AdGuardHome/internal/client/persistent.go

342 lines
8.9 KiB
Go
Raw Normal View History

2024-03-12 14:45:11 +00:00
package client
2023-03-09 12:39:35 +00:00
import (
2024-01-30 15:43:51 +00:00
"encoding"
2023-03-09 12:39:35 +00:00
"fmt"
2024-01-30 15:43:51 +00:00
"net"
"net/netip"
2024-03-12 14:45:11 +00:00
"slices"
2024-01-30 15:43:51 +00:00
"strings"
2023-04-12 12:48:42 +01:00
"time"
2023-03-09 12:39:35 +00:00
2023-04-12 12:48:42 +01:00
"github.com/AdguardTeam/AdGuardHome/internal/filtering"
"github.com/AdguardTeam/AdGuardHome/internal/filtering/safesearch"
2023-03-09 12:39:35 +00:00
"github.com/AdguardTeam/dnsproxy/proxy"
2024-07-03 13:38:37 +01:00
"github.com/AdguardTeam/dnsproxy/upstream"
2024-04-02 18:22:19 +01:00
"github.com/AdguardTeam/golibs/container"
2024-01-30 15:43:51 +00:00
"github.com/AdguardTeam/golibs/errors"
"github.com/AdguardTeam/golibs/log"
2024-03-12 14:45:11 +00:00
"github.com/AdguardTeam/golibs/netutil"
2024-01-30 15:43:51 +00:00
"github.com/google/uuid"
2023-03-09 12:39:35 +00:00
)
2024-01-30 15:43:51 +00:00
// UID is the type for the unique IDs of persistent clients.
type UID uuid.UUID
// NewUID returns a new persistent client UID. Any error returned is an error
// from the cryptographic randomness reader.
func NewUID() (uid UID, err error) {
uuidv7, err := uuid.NewV7()
return UID(uuidv7), err
}
2024-03-12 14:45:11 +00:00
// MustNewUID is a wrapper around [NewUID] that panics if there is an error.
func MustNewUID() (uid UID) {
uid, err := NewUID()
if err != nil {
panic(fmt.Errorf("unexpected uuidv7 error: %w", err))
}
return uid
}
2024-01-30 15:43:51 +00:00
// type check
var _ encoding.TextMarshaler = UID{}
// MarshalText implements the [encoding.TextMarshaler] for UID.
func (uid UID) MarshalText() ([]byte, error) {
return uuid.UUID(uid).MarshalText()
}
// type check
var _ encoding.TextUnmarshaler = (*UID)(nil)
// UnmarshalText implements the [encoding.TextUnmarshaler] interface for UID.
func (uid *UID) UnmarshalText(data []byte) error {
return (*uuid.UUID)(uid).UnmarshalText(data)
}
2024-03-12 14:45:11 +00:00
// Persistent contains information about persistent clients.
type Persistent struct {
// UpstreamConfig is the custom upstream configuration for this client. If
// it's nil, it has not been initialized yet. If it's non-nil and empty,
// there are no valid upstreams. If it's non-nil and non-empty, these
// upstream must be used.
2024-03-12 14:45:11 +00:00
UpstreamConfig *proxy.CustomUpstreamConfig
2023-03-09 12:39:35 +00:00
2024-07-03 13:38:37 +01:00
// SafeSearch handles search engine hosts rewrites.
2024-05-15 11:34:12 +01:00
SafeSearch filtering.SafeSearch
2023-04-12 12:48:42 +01:00
2024-07-03 13:38:37 +01:00
// BlockedServices is the configuration of blocked services of a client. It
// must not be nil after initialization.
2023-07-03 12:10:40 +01:00
BlockedServices *filtering.BlockedServices
2024-07-03 13:38:37 +01:00
// Name of the persistent client. Must not be empty.
2023-03-09 12:39:35 +00:00
Name string
2024-07-03 13:38:37 +01:00
// Tags is a list of client tags that categorize the client.
Tags []string
// Upstreams is a list of custom upstream DNS servers for the client.
2023-07-03 12:10:40 +01:00
Upstreams []string
2023-03-09 12:39:35 +00:00
2024-07-03 13:38:37 +01:00
// IPs is a list of IP addresses that identify the client. The client must
// have at least one ID (IP, subnet, MAC, or ClientID).
2024-01-30 15:43:51 +00:00
IPs []netip.Addr
2024-07-03 13:38:37 +01:00
// Subnets identifying the client. The client must have at least one ID
// (IP, subnet, MAC, or ClientID).
//
2024-01-30 15:43:51 +00:00
// TODO(s.chzhen): Use netutil.Prefix.
2024-07-03 13:38:37 +01:00
Subnets []netip.Prefix
// MACs identifying the client. The client must have at least one ID (IP,
// subnet, MAC, or ClientID).
MACs []net.HardwareAddr
// ClientIDs identifying the client. The client must have at least one ID
// (IP, subnet, MAC, or ClientID).
2024-01-30 15:43:51 +00:00
ClientIDs []string
// UID is the unique identifier of the persistent client.
UID UID
2024-07-03 13:38:37 +01:00
// UpstreamsCacheSize is the cache size for custom upstreams.
UpstreamsCacheSize uint32
// UpstreamsCacheEnabled specifies whether custom upstreams are used.
UpstreamsCacheEnabled bool
2024-07-03 13:38:37 +01:00
// UseOwnSettings specifies whether custom filtering settings are used.
UseOwnSettings bool
// FilteringEnabled specifies whether filtering is enabled.
FilteringEnabled bool
// SafeBrowsingEnabled specifies whether safe browsing is enabled.
SafeBrowsingEnabled bool
// ParentalEnabled specifies whether parental control is enabled.
ParentalEnabled bool
// UseOwnBlockedServices specifies whether custom services are blocked.
2023-03-09 12:39:35 +00:00
UseOwnBlockedServices bool
2024-05-15 11:34:12 +01:00
2024-07-03 13:38:37 +01:00
// IgnoreQueryLog specifies whether the client requests are logged.
IgnoreQueryLog bool
// IgnoreStatistics specifies whether the client requests are counted.
IgnoreStatistics bool
// SafeSearchConf is the safe search filtering configuration.
//
2024-05-15 11:34:12 +01:00
// TODO(d.kolyshev): Make SafeSearchConf a pointer.
SafeSearchConf filtering.SafeSearchConfig
2023-03-09 12:39:35 +00:00
}
2024-07-03 13:38:37 +01:00
// validate returns an error if persistent client information contains errors.
func (c *Persistent) validate(allTags *container.MapSet[string]) (err error) {
switch {
case c.Name == "":
return errors.Error("empty name")
case c.IDsLen() == 0:
return errors.Error("id required")
case c.UID == UID{}:
return errors.Error("uid required")
}
2024-01-30 15:43:51 +00:00
2024-07-03 13:38:37 +01:00
conf, err := proxy.ParseUpstreamsConfig(c.Upstreams, &upstream.Options{})
if err != nil {
return fmt.Errorf("invalid upstream servers: %w", err)
}
2024-01-30 15:43:51 +00:00
2024-07-03 13:38:37 +01:00
err = conf.Close()
if err != nil {
log.Error("client: closing upstream config: %s", err)
2024-01-30 15:43:51 +00:00
}
2024-07-03 13:38:37 +01:00
for _, t := range c.Tags {
if !allTags.Has(t) {
return fmt.Errorf("invalid tag: %q", t)
}
}
// TODO(s.chzhen): Move to the constructor.
2024-01-30 15:43:51 +00:00
slices.Sort(c.Tags)
2024-07-03 13:38:37 +01:00
return nil
2024-01-30 15:43:51 +00:00
}
2024-03-12 14:45:11 +00:00
// SetIDs parses a list of strings into typed fields and returns an error if
2024-01-30 15:43:51 +00:00
// there is one.
2024-03-12 14:45:11 +00:00
func (c *Persistent) SetIDs(ids []string) (err error) {
2024-01-30 15:43:51 +00:00
for _, id := range ids {
err = c.setID(id)
if err != nil {
return err
}
}
slices.SortFunc(c.IPs, netip.Addr.Compare)
// TODO(s.chzhen): Use netip.PrefixCompare in Go 1.23.
slices.SortFunc(c.Subnets, subnetCompare)
slices.SortFunc(c.MACs, slices.Compare[net.HardwareAddr])
slices.Sort(c.ClientIDs)
return nil
}
// subnetCompare is a comparison function for the two subnets. It returns -1 if
// x sorts before y, 1 if x sorts after y, and 0 if their relative sorting
// position is the same.
func subnetCompare(x, y netip.Prefix) (cmp int) {
if x == y {
return 0
}
xAddr, xBits := x.Addr(), x.Bits()
yAddr, yBits := y.Addr(), y.Bits()
if xBits == yBits {
return xAddr.Compare(yAddr)
}
if xBits > yBits {
return -1
} else {
return 1
}
}
// setID parses id into typed field if there is no error.
2024-03-12 14:45:11 +00:00
func (c *Persistent) setID(id string) (err error) {
2024-01-30 15:43:51 +00:00
if id == "" {
return errors.Error("clientid is empty")
}
var ip netip.Addr
if ip, err = netip.ParseAddr(id); err == nil {
c.IPs = append(c.IPs, ip)
return nil
}
var subnet netip.Prefix
if subnet, err = netip.ParsePrefix(id); err == nil {
c.Subnets = append(c.Subnets, subnet)
return nil
}
var mac net.HardwareAddr
if mac, err = net.ParseMAC(id); err == nil {
c.MACs = append(c.MACs, mac)
return nil
}
2024-03-12 14:45:11 +00:00
err = ValidateClientID(id)
2024-01-30 15:43:51 +00:00
if err != nil {
// Don't wrap the error, because it's informative enough as is.
return err
}
c.ClientIDs = append(c.ClientIDs, strings.ToLower(id))
return nil
}
2024-03-12 14:45:11 +00:00
// ValidateClientID returns an error if id is not a valid ClientID.
//
// TODO(s.chzhen): It's an exact copy of the [dnsforward.ValidateClientID] to
// avoid the import cycle. Remove it.
func ValidateClientID(id string) (err error) {
err = netutil.ValidateHostnameLabel(id)
if err != nil {
// Replace the domain name label wrapper with our own.
return fmt.Errorf("invalid clientid %q: %w", id, errors.Unwrap(err))
}
return nil
}
// IDs returns a list of client IDs containing at least one element.
func (c *Persistent) IDs() (ids []string) {
ids = make([]string, 0, c.IDsLen())
2024-01-30 15:43:51 +00:00
for _, ip := range c.IPs {
ids = append(ids, ip.String())
}
for _, subnet := range c.Subnets {
ids = append(ids, subnet.String())
}
for _, mac := range c.MACs {
ids = append(ids, mac.String())
}
return append(ids, c.ClientIDs...)
}
2024-03-12 14:45:11 +00:00
// IDsLen returns a length of client ids.
func (c *Persistent) IDsLen() (n int) {
2024-01-30 15:43:51 +00:00
return len(c.IPs) + len(c.Subnets) + len(c.MACs) + len(c.ClientIDs)
}
2024-03-12 14:45:11 +00:00
// EqualIDs returns true if the ids of the current and previous clients are the
2024-01-30 15:43:51 +00:00
// same.
2024-03-12 14:45:11 +00:00
func (c *Persistent) EqualIDs(prev *Persistent) (equal bool) {
2024-01-30 15:43:51 +00:00
return slices.Equal(c.IPs, prev.IPs) &&
slices.Equal(c.Subnets, prev.Subnets) &&
slices.EqualFunc(c.MACs, prev.MACs, slices.Equal[net.HardwareAddr]) &&
slices.Equal(c.ClientIDs, prev.ClientIDs)
}
2024-03-12 14:45:11 +00:00
// ShallowClone returns a deep copy of the client, except upstreamConfig,
2023-06-07 18:04:01 +01:00
// safeSearchConf, SafeSearch fields, because it's difficult to copy them.
2024-03-12 14:45:11 +00:00
func (c *Persistent) ShallowClone() (clone *Persistent) {
clone = &Persistent{}
2024-01-30 15:43:51 +00:00
*clone = *c
2023-06-07 18:04:01 +01:00
2023-07-03 12:10:40 +01:00
clone.BlockedServices = c.BlockedServices.Clone()
2024-01-30 15:43:51 +00:00
clone.Tags = slices.Clone(c.Tags)
clone.Upstreams = slices.Clone(c.Upstreams)
clone.IPs = slices.Clone(c.IPs)
clone.Subnets = slices.Clone(c.Subnets)
clone.MACs = slices.Clone(c.MACs)
clone.ClientIDs = slices.Clone(c.ClientIDs)
2023-06-07 18:04:01 +01:00
2024-01-30 15:43:51 +00:00
return clone
2023-06-07 18:04:01 +01:00
}
2024-03-12 14:45:11 +00:00
// CloseUpstreams closes the client-specific upstream config of c if any.
func (c *Persistent) CloseUpstreams() (err error) {
if c.UpstreamConfig != nil {
if err = c.UpstreamConfig.Close(); err != nil {
2023-03-09 12:39:35 +00:00
return fmt.Errorf("closing upstreams of client %q: %w", c.Name, err)
}
}
return nil
}
2024-03-12 14:45:11 +00:00
// SetSafeSearch initializes and sets the safe search filter for this client.
func (c *Persistent) SetSafeSearch(
2023-04-12 12:48:42 +01:00
conf filtering.SafeSearchConfig,
cacheSize uint,
cacheTTL time.Duration,
) (err error) {
ss, err := safesearch.NewDefault(conf, fmt.Sprintf("client %q", c.Name), cacheSize, cacheTTL)
if err != nil {
// Don't wrap the error, because it's informative enough as is.
return err
}
c.SafeSearch = ss
return nil
}