|
return nil, fmt.Errorf("couldn't read config file %s: %w", configFile, err)
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
2019-04-30 11:38:24 +00:00
|
|
|
return d, nil
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
|
|
|
|
2018-10-30 09:24:59 +00:00
|
|
|
// Saves configuration to the YAML file and also saves the user filter contents to a file
|
2018-11-29 11:56:56 +00:00
|
|
|
func (c *configuration) write() error {
|
2018-11-29 10:31:50 +00:00
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
2019-04-26 13:04:22 +00:00
|
|
|
|
2019-12-11 09:38:58 +00:00
|
|
|
Context.clients.WriteDiskConfig(&config.Clients)
|
2019-04-26 13:04:22 +00:00
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
if Context.auth != nil {
|
|
|
|
config.Users = Context.auth.GetUsers()
|
2019-08-29 09:34:07 +00:00
|
|
|
}
|
2020-02-19 12:28:06 +00:00
|
|
|
if Context.tls != nil {
|
|
|
|
tlsConf := tlsConfigSettings{}
|
|
|
|
Context.tls.WriteDiskConfig(&tlsConf)
|
|
|
|
config.TLS = tlsConf
|
|
|
|
}
|
2019-08-29 09:34:07 +00:00
|
|
|
|
2019-12-11 09:38:58 +00:00
|
|
|
if Context.stats != nil {
|
2019-09-25 12:36:09 +00:00
|
|
|
sdc := stats.DiskConfig{}
|
2019-12-11 09:38:58 +00:00
|
|
|
Context.stats.WriteDiskConfig(&sdc)
|
2019-09-25 12:36:09 +00:00
|
|
|
config.DNS.StatsInterval = sdc.Interval
|
|
|
|
}
|
|
|
|
|
2019-12-11 09:38:58 +00:00
|
|
|
if Context.queryLog != nil {
|
2020-05-28 12:29:36 +00:00
|
|
|
dc := querylog.Config{}
|
2019-12-11 09:38:58 +00:00
|
|
|
Context.queryLog.WriteDiskConfig(&dc)
|
2019-09-27 15:58:57 +00:00
|
|
|
config.DNS.QueryLogEnabled = dc.Enabled
|
2020-05-28 12:29:36 +00:00
|
|
|
config.DNS.QueryLogFileEnabled = dc.FileEnabled
|
2021-09-30 18:17:54 +00:00
|
|
|
config.DNS.QueryLogInterval = timeutil.Duration{Duration: dc.RotationIvl}
|
2019-11-08 09:31:50 +00:00
|
|
|
config.DNS.QueryLogMemSize = dc.MemSize
|
2020-03-03 17:21:53 +00:00
|
|
|
config.DNS.AnonymizeClientIP = dc.AnonymizeClientIP
|
2019-09-27 15:58:57 +00:00
|
|
|
}
|
|
|
|
|
2019-12-11 09:38:58 +00:00
|
|
|
if Context.dnsFilter != nil {
|
2021-05-21 13:15:47 +00:00
|
|
|
c := filtering.Config{}
|
2019-12-11 09:38:58 +00:00
|
|
|
Context.dnsFilter.WriteDiskConfig(&c)
|
2019-10-09 16:51:26 +00:00
|
|
|
config.DNS.DnsfilterConf = c
|
|
|
|
}
|
|
|
|
|
2021-04-07 17:16:06 +00:00
|
|
|
if s := Context.dnsServer; s != nil {
|
2019-10-30 08:52:58 +00:00
|
|
|
c := dnsforward.FilteringConfig{}
|
2021-04-07 17:16:06 +00:00
|
|
|
s.WriteDiskConfig(&c)
|
2021-05-26 14:55:19 +00:00
|
|
|
dns := &config.DNS
|
|
|
|
dns.FilteringConfig = c
|
|
|
|
dns.LocalPTRResolvers,
|
|
|
|
dns.ResolveClients,
|
|
|
|
dns.UsePrivateRDNS = s.RDNSSettings()
|
2019-10-30 08:52:58 +00:00
|
|
|
}
|
|
|
|
|
2019-12-11 09:38:58 +00:00
|
|
|
if Context.dhcpServer != nil {
|
2019-11-22 11:21:08 +00:00
|
|
|
c := dhcpd.ServerConfig{}
|
2019-12-11 09:38:58 +00:00
|
|
|
Context.dhcpServer.WriteDiskConfig(&c)
|
2019-11-22 11:21:08 +00:00
|
|
|
config.DHCP = c
|
|
|
|
}
|
|
|
|
|
2019-02-05 17:35:48 +00:00
|
|
|
configFile := config.getConfigFilename()
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Debug("Writing YAML file: %s", configFile)
|
2018-08-30 14:25:33 +00:00
|
|
|
yamlText, err := yaml.Marshal(&config)
|
2019-04-26 13:04:22 +00:00
|
|
|
config.Clients = nil
|
2018-08-30 14:25:33 +00:00
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't generate YAML file: %s", err)
|
2021-04-06 17:48:36 +00:00
|
|
|
|
2018-08-30 14:25:33 +00:00
|
|
|
return err
|
|
|
|
}
|
2021-04-06 17:48:36 +00:00
|
|
|
|
|
|
|
err = maybe.WriteFile(configFile, yamlText, 0o644)
|
2018-08-30 14:25:33 +00:00
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't save YAML config: %s", err)
|
2021-04-06 17:48:36 +00:00
|
|
|
|
2018-08-30 14:25:33 +00:00
|
|
|
return err
|
|
|
|
}
|
2018-10-29 23:17:24 +00:00
|
|
|
|
2018-11-28 17:15:32 +00:00
|
|
|
return nil
|
|
|
|
}
|