2019-06-10 09:33:19 +01:00
|
|
|
package home
|
2018-08-30 15:25:33 +01:00
|
|
|
|
|
|
|
import (
|
2019-04-25 12:57:03 +01:00
|
|
|
"context"
|
2019-02-12 18:14:02 +00:00
|
|
|
"crypto/tls"
|
2020-03-04 12:11:17 +00:00
|
|
|
"crypto/x509"
|
2018-08-30 15:25:33 +01:00
|
|
|
"fmt"
|
2019-04-05 10:19:28 +01:00
|
|
|
"io/ioutil"
|
2018-08-30 15:25:33 +01:00
|
|
|
"net"
|
|
|
|
"net/http"
|
2020-03-12 12:11:08 +00:00
|
|
|
"net/url"
|
2018-08-30 15:25:33 +01:00
|
|
|
"os"
|
2018-12-05 12:36:18 +00:00
|
|
|
"os/signal"
|
2018-08-30 15:25:33 +01:00
|
|
|
"path/filepath"
|
2019-02-05 11:09:05 +00:00
|
|
|
"runtime"
|
2018-08-30 15:25:33 +01:00
|
|
|
"strconv"
|
2019-02-12 18:14:02 +00:00
|
|
|
"sync"
|
2018-12-05 12:36:18 +00:00
|
|
|
"syscall"
|
2019-06-06 01:00:15 +01:00
|
|
|
"time"
|
2018-08-30 15:25:33 +01:00
|
|
|
|
2020-06-02 17:20:31 +01:00
|
|
|
"gopkg.in/natefinch/lumberjack.v2"
|
|
|
|
|
2020-07-22 12:20:14 +01:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/update"
|
2020-02-13 15:42:07 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/util"
|
|
|
|
|
|
|
|
"github.com/joomcode/errorx"
|
|
|
|
|
2019-12-23 11:57:10 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/isdelve"
|
|
|
|
|
2019-11-22 11:21:08 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/dhcpd"
|
2019-12-11 09:38:58 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/dnsfilter"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/dnsforward"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/querylog"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/stats"
|
2019-02-25 13:44:22 +00:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
2018-08-30 15:25:33 +01:00
|
|
|
)
|
|
|
|
|
2019-02-05 11:09:05 +00:00
|
|
|
const (
|
|
|
|
// Used in config to indicate that syslog or eventlog (win) should be used for logger output
|
|
|
|
configSyslog = "syslog"
|
|
|
|
)
|
|
|
|
|
2019-06-20 12:36:26 +01:00
|
|
|
// Update-related variables
|
|
|
|
var (
|
2020-04-15 13:17:57 +01:00
|
|
|
versionString = "dev"
|
|
|
|
updateChannel = "none"
|
|
|
|
versionCheckURL = ""
|
|
|
|
ARMVersion = ""
|
2019-06-20 12:36:26 +01:00
|
|
|
)
|
|
|
|
|
2019-12-11 09:38:58 +00:00
|
|
|
// Global context
|
|
|
|
type homeContext struct {
|
2020-02-13 15:42:07 +00:00
|
|
|
// Modules
|
|
|
|
// --
|
|
|
|
|
2020-02-19 12:24:55 +00:00
|
|
|
clients clientsContainer // per-client-settings module
|
|
|
|
stats stats.Stats // statistics module
|
|
|
|
queryLog querylog.QueryLog // query log module
|
|
|
|
dnsServer *dnsforward.Server // DNS module
|
|
|
|
rdns *RDNS // rDNS module
|
|
|
|
whois *Whois // WHOIS module
|
|
|
|
dnsFilter *dnsfilter.Dnsfilter // DNS filtering module
|
|
|
|
dhcpServer *dhcpd.Server // DHCP module
|
|
|
|
auth *Auth // HTTP authentication module
|
2020-02-19 12:28:06 +00:00
|
|
|
filters Filtering // DNS filtering module
|
|
|
|
web *Web // Web (HTTP, HTTPS) module
|
|
|
|
tls *TLSMod // TLS module
|
2020-03-20 12:05:43 +00:00
|
|
|
autoHosts util.AutoHosts // IP-hostname pairs taken from system configuration (e.g. /etc/hosts) files
|
2020-07-22 12:20:14 +01:00
|
|
|
updater *update.Updater
|
2020-02-13 15:42:07 +00:00
|
|
|
|
|
|
|
// Runtime properties
|
|
|
|
// --
|
|
|
|
|
|
|
|
configFilename string // Config filename (can be overridden via the command line arguments)
|
|
|
|
workDir string // Location of our directory, used to protect against CWD being somewhere else
|
|
|
|
firstRun bool // if set to true, don't run any services except HTTP web inteface, and serve only first-run html
|
|
|
|
pidFileName string // PID file name. Empty if no PID file was created.
|
|
|
|
disableUpdate bool // If set, don't check for updates
|
|
|
|
controlLock sync.Mutex
|
2020-03-04 12:11:17 +00:00
|
|
|
tlsRoots *x509.CertPool // list of root CAs for TLSv1.2
|
2020-03-23 07:23:34 +00:00
|
|
|
tlsCiphers []uint16 // list of TLS ciphers to use
|
2020-02-13 15:42:07 +00:00
|
|
|
transport *http.Transport
|
|
|
|
client *http.Client
|
|
|
|
appSignalChannel chan os.Signal // Channel for receiving OS signals by the console app
|
|
|
|
// runningAsService flag is set to true when options are passed from the service runner
|
|
|
|
runningAsService bool
|
|
|
|
}
|
|
|
|
|
|
|
|
// getDataDir returns path to the directory where we store databases and filters
|
|
|
|
func (c *homeContext) getDataDir() string {
|
|
|
|
return filepath.Join(c.workDir, dataDir)
|
2019-12-11 09:38:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Context - a global context object
|
|
|
|
var Context homeContext
|
|
|
|
|
2019-07-09 16:52:18 +01:00
|
|
|
// Main is the entry point
|
2020-01-15 15:58:12 +00:00
|
|
|
func Main(version string, channel string, armVer string) {
|
2019-06-20 12:36:26 +01:00
|
|
|
// Init update-related global variables
|
|
|
|
versionString = version
|
|
|
|
updateChannel = channel
|
2020-01-15 15:58:12 +00:00
|
|
|
ARMVersion = armVer
|
2019-06-20 12:36:26 +01:00
|
|
|
versionCheckURL = "https://static.adguard.com/adguardhome/" + updateChannel + "/version.json"
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// config can be specified, which reads options from there, but other command line flags have to override config values
|
|
|
|
// therefore, we must do it manually instead of using a lib
|
|
|
|
args := loadOptions()
|
2018-08-30 15:25:33 +01:00
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.appSignalChannel = make(chan os.Signal)
|
|
|
|
signal.Notify(Context.appSignalChannel, syscall.SIGINT, syscall.SIGTERM, syscall.SIGHUP, syscall.SIGQUIT)
|
|
|
|
go func() {
|
2020-02-18 11:49:50 +00:00
|
|
|
for {
|
|
|
|
sig := <-Context.appSignalChannel
|
|
|
|
log.Info("Received signal '%s'", sig)
|
|
|
|
switch sig {
|
|
|
|
case syscall.SIGHUP:
|
|
|
|
Context.clients.Reload()
|
2020-02-19 12:28:06 +00:00
|
|
|
Context.tls.Reload()
|
2020-02-18 11:49:50 +00:00
|
|
|
|
|
|
|
default:
|
|
|
|
cleanup()
|
|
|
|
cleanupAlways()
|
|
|
|
os.Exit(0)
|
|
|
|
}
|
|
|
|
}
|
2020-02-13 15:42:07 +00:00
|
|
|
}()
|
|
|
|
|
2020-06-11 08:24:43 +01:00
|
|
|
if args.serviceControlAction != "" {
|
|
|
|
handleServiceControlAction(args.serviceControlAction)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-02-05 11:09:05 +00:00
|
|
|
// run the protection
|
|
|
|
run(args)
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
|
|
|
|
2020-07-09 17:54:53 +01:00
|
|
|
// version - returns the current version string
|
|
|
|
func version() string {
|
|
|
|
msg := "AdGuard Home, version %s, channel %s, arch %s %s"
|
|
|
|
if ARMVersion != "" {
|
|
|
|
msg = msg + " v" + ARMVersion
|
|
|
|
}
|
|
|
|
return fmt.Sprintf(msg, versionString, updateChannel, runtime.GOOS, runtime.GOARCH)
|
|
|
|
}
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// run initializes configuration and runs the AdGuard Home
|
2020-02-13 15:42:07 +00:00
|
|
|
// run is a blocking method!
|
2019-08-19 22:55:32 +01:00
|
|
|
// nolint
|
2019-02-04 10:54:53 +00:00
|
|
|
func run(args options) {
|
2019-02-05 11:09:05 +00:00
|
|
|
// config file path can be overridden by command-line arguments:
|
2019-02-04 10:54:53 +00:00
|
|
|
if args.configFilename != "" {
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.configFilename = args.configFilename
|
|
|
|
} else {
|
|
|
|
// Default config file name
|
|
|
|
Context.configFilename = "AdGuardHome.yaml"
|
|
|
|
}
|
|
|
|
|
2019-02-05 11:09:05 +00:00
|
|
|
// configure working dir and config path
|
2019-02-05 17:35:48 +00:00
|
|
|
initWorkingDir(args)
|
2019-02-05 11:09:05 +00:00
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// configure log level and output
|
|
|
|
configureLogger(args)
|
|
|
|
|
|
|
|
// print the first message after logger is configured
|
2020-07-09 17:54:53 +01:00
|
|
|
log.Println(version())
|
2020-02-13 15:42:07 +00:00
|
|
|
log.Debug("Current working directory is %s", Context.workDir)
|
2019-02-05 11:09:05 +00:00
|
|
|
if args.runningAsService {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Info("AdGuard Home is running as a service")
|
2019-02-05 11:09:05 +00:00
|
|
|
}
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.runningAsService = args.runningAsService
|
|
|
|
Context.disableUpdate = args.disableUpdate
|
2019-02-04 10:54:53 +00:00
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.firstRun = detectFirstRun()
|
|
|
|
if Context.firstRun {
|
2020-04-15 13:17:57 +01:00
|
|
|
log.Info("This is the first time AdGuard Home is launched")
|
2020-06-23 16:02:28 +01:00
|
|
|
checkPermissions()
|
2019-04-01 10:22:54 +01:00
|
|
|
}
|
|
|
|
|
2019-07-09 16:37:24 +01:00
|
|
|
initConfig()
|
2019-05-31 14:39:18 +01:00
|
|
|
|
2020-03-04 12:11:17 +00:00
|
|
|
Context.tlsRoots = util.LoadSystemRootCAs()
|
2020-03-23 07:23:34 +00:00
|
|
|
Context.tlsCiphers = util.InitTLSCiphers()
|
2020-03-04 12:11:17 +00:00
|
|
|
Context.transport = &http.Transport{
|
|
|
|
DialContext: customDialContext,
|
|
|
|
Proxy: getHTTPProxy,
|
|
|
|
TLSClientConfig: &tls.Config{
|
|
|
|
RootCAs: Context.tlsRoots,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
Context.client = &http.Client{
|
|
|
|
Timeout: time.Minute * 5,
|
|
|
|
Transport: Context.transport,
|
|
|
|
}
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
if !Context.firstRun {
|
2019-04-30 12:38:24 +01:00
|
|
|
// Do the upgrade if necessary
|
|
|
|
err := upgradeConfig()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = parseConfig()
|
|
|
|
if err != nil {
|
2020-04-15 13:17:57 +01:00
|
|
|
log.Error("Failed to parse configuration, exiting")
|
2019-04-30 12:38:24 +01:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
2019-04-30 13:26:57 +01:00
|
|
|
|
|
|
|
if args.checkConfig {
|
|
|
|
log.Info("Configuration file is OK")
|
|
|
|
os.Exit(0)
|
|
|
|
}
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
|
|
|
|
2020-04-27 11:21:16 +01:00
|
|
|
// 'clients' module uses 'dnsfilter' module's static data (dnsfilter.BlockedSvcKnown()),
|
|
|
|
// so we have to initialize dnsfilter's static data first,
|
|
|
|
// but also avoid relying on automatic Go init() function
|
|
|
|
dnsfilter.InitModule()
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
config.DHCP.WorkDir = Context.workDir
|
2019-10-11 17:56:18 +01:00
|
|
|
config.DHCP.HTTPRegister = httpRegister
|
|
|
|
config.DHCP.ConfigModified = onConfigModified
|
2019-12-11 09:38:58 +00:00
|
|
|
Context.dhcpServer = dhcpd.Create(config.DHCP)
|
2020-03-13 14:30:09 +00:00
|
|
|
if Context.dhcpServer == nil {
|
2020-04-15 13:17:57 +01:00
|
|
|
log.Error("Failed to initialize DHCP server, exiting")
|
2020-03-13 14:30:09 +00:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
2020-03-20 12:05:43 +00:00
|
|
|
Context.autoHosts.Init("")
|
2020-07-22 12:20:14 +01:00
|
|
|
|
2020-07-22 18:27:20 +01:00
|
|
|
Context.updater = update.NewUpdater(update.Config{
|
|
|
|
Client: Context.client,
|
|
|
|
WorkDir: Context.workDir,
|
|
|
|
VersionURL: versionCheckURL,
|
|
|
|
VersionString: versionString,
|
|
|
|
OS: runtime.GOOS,
|
|
|
|
Arch: runtime.GOARCH,
|
|
|
|
ARMVersion: ARMVersion,
|
|
|
|
ConfigName: config.getConfigFilename(),
|
|
|
|
})
|
2020-07-22 12:20:14 +01:00
|
|
|
|
2020-03-20 12:05:43 +00:00
|
|
|
Context.clients.Init(config.Clients, Context.dhcpServer, &Context.autoHosts)
|
2019-09-26 14:40:52 +01:00
|
|
|
config.Clients = nil
|
|
|
|
|
2019-03-27 14:09:48 +00:00
|
|
|
if (runtime.GOOS == "linux" || runtime.GOOS == "darwin") &&
|
|
|
|
config.RlimitNoFile != 0 {
|
2020-02-13 15:42:07 +00:00
|
|
|
util.SetRlimit(config.RlimitNoFile)
|
2019-03-27 14:09:48 +00:00
|
|
|
}
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// override bind host/port from the console
|
|
|
|
if args.bindHost != "" {
|
|
|
|
config.BindHost = args.bindHost
|
|
|
|
}
|
|
|
|
if args.bindPort != 0 {
|
|
|
|
config.BindPort = args.bindPort
|
|
|
|
}
|
2020-02-18 16:27:09 +00:00
|
|
|
if len(args.pidFile) != 0 && writePIDFile(args.pidFile) {
|
|
|
|
Context.pidFileName = args.pidFile
|
|
|
|
}
|
2018-08-30 15:25:33 +01:00
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
if !Context.firstRun {
|
2019-04-30 12:38:24 +01:00
|
|
|
// Save the updated config
|
|
|
|
err := config.write()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
2020-04-22 14:00:26 +01:00
|
|
|
|
|
|
|
if config.DebugPProf {
|
|
|
|
mux := http.NewServeMux()
|
|
|
|
util.PProfRegisterWebHandlers(mux)
|
|
|
|
go func() {
|
|
|
|
log.Info("pprof: listening on localhost:6060")
|
|
|
|
err := http.ListenAndServe("localhost:6060", mux)
|
|
|
|
log.Error("Error while running the pprof server: %s", err)
|
|
|
|
}()
|
|
|
|
}
|
2020-02-18 16:27:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
err := os.MkdirAll(Context.getDataDir(), 0755)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Cannot create DNS data dir at %s: %s", Context.getDataDir(), err)
|
|
|
|
}
|
2018-08-30 15:25:33 +01:00
|
|
|
|
2020-02-19 12:24:55 +00:00
|
|
|
sessFilename := filepath.Join(Context.getDataDir(), "sessions.db")
|
2020-07-03 18:34:08 +01:00
|
|
|
GLMode = args.glinetMode
|
2020-02-19 12:24:55 +00:00
|
|
|
Context.auth = InitAuth(sessFilename, config.Users, config.WebSessionTTLHours*60*60)
|
|
|
|
if Context.auth == nil {
|
|
|
|
log.Fatalf("Couldn't initialize Auth module")
|
|
|
|
}
|
|
|
|
config.Users = nil
|
|
|
|
|
2020-02-19 12:28:06 +00:00
|
|
|
Context.tls = tlsCreate(config.TLS)
|
|
|
|
if Context.tls == nil {
|
|
|
|
log.Fatalf("Can't initialize TLS module")
|
|
|
|
}
|
|
|
|
|
2020-02-19 12:24:55 +00:00
|
|
|
webConf := WebConfig{
|
|
|
|
firstRun: Context.firstRun,
|
|
|
|
BindHost: config.BindHost,
|
|
|
|
BindPort: config.BindPort,
|
|
|
|
}
|
|
|
|
Context.web = CreateWeb(&webConf)
|
|
|
|
if Context.web == nil {
|
|
|
|
log.Fatalf("Can't initialize Web module")
|
2020-02-18 16:27:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if !Context.firstRun {
|
|
|
|
err := initDNSServer()
|
2019-12-11 09:38:58 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("%s", err)
|
|
|
|
}
|
2020-02-19 12:28:06 +00:00
|
|
|
Context.tls.Start()
|
2020-03-20 12:05:43 +00:00
|
|
|
Context.autoHosts.Start()
|
2020-02-19 12:28:06 +00:00
|
|
|
|
2019-10-09 17:51:26 +01:00
|
|
|
go func() {
|
2019-12-11 14:54:34 +00:00
|
|
|
err := startDNSServer()
|
2019-10-09 17:51:26 +01:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
}()
|
2018-09-06 00:00:57 +01:00
|
|
|
|
2019-02-01 16:25:04 +00:00
|
|
|
err = startDHCPServer()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
2018-12-28 18:01:16 +00:00
|
|
|
}
|
|
|
|
|
2020-02-19 12:24:55 +00:00
|
|
|
Context.web.Start()
|
2020-02-18 16:27:09 +00:00
|
|
|
|
|
|
|
// wait indefinitely for other go-routines to complete their job
|
|
|
|
select {}
|
|
|
|
}
|
|
|
|
|
2020-02-19 12:28:06 +00:00
|
|
|
// StartMods - initialize and start DNS after installation
|
|
|
|
func StartMods() error {
|
|
|
|
err := initDNSServer()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
Context.tls.Start()
|
|
|
|
|
|
|
|
err = startDNSServer()
|
|
|
|
if err != nil {
|
|
|
|
closeDNSServer()
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-06-23 16:04:26 +01:00
|
|
|
// Check if the current user permissions are enough to run AdGuard Home
|
2020-06-23 16:02:28 +01:00
|
|
|
func checkPermissions() {
|
|
|
|
log.Info("Checking if AdGuard Home has necessary permissions")
|
2019-04-01 10:22:54 +01:00
|
|
|
|
|
|
|
if runtime.GOOS == "windows" {
|
2020-06-23 16:02:28 +01:00
|
|
|
// On Windows we need to have admin rights to run properly
|
|
|
|
|
|
|
|
admin, _ := util.HaveAdminRights()
|
|
|
|
if //noinspection ALL
|
|
|
|
admin || isdelve.Enabled {
|
|
|
|
// Don't forget that for this to work you need to add "delve" tag explicitly
|
|
|
|
// https://stackoverflow.com/questions/47879070/how-can-i-see-if-the-goland-debugger-is-running-in-the-program
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-04-01 10:22:54 +01:00
|
|
|
log.Fatal("This is the first launch of AdGuard Home. You must run it as Administrator.")
|
2020-06-23 16:02:28 +01:00
|
|
|
}
|
2019-04-01 10:22:54 +01:00
|
|
|
|
2020-06-23 16:02:28 +01:00
|
|
|
// We should check if AdGuard Home is able to bind to port 53
|
|
|
|
ok, err := util.CanBindPort(53)
|
2019-04-01 10:22:54 +01:00
|
|
|
|
2020-06-23 16:02:28 +01:00
|
|
|
if ok {
|
|
|
|
log.Info("AdGuard Home can bind to port 53")
|
|
|
|
return
|
|
|
|
}
|
2019-04-01 10:22:54 +01:00
|
|
|
|
2020-06-23 16:02:28 +01:00
|
|
|
if opErr, ok := err.(*net.OpError); ok {
|
|
|
|
if sysErr, ok := opErr.Err.(*os.SyscallError); ok {
|
|
|
|
if errno, ok := sysErr.Err.(syscall.Errno); ok && errno == syscall.EACCES {
|
|
|
|
msg := `Permission check failed.
|
|
|
|
|
|
|
|
AdGuard Home is not allowed to bind to privileged ports (for instance, port 53).
|
|
|
|
Please note, that this is crucial for a server to be able to use privileged ports.
|
|
|
|
|
|
|
|
You have two options:
|
|
|
|
1. Run AdGuard Home with root privileges
|
|
|
|
2. On Linux you can grant the CAP_NET_BIND_SERVICE capability:
|
|
|
|
https://github.com/AdguardTeam/AdGuardHome/wiki/Getting-Started#running-without-superuser`
|
|
|
|
|
|
|
|
log.Fatal(msg)
|
|
|
|
}
|
|
|
|
}
|
2019-04-01 10:22:54 +01:00
|
|
|
}
|
2020-06-23 16:02:28 +01:00
|
|
|
|
|
|
|
msg := fmt.Sprintf(`AdGuard failed to bind to port 53 due to %v
|
|
|
|
|
|
|
|
Please note, that this is crucial for a DNS server to be able to use that port.`, err)
|
|
|
|
|
|
|
|
log.Info(msg)
|
2019-04-01 10:22:54 +01:00
|
|
|
}
|
|
|
|
|
2019-04-05 10:19:28 +01:00
|
|
|
// Write PID to a file
|
|
|
|
func writePIDFile(fn string) bool {
|
|
|
|
data := fmt.Sprintf("%d", os.Getpid())
|
|
|
|
err := ioutil.WriteFile(fn, []byte(data), 0644)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Couldn't write PID to file %s: %v", fn, err)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2020-02-13 15:42:07 +00:00
|
|
|
// initWorkingDir initializes the workDir
|
2019-02-10 17:47:43 +00:00
|
|
|
// if no command-line arguments specified, we use the directory where our binary file is located
|
2019-02-05 17:35:48 +00:00
|
|
|
func initWorkingDir(args options) {
|
2020-02-11 09:59:21 +00:00
|
|
|
execPath, err := os.Executable()
|
2019-02-05 11:09:05 +00:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2019-02-10 17:47:43 +00:00
|
|
|
if args.workDir != "" {
|
2019-02-05 17:35:48 +00:00
|
|
|
// If there is a custom config file, use it's directory as our working dir
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.workDir = args.workDir
|
2019-02-05 11:09:05 +00:00
|
|
|
} else {
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.workDir = filepath.Dir(execPath)
|
2019-02-05 11:09:05 +00:00
|
|
|
}
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// configureLogger configures logger level and output
|
|
|
|
func configureLogger(args options) {
|
|
|
|
ls := getLogSettings()
|
|
|
|
|
|
|
|
// command-line arguments can override config settings
|
2020-06-02 12:20:12 +01:00
|
|
|
if args.verbose || config.Verbose {
|
2019-02-04 10:54:53 +00:00
|
|
|
ls.Verbose = true
|
|
|
|
}
|
|
|
|
if args.logFile != "" {
|
|
|
|
ls.LogFile = args.logFile
|
2020-06-02 12:20:12 +01:00
|
|
|
} else if config.LogFile != "" {
|
|
|
|
ls.LogFile = config.LogFile
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
|
|
|
|
2020-06-02 12:20:12 +01:00
|
|
|
// Handle default log settings overrides
|
|
|
|
ls.LogCompress = config.LogCompress
|
|
|
|
ls.LogLocalTime = config.LogLocalTime
|
|
|
|
ls.LogMaxBackups = config.LogMaxBackups
|
|
|
|
ls.LogMaxSize = config.LogMaxSize
|
|
|
|
ls.LogMaxAge = config.LogMaxAge
|
|
|
|
|
2019-12-11 09:38:58 +00:00
|
|
|
// log.SetLevel(log.INFO) - default
|
2019-02-25 13:44:22 +00:00
|
|
|
if ls.Verbose {
|
2019-12-11 09:38:58 +00:00
|
|
|
log.SetLevel(log.DEBUG)
|
2019-02-25 13:44:22 +00:00
|
|
|
}
|
2019-02-04 10:54:53 +00:00
|
|
|
|
2019-02-05 11:09:05 +00:00
|
|
|
if args.runningAsService && ls.LogFile == "" && runtime.GOOS == "windows" {
|
|
|
|
// When running as a Windows service, use eventlog by default if nothing else is configured
|
|
|
|
// Otherwise, we'll simply loose the log output
|
|
|
|
ls.LogFile = configSyslog
|
|
|
|
}
|
|
|
|
|
2020-06-02 12:20:12 +01:00
|
|
|
// logs are written to stdout (default)
|
2019-02-04 10:54:53 +00:00
|
|
|
if ls.LogFile == "" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-02-05 11:09:05 +00:00
|
|
|
if ls.LogFile == configSyslog {
|
|
|
|
// Use syslog where it is possible and eventlog on Windows
|
2020-02-13 15:42:07 +00:00
|
|
|
err := util.ConfigureSyslog(serviceName)
|
2019-02-04 10:54:53 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("cannot initialize syslog: %s", err)
|
|
|
|
}
|
2019-02-05 11:09:05 +00:00
|
|
|
} else {
|
2020-02-13 15:42:07 +00:00
|
|
|
logFilePath := filepath.Join(Context.workDir, ls.LogFile)
|
2019-03-14 15:06:53 +00:00
|
|
|
if filepath.IsAbs(ls.LogFile) {
|
|
|
|
logFilePath = ls.LogFile
|
|
|
|
}
|
|
|
|
|
2020-06-02 12:20:12 +01:00
|
|
|
_, err := os.OpenFile(logFilePath, os.O_WRONLY|os.O_CREATE|os.O_APPEND, 0644)
|
2019-02-05 11:09:05 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("cannot create a log file: %s", err)
|
|
|
|
}
|
2020-06-02 12:20:12 +01:00
|
|
|
|
|
|
|
log.SetOutput(&lumberjack.Logger{
|
|
|
|
Filename: logFilePath,
|
|
|
|
Compress: ls.LogCompress, // disabled by default
|
|
|
|
LocalTime: ls.LogLocalTime,
|
|
|
|
MaxBackups: ls.LogMaxBackups,
|
|
|
|
MaxSize: ls.LogMaxSize, // megabytes
|
|
|
|
MaxAge: ls.LogMaxAge, //days
|
|
|
|
})
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
2018-08-30 15:25:33 +01:00
|
|
|
}
|
2018-10-12 17:40:43 +01:00
|
|
|
|
2018-12-05 12:36:18 +00:00
|
|
|
func cleanup() {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Info("Stopping AdGuard Home")
|
2019-02-04 10:54:53 +00:00
|
|
|
|
2020-02-19 12:24:55 +00:00
|
|
|
if Context.web != nil {
|
|
|
|
Context.web.Close()
|
|
|
|
Context.web = nil
|
|
|
|
}
|
|
|
|
if Context.auth != nil {
|
|
|
|
Context.auth.Close()
|
|
|
|
Context.auth = nil
|
|
|
|
}
|
2020-02-18 16:27:09 +00:00
|
|
|
|
2018-12-05 12:36:18 +00:00
|
|
|
err := stopDNSServer()
|
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't stop DNS server: %s", err)
|
2018-12-05 12:36:18 +00:00
|
|
|
}
|
2019-02-04 10:54:53 +00:00
|
|
|
err = stopDHCPServer()
|
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't stop DHCP server: %s", err)
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
2020-02-19 12:28:06 +00:00
|
|
|
|
2020-03-20 12:05:43 +00:00
|
|
|
Context.autoHosts.Close()
|
|
|
|
|
2020-02-19 12:28:06 +00:00
|
|
|
if Context.tls != nil {
|
|
|
|
Context.tls.Close()
|
|
|
|
Context.tls = nil
|
|
|
|
}
|
2018-12-05 12:36:18 +00:00
|
|
|
}
|
|
|
|
|
2019-04-05 10:19:28 +01:00
|
|
|
// This function is called before application exits
|
|
|
|
func cleanupAlways() {
|
2020-02-13 15:42:07 +00:00
|
|
|
if len(Context.pidFileName) != 0 {
|
|
|
|
_ = os.Remove(Context.pidFileName)
|
2019-04-05 10:19:28 +01:00
|
|
|
}
|
2019-05-08 08:43:47 +01:00
|
|
|
log.Info("Stopped")
|
2019-04-05 10:19:28 +01:00
|
|
|
}
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// command-line arguments
|
|
|
|
type options struct {
|
|
|
|
verbose bool // is verbose logging enabled
|
|
|
|
configFilename string // path to the config file
|
2019-02-10 17:47:43 +00:00
|
|
|
workDir string // path to the working directory where we will store the filters data and the querylog
|
2019-02-04 10:54:53 +00:00
|
|
|
bindHost string // host address to bind HTTP server on
|
|
|
|
bindPort int // port to serve HTTP pages on
|
|
|
|
logFile string // Path to the log file. If empty, write to stdout. If "syslog", writes to syslog
|
2019-04-05 10:19:28 +01:00
|
|
|
pidFile string // File name to save PID to
|
2019-04-30 13:26:57 +01:00
|
|
|
checkConfig bool // Check configuration and exit
|
2019-05-27 16:48:33 +01:00
|
|
|
disableUpdate bool // If set, don't check for updates
|
2019-02-04 10:54:53 +00:00
|
|
|
|
|
|
|
// service control action (see service.ControlAction array + "status" command)
|
|
|
|
serviceControlAction string
|
2019-02-05 11:09:05 +00:00
|
|
|
|
|
|
|
// runningAsService flag is set to true when options are passed from the service runner
|
|
|
|
runningAsService bool
|
2020-07-03 18:34:08 +01:00
|
|
|
|
|
|
|
glinetMode bool // Activate GL-Inet mode
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
|
|
|
|
2019-01-24 17:11:01 +00:00
|
|
|
// loadOptions reads command line arguments and initializes configuration
|
2019-02-04 10:54:53 +00:00
|
|
|
func loadOptions() options {
|
|
|
|
o := options{}
|
|
|
|
|
2019-01-24 17:11:01 +00:00
|
|
|
var printHelp func()
|
|
|
|
var opts = []struct {
|
|
|
|
longName string
|
|
|
|
shortName string
|
|
|
|
description string
|
|
|
|
callbackWithValue func(value string)
|
|
|
|
callbackNoValue func()
|
|
|
|
}{
|
2019-04-30 13:49:00 +01:00
|
|
|
{"config", "c", "Path to the config file", func(value string) { o.configFilename = value }, nil},
|
|
|
|
{"work-dir", "w", "Path to the working directory", func(value string) { o.workDir = value }, nil},
|
|
|
|
{"host", "h", "Host address to bind HTTP server on", func(value string) { o.bindHost = value }, nil},
|
|
|
|
{"port", "p", "Port to serve HTTP pages on", func(value string) {
|
2019-01-24 17:11:01 +00:00
|
|
|
v, err := strconv.Atoi(value)
|
|
|
|
if err != nil {
|
|
|
|
panic("Got port that is not a number")
|
|
|
|
}
|
2019-02-04 10:54:53 +00:00
|
|
|
o.bindPort = v
|
|
|
|
}, nil},
|
2020-02-18 13:01:32 +00:00
|
|
|
{"service", "s", "Service control action: status, install, uninstall, start, stop, restart, reload (configuration)", func(value string) {
|
2019-02-04 10:54:53 +00:00
|
|
|
o.serviceControlAction = value
|
|
|
|
}, nil},
|
2019-04-30 13:49:00 +01:00
|
|
|
{"logfile", "l", "Path to log file. If empty: write to stdout; if 'syslog': write to system log", func(value string) {
|
2019-02-04 10:54:53 +00:00
|
|
|
o.logFile = value
|
2019-01-24 17:11:01 +00:00
|
|
|
}, nil},
|
2019-04-30 13:49:00 +01:00
|
|
|
{"pidfile", "", "Path to a file where PID is stored", func(value string) { o.pidFile = value }, nil},
|
2019-04-30 13:26:57 +01:00
|
|
|
{"check-config", "", "Check configuration and exit", nil, func() { o.checkConfig = true }},
|
2019-05-27 16:48:33 +01:00
|
|
|
{"no-check-update", "", "Don't check for updates", nil, func() { o.disableUpdate = true }},
|
2019-04-30 13:49:00 +01:00
|
|
|
{"verbose", "v", "Enable verbose output", nil, func() { o.verbose = true }},
|
2020-07-03 18:34:08 +01:00
|
|
|
{"glinet", "", "Run in GL-Inet compatibility mode", nil, func() { o.glinetMode = true }},
|
2020-01-16 07:42:03 +00:00
|
|
|
{"version", "", "Show the version and exit", nil, func() {
|
2020-07-09 17:54:53 +01:00
|
|
|
fmt.Println(version())
|
2020-01-16 07:42:03 +00:00
|
|
|
os.Exit(0)
|
|
|
|
}},
|
2019-04-30 13:49:00 +01:00
|
|
|
{"help", "", "Print this help", nil, func() {
|
2019-02-04 10:54:53 +00:00
|
|
|
printHelp()
|
|
|
|
os.Exit(64)
|
|
|
|
}},
|
2019-01-24 17:11:01 +00:00
|
|
|
}
|
|
|
|
printHelp = func() {
|
|
|
|
fmt.Printf("Usage:\n\n")
|
|
|
|
fmt.Printf("%s [options]\n\n", os.Args[0])
|
|
|
|
fmt.Printf("Options:\n")
|
|
|
|
for _, opt := range opts {
|
2019-04-30 13:49:00 +01:00
|
|
|
val := ""
|
|
|
|
if opt.callbackWithValue != nil {
|
|
|
|
val = " VALUE"
|
|
|
|
}
|
2019-02-05 20:29:11 +00:00
|
|
|
if opt.shortName != "" {
|
2019-04-30 13:49:00 +01:00
|
|
|
fmt.Printf(" -%s, %-30s %s\n", opt.shortName, "--"+opt.longName+val, opt.description)
|
2019-02-05 20:29:11 +00:00
|
|
|
} else {
|
2019-04-30 13:49:00 +01:00
|
|
|
fmt.Printf(" %-34s %s\n", "--"+opt.longName+val, opt.description)
|
2019-02-05 20:29:11 +00:00
|
|
|
}
|
2019-01-24 17:11:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
for i := 1; i < len(os.Args); i++ {
|
|
|
|
v := os.Args[i]
|
|
|
|
knownParam := false
|
|
|
|
for _, opt := range opts {
|
2019-02-05 20:29:11 +00:00
|
|
|
if v == "--"+opt.longName || (opt.shortName != "" && v == "-"+opt.shortName) {
|
2019-01-24 17:11:01 +00:00
|
|
|
if opt.callbackWithValue != nil {
|
2019-02-04 10:54:53 +00:00
|
|
|
if i+1 >= len(os.Args) {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Got %s without argument\n", v)
|
2019-01-24 17:11:01 +00:00
|
|
|
os.Exit(64)
|
|
|
|
}
|
|
|
|
i++
|
|
|
|
opt.callbackWithValue(os.Args[i])
|
|
|
|
} else if opt.callbackNoValue != nil {
|
|
|
|
opt.callbackNoValue()
|
|
|
|
}
|
|
|
|
knownParam = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !knownParam {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("unknown option %v\n", v)
|
2019-01-24 17:11:01 +00:00
|
|
|
printHelp()
|
|
|
|
os.Exit(64)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
return o
|
2019-01-24 17:11:01 +00:00
|
|
|
}
|
2019-02-22 14:59:42 +00:00
|
|
|
|
|
|
|
// prints IP addresses which user can use to open the admin interface
|
|
|
|
// proto is either "http" or "https"
|
|
|
|
func printHTTPAddresses(proto string) {
|
|
|
|
var address string
|
2019-02-22 15:47:54 +00:00
|
|
|
|
2020-02-19 12:28:06 +00:00
|
|
|
tlsConf := tlsConfigSettings{}
|
2020-04-07 17:24:29 +01:00
|
|
|
if Context.tls != nil {
|
|
|
|
Context.tls.WriteDiskConfig(&tlsConf)
|
|
|
|
}
|
2020-05-16 00:02:50 +01:00
|
|
|
|
|
|
|
port := strconv.Itoa(config.BindPort)
|
|
|
|
if proto == "https" {
|
|
|
|
port = strconv.Itoa(tlsConf.PortHTTPS)
|
|
|
|
}
|
|
|
|
|
2020-02-19 12:28:06 +00:00
|
|
|
if proto == "https" && tlsConf.ServerName != "" {
|
|
|
|
if tlsConf.PortHTTPS == 443 {
|
|
|
|
log.Printf("Go to https://%s", tlsConf.ServerName)
|
2019-02-22 15:47:54 +00:00
|
|
|
} else {
|
2020-05-16 00:02:50 +01:00
|
|
|
log.Printf("Go to https://%s:%s", tlsConf.ServerName, port)
|
2019-02-22 15:47:54 +00:00
|
|
|
}
|
|
|
|
} else if config.BindHost == "0.0.0.0" {
|
2019-02-22 14:59:42 +00:00
|
|
|
log.Println("AdGuard Home is available on the following addresses:")
|
2020-02-13 15:42:07 +00:00
|
|
|
ifaces, err := util.GetValidNetInterfacesForWeb()
|
2019-02-22 14:59:42 +00:00
|
|
|
if err != nil {
|
|
|
|
// That's weird, but we'll ignore it
|
2020-05-16 00:02:50 +01:00
|
|
|
address = net.JoinHostPort(config.BindHost, port)
|
2019-02-22 14:59:42 +00:00
|
|
|
log.Printf("Go to %s://%s", proto, address)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, iface := range ifaces {
|
2020-07-02 12:42:39 +01:00
|
|
|
for _, addr := range iface.Addresses {
|
|
|
|
address = net.JoinHostPort(addr, strconv.Itoa(config.BindPort))
|
|
|
|
log.Printf("Go to %s://%s", proto, address)
|
|
|
|
}
|
2019-02-22 14:59:42 +00:00
|
|
|
}
|
|
|
|
} else {
|
2020-05-16 00:02:50 +01:00
|
|
|
address = net.JoinHostPort(config.BindHost, port)
|
2019-02-22 14:59:42 +00:00
|
|
|
log.Printf("Go to %s://%s", proto, address)
|
|
|
|
}
|
|
|
|
}
|
2020-02-13 15:42:07 +00:00
|
|
|
|
|
|
|
// -------------------
|
|
|
|
// first run / install
|
|
|
|
// -------------------
|
|
|
|
func detectFirstRun() bool {
|
|
|
|
configfile := Context.configFilename
|
|
|
|
if !filepath.IsAbs(configfile) {
|
|
|
|
configfile = filepath.Join(Context.workDir, Context.configFilename)
|
|
|
|
}
|
|
|
|
_, err := os.Stat(configfile)
|
|
|
|
if !os.IsNotExist(err) {
|
|
|
|
// do nothing, file exists
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Connect to a remote server resolving hostname using our own DNS server
|
|
|
|
func customDialContext(ctx context.Context, network, addr string) (net.Conn, error) {
|
|
|
|
log.Tracef("network:%v addr:%v", network, addr)
|
|
|
|
|
|
|
|
host, port, err := net.SplitHostPort(addr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
dialer := &net.Dialer{
|
|
|
|
Timeout: time.Minute * 5,
|
|
|
|
}
|
|
|
|
|
|
|
|
if net.ParseIP(host) != nil || config.DNS.Port == 0 {
|
|
|
|
con, err := dialer.DialContext(ctx, network, addr)
|
|
|
|
return con, err
|
|
|
|
}
|
|
|
|
|
|
|
|
addrs, e := Context.dnsServer.Resolve(host)
|
|
|
|
log.Debug("dnsServer.Resolve: %s: %v", host, addrs)
|
|
|
|
if e != nil {
|
|
|
|
return nil, e
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(addrs) == 0 {
|
|
|
|
return nil, fmt.Errorf("couldn't lookup host: %s", host)
|
|
|
|
}
|
|
|
|
|
|
|
|
var dialErrs []error
|
|
|
|
for _, a := range addrs {
|
|
|
|
addr = net.JoinHostPort(a.String(), port)
|
|
|
|
con, err := dialer.DialContext(ctx, network, addr)
|
|
|
|
if err != nil {
|
|
|
|
dialErrs = append(dialErrs, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
return con, err
|
|
|
|
}
|
|
|
|
return nil, errorx.DecorateMany(fmt.Sprintf("couldn't dial to %s", addr), dialErrs...)
|
|
|
|
}
|
2020-03-12 12:11:08 +00:00
|
|
|
|
|
|
|
func getHTTPProxy(req *http.Request) (*url.URL, error) {
|
|
|
|
if len(config.ProxyURL) == 0 {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return url.Parse(config.ProxyURL)
|
|
|
|
}
|