AdGuardHome/internal/home/controlupdate.go

226 lines
5.8 KiB
Go
Raw Normal View History

package home
2019-04-25 12:57:03 +01:00
import (
"context"
2019-04-25 12:57:03 +01:00
"encoding/json"
"fmt"
2019-04-25 12:57:03 +01:00
"net/http"
"os"
"os/exec"
"runtime"
"syscall"
"time"
2019-04-25 12:57:03 +01:00
"github.com/AdguardTeam/AdGuardHome/internal/aghalg"
"github.com/AdguardTeam/AdGuardHome/internal/aghhttp"
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
"github.com/AdguardTeam/AdGuardHome/internal/updater"
"github.com/AdguardTeam/golibs/errors"
2019-04-25 12:57:03 +01:00
"github.com/AdguardTeam/golibs/log"
)
2020-12-25 09:54:22 +00:00
// temporaryError is the interface for temporary errors from the Go standard
2020-12-24 18:44:36 +00:00
// library.
2020-12-25 09:54:22 +00:00
type temporaryError interface {
2020-12-24 18:44:36 +00:00
error
Temporary() (ok bool)
}
2023-06-07 18:04:01 +01:00
// handleVersionJSON is the handler for the POST /control/version.json HTTP API.
//
// TODO(a.garipov): Find out if this API used with a GET method by anyone.
2023-07-26 11:18:44 +01:00
func (web *webAPI) handleVersionJSON(w http.ResponseWriter, r *http.Request) {
resp := &versionResponse{}
2023-07-26 11:18:44 +01:00
if web.conf.disableUpdate {
resp.Disabled = true
2023-09-07 15:13:48 +01:00
aghhttp.WriteJSONResponseOK(w, r, resp)
return
}
req := &struct {
Recheck bool `json:"recheck_now"`
}{}
var err error
if r.ContentLength != 0 {
err = json.NewDecoder(r.Body).Decode(req)
if err != nil {
aghhttp.Error(r, w, http.StatusBadRequest, "parsing request: %s", err)
return
}
}
2023-07-26 11:18:44 +01:00
err = web.requestVersionInfo(resp, req.Recheck)
if err != nil {
// Don't wrap the error, because it's informative enough as is.
aghhttp.Error(r, w, http.StatusBadGateway, "%s", err)
return
}
2020-12-24 18:44:36 +00:00
err = resp.setAllowedToAutoUpdate()
if err != nil {
// Don't wrap the error, because it's informative enough as is.
aghhttp.Error(r, w, http.StatusInternalServerError, "%s", err)
return
}
2023-09-07 15:13:48 +01:00
aghhttp.WriteJSONResponseOK(w, r, resp)
}
2020-12-24 18:44:36 +00:00
// requestVersionInfo sets the VersionInfo field of resp if it can reach the
// update server.
2023-07-26 11:18:44 +01:00
func (web *webAPI) requestVersionInfo(resp *versionResponse, recheck bool) (err error) {
updater := web.conf.updater
for i := 0; i != 3; i++ {
2023-07-26 11:18:44 +01:00
resp.VersionInfo, err = updater.VersionInfo(recheck)
2020-12-24 18:44:36 +00:00
if err != nil {
2020-12-25 09:54:22 +00:00
var terr temporaryError
2020-12-24 18:44:36 +00:00
if errors.As(err, &terr) && terr.Temporary() {
// Temporary network error. This case may happen while we're
// restarting our DNS server. Log and sleep for some time.
2020-12-24 18:44:36 +00:00
//
// See https://github.com/AdguardTeam/AdGuardHome/issues/934.
d := time.Duration(i) * time.Second
log.Info("update: temp net error: %q; sleeping for %s and retrying", err, d)
2020-12-24 18:44:36 +00:00
time.Sleep(d)
continue
}
}
2020-12-24 18:44:36 +00:00
break
}
2019-04-25 12:57:03 +01:00
if err != nil {
2023-07-26 11:18:44 +01:00
vcu := updater.VersionCheckURL()
2023-03-09 12:39:35 +00:00
return fmt.Errorf("getting version info from %s: %w", vcu, err)
2019-04-25 12:57:03 +01:00
}
return nil
2019-04-25 12:57:03 +01:00
}
// handleUpdate performs an update to the latest available version procedure.
2023-07-26 11:18:44 +01:00
func (web *webAPI) handleUpdate(w http.ResponseWriter, r *http.Request) {
updater := web.conf.updater
if updater.NewVersion() == "" {
aghhttp.Error(r, w, http.StatusBadRequest, "/update request isn't allowed now")
return
}
// Retain the current absolute path of the executable, since the updater is
// likely to change the position current one to the backup directory.
//
// See https://github.com/AdguardTeam/AdGuardHome/issues/4735.
execPath, err := os.Executable()
if err != nil {
aghhttp.Error(r, w, http.StatusInternalServerError, "getting path: %s", err)
return
}
2023-07-26 11:18:44 +01:00
err = updater.Update(false)
if err != nil {
aghhttp.Error(r, w, http.StatusInternalServerError, "%s", err)
return
}
aghhttp.OK(w)
if f, ok := w.(http.Flusher); ok {
f.Flush()
}
// The background context is used because the underlying functions wrap it
// with timeout and shut down the server, which handles current request. It
// also should be done in a separate goroutine for the same reason.
2023-07-26 11:18:44 +01:00
go finishUpdate(context.Background(), execPath, web.conf.runningAsService)
}
// versionResponse is the response for /control/version.json endpoint.
type versionResponse struct {
updater.VersionInfo
Disabled bool `json:"disabled"`
}
// setAllowedToAutoUpdate sets CanAutoUpdate to true if AdGuard Home is actually
// allowed to perform an automatic update by the OS.
func (vr *versionResponse) setAllowedToAutoUpdate() (err error) {
if vr.CanAutoUpdate != aghalg.NBTrue {
return nil
}
tlsConf := &tlsConfigSettings{}
Context.tls.WriteDiskConfig(tlsConf)
canUpdate := true
2023-07-03 12:10:40 +01:00
if tlsConfUsesPrivilegedPorts(tlsConf) ||
config.HTTPConfig.Address.Port() < 1024 ||
config.DNS.Port < 1024 {
canUpdate, err = aghnet.CanBindPrivilegedPorts()
if err != nil {
return fmt.Errorf("checking ability to bind privileged ports: %w", err)
}
}
vr.CanAutoUpdate = aghalg.BoolToNullBool(canUpdate)
return nil
}
// tlsConfUsesPrivilegedPorts returns true if the provided TLS configuration
// indicates that privileged ports are used.
func tlsConfUsesPrivilegedPorts(c *tlsConfigSettings) (ok bool) {
return c.Enabled && (c.PortHTTPS < 1024 || c.PortDNSOverTLS < 1024 || c.PortDNSOverQUIC < 1024)
}
// finishUpdate completes an update procedure.
2023-07-26 11:18:44 +01:00
func finishUpdate(ctx context.Context, execPath string, runningAsService bool) {
var err error
log.Info("stopping all tasks")
cleanup(ctx)
2019-04-25 12:57:03 +01:00
cleanupAlways()
if runtime.GOOS == "windows" {
2023-07-26 11:18:44 +01:00
if runningAsService {
// NOTE: We can't restart the service via "kardianos/service"
// package, because it kills the process first we can't start a new
// instance, because Windows doesn't allow it.
//
// TODO(a.garipov): Recheck the claim above.
2019-04-25 12:57:03 +01:00
cmd := exec.Command("cmd", "/c", "net stop AdGuardHome & net start AdGuardHome")
err = cmd.Start()
2019-04-25 12:57:03 +01:00
if err != nil {
log.Fatalf("restarting: stopping: %s", err)
2019-04-25 12:57:03 +01:00
}
2019-04-25 12:57:03 +01:00
os.Exit(0)
}
cmd := exec.Command(execPath, os.Args[1:]...)
log.Info("restarting: %q %q", execPath, os.Args[1:])
2019-04-25 12:57:03 +01:00
cmd.Stdin = os.Stdin
cmd.Stdout = os.Stdout
cmd.Stderr = os.Stderr
err = cmd.Start()
2019-04-25 12:57:03 +01:00
if err != nil {
log.Fatalf("restarting:: %s", err)
2019-04-25 12:57:03 +01:00
}
2019-04-25 12:57:03 +01:00
os.Exit(0)
}
log.Info("restarting: %q %q", execPath, os.Args[1:])
err = syscall.Exec(execPath, os.Args, os.Environ())
if err != nil {
log.Fatalf("restarting: %s", err)
2019-04-25 12:57:03 +01:00
}
}