2019-09-26 16:40:52 +03:00
|
|
|
package home
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
2022-11-23 16:52:05 +03:00
|
|
|
"net/netip"
|
2021-06-29 15:53:28 +03:00
|
|
|
|
2023-04-18 16:07:11 +03:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghalg"
|
2021-12-16 20:54:59 +03:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghhttp"
|
2023-09-07 17:13:48 +03:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/client"
|
2023-04-12 14:48:42 +03:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/filtering"
|
2023-07-03 14:10:40 +03:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/schedule"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/whois"
|
2019-09-26 16:40:52 +03:00
|
|
|
)
|
|
|
|
|
2021-05-06 16:41:33 +03:00
|
|
|
// clientJSON is a common structure used by several handlers to deal with
|
|
|
|
// clients. Some of the fields are only necessary in one or two handlers and
|
|
|
|
// are thus made pointers with an omitempty tag.
|
|
|
|
//
|
|
|
|
// TODO(a.garipov): Consider using nullbool and an optional string here? Or
|
|
|
|
// split into several structs?
|
2019-09-26 16:40:52 +03:00
|
|
|
type clientJSON struct {
|
2021-05-06 16:41:33 +03:00
|
|
|
// Disallowed, if non-nil and false, means that the client's IP is
|
|
|
|
// allowed. Otherwise, the IP is blocked.
|
|
|
|
Disallowed *bool `json:"disallowed,omitempty"`
|
|
|
|
|
|
|
|
// DisallowedRule is the rule due to which the client is disallowed.
|
|
|
|
// If Disallowed is true and this string is empty, the client IP is
|
|
|
|
// disallowed by the "allowed IP list", that is it is not included in
|
|
|
|
// the allowlist.
|
|
|
|
DisallowedRule *string `json:"disallowed_rule,omitempty"`
|
|
|
|
|
2023-07-03 14:10:40 +03:00
|
|
|
// WHOIS is the filtered WHOIS data of a client.
|
|
|
|
WHOIS *whois.Info `json:"whois_info,omitempty"`
|
2023-04-12 14:48:42 +03:00
|
|
|
SafeSearchConf *filtering.SafeSearchConfig `json:"safe_search"`
|
2021-05-06 16:41:33 +03:00
|
|
|
|
2023-09-07 17:13:48 +03:00
|
|
|
// Schedule is blocked services schedule for every day of the week.
|
|
|
|
Schedule *schedule.Weekly `json:"blocked_services_schedule"`
|
|
|
|
|
2021-05-06 16:41:33 +03:00
|
|
|
Name string `json:"name"`
|
|
|
|
|
2023-09-07 17:13:48 +03:00
|
|
|
// BlockedServices is the names of blocked services.
|
2021-05-06 16:41:33 +03:00
|
|
|
BlockedServices []string `json:"blocked_services"`
|
|
|
|
IDs []string `json:"ids"`
|
|
|
|
Tags []string `json:"tags"`
|
|
|
|
Upstreams []string `json:"upstreams"`
|
|
|
|
|
2023-04-12 14:48:42 +03:00
|
|
|
FilteringEnabled bool `json:"filtering_enabled"`
|
|
|
|
ParentalEnabled bool `json:"parental_enabled"`
|
|
|
|
SafeBrowsingEnabled bool `json:"safebrowsing_enabled"`
|
|
|
|
// Deprecated: use safeSearchConf.
|
2021-05-06 16:41:33 +03:00
|
|
|
SafeSearchEnabled bool `json:"safesearch_enabled"`
|
|
|
|
UseGlobalBlockedServices bool `json:"use_global_blocked_services"`
|
|
|
|
UseGlobalSettings bool `json:"use_global_settings"`
|
2023-04-18 16:07:11 +03:00
|
|
|
|
|
|
|
IgnoreQueryLog aghalg.NullBool `json:"ignore_querylog"`
|
|
|
|
IgnoreStatistics aghalg.NullBool `json:"ignore_statistics"`
|
2023-09-07 17:13:48 +03:00
|
|
|
|
2023-12-07 17:23:00 +03:00
|
|
|
UpstreamsCacheSize uint32 `json:"upstreams_cache_size"`
|
|
|
|
UpstreamsCacheEnabled aghalg.NullBool `json:"upstreams_cache_enabled"`
|
2023-09-07 17:13:48 +03:00
|
|
|
}
|
|
|
|
|
2024-01-30 18:43:51 +03:00
|
|
|
// runtimeClientJSON is a JSON representation of the [client.Runtime].
|
2021-04-02 17:30:39 +03:00
|
|
|
type runtimeClientJSON struct {
|
2023-07-03 14:10:40 +03:00
|
|
|
WHOIS *whois.Info `json:"whois_info"`
|
2021-04-02 17:30:39 +03:00
|
|
|
|
2023-09-07 17:13:48 +03:00
|
|
|
IP netip.Addr `json:"ip"`
|
|
|
|
Name string `json:"name"`
|
|
|
|
Source client.Source `json:"source"`
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2024-01-30 18:43:51 +03:00
|
|
|
// clientListJSON contains lists of persistent clients, runtime clients and also
|
|
|
|
// supported tags.
|
2019-09-26 16:40:52 +03:00
|
|
|
type clientListJSON struct {
|
2021-06-29 15:53:28 +03:00
|
|
|
Clients []*clientJSON `json:"clients"`
|
2021-04-02 17:30:39 +03:00
|
|
|
RuntimeClients []runtimeClientJSON `json:"auto_clients"`
|
|
|
|
Tags []string `json:"supported_tags"`
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2024-01-30 18:43:51 +03:00
|
|
|
// whoisOrEmpty returns a WHOIS client information or a pointer to an empty
|
|
|
|
// struct. Frontend expects a non-nil value.
|
|
|
|
func whoisOrEmpty(r *client.Runtime) (info *whois.Info) {
|
|
|
|
info = r.WHOIS()
|
|
|
|
if info != nil {
|
|
|
|
return info
|
|
|
|
}
|
|
|
|
|
|
|
|
return &whois.Info{}
|
|
|
|
}
|
|
|
|
|
2023-04-12 14:48:42 +03:00
|
|
|
// handleGetClients is the handler for GET /control/clients HTTP API.
|
2021-12-16 20:54:59 +03:00
|
|
|
func (clients *clientsContainer) handleGetClients(w http.ResponseWriter, r *http.Request) {
|
2019-09-26 16:40:52 +03:00
|
|
|
data := clientListJSON{}
|
|
|
|
|
2019-11-22 14:37:25 +03:00
|
|
|
clients.lock.Lock()
|
2021-04-02 17:30:39 +03:00
|
|
|
defer clients.lock.Unlock()
|
|
|
|
|
2024-07-03 15:38:37 +03:00
|
|
|
clients.storage.RangeByName(func(c *client.Persistent) (cont bool) {
|
2019-09-26 16:40:52 +03:00
|
|
|
cj := clientToJSON(c)
|
|
|
|
data.Clients = append(data.Clients, cj)
|
2021-06-29 15:53:28 +03:00
|
|
|
|
2024-05-15 13:34:12 +03:00
|
|
|
return true
|
|
|
|
})
|
|
|
|
|
2024-09-30 20:17:20 +03:00
|
|
|
clients.storage.UpdateDHCP()
|
|
|
|
|
|
|
|
clients.storage.RangeRuntime(func(rc *client.Runtime) (cont bool) {
|
2024-01-30 18:43:51 +03:00
|
|
|
src, host := rc.Info()
|
2021-04-02 17:30:39 +03:00
|
|
|
cj := runtimeClientJSON{
|
2024-01-30 18:43:51 +03:00
|
|
|
WHOIS: whoisOrEmpty(rc),
|
|
|
|
Name: host,
|
|
|
|
Source: src,
|
2024-05-15 13:34:12 +03:00
|
|
|
IP: rc.Addr(),
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2021-04-02 17:30:39 +03:00
|
|
|
data.RuntimeClients = append(data.RuntimeClients, cj)
|
2024-05-15 13:34:12 +03:00
|
|
|
|
|
|
|
return true
|
|
|
|
})
|
2019-09-26 16:40:52 +03:00
|
|
|
|
2024-09-30 20:17:20 +03:00
|
|
|
data.Tags = clients.storage.AllowedTags()
|
2020-01-28 14:06:52 +03:00
|
|
|
|
2023-09-07 17:13:48 +03:00
|
|
|
aghhttp.WriteJSONResponseOK(w, r, data)
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2024-01-30 18:43:51 +03:00
|
|
|
// initPrev initializes the persistent client with the default or previous
|
|
|
|
// client properties.
|
2024-03-12 17:45:11 +03:00
|
|
|
func initPrev(cj clientJSON, prev *client.Persistent) (c *client.Persistent, err error) {
|
2024-01-30 18:43:51 +03:00
|
|
|
var (
|
2024-03-12 17:45:11 +03:00
|
|
|
uid client.UID
|
2024-01-30 18:43:51 +03:00
|
|
|
ignoreQueryLog bool
|
|
|
|
ignoreStatistics bool
|
|
|
|
upsCacheEnabled bool
|
|
|
|
upsCacheSize uint32
|
|
|
|
)
|
|
|
|
|
|
|
|
if prev != nil {
|
|
|
|
uid = prev.UID
|
|
|
|
ignoreQueryLog = prev.IgnoreQueryLog
|
|
|
|
ignoreStatistics = prev.IgnoreStatistics
|
|
|
|
upsCacheEnabled = prev.UpstreamsCacheEnabled
|
|
|
|
upsCacheSize = prev.UpstreamsCacheSize
|
|
|
|
}
|
2023-04-12 14:48:42 +03:00
|
|
|
|
2023-12-07 17:23:00 +03:00
|
|
|
if cj.IgnoreQueryLog != aghalg.NBNull {
|
|
|
|
ignoreQueryLog = cj.IgnoreQueryLog == aghalg.NBTrue
|
2023-04-12 14:48:42 +03:00
|
|
|
}
|
|
|
|
|
2023-12-07 17:23:00 +03:00
|
|
|
if cj.IgnoreStatistics != aghalg.NBNull {
|
|
|
|
ignoreStatistics = cj.IgnoreStatistics == aghalg.NBTrue
|
|
|
|
}
|
2023-09-07 17:13:48 +03:00
|
|
|
|
2023-12-07 17:23:00 +03:00
|
|
|
if cj.UpstreamsCacheEnabled != aghalg.NBNull {
|
|
|
|
upsCacheEnabled = cj.UpstreamsCacheEnabled == aghalg.NBTrue
|
|
|
|
upsCacheSize = cj.UpstreamsCacheSize
|
2023-09-07 17:13:48 +03:00
|
|
|
}
|
2023-12-07 17:23:00 +03:00
|
|
|
|
|
|
|
svcs, err := copyBlockedServices(cj.Schedule, cj.BlockedServices, prev)
|
2023-09-07 17:13:48 +03:00
|
|
|
if err != nil {
|
2023-12-07 17:23:00 +03:00
|
|
|
return nil, fmt.Errorf("invalid blocked services: %w", err)
|
2023-07-03 14:10:40 +03:00
|
|
|
}
|
|
|
|
|
2024-03-12 17:45:11 +03:00
|
|
|
if (uid == client.UID{}) {
|
|
|
|
uid, err = client.NewUID()
|
2024-01-30 18:43:51 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("generating uid: %w", err)
|
|
|
|
}
|
|
|
|
}
|
2023-04-12 14:48:42 +03:00
|
|
|
|
2024-03-12 17:45:11 +03:00
|
|
|
return &client.Persistent{
|
2024-01-30 18:43:51 +03:00
|
|
|
BlockedServices: svcs,
|
|
|
|
UID: uid,
|
2023-09-07 17:13:48 +03:00
|
|
|
IgnoreQueryLog: ignoreQueryLog,
|
|
|
|
IgnoreStatistics: ignoreStatistics,
|
2023-12-07 17:23:00 +03:00
|
|
|
UpstreamsCacheEnabled: upsCacheEnabled,
|
|
|
|
UpstreamsCacheSize: upsCacheSize,
|
2024-01-30 18:43:51 +03:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// jsonToClient converts JSON object to persistent client object if there are no
|
|
|
|
// errors.
|
|
|
|
func (clients *clientsContainer) jsonToClient(
|
|
|
|
cj clientJSON,
|
2024-03-12 17:45:11 +03:00
|
|
|
prev *client.Persistent,
|
|
|
|
) (c *client.Persistent, err error) {
|
2024-01-30 18:43:51 +03:00
|
|
|
c, err = initPrev(cj, prev)
|
|
|
|
if err != nil {
|
|
|
|
// Don't wrap the error since it's informative enough as is.
|
|
|
|
return nil, err
|
2023-04-18 16:07:11 +03:00
|
|
|
}
|
|
|
|
|
2024-03-12 17:45:11 +03:00
|
|
|
err = c.SetIDs(cj.IDs)
|
2024-01-30 18:43:51 +03:00
|
|
|
if err != nil {
|
|
|
|
// Don't wrap the error since it's informative enough as is.
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2024-03-12 17:45:11 +03:00
|
|
|
c.SafeSearchConf = copySafeSearch(cj.SafeSearchConf, cj.SafeSearchEnabled)
|
2024-01-30 18:43:51 +03:00
|
|
|
c.Name = cj.Name
|
|
|
|
c.Tags = cj.Tags
|
|
|
|
c.Upstreams = cj.Upstreams
|
|
|
|
c.UseOwnSettings = !cj.UseGlobalSettings
|
|
|
|
c.FilteringEnabled = cj.FilteringEnabled
|
|
|
|
c.ParentalEnabled = cj.ParentalEnabled
|
|
|
|
c.SafeBrowsingEnabled = cj.SafeBrowsingEnabled
|
|
|
|
c.UseOwnBlockedServices = !cj.UseGlobalBlockedServices
|
|
|
|
|
2024-03-12 17:45:11 +03:00
|
|
|
if c.SafeSearchConf.Enabled {
|
|
|
|
err = c.SetSafeSearch(
|
|
|
|
c.SafeSearchConf,
|
2023-04-12 14:48:42 +03:00
|
|
|
clients.safeSearchCacheSize,
|
|
|
|
clients.safeSearchCacheTTL,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("creating safesearch for client %q: %w", c.Name, err)
|
|
|
|
}
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
2023-04-12 14:48:42 +03:00
|
|
|
|
|
|
|
return c, nil
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2023-12-07 17:23:00 +03:00
|
|
|
// copySafeSearch returns safe search config created from provided parameters.
|
|
|
|
func copySafeSearch(
|
|
|
|
jsonConf *filtering.SafeSearchConfig,
|
|
|
|
enabled bool,
|
|
|
|
) (conf filtering.SafeSearchConfig) {
|
|
|
|
if jsonConf != nil {
|
|
|
|
return *jsonConf
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(d.kolyshev): Remove after cleaning the deprecated
|
|
|
|
// [clientJSON.SafeSearchEnabled] field.
|
|
|
|
conf = filtering.SafeSearchConfig{
|
|
|
|
Enabled: enabled,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set default service flags for enabled safesearch.
|
|
|
|
if conf.Enabled {
|
|
|
|
conf.Bing = true
|
|
|
|
conf.DuckDuckGo = true
|
2024-09-30 20:17:20 +03:00
|
|
|
conf.Ecosia = true
|
2023-12-07 17:23:00 +03:00
|
|
|
conf.Google = true
|
|
|
|
conf.Pixabay = true
|
|
|
|
conf.Yandex = true
|
|
|
|
conf.YouTube = true
|
|
|
|
}
|
|
|
|
|
|
|
|
return conf
|
|
|
|
}
|
|
|
|
|
|
|
|
// copyBlockedServices converts a json blocked services to an internal blocked
|
|
|
|
// services.
|
|
|
|
func copyBlockedServices(
|
|
|
|
sch *schedule.Weekly,
|
|
|
|
svcStrs []string,
|
2024-03-12 17:45:11 +03:00
|
|
|
prev *client.Persistent,
|
2023-12-07 17:23:00 +03:00
|
|
|
) (svcs *filtering.BlockedServices, err error) {
|
|
|
|
var weekly *schedule.Weekly
|
|
|
|
if sch != nil {
|
|
|
|
weekly = sch.Clone()
|
2024-07-03 15:38:37 +03:00
|
|
|
} else if prev != nil {
|
2023-12-07 17:23:00 +03:00
|
|
|
weekly = prev.BlockedServices.Schedule.Clone()
|
|
|
|
} else {
|
|
|
|
weekly = schedule.EmptyWeekly()
|
|
|
|
}
|
|
|
|
|
|
|
|
svcs = &filtering.BlockedServices{
|
|
|
|
Schedule: weekly,
|
|
|
|
IDs: svcStrs,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = svcs.Validate()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("validating blocked services: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return svcs, nil
|
|
|
|
}
|
|
|
|
|
2024-01-30 18:43:51 +03:00
|
|
|
// clientToJSON converts persistent client object to JSON object.
|
2024-03-12 17:45:11 +03:00
|
|
|
func clientToJSON(c *client.Persistent) (cj *clientJSON) {
|
2023-04-12 14:48:42 +03:00
|
|
|
// TODO(d.kolyshev): Remove after cleaning the deprecated
|
|
|
|
// [clientJSON.SafeSearchEnabled] field.
|
2024-03-12 17:45:11 +03:00
|
|
|
cloneVal := c.SafeSearchConf
|
2023-04-12 14:48:42 +03:00
|
|
|
safeSearchConf := &cloneVal
|
|
|
|
|
2021-06-29 15:53:28 +03:00
|
|
|
return &clientJSON{
|
2019-09-26 16:40:52 +03:00
|
|
|
Name: c.Name,
|
2024-03-12 17:45:11 +03:00
|
|
|
IDs: c.IDs(),
|
2020-01-28 14:06:52 +03:00
|
|
|
Tags: c.Tags,
|
2019-09-26 16:40:52 +03:00
|
|
|
UseGlobalSettings: !c.UseOwnSettings,
|
|
|
|
FilteringEnabled: c.FilteringEnabled,
|
|
|
|
ParentalEnabled: c.ParentalEnabled,
|
2023-04-12 14:48:42 +03:00
|
|
|
SafeSearchEnabled: safeSearchConf.Enabled,
|
|
|
|
SafeSearchConf: safeSearchConf,
|
2019-09-26 16:40:52 +03:00
|
|
|
SafeBrowsingEnabled: c.SafeBrowsingEnabled,
|
|
|
|
|
|
|
|
UseGlobalBlockedServices: !c.UseOwnBlockedServices,
|
2023-07-03 14:10:40 +03:00
|
|
|
|
2023-09-07 17:13:48 +03:00
|
|
|
Schedule: c.BlockedServices.Schedule,
|
2023-07-03 14:10:40 +03:00
|
|
|
BlockedServices: c.BlockedServices.IDs,
|
2019-11-06 17:24:15 +03:00
|
|
|
|
|
|
|
Upstreams: c.Upstreams,
|
2023-04-18 16:07:11 +03:00
|
|
|
|
|
|
|
IgnoreQueryLog: aghalg.BoolToNullBool(c.IgnoreQueryLog),
|
|
|
|
IgnoreStatistics: aghalg.BoolToNullBool(c.IgnoreStatistics),
|
2023-12-07 17:23:00 +03:00
|
|
|
|
|
|
|
UpstreamsCacheSize: c.UpstreamsCacheSize,
|
|
|
|
UpstreamsCacheEnabled: aghalg.BoolToNullBool(c.UpstreamsCacheEnabled),
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-12 14:48:42 +03:00
|
|
|
// handleAddClient is the handler for POST /control/clients/add HTTP API.
|
2019-11-22 14:37:25 +03:00
|
|
|
func (clients *clientsContainer) handleAddClient(w http.ResponseWriter, r *http.Request) {
|
2019-09-26 16:40:52 +03:00
|
|
|
cj := clientJSON{}
|
2020-11-23 14:14:08 +03:00
|
|
|
err := json.NewDecoder(r.Body).Decode(&cj)
|
2019-09-26 16:40:52 +03:00
|
|
|
if err != nil {
|
2021-12-16 20:54:59 +03:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "failed to process request body: %s", err)
|
2020-11-23 14:14:08 +03:00
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-04-18 16:07:11 +03:00
|
|
|
c, err := clients.jsonToClient(cj, nil)
|
2023-04-12 14:48:42 +03:00
|
|
|
if err != nil {
|
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "%s", err)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-07-03 15:38:37 +03:00
|
|
|
err = clients.storage.Add(c)
|
2019-09-26 16:40:52 +03:00
|
|
|
if err != nil {
|
2021-12-16 20:54:59 +03:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "%s", err)
|
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
return
|
|
|
|
}
|
2021-12-16 20:54:59 +03:00
|
|
|
|
2024-05-15 13:34:12 +03:00
|
|
|
if !clients.testing {
|
|
|
|
onConfigModified()
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-12 14:48:42 +03:00
|
|
|
// handleDelClient is the handler for POST /control/clients/delete HTTP API.
|
2019-11-22 14:37:25 +03:00
|
|
|
func (clients *clientsContainer) handleDelClient(w http.ResponseWriter, r *http.Request) {
|
2020-11-23 14:14:08 +03:00
|
|
|
cj := clientJSON{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&cj)
|
2019-09-26 16:40:52 +03:00
|
|
|
if err != nil {
|
2021-12-16 20:54:59 +03:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "failed to process request body: %s", err)
|
2020-11-23 14:14:08 +03:00
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-11-23 14:14:08 +03:00
|
|
|
if len(cj.Name) == 0 {
|
2021-12-16 20:54:59 +03:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "client's name must be non-empty")
|
2020-11-23 14:14:08 +03:00
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-07-03 15:38:37 +03:00
|
|
|
if !clients.storage.RemoveByName(cj.Name) {
|
2021-12-16 20:54:59 +03:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "Client not found")
|
2022-11-02 16:18:02 +03:00
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-05-15 13:34:12 +03:00
|
|
|
if !clients.testing {
|
|
|
|
onConfigModified()
|
|
|
|
}
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2024-01-30 18:43:51 +03:00
|
|
|
// updateJSON contains the name and data of the updated persistent client.
|
2019-09-26 16:40:52 +03:00
|
|
|
type updateJSON struct {
|
|
|
|
Name string `json:"name"`
|
|
|
|
Data clientJSON `json:"data"`
|
|
|
|
}
|
|
|
|
|
2023-04-12 14:48:42 +03:00
|
|
|
// handleUpdateClient is the handler for POST /control/clients/update HTTP API.
|
2023-04-18 16:07:11 +03:00
|
|
|
//
|
|
|
|
// TODO(s.chzhen): Accept updated parameters instead of whole structure.
|
2019-11-22 14:37:25 +03:00
|
|
|
func (clients *clientsContainer) handleUpdateClient(w http.ResponseWriter, r *http.Request) {
|
2020-11-23 14:14:08 +03:00
|
|
|
dj := updateJSON{}
|
|
|
|
err := json.NewDecoder(r.Body).Decode(&dj)
|
2019-09-26 16:40:52 +03:00
|
|
|
if err != nil {
|
2021-12-16 20:54:59 +03:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "failed to process request body: %s", err)
|
2019-09-26 16:40:52 +03:00
|
|
|
|
|
|
|
return
|
|
|
|
}
|
2020-11-23 14:14:08 +03:00
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
if len(dj.Name) == 0 {
|
2021-12-16 20:54:59 +03:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "Invalid request")
|
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-07-03 15:38:37 +03:00
|
|
|
c, err := clients.jsonToClient(dj.Data, nil)
|
2023-04-12 14:48:42 +03:00
|
|
|
if err != nil {
|
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "%s", err)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-07-03 15:38:37 +03:00
|
|
|
err = clients.storage.Update(dj.Name, c)
|
2019-09-26 16:40:52 +03:00
|
|
|
if err != nil {
|
2021-12-16 20:54:59 +03:00
|
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "%s", err)
|
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-05-15 13:34:12 +03:00
|
|
|
if !clients.testing {
|
|
|
|
onConfigModified()
|
|
|
|
}
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2023-04-12 14:48:42 +03:00
|
|
|
// handleFindClient is the handler for GET /control/clients/find HTTP API.
|
2019-11-22 14:37:25 +03:00
|
|
|
func (clients *clientsContainer) handleFindClient(w http.ResponseWriter, r *http.Request) {
|
2019-09-26 16:40:52 +03:00
|
|
|
q := r.URL.Query()
|
2021-06-29 15:53:28 +03:00
|
|
|
data := []map[string]*clientJSON{}
|
2024-05-15 13:34:12 +03:00
|
|
|
for i := range len(q) {
|
2021-01-27 18:32:13 +03:00
|
|
|
idStr := q.Get(fmt.Sprintf("ip%d", i))
|
|
|
|
if idStr == "" {
|
2019-09-26 16:40:52 +03:00
|
|
|
break
|
|
|
|
}
|
2021-01-15 20:30:48 +03:00
|
|
|
|
2022-11-23 16:52:05 +03:00
|
|
|
ip, _ := netip.ParseAddr(idStr)
|
2024-09-30 20:17:20 +03:00
|
|
|
c, ok := clients.storage.Find(idStr)
|
2021-06-29 15:53:28 +03:00
|
|
|
var cj *clientJSON
|
2019-09-26 16:40:52 +03:00
|
|
|
if !ok {
|
2021-06-29 15:53:28 +03:00
|
|
|
cj = clients.findRuntime(ip, idStr)
|
2019-09-26 16:40:52 +03:00
|
|
|
} else {
|
2021-01-27 18:32:13 +03:00
|
|
|
cj = clientToJSON(c)
|
2024-05-15 13:34:12 +03:00
|
|
|
disallowed, rule := clients.clientChecker.IsBlockedClient(ip, idStr)
|
2021-05-06 16:41:33 +03:00
|
|
|
cj.Disallowed, cj.DisallowedRule = &disallowed, &rule
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2021-06-29 15:53:28 +03:00
|
|
|
data = append(data, map[string]*clientJSON{
|
2021-01-27 18:32:13 +03:00
|
|
|
idStr: cj,
|
2021-01-22 15:00:45 +03:00
|
|
|
})
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2023-09-07 17:13:48 +03:00
|
|
|
aghhttp.WriteJSONResponseOK(w, r, data)
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|
|
|
|
|
2021-04-15 19:00:31 +03:00
|
|
|
// findRuntime looks up the IP in runtime and temporary storages, like
|
2021-06-29 15:53:28 +03:00
|
|
|
// /etc/hosts tables, DHCP leases, or blocklists. cj is guaranteed to be
|
|
|
|
// non-nil.
|
2022-11-23 16:52:05 +03:00
|
|
|
func (clients *clientsContainer) findRuntime(ip netip.Addr, idStr string) (cj *clientJSON) {
|
2024-09-30 20:17:20 +03:00
|
|
|
rc := clients.storage.ClientRuntime(ip)
|
2024-05-15 13:34:12 +03:00
|
|
|
if rc == nil {
|
2022-08-04 19:05:28 +03:00
|
|
|
// It is still possible that the IP used to be in the runtime clients
|
|
|
|
// list, but then the server was reloaded. So, check the DNS server's
|
|
|
|
// blocked IP list.
|
2021-01-15 20:30:48 +03:00
|
|
|
//
|
|
|
|
// See https://github.com/AdguardTeam/AdGuardHome/issues/2428.
|
2024-05-15 13:34:12 +03:00
|
|
|
disallowed, rule := clients.clientChecker.IsBlockedClient(ip, idStr)
|
2021-06-29 15:53:28 +03:00
|
|
|
cj = &clientJSON{
|
2021-01-27 18:32:13 +03:00
|
|
|
IDs: []string{idStr},
|
2021-05-06 16:41:33 +03:00
|
|
|
Disallowed: &disallowed,
|
|
|
|
DisallowedRule: &rule,
|
2023-07-03 14:10:40 +03:00
|
|
|
WHOIS: &whois.Info{},
|
2021-01-15 20:30:48 +03:00
|
|
|
}
|
|
|
|
|
2021-06-29 15:53:28 +03:00
|
|
|
return cj
|
|
|
|
}
|
|
|
|
|
2024-01-30 18:43:51 +03:00
|
|
|
_, host := rc.Info()
|
2021-06-29 15:53:28 +03:00
|
|
|
cj = &clientJSON{
|
2024-01-30 18:43:51 +03:00
|
|
|
Name: host,
|
2023-07-03 14:10:40 +03:00
|
|
|
IDs: []string{idStr},
|
2024-01-30 18:43:51 +03:00
|
|
|
WHOIS: whoisOrEmpty(rc),
|
2021-01-15 20:30:48 +03:00
|
|
|
}
|
|
|
|
|
2024-05-15 13:34:12 +03:00
|
|
|
disallowed, rule := clients.clientChecker.IsBlockedClient(ip, idStr)
|
2021-05-06 16:41:33 +03:00
|
|
|
cj.Disallowed, cj.DisallowedRule = &disallowed, &rule
|
2021-01-15 20:30:48 +03:00
|
|
|
|
2021-06-29 15:53:28 +03:00
|
|
|
return cj
|
2021-01-15 20:30:48 +03:00
|
|
|
}
|
|
|
|
|
2019-09-26 16:40:52 +03:00
|
|
|
// RegisterClientsHandlers registers HTTP handlers
|
2019-11-22 14:37:25 +03:00
|
|
|
func (clients *clientsContainer) registerWebHandlers() {
|
2021-02-04 14:15:34 +03:00
|
|
|
httpRegister(http.MethodGet, "/control/clients", clients.handleGetClients)
|
|
|
|
httpRegister(http.MethodPost, "/control/clients/add", clients.handleAddClient)
|
|
|
|
httpRegister(http.MethodPost, "/control/clients/delete", clients.handleDelClient)
|
|
|
|
httpRegister(http.MethodPost, "/control/clients/update", clients.handleUpdateClient)
|
|
|
|
httpRegister(http.MethodGet, "/control/clients/find", clients.handleFindClient)
|
2019-09-26 16:40:52 +03:00
|
|
|
}
|