2019-06-10 11:33:19 +03:00
|
|
|
package home
|
2018-08-30 17:25:33 +03:00
|
|
|
|
|
|
|
import (
|
2019-04-01 12:22:54 +03:00
|
|
|
"bufio"
|
2019-04-25 14:57:03 +03:00
|
|
|
"context"
|
2019-02-12 21:14:02 +03:00
|
|
|
"crypto/tls"
|
2018-08-30 17:25:33 +03:00
|
|
|
"fmt"
|
2019-04-01 12:22:54 +03:00
|
|
|
"io"
|
2019-04-05 12:19:28 +03:00
|
|
|
"io/ioutil"
|
2018-08-30 17:25:33 +03:00
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"os"
|
2019-04-01 12:22:54 +03:00
|
|
|
"os/exec"
|
2018-12-05 15:36:18 +03:00
|
|
|
"os/signal"
|
2018-08-30 17:25:33 +03:00
|
|
|
"path/filepath"
|
2019-02-05 14:09:05 +03:00
|
|
|
"runtime"
|
2018-08-30 17:25:33 +03:00
|
|
|
"strconv"
|
2019-04-01 12:22:54 +03:00
|
|
|
"strings"
|
2019-02-12 21:14:02 +03:00
|
|
|
"sync"
|
2018-12-05 15:36:18 +03:00
|
|
|
"syscall"
|
2019-06-06 03:00:15 +03:00
|
|
|
"time"
|
2018-08-30 17:25:33 +03:00
|
|
|
|
2019-02-25 16:44:22 +03:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
2019-04-04 15:32:00 +03:00
|
|
|
"github.com/NYTimes/gziphandler"
|
2018-08-30 17:25:33 +03:00
|
|
|
"github.com/gobuffalo/packr"
|
|
|
|
)
|
|
|
|
|
2019-02-05 14:09:05 +03:00
|
|
|
const (
|
|
|
|
// Used in config to indicate that syslog or eventlog (win) should be used for logger output
|
|
|
|
configSyslog = "syslog"
|
|
|
|
)
|
|
|
|
|
2019-06-20 14:36:26 +03:00
|
|
|
// Update-related variables
|
|
|
|
var (
|
|
|
|
versionString string
|
|
|
|
updateChannel string
|
|
|
|
versionCheckURL string
|
|
|
|
)
|
|
|
|
|
|
|
|
const versionCheckPeriod = time.Hour * 8
|
|
|
|
|
2019-07-09 18:52:18 +03:00
|
|
|
// Main is the entry point
|
2019-06-20 14:36:26 +03:00
|
|
|
func Main(version string, channel string) {
|
|
|
|
// Init update-related global variables
|
|
|
|
versionString = version
|
|
|
|
updateChannel = channel
|
|
|
|
versionCheckURL = "https://static.adguard.com/adguardhome/" + updateChannel + "/version.json"
|
|
|
|
|
2019-02-04 13:54:53 +03:00
|
|
|
// config can be specified, which reads options from there, but other command line flags have to override config values
|
|
|
|
// therefore, we must do it manually instead of using a lib
|
|
|
|
args := loadOptions()
|
2018-08-30 17:25:33 +03:00
|
|
|
|
2019-02-04 13:54:53 +03:00
|
|
|
if args.serviceControlAction != "" {
|
|
|
|
handleServiceControlAction(args.serviceControlAction)
|
|
|
|
return
|
2018-10-30 02:17:24 +03:00
|
|
|
}
|
2018-10-15 16:13:03 +03:00
|
|
|
|
2019-02-05 14:09:05 +03:00
|
|
|
// run the protection
|
|
|
|
run(args)
|
2019-02-04 13:54:53 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// run initializes configuration and runs the AdGuard Home
|
2019-02-05 14:09:05 +03:00
|
|
|
// run is a blocking method and it won't exit until the service is stopped!
|
2019-08-20 00:55:32 +03:00
|
|
|
// nolint
|
2019-02-04 13:54:53 +03:00
|
|
|
func run(args options) {
|
2019-02-05 14:09:05 +03:00
|
|
|
// config file path can be overridden by command-line arguments:
|
2019-02-04 13:54:53 +03:00
|
|
|
if args.configFilename != "" {
|
|
|
|
config.ourConfigFilename = args.configFilename
|
|
|
|
}
|
|
|
|
|
2019-02-05 14:09:05 +03:00
|
|
|
// configure working dir and config path
|
2019-02-05 20:35:48 +03:00
|
|
|
initWorkingDir(args)
|
2019-02-05 14:09:05 +03:00
|
|
|
|
2019-02-04 13:54:53 +03:00
|
|
|
// configure log level and output
|
|
|
|
configureLogger(args)
|
|
|
|
|
2019-02-26 15:32:56 +03:00
|
|
|
// enable TLS 1.3
|
|
|
|
enableTLS13()
|
|
|
|
|
2019-02-04 13:54:53 +03:00
|
|
|
// print the first message after logger is configured
|
2019-06-20 14:36:26 +03:00
|
|
|
log.Printf("AdGuard Home, version %s, channel %s\n", versionString, updateChannel)
|
2019-02-25 16:44:22 +03:00
|
|
|
log.Debug("Current working directory is %s", config.ourWorkingDir)
|
2019-02-05 14:09:05 +03:00
|
|
|
if args.runningAsService {
|
2019-02-25 16:44:22 +03:00
|
|
|
log.Info("AdGuard Home is running as a service")
|
2019-02-05 14:09:05 +03:00
|
|
|
}
|
2019-05-17 14:22:59 +03:00
|
|
|
config.runningAsService = args.runningAsService
|
2019-05-27 18:48:33 +03:00
|
|
|
config.disableUpdate = args.disableUpdate
|
2019-02-04 13:54:53 +03:00
|
|
|
|
2019-01-29 20:41:57 +03:00
|
|
|
config.firstRun = detectFirstRun()
|
2019-04-01 12:22:54 +03:00
|
|
|
if config.firstRun {
|
|
|
|
requireAdminRights()
|
|
|
|
}
|
|
|
|
|
2019-07-02 12:56:23 +03:00
|
|
|
config.appSignalChannel = make(chan os.Signal)
|
|
|
|
signal.Notify(config.appSignalChannel, syscall.SIGINT, syscall.SIGTERM, syscall.SIGHUP, syscall.SIGQUIT)
|
2019-04-01 12:22:54 +03:00
|
|
|
go func() {
|
2019-07-02 12:56:23 +03:00
|
|
|
<-config.appSignalChannel
|
2019-04-01 12:22:54 +03:00
|
|
|
cleanup()
|
|
|
|
cleanupAlways()
|
|
|
|
os.Exit(0)
|
|
|
|
}()
|
2019-02-04 13:54:53 +03:00
|
|
|
|
2019-07-09 18:37:24 +03:00
|
|
|
initConfig()
|
2019-07-09 18:19:50 +03:00
|
|
|
config.clients.Init()
|
2019-07-23 12:21:37 +03:00
|
|
|
initServices()
|
2019-05-31 16:39:18 +03:00
|
|
|
|
2019-04-30 14:38:24 +03:00
|
|
|
if !config.firstRun {
|
|
|
|
// Do the upgrade if necessary
|
|
|
|
err := upgradeConfig()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = parseConfig()
|
|
|
|
if err != nil {
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2019-04-30 15:26:57 +03:00
|
|
|
|
|
|
|
if args.checkConfig {
|
|
|
|
log.Info("Configuration file is OK")
|
|
|
|
os.Exit(0)
|
|
|
|
}
|
2019-02-04 13:54:53 +03:00
|
|
|
}
|
|
|
|
|
2019-03-27 17:09:48 +03:00
|
|
|
if (runtime.GOOS == "linux" || runtime.GOOS == "darwin") &&
|
|
|
|
config.RlimitNoFile != 0 {
|
|
|
|
setRlimit(config.RlimitNoFile)
|
|
|
|
}
|
|
|
|
|
2019-02-04 13:54:53 +03:00
|
|
|
// override bind host/port from the console
|
|
|
|
if args.bindHost != "" {
|
|
|
|
config.BindHost = args.bindHost
|
|
|
|
}
|
|
|
|
if args.bindPort != 0 {
|
|
|
|
config.BindPort = args.bindPort
|
|
|
|
}
|
2018-08-30 17:25:33 +03:00
|
|
|
|
2019-04-30 14:38:24 +03:00
|
|
|
if !config.firstRun {
|
|
|
|
// Save the updated config
|
|
|
|
err := config.write()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
2018-08-30 17:25:33 +03:00
|
|
|
|
2019-10-02 16:53:23 +03:00
|
|
|
initDNSServer()
|
2019-10-09 19:51:26 +03:00
|
|
|
go func() {
|
|
|
|
err = startDNSServer()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
}()
|
2018-09-06 02:00:57 +03:00
|
|
|
|
2019-02-01 19:25:04 +03:00
|
|
|
err = startDHCPServer()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
2018-12-28 21:01:16 +03:00
|
|
|
}
|
|
|
|
|
2019-04-05 12:19:28 +03:00
|
|
|
if len(args.pidFile) != 0 && writePIDFile(args.pidFile) {
|
2019-07-09 18:49:31 +03:00
|
|
|
config.pidFileName = args.pidFile
|
2019-04-05 12:19:28 +03:00
|
|
|
}
|
|
|
|
|
2019-02-05 14:09:05 +03:00
|
|
|
// Initialize and run the admin Web interface
|
2019-06-10 11:33:19 +03:00
|
|
|
box := packr.NewBox("../build/static")
|
2019-04-04 15:32:00 +03:00
|
|
|
|
2019-01-29 20:41:57 +03:00
|
|
|
// if not configured, redirect / to /install.html, otherwise redirect /install.html to /
|
2019-04-04 15:32:00 +03:00
|
|
|
http.Handle("/", postInstallHandler(optionalAuthHandler(gziphandler.GzipHandler(http.FileServer(box)))))
|
2019-02-05 14:09:05 +03:00
|
|
|
registerControlHandlers()
|
|
|
|
|
2019-02-06 16:48:04 +03:00
|
|
|
// add handlers for /install paths, we only need them when we're not configured yet
|
|
|
|
if config.firstRun {
|
2019-02-25 16:44:22 +03:00
|
|
|
log.Info("This is the first launch of AdGuard Home, redirecting everything to /install.html ")
|
2019-02-06 16:48:04 +03:00
|
|
|
http.Handle("/install.html", preInstallHandler(http.FileServer(box)))
|
|
|
|
registerInstallHandlers()
|
|
|
|
}
|
|
|
|
|
2019-07-09 18:50:17 +03:00
|
|
|
config.httpsServer.cond = sync.NewCond(&config.httpsServer.Mutex)
|
2019-02-12 21:14:02 +03:00
|
|
|
|
|
|
|
// for https, we have a separate goroutine loop
|
2019-04-23 11:36:23 +03:00
|
|
|
go httpServerLoop()
|
2019-02-12 21:14:02 +03:00
|
|
|
|
2019-02-06 16:47:17 +03:00
|
|
|
// this loop is used as an ability to change listening host and/or port
|
2019-07-09 18:50:17 +03:00
|
|
|
for !config.httpsServer.shutdown {
|
2019-02-22 17:59:42 +03:00
|
|
|
printHTTPAddresses("http")
|
|
|
|
|
2019-02-06 16:47:17 +03:00
|
|
|
// we need to have new instance, because after Shutdown() the Server is not usable
|
2019-02-22 17:59:42 +03:00
|
|
|
address := net.JoinHostPort(config.BindHost, strconv.Itoa(config.BindPort))
|
2019-07-09 18:52:06 +03:00
|
|
|
config.httpServer = &http.Server{
|
2019-02-06 16:47:17 +03:00
|
|
|
Addr: address,
|
|
|
|
}
|
2019-07-09 18:52:06 +03:00
|
|
|
err := config.httpServer.ListenAndServe()
|
2019-02-06 16:47:17 +03:00
|
|
|
if err != http.ErrServerClosed {
|
2019-04-05 12:19:28 +03:00
|
|
|
cleanupAlways()
|
2019-02-06 16:47:17 +03:00
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
// We use ErrServerClosed as a sign that we need to rebind on new address, so go back to the start of the loop
|
|
|
|
}
|
2019-04-25 14:57:03 +03:00
|
|
|
|
|
|
|
// wait indefinitely for other go-routines to complete their job
|
|
|
|
select {}
|
2019-02-05 14:09:05 +03:00
|
|
|
}
|
|
|
|
|
2019-04-23 11:36:23 +03:00
|
|
|
func httpServerLoop() {
|
2019-07-09 18:50:17 +03:00
|
|
|
for !config.httpsServer.shutdown {
|
|
|
|
config.httpsServer.cond.L.Lock()
|
2019-04-23 11:36:23 +03:00
|
|
|
// this mechanism doesn't let us through until all conditions are met
|
|
|
|
for config.TLS.Enabled == false ||
|
|
|
|
config.TLS.PortHTTPS == 0 ||
|
2019-08-13 12:32:52 +03:00
|
|
|
len(config.TLS.PrivateKeyData) == 0 ||
|
|
|
|
len(config.TLS.CertificateChainData) == 0 { // sleep until necessary data is supplied
|
2019-07-09 18:50:17 +03:00
|
|
|
config.httpsServer.cond.Wait()
|
2019-04-23 11:36:23 +03:00
|
|
|
}
|
|
|
|
address := net.JoinHostPort(config.BindHost, strconv.Itoa(config.TLS.PortHTTPS))
|
|
|
|
// validate current TLS config and update warnings (it could have been loaded from file)
|
2019-08-13 12:32:52 +03:00
|
|
|
data := validateCertificates(string(config.TLS.CertificateChainData), string(config.TLS.PrivateKeyData), config.TLS.ServerName)
|
2019-04-23 11:36:23 +03:00
|
|
|
if !data.ValidPair {
|
|
|
|
cleanupAlways()
|
|
|
|
log.Fatal(data.WarningValidation)
|
|
|
|
}
|
|
|
|
config.Lock()
|
|
|
|
config.TLS.tlsConfigStatus = data // update warnings
|
|
|
|
config.Unlock()
|
|
|
|
|
|
|
|
// prepare certs for HTTPS server
|
|
|
|
// important -- they have to be copies, otherwise changing the contents in config.TLS will break encryption for in-flight requests
|
2019-08-13 12:32:52 +03:00
|
|
|
certchain := make([]byte, len(config.TLS.CertificateChainData))
|
|
|
|
copy(certchain, config.TLS.CertificateChainData)
|
|
|
|
privatekey := make([]byte, len(config.TLS.PrivateKeyData))
|
|
|
|
copy(privatekey, config.TLS.PrivateKeyData)
|
2019-04-23 11:36:23 +03:00
|
|
|
cert, err := tls.X509KeyPair(certchain, privatekey)
|
|
|
|
if err != nil {
|
|
|
|
cleanupAlways()
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
2019-07-09 18:50:17 +03:00
|
|
|
config.httpsServer.cond.L.Unlock()
|
2019-04-23 11:36:23 +03:00
|
|
|
|
|
|
|
// prepare HTTPS server
|
2019-07-09 18:50:17 +03:00
|
|
|
config.httpsServer.server = &http.Server{
|
2019-04-23 11:36:23 +03:00
|
|
|
Addr: address,
|
|
|
|
TLSConfig: &tls.Config{
|
|
|
|
Certificates: []tls.Certificate{cert},
|
|
|
|
MinVersion: tls.VersionTLS12,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
printHTTPAddresses("https")
|
2019-07-09 18:50:17 +03:00
|
|
|
err = config.httpsServer.server.ListenAndServeTLS("", "")
|
2019-04-23 11:36:23 +03:00
|
|
|
if err != http.ErrServerClosed {
|
|
|
|
cleanupAlways()
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-01 12:22:54 +03:00
|
|
|
// Check if the current user has root (administrator) rights
|
|
|
|
// and if not, ask and try to run as root
|
|
|
|
func requireAdminRights() {
|
|
|
|
admin, _ := haveAdminRights()
|
|
|
|
if admin {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
log.Fatal("This is the first launch of AdGuard Home. You must run it as Administrator.")
|
|
|
|
|
|
|
|
} else {
|
|
|
|
log.Error("This is the first launch of AdGuard Home. You must run it as root.")
|
|
|
|
|
|
|
|
_, _ = io.WriteString(os.Stdout, "Do you want to start AdGuard Home as root user? [y/n] ")
|
|
|
|
stdin := bufio.NewReader(os.Stdin)
|
|
|
|
buf, _ := stdin.ReadString('\n')
|
|
|
|
buf = strings.TrimSpace(buf)
|
|
|
|
if buf != "y" {
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd := exec.Command("sudo", os.Args...)
|
|
|
|
cmd.Stdin = os.Stdin
|
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stderr
|
|
|
|
_ = cmd.Run()
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-05 12:19:28 +03:00
|
|
|
// Write PID to a file
|
|
|
|
func writePIDFile(fn string) bool {
|
|
|
|
data := fmt.Sprintf("%d", os.Getpid())
|
|
|
|
err := ioutil.WriteFile(fn, []byte(data), 0644)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Couldn't write PID to file %s: %v", fn, err)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2019-02-10 20:47:43 +03:00
|
|
|
// initWorkingDir initializes the ourWorkingDir
|
|
|
|
// if no command-line arguments specified, we use the directory where our binary file is located
|
2019-02-05 20:35:48 +03:00
|
|
|
func initWorkingDir(args options) {
|
2019-02-05 14:09:05 +03:00
|
|
|
exec, err := os.Executable()
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2019-02-10 20:47:43 +03:00
|
|
|
if args.workDir != "" {
|
2019-02-05 20:35:48 +03:00
|
|
|
// If there is a custom config file, use it's directory as our working dir
|
2019-02-10 20:47:43 +03:00
|
|
|
config.ourWorkingDir = args.workDir
|
2019-02-05 14:09:05 +03:00
|
|
|
} else {
|
2019-02-10 20:47:43 +03:00
|
|
|
config.ourWorkingDir = filepath.Dir(exec)
|
2019-02-05 14:09:05 +03:00
|
|
|
}
|
2019-02-04 13:54:53 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// configureLogger configures logger level and output
|
|
|
|
func configureLogger(args options) {
|
|
|
|
ls := getLogSettings()
|
|
|
|
|
|
|
|
// command-line arguments can override config settings
|
|
|
|
if args.verbose {
|
|
|
|
ls.Verbose = true
|
|
|
|
}
|
|
|
|
if args.logFile != "" {
|
|
|
|
ls.LogFile = args.logFile
|
|
|
|
}
|
|
|
|
|
2019-02-25 16:44:22 +03:00
|
|
|
level := log.INFO
|
|
|
|
if ls.Verbose {
|
|
|
|
level = log.DEBUG
|
|
|
|
}
|
|
|
|
log.SetLevel(level)
|
2019-02-04 13:54:53 +03:00
|
|
|
|
2019-02-05 14:09:05 +03:00
|
|
|
if args.runningAsService && ls.LogFile == "" && runtime.GOOS == "windows" {
|
|
|
|
// When running as a Windows service, use eventlog by default if nothing else is configured
|
|
|
|
// Otherwise, we'll simply loose the log output
|
|
|
|
ls.LogFile = configSyslog
|
|
|
|
}
|
|
|
|
|
2019-02-04 13:54:53 +03:00
|
|
|
if ls.LogFile == "" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-02-05 14:09:05 +03:00
|
|
|
if ls.LogFile == configSyslog {
|
|
|
|
// Use syslog where it is possible and eventlog on Windows
|
|
|
|
err := configureSyslog()
|
2019-02-04 13:54:53 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("cannot initialize syslog: %s", err)
|
|
|
|
}
|
2019-02-05 14:09:05 +03:00
|
|
|
} else {
|
2019-02-10 20:47:43 +03:00
|
|
|
logFilePath := filepath.Join(config.ourWorkingDir, ls.LogFile)
|
2019-03-14 18:06:53 +03:00
|
|
|
if filepath.IsAbs(ls.LogFile) {
|
|
|
|
logFilePath = ls.LogFile
|
|
|
|
}
|
|
|
|
|
|
|
|
file, err := os.OpenFile(logFilePath, os.O_WRONLY|os.O_CREATE|os.O_APPEND, 0644)
|
2019-02-05 14:09:05 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("cannot create a log file: %s", err)
|
|
|
|
}
|
2019-02-25 16:44:22 +03:00
|
|
|
log.SetOutput(file)
|
2019-02-04 13:54:53 +03:00
|
|
|
}
|
2018-08-30 17:25:33 +03:00
|
|
|
}
|
2018-10-12 19:40:43 +03:00
|
|
|
|
2019-02-26 15:32:56 +03:00
|
|
|
// TODO after GO 1.13 release TLS 1.3 will be enabled by default. Remove this afterward
|
|
|
|
func enableTLS13() {
|
|
|
|
err := os.Setenv("GODEBUG", os.Getenv("GODEBUG")+",tls13=1")
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to enable TLS 1.3: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-05 15:36:18 +03:00
|
|
|
func cleanup() {
|
2019-02-25 16:44:22 +03:00
|
|
|
log.Info("Stopping AdGuard Home")
|
2019-02-04 13:54:53 +03:00
|
|
|
|
2018-12-05 15:36:18 +03:00
|
|
|
err := stopDNSServer()
|
|
|
|
if err != nil {
|
2019-02-25 16:44:22 +03:00
|
|
|
log.Error("Couldn't stop DNS server: %s", err)
|
2018-12-05 15:36:18 +03:00
|
|
|
}
|
2019-02-04 13:54:53 +03:00
|
|
|
err = stopDHCPServer()
|
|
|
|
if err != nil {
|
2019-02-25 16:44:22 +03:00
|
|
|
log.Error("Couldn't stop DHCP server: %s", err)
|
2019-02-04 13:54:53 +03:00
|
|
|
}
|
2018-12-05 15:36:18 +03:00
|
|
|
}
|
|
|
|
|
2019-04-25 14:57:03 +03:00
|
|
|
// Stop HTTP server, possibly waiting for all active connections to be closed
|
|
|
|
func stopHTTPServer() {
|
2019-07-09 18:50:17 +03:00
|
|
|
config.httpsServer.shutdown = true
|
|
|
|
if config.httpsServer.server != nil {
|
|
|
|
config.httpsServer.server.Shutdown(context.TODO())
|
2019-04-25 14:57:03 +03:00
|
|
|
}
|
2019-07-09 18:52:06 +03:00
|
|
|
config.httpServer.Shutdown(context.TODO())
|
2019-04-25 14:57:03 +03:00
|
|
|
}
|
|
|
|
|
2019-04-05 12:19:28 +03:00
|
|
|
// This function is called before application exits
|
|
|
|
func cleanupAlways() {
|
2019-07-09 18:49:31 +03:00
|
|
|
if len(config.pidFileName) != 0 {
|
|
|
|
os.Remove(config.pidFileName)
|
2019-04-05 12:19:28 +03:00
|
|
|
}
|
2019-05-08 10:43:47 +03:00
|
|
|
log.Info("Stopped")
|
2019-04-05 12:19:28 +03:00
|
|
|
}
|
|
|
|
|
2019-02-04 13:54:53 +03:00
|
|
|
// command-line arguments
|
|
|
|
type options struct {
|
|
|
|
verbose bool // is verbose logging enabled
|
|
|
|
configFilename string // path to the config file
|
2019-02-10 20:47:43 +03:00
|
|
|
workDir string // path to the working directory where we will store the filters data and the querylog
|
2019-02-04 13:54:53 +03:00
|
|
|
bindHost string // host address to bind HTTP server on
|
|
|
|
bindPort int // port to serve HTTP pages on
|
|
|
|
logFile string // Path to the log file. If empty, write to stdout. If "syslog", writes to syslog
|
2019-04-05 12:19:28 +03:00
|
|
|
pidFile string // File name to save PID to
|
2019-04-30 15:26:57 +03:00
|
|
|
checkConfig bool // Check configuration and exit
|
2019-05-27 18:48:33 +03:00
|
|
|
disableUpdate bool // If set, don't check for updates
|
2019-02-04 13:54:53 +03:00
|
|
|
|
|
|
|
// service control action (see service.ControlAction array + "status" command)
|
|
|
|
serviceControlAction string
|
2019-02-05 14:09:05 +03:00
|
|
|
|
|
|
|
// runningAsService flag is set to true when options are passed from the service runner
|
|
|
|
runningAsService bool
|
2019-02-04 13:54:53 +03:00
|
|
|
}
|
|
|
|
|
2019-01-24 20:11:01 +03:00
|
|
|
// loadOptions reads command line arguments and initializes configuration
|
2019-02-04 13:54:53 +03:00
|
|
|
func loadOptions() options {
|
|
|
|
o := options{}
|
|
|
|
|
2019-01-24 20:11:01 +03:00
|
|
|
var printHelp func()
|
|
|
|
var opts = []struct {
|
|
|
|
longName string
|
|
|
|
shortName string
|
|
|
|
description string
|
|
|
|
callbackWithValue func(value string)
|
|
|
|
callbackNoValue func()
|
|
|
|
}{
|
2019-04-30 15:49:00 +03:00
|
|
|
{"config", "c", "Path to the config file", func(value string) { o.configFilename = value }, nil},
|
|
|
|
{"work-dir", "w", "Path to the working directory", func(value string) { o.workDir = value }, nil},
|
|
|
|
{"host", "h", "Host address to bind HTTP server on", func(value string) { o.bindHost = value }, nil},
|
|
|
|
{"port", "p", "Port to serve HTTP pages on", func(value string) {
|
2019-01-24 20:11:01 +03:00
|
|
|
v, err := strconv.Atoi(value)
|
|
|
|
if err != nil {
|
|
|
|
panic("Got port that is not a number")
|
|
|
|
}
|
2019-02-04 13:54:53 +03:00
|
|
|
o.bindPort = v
|
|
|
|
}, nil},
|
2019-04-30 15:49:00 +03:00
|
|
|
{"service", "s", "Service control action: status, install, uninstall, start, stop, restart", func(value string) {
|
2019-02-04 13:54:53 +03:00
|
|
|
o.serviceControlAction = value
|
|
|
|
}, nil},
|
2019-04-30 15:49:00 +03:00
|
|
|
{"logfile", "l", "Path to log file. If empty: write to stdout; if 'syslog': write to system log", func(value string) {
|
2019-02-04 13:54:53 +03:00
|
|
|
o.logFile = value
|
2019-01-24 20:11:01 +03:00
|
|
|
}, nil},
|
2019-04-30 15:49:00 +03:00
|
|
|
{"pidfile", "", "Path to a file where PID is stored", func(value string) { o.pidFile = value }, nil},
|
2019-04-30 15:26:57 +03:00
|
|
|
{"check-config", "", "Check configuration and exit", nil, func() { o.checkConfig = true }},
|
2019-05-27 18:48:33 +03:00
|
|
|
{"no-check-update", "", "Don't check for updates", nil, func() { o.disableUpdate = true }},
|
2019-04-30 15:49:00 +03:00
|
|
|
{"verbose", "v", "Enable verbose output", nil, func() { o.verbose = true }},
|
|
|
|
{"help", "", "Print this help", nil, func() {
|
2019-02-04 13:54:53 +03:00
|
|
|
printHelp()
|
|
|
|
os.Exit(64)
|
|
|
|
}},
|
2019-01-24 20:11:01 +03:00
|
|
|
}
|
|
|
|
printHelp = func() {
|
|
|
|
fmt.Printf("Usage:\n\n")
|
|
|
|
fmt.Printf("%s [options]\n\n", os.Args[0])
|
|
|
|
fmt.Printf("Options:\n")
|
|
|
|
for _, opt := range opts {
|
2019-04-30 15:49:00 +03:00
|
|
|
val := ""
|
|
|
|
if opt.callbackWithValue != nil {
|
|
|
|
val = " VALUE"
|
|
|
|
}
|
2019-02-05 23:29:11 +03:00
|
|
|
if opt.shortName != "" {
|
2019-04-30 15:49:00 +03:00
|
|
|
fmt.Printf(" -%s, %-30s %s\n", opt.shortName, "--"+opt.longName+val, opt.description)
|
2019-02-05 23:29:11 +03:00
|
|
|
} else {
|
2019-04-30 15:49:00 +03:00
|
|
|
fmt.Printf(" %-34s %s\n", "--"+opt.longName+val, opt.description)
|
2019-02-05 23:29:11 +03:00
|
|
|
}
|
2019-01-24 20:11:01 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
for i := 1; i < len(os.Args); i++ {
|
|
|
|
v := os.Args[i]
|
|
|
|
knownParam := false
|
|
|
|
for _, opt := range opts {
|
2019-02-05 23:29:11 +03:00
|
|
|
if v == "--"+opt.longName || (opt.shortName != "" && v == "-"+opt.shortName) {
|
2019-01-24 20:11:01 +03:00
|
|
|
if opt.callbackWithValue != nil {
|
2019-02-04 13:54:53 +03:00
|
|
|
if i+1 >= len(os.Args) {
|
2019-02-25 16:44:22 +03:00
|
|
|
log.Error("Got %s without argument\n", v)
|
2019-01-24 20:11:01 +03:00
|
|
|
os.Exit(64)
|
|
|
|
}
|
|
|
|
i++
|
|
|
|
opt.callbackWithValue(os.Args[i])
|
|
|
|
} else if opt.callbackNoValue != nil {
|
|
|
|
opt.callbackNoValue()
|
|
|
|
}
|
|
|
|
knownParam = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !knownParam {
|
2019-02-25 16:44:22 +03:00
|
|
|
log.Error("unknown option %v\n", v)
|
2019-01-24 20:11:01 +03:00
|
|
|
printHelp()
|
|
|
|
os.Exit(64)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-04 13:54:53 +03:00
|
|
|
return o
|
2019-01-24 20:11:01 +03:00
|
|
|
}
|
2019-02-22 17:59:42 +03:00
|
|
|
|
|
|
|
// prints IP addresses which user can use to open the admin interface
|
|
|
|
// proto is either "http" or "https"
|
|
|
|
func printHTTPAddresses(proto string) {
|
|
|
|
var address string
|
2019-02-22 18:47:54 +03:00
|
|
|
|
|
|
|
if proto == "https" && config.TLS.ServerName != "" {
|
|
|
|
if config.TLS.PortHTTPS == 443 {
|
|
|
|
log.Printf("Go to https://%s", config.TLS.ServerName)
|
|
|
|
} else {
|
|
|
|
log.Printf("Go to https://%s:%d", config.TLS.ServerName, config.TLS.PortHTTPS)
|
|
|
|
}
|
|
|
|
} else if config.BindHost == "0.0.0.0" {
|
2019-02-22 17:59:42 +03:00
|
|
|
log.Println("AdGuard Home is available on the following addresses:")
|
|
|
|
ifaces, err := getValidNetInterfacesForWeb()
|
|
|
|
if err != nil {
|
|
|
|
// That's weird, but we'll ignore it
|
|
|
|
address = net.JoinHostPort(config.BindHost, strconv.Itoa(config.BindPort))
|
|
|
|
log.Printf("Go to %s://%s", proto, address)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, iface := range ifaces {
|
|
|
|
address = net.JoinHostPort(iface.Addresses[0], strconv.Itoa(config.BindPort))
|
|
|
|
log.Printf("Go to %s://%s", proto, address)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
address = net.JoinHostPort(config.BindHost, strconv.Itoa(config.BindPort))
|
|
|
|
log.Printf("Go to %s://%s", proto, address)
|
|
|
|
}
|
|
|
|
}
|