2019-06-10 09:33:19 +01:00
|
|
|
package home
|
2018-08-30 15:25:33 +01:00
|
|
|
|
|
|
|
import (
|
|
|
|
"io/ioutil"
|
2019-07-09 16:37:24 +01:00
|
|
|
"net/http"
|
2018-08-30 15:25:33 +01:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2019-02-27 09:41:37 +00:00
|
|
|
"runtime"
|
2018-08-30 15:25:33 +01:00
|
|
|
"sync"
|
2019-02-15 12:16:25 +00:00
|
|
|
"time"
|
2018-10-30 14:16:20 +00:00
|
|
|
|
2018-12-28 14:17:51 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/dhcpd"
|
2019-10-09 17:51:26 +01:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/dnsfilter"
|
2018-11-28 14:29:48 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/dnsforward"
|
2019-08-26 09:54:38 +01:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/querylog"
|
2019-08-22 14:34:58 +01:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/stats"
|
2019-03-06 09:20:34 +00:00
|
|
|
"github.com/AdguardTeam/golibs/file"
|
2019-02-25 13:44:22 +00:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
2019-01-25 13:01:27 +00:00
|
|
|
yaml "gopkg.in/yaml.v2"
|
2018-08-30 15:25:33 +01:00
|
|
|
)
|
|
|
|
|
2018-11-27 17:51:12 +00:00
|
|
|
const (
|
2018-12-05 17:29:00 +00:00
|
|
|
dataDir = "data" // data storage
|
|
|
|
filterDir = "filters" // cache location for downloaded filters, it's under DataDir
|
2018-11-27 17:51:12 +00:00
|
|
|
)
|
2018-10-30 14:16:20 +00:00
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// logSettings
|
|
|
|
type logSettings struct {
|
|
|
|
LogFile string `yaml:"log_file"` // Path to the log file. If empty, write to stdout. If "syslog", writes to syslog
|
|
|
|
Verbose bool `yaml:"verbose"` // If true, verbose logging is enabled
|
|
|
|
}
|
|
|
|
|
2019-04-26 14:04:22 +01:00
|
|
|
type clientObject struct {
|
|
|
|
Name string `yaml:"name"`
|
|
|
|
IP string `yaml:"ip"`
|
|
|
|
MAC string `yaml:"mac"`
|
|
|
|
UseGlobalSettings bool `yaml:"use_global_settings"`
|
|
|
|
FilteringEnabled bool `yaml:"filtering_enabled"`
|
|
|
|
ParentalEnabled bool `yaml:"parental_enabled"`
|
|
|
|
SafeSearchEnabled bool `yaml:"safebrowsing_enabled"`
|
|
|
|
SafeBrowsingEnabled bool `yaml:"safesearch_enabled"`
|
2019-07-17 17:17:35 +01:00
|
|
|
|
|
|
|
UseGlobalBlockedServices bool `yaml:"use_global_blocked_services"`
|
|
|
|
BlockedServices []string `yaml:"blocked_services"`
|
2019-04-26 14:04:22 +01:00
|
|
|
}
|
|
|
|
|
2019-07-09 16:50:17 +01:00
|
|
|
type HTTPSServer struct {
|
|
|
|
server *http.Server
|
|
|
|
cond *sync.Cond // reacts to config.TLS.Enabled, PortHTTPS, CertificateChain and PrivateKey
|
|
|
|
sync.Mutex // protects config.TLS
|
|
|
|
shutdown bool // if TRUE, don't restart the server
|
|
|
|
}
|
|
|
|
|
2018-08-30 15:25:33 +01:00
|
|
|
// configuration is loaded from YAML
|
2018-11-27 17:51:12 +00:00
|
|
|
// field ordering is important -- yaml fields will mirror ordering from here
|
2018-08-30 15:25:33 +01:00
|
|
|
type configuration struct {
|
2019-04-30 12:38:24 +01:00
|
|
|
// Raw file data to avoid re-reading of configuration file
|
|
|
|
// It's reset after config is parsed
|
|
|
|
fileData []byte
|
|
|
|
|
2019-01-24 17:11:01 +00:00
|
|
|
ourConfigFilename string // Config filename (can be overridden via the command line arguments)
|
2019-02-10 17:47:43 +00:00
|
|
|
ourWorkingDir string // Location of our directory, used to protect against CWD being somewhere else
|
2019-01-29 17:41:57 +00:00
|
|
|
firstRun bool // if set to true, don't run any services except HTTP web inteface, and serve only first-run html
|
2019-07-09 16:49:31 +01:00
|
|
|
pidFileName string // PID file name. Empty if no PID file was created.
|
2019-05-17 12:22:59 +01:00
|
|
|
// runningAsService flag is set to true when options are passed from the service runner
|
|
|
|
runningAsService bool
|
2019-05-27 16:48:33 +01:00
|
|
|
disableUpdate bool // If set, don't check for updates
|
2019-07-02 10:56:23 +01:00
|
|
|
appSignalChannel chan os.Signal
|
2019-08-29 10:34:07 +01:00
|
|
|
clients clientsContainer // per-client-settings module
|
2019-07-09 16:25:26 +01:00
|
|
|
controlLock sync.Mutex
|
2019-07-09 16:37:24 +01:00
|
|
|
transport *http.Transport
|
|
|
|
client *http.Client
|
2019-08-29 10:34:07 +01:00
|
|
|
stats stats.Stats // statistics module
|
|
|
|
queryLog querylog.QueryLog // query log module
|
|
|
|
auth *Auth // HTTP authentication module
|
2018-11-27 17:51:12 +00:00
|
|
|
|
2019-07-09 16:40:56 +01:00
|
|
|
// cached version.json to avoid hammering github.io for each page reload
|
|
|
|
versionCheckJSON []byte
|
|
|
|
versionCheckLastTime time.Time
|
|
|
|
|
2019-07-09 17:02:45 +01:00
|
|
|
dnsctx dnsContext
|
2019-10-09 17:51:26 +01:00
|
|
|
dnsFilter *dnsfilter.Dnsfilter
|
2019-07-09 17:00:11 +01:00
|
|
|
dnsServer *dnsforward.Server
|
2019-07-09 16:57:41 +01:00
|
|
|
dhcpServer dhcpd.Server
|
2019-07-09 16:52:06 +01:00
|
|
|
httpServer *http.Server
|
2019-07-09 16:50:17 +01:00
|
|
|
httpsServer HTTPSServer
|
|
|
|
|
2019-03-27 14:09:48 +00:00
|
|
|
BindHost string `yaml:"bind_host"` // BindHost is the IP address of the HTTP server to bind to
|
|
|
|
BindPort int `yaml:"bind_port"` // BindPort is the port the HTTP server
|
2019-08-29 10:34:07 +01:00
|
|
|
Users []User `yaml:"users"` // Users that can access HTTP server
|
2019-03-27 14:09:48 +00:00
|
|
|
Language string `yaml:"language"` // two-letter ISO 639-1 language code
|
|
|
|
RlimitNoFile uint `yaml:"rlimit_nofile"` // Maximum number of opened fd's per process (0: default)
|
|
|
|
|
2018-12-28 14:17:51 +00:00
|
|
|
DNS dnsConfig `yaml:"dns"`
|
2019-01-30 16:17:30 +00:00
|
|
|
TLS tlsConfig `yaml:"tls"`
|
2018-12-28 14:17:51 +00:00
|
|
|
Filters []filter `yaml:"filters"`
|
|
|
|
UserRules []string `yaml:"user_rules"`
|
|
|
|
DHCP dhcpd.ServerConfig `yaml:"dhcp"`
|
2018-08-30 15:25:33 +01:00
|
|
|
|
2019-04-26 14:04:22 +01:00
|
|
|
// Note: this array is filled only before file read/write and then it's cleared
|
|
|
|
Clients []clientObject `yaml:"clients"`
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
logSettings `yaml:",inline"`
|
|
|
|
|
2018-10-06 22:58:59 +01:00
|
|
|
sync.RWMutex `yaml:"-"`
|
2018-11-27 17:51:12 +00:00
|
|
|
|
|
|
|
SchemaVersion int `yaml:"schema_version"` // keeping last so that users will be less tempted to change it -- used when upgrading between versions
|
2018-08-30 15:25:33 +01:00
|
|
|
}
|
|
|
|
|
2018-11-27 17:51:12 +00:00
|
|
|
// field ordering is important -- yaml fields will mirror ordering from here
|
2018-12-05 17:29:00 +00:00
|
|
|
type dnsConfig struct {
|
2019-01-24 17:11:01 +00:00
|
|
|
BindHost string `yaml:"bind_host"`
|
|
|
|
Port int `yaml:"port"`
|
2018-11-28 15:24:04 +00:00
|
|
|
|
2019-08-08 10:41:00 +01:00
|
|
|
// time interval for statistics (in days)
|
2019-09-10 15:59:10 +01:00
|
|
|
StatsInterval uint32 `yaml:"statistics_interval"`
|
2019-08-08 10:41:00 +01:00
|
|
|
|
2018-11-28 15:24:04 +00:00
|
|
|
dnsforward.FilteringConfig `yaml:",inline"`
|
|
|
|
|
2018-12-05 21:22:20 +00:00
|
|
|
UpstreamDNS []string `yaml:"upstream_dns"`
|
2018-08-30 15:25:33 +01:00
|
|
|
}
|
|
|
|
|
2019-08-13 09:52:06 +01:00
|
|
|
var defaultDNS = []string{
|
|
|
|
"https://1.1.1.1/dns-query",
|
|
|
|
"https://1.0.0.1/dns-query",
|
|
|
|
}
|
|
|
|
var defaultBootstrap = []string{"1.1.1.1", "1.0.0.1"}
|
2018-08-30 15:25:33 +01:00
|
|
|
|
2019-02-13 08:08:07 +00:00
|
|
|
type tlsConfigSettings struct {
|
2019-02-21 14:33:46 +00:00
|
|
|
Enabled bool `yaml:"enabled" json:"enabled"` // Enabled is the encryption (DOT/DOH/HTTPS) status
|
|
|
|
ServerName string `yaml:"server_name" json:"server_name,omitempty"` // ServerName is the hostname of your HTTPS/TLS server
|
|
|
|
ForceHTTPS bool `yaml:"force_https" json:"force_https,omitempty"` // ForceHTTPS: if true, forces HTTP->HTTPS redirect
|
|
|
|
PortHTTPS int `yaml:"port_https" json:"port_https,omitempty"` // HTTPS port. If 0, HTTPS will be disabled
|
|
|
|
PortDNSOverTLS int `yaml:"port_dns_over_tls" json:"port_dns_over_tls,omitempty"` // DNS-over-TLS port. If 0, DOT will be disabled
|
2019-02-12 14:23:38 +00:00
|
|
|
|
|
|
|
dnsforward.TLSConfig `yaml:",inline" json:",inline"`
|
2019-02-13 08:08:07 +00:00
|
|
|
}
|
|
|
|
|
2019-02-13 08:45:23 +00:00
|
|
|
// field ordering is not important -- these are for API and are recalculated on each run
|
|
|
|
type tlsConfigStatus struct {
|
2019-02-21 14:33:46 +00:00
|
|
|
ValidCert bool `yaml:"-" json:"valid_cert"` // ValidCert is true if the specified certificates chain is a valid chain of X509 certificates
|
|
|
|
ValidChain bool `yaml:"-" json:"valid_chain"` // ValidChain is true if the specified certificates chain is verified and issued by a known CA
|
|
|
|
Subject string `yaml:"-" json:"subject,omitempty"` // Subject is the subject of the first certificate in the chain
|
|
|
|
Issuer string `yaml:"-" json:"issuer,omitempty"` // Issuer is the issuer of the first certificate in the chain
|
|
|
|
NotBefore time.Time `yaml:"-" json:"not_before,omitempty"` // NotBefore is the NotBefore field of the first certificate in the chain
|
|
|
|
NotAfter time.Time `yaml:"-" json:"not_after,omitempty"` // NotAfter is the NotAfter field of the first certificate in the chain
|
|
|
|
DNSNames []string `yaml:"-" json:"dns_names"` // DNSNames is the value of SubjectAltNames field of the first certificate in the chain
|
2019-02-15 12:16:25 +00:00
|
|
|
|
|
|
|
// key status
|
2019-02-21 14:33:46 +00:00
|
|
|
ValidKey bool `yaml:"-" json:"valid_key"` // ValidKey is true if the key is a valid private key
|
|
|
|
KeyType string `yaml:"-" json:"key_type,omitempty"` // KeyType is one of RSA or ECDSA
|
2019-02-15 12:16:25 +00:00
|
|
|
|
2019-02-19 12:21:38 +00:00
|
|
|
// is usable? set by validator
|
2019-02-27 14:36:02 +00:00
|
|
|
ValidPair bool `yaml:"-" json:"valid_pair"` // ValidPair is true if both certificate and private key are correct
|
2019-02-19 12:21:38 +00:00
|
|
|
|
2019-02-15 12:16:25 +00:00
|
|
|
// warnings
|
2019-02-21 14:33:46 +00:00
|
|
|
WarningValidation string `yaml:"-" json:"warning_validation,omitempty"` // WarningValidation is a validation warning message with the issue description
|
2019-02-13 08:45:23 +00:00
|
|
|
}
|
|
|
|
|
2019-02-13 08:08:07 +00:00
|
|
|
// field ordering is important -- yaml fields will mirror ordering from here
|
|
|
|
type tlsConfig struct {
|
|
|
|
tlsConfigSettings `yaml:",inline" json:",inline"`
|
2019-02-13 08:45:23 +00:00
|
|
|
tlsConfigStatus `yaml:"-" json:",inline"`
|
2019-01-23 14:26:15 +00:00
|
|
|
}
|
|
|
|
|
2018-08-30 15:25:33 +01:00
|
|
|
// initialize to default values, will be changed later when reading config or parsing command line
|
|
|
|
var config = configuration{
|
2018-10-15 14:02:19 +01:00
|
|
|
ourConfigFilename: "AdGuardHome.yaml",
|
2018-08-30 15:25:33 +01:00
|
|
|
BindPort: 3000,
|
2019-02-06 13:48:22 +00:00
|
|
|
BindHost: "0.0.0.0",
|
2018-12-05 17:29:00 +00:00
|
|
|
DNS: dnsConfig{
|
2019-08-08 10:41:00 +01:00
|
|
|
BindHost: "0.0.0.0",
|
|
|
|
Port: 53,
|
|
|
|
StatsInterval: 1,
|
2018-11-28 15:24:04 +00:00
|
|
|
FilteringConfig: dnsforward.FilteringConfig{
|
2019-09-04 12:12:00 +01:00
|
|
|
ProtectionEnabled: true, // whether or not use any of dnsfilter features
|
|
|
|
FilteringEnabled: true, // whether or not use filter lists
|
|
|
|
FiltersUpdateIntervalHours: 24,
|
|
|
|
BlockingMode: "nxdomain", // mode how to answer filtered requests
|
|
|
|
BlockedResponseTTL: 10, // in seconds
|
|
|
|
QueryLogEnabled: true,
|
|
|
|
QueryLogInterval: 1,
|
|
|
|
Ratelimit: 20,
|
|
|
|
RefuseAny: true,
|
|
|
|
BootstrapDNS: defaultBootstrap,
|
|
|
|
AllServers: false,
|
2018-11-28 15:24:04 +00:00
|
|
|
},
|
2018-12-05 21:22:20 +00:00
|
|
|
UpstreamDNS: defaultDNS,
|
2018-08-30 15:25:33 +01:00
|
|
|
},
|
2019-02-11 18:52:39 +00:00
|
|
|
TLS: tlsConfig{
|
2019-02-13 08:08:07 +00:00
|
|
|
tlsConfigSettings: tlsConfigSettings{
|
|
|
|
PortHTTPS: 443,
|
|
|
|
PortDNSOverTLS: 853, // needs to be passed through to dnsproxy
|
|
|
|
},
|
2019-02-11 18:52:39 +00:00
|
|
|
},
|
2019-03-28 13:27:24 +00:00
|
|
|
DHCP: dhcpd.ServerConfig{
|
|
|
|
LeaseDuration: 86400,
|
|
|
|
ICMPTimeout: 1000,
|
|
|
|
},
|
2018-12-05 21:29:38 +00:00
|
|
|
SchemaVersion: currentSchemaVersion,
|
2018-08-30 15:25:33 +01:00
|
|
|
}
|
|
|
|
|
2019-07-09 16:37:24 +01:00
|
|
|
// initConfig initializes default configuration for the current OS&ARCH
|
|
|
|
func initConfig() {
|
|
|
|
config.transport = &http.Transport{
|
|
|
|
DialContext: customDialContext,
|
|
|
|
}
|
|
|
|
config.client = &http.Client{
|
|
|
|
Timeout: time.Minute * 5,
|
|
|
|
Transport: config.transport,
|
|
|
|
}
|
|
|
|
|
2019-02-27 09:41:37 +00:00
|
|
|
if runtime.GOARCH == "mips" || runtime.GOARCH == "mipsle" {
|
|
|
|
// Use plain DNS on MIPS, encryption is too slow
|
|
|
|
defaultDNS = []string{"1.1.1.1", "1.0.0.1"}
|
|
|
|
// also change the default config
|
|
|
|
config.DNS.UpstreamDNS = defaultDNS
|
|
|
|
}
|
2019-08-22 13:09:43 +01:00
|
|
|
|
|
|
|
config.DNS.CacheSize = 4 * 1024 * 1024
|
2019-10-09 17:51:26 +01:00
|
|
|
config.DNS.DnsfilterConf.SafeBrowsingCacheSize = 1 * 1024 * 1024
|
|
|
|
config.DNS.DnsfilterConf.SafeSearchCacheSize = 1 * 1024 * 1024
|
|
|
|
config.DNS.DnsfilterConf.ParentalCacheSize = 1 * 1024 * 1024
|
|
|
|
config.DNS.DnsfilterConf.CacheTime = 30
|
2019-09-04 12:12:00 +01:00
|
|
|
config.Filters = defaultFilters()
|
2019-02-27 09:41:37 +00:00
|
|
|
}
|
|
|
|
|
2019-02-05 17:35:48 +00:00
|
|
|
// getConfigFilename returns path to the current config file
|
|
|
|
func (c *configuration) getConfigFilename() string {
|
2019-03-14 15:06:53 +00:00
|
|
|
configFile, err := filepath.EvalSymlinks(config.ourConfigFilename)
|
|
|
|
if err != nil {
|
|
|
|
if !os.IsNotExist(err) {
|
|
|
|
log.Error("unexpected error while config file path evaluation: %s", err)
|
|
|
|
}
|
|
|
|
configFile = config.ourConfigFilename
|
|
|
|
}
|
2019-02-05 17:35:48 +00:00
|
|
|
if !filepath.IsAbs(configFile) {
|
2019-03-14 15:06:53 +00:00
|
|
|
configFile = filepath.Join(config.ourWorkingDir, configFile)
|
2019-02-05 17:35:48 +00:00
|
|
|
}
|
|
|
|
return configFile
|
|
|
|
}
|
|
|
|
|
2019-10-02 14:53:23 +01:00
|
|
|
// getDataDir returns path to the directory where we store databases and filters
|
|
|
|
func (c *configuration) getDataDir() string {
|
|
|
|
return filepath.Join(c.ourWorkingDir, dataDir)
|
|
|
|
}
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// getLogSettings reads logging settings from the config file.
|
|
|
|
// we do it in a separate method in order to configure logger before the actual configuration is parsed and applied.
|
|
|
|
func getLogSettings() logSettings {
|
|
|
|
l := logSettings{}
|
|
|
|
yamlFile, err := readConfigFile()
|
2019-04-30 12:38:24 +01:00
|
|
|
if err != nil {
|
2019-02-04 10:54:53 +00:00
|
|
|
return l
|
|
|
|
}
|
|
|
|
err = yaml.Unmarshal(yamlFile, &l)
|
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't get logging settings from the configuration: %s", err)
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
|
|
|
return l
|
|
|
|
}
|
|
|
|
|
|
|
|
// parseConfig loads configuration from the YAML file
|
2018-08-30 15:25:33 +01:00
|
|
|
func parseConfig() error {
|
2019-02-05 17:35:48 +00:00
|
|
|
configFile := config.getConfigFilename()
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Debug("Reading config file: %s", configFile)
|
2019-02-04 10:54:53 +00:00
|
|
|
yamlFile, err := readConfigFile()
|
2018-08-30 15:25:33 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-04-30 12:38:24 +01:00
|
|
|
config.fileData = nil
|
2018-08-30 15:25:33 +01:00
|
|
|
err = yaml.Unmarshal(yamlFile, &config)
|
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't parse config file: %s", err)
|
2018-08-30 15:25:33 +01:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-09-04 12:12:00 +01:00
|
|
|
if !checkFiltersUpdateIntervalHours(config.DNS.FiltersUpdateIntervalHours) {
|
|
|
|
config.DNS.FiltersUpdateIntervalHours = 24
|
|
|
|
}
|
2019-08-08 10:41:00 +01:00
|
|
|
|
2019-04-26 14:04:22 +01:00
|
|
|
for _, cy := range config.Clients {
|
|
|
|
cli := Client{
|
|
|
|
Name: cy.Name,
|
|
|
|
IP: cy.IP,
|
|
|
|
MAC: cy.MAC,
|
|
|
|
UseOwnSettings: !cy.UseGlobalSettings,
|
|
|
|
FilteringEnabled: cy.FilteringEnabled,
|
|
|
|
ParentalEnabled: cy.ParentalEnabled,
|
|
|
|
SafeSearchEnabled: cy.SafeSearchEnabled,
|
|
|
|
SafeBrowsingEnabled: cy.SafeBrowsingEnabled,
|
2019-07-17 17:17:35 +01:00
|
|
|
|
|
|
|
UseOwnBlockedServices: !cy.UseGlobalBlockedServices,
|
|
|
|
BlockedServices: cy.BlockedServices,
|
2019-04-26 14:04:22 +01:00
|
|
|
}
|
2019-07-09 16:19:50 +01:00
|
|
|
_, err = config.clients.Add(cli)
|
2019-04-26 14:04:22 +01:00
|
|
|
if err != nil {
|
|
|
|
log.Tracef("clientAdd: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
config.Clients = nil
|
|
|
|
|
2019-08-13 10:32:52 +01:00
|
|
|
status := tlsConfigStatus{}
|
|
|
|
if !tlsLoadConfig(&config.TLS, &status) {
|
|
|
|
log.Error("%s", status.WarningValidation)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-08-30 15:25:33 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// readConfigFile reads config file contents if it exists
|
|
|
|
func readConfigFile() ([]byte, error) {
|
2019-04-30 12:38:24 +01:00
|
|
|
if len(config.fileData) != 0 {
|
|
|
|
return config.fileData, nil
|
|
|
|
}
|
|
|
|
|
2019-02-05 17:35:48 +00:00
|
|
|
configFile := config.getConfigFilename()
|
2019-04-30 12:38:24 +01:00
|
|
|
d, err := ioutil.ReadFile(configFile)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Couldn't read config file %s: %s", configFile, err)
|
|
|
|
return nil, err
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
2019-04-30 12:38:24 +01:00
|
|
|
return d, nil
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
|
|
|
|
2018-10-30 09:24:59 +00:00
|
|
|
// Saves configuration to the YAML file and also saves the user filter contents to a file
|
2018-11-29 11:56:56 +00:00
|
|
|
func (c *configuration) write() error {
|
2018-11-29 10:31:50 +00:00
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
2019-04-26 14:04:22 +01:00
|
|
|
|
2019-07-09 16:19:50 +01:00
|
|
|
clientsList := config.clients.GetList()
|
2019-04-26 14:04:22 +01:00
|
|
|
for _, cli := range clientsList {
|
|
|
|
ip := cli.IP
|
|
|
|
if len(cli.MAC) != 0 {
|
|
|
|
ip = ""
|
|
|
|
}
|
|
|
|
cy := clientObject{
|
|
|
|
Name: cli.Name,
|
|
|
|
IP: ip,
|
|
|
|
MAC: cli.MAC,
|
|
|
|
UseGlobalSettings: !cli.UseOwnSettings,
|
|
|
|
FilteringEnabled: cli.FilteringEnabled,
|
|
|
|
ParentalEnabled: cli.ParentalEnabled,
|
|
|
|
SafeSearchEnabled: cli.SafeSearchEnabled,
|
|
|
|
SafeBrowsingEnabled: cli.SafeBrowsingEnabled,
|
2019-07-17 17:17:35 +01:00
|
|
|
|
|
|
|
UseGlobalBlockedServices: !cli.UseOwnBlockedServices,
|
|
|
|
BlockedServices: cli.BlockedServices,
|
2019-04-26 14:04:22 +01:00
|
|
|
}
|
|
|
|
config.Clients = append(config.Clients, cy)
|
|
|
|
}
|
|
|
|
|
2019-08-29 10:34:07 +01:00
|
|
|
if config.auth != nil {
|
|
|
|
config.Users = config.auth.GetUsers()
|
|
|
|
}
|
|
|
|
|
2019-09-25 13:36:09 +01:00
|
|
|
if config.stats != nil {
|
|
|
|
sdc := stats.DiskConfig{}
|
|
|
|
config.stats.WriteDiskConfig(&sdc)
|
|
|
|
config.DNS.StatsInterval = sdc.Interval
|
|
|
|
}
|
|
|
|
|
2019-09-27 16:58:57 +01:00
|
|
|
if config.queryLog != nil {
|
|
|
|
dc := querylog.DiskConfig{}
|
|
|
|
config.queryLog.WriteDiskConfig(&dc)
|
|
|
|
config.DNS.QueryLogEnabled = dc.Enabled
|
|
|
|
config.DNS.QueryLogInterval = dc.Interval
|
|
|
|
}
|
|
|
|
|
2019-10-09 17:51:26 +01:00
|
|
|
if config.dnsFilter != nil {
|
|
|
|
c := dnsfilter.Config{}
|
|
|
|
config.dnsFilter.WriteDiskConfig(&c)
|
|
|
|
config.DNS.DnsfilterConf = c
|
|
|
|
}
|
|
|
|
|
2019-02-05 17:35:48 +00:00
|
|
|
configFile := config.getConfigFilename()
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Debug("Writing YAML file: %s", configFile)
|
2018-08-30 15:25:33 +01:00
|
|
|
yamlText, err := yaml.Marshal(&config)
|
2019-04-26 14:04:22 +01:00
|
|
|
config.Clients = nil
|
2018-08-30 15:25:33 +01:00
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't generate YAML file: %s", err)
|
2018-08-30 15:25:33 +01:00
|
|
|
return err
|
|
|
|
}
|
2019-03-06 09:20:34 +00:00
|
|
|
err = file.SafeWrite(configFile, yamlText)
|
2018-08-30 15:25:33 +01:00
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't save YAML config: %s", err)
|
2018-08-30 15:25:33 +01:00
|
|
|
return err
|
|
|
|
}
|
2018-10-29 23:17:24 +00:00
|
|
|
|
2018-11-28 17:15:32 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func writeAllConfigs() error {
|
|
|
|
err := config.write()
|
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't write config: %s", err)
|
2018-11-28 17:15:32 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-11-27 13:48:57 +00:00
|
|
|
userFilter := userFilter()
|
2018-10-29 23:17:24 +00:00
|
|
|
err = userFilter.save()
|
2018-09-06 00:03:03 +01:00
|
|
|
if err != nil {
|
2019-02-25 13:44:22 +00:00
|
|
|
log.Error("Couldn't save the user filter: %s", err)
|
2018-09-06 00:03:03 +01:00
|
|
|
return err
|
|
|
|
}
|
2018-10-29 23:17:24 +00:00
|
|
|
|
2018-08-30 15:25:33 +01:00
|
|
|
return nil
|
|
|
|
}
|