package home import ( "context" "crypto/tls" "fmt" "io/fs" "log/slog" "net/http" "net/netip" "runtime" "sync" "time" "github.com/AdguardTeam/AdGuardHome/internal/aghnet" "github.com/AdguardTeam/AdGuardHome/internal/updater" "github.com/AdguardTeam/golibs/errors" "github.com/AdguardTeam/golibs/log" "github.com/AdguardTeam/golibs/logutil/slogutil" "github.com/AdguardTeam/golibs/netutil" "github.com/AdguardTeam/golibs/netutil/httputil" "github.com/AdguardTeam/golibs/netutil/urlutil" "github.com/NYTimes/gziphandler" "github.com/quic-go/quic-go/http3" "golang.org/x/net/http2" "golang.org/x/net/http2/h2c" ) // TODO(a.garipov): Make configurable. const ( // readTimeout is the maximum duration for reading the entire request, // including the body. readTimeout = 60 * time.Second // readHdrTimeout is the amount of time allowed to read request headers. readHdrTimeout = 60 * time.Second // writeTimeout is the maximum duration before timing out writes of the // response. writeTimeout = 5 * time.Minute ) type webConfig struct { updater *updater.Updater clientFS fs.FS // BindAddr is the binding address with port for plain HTTP web interface. BindAddr netip.AddrPort // ReadTimeout is an option to pass to http.Server for setting an // appropriate field. ReadTimeout time.Duration // ReadHeaderTimeout is an option to pass to http.Server for setting an // appropriate field. ReadHeaderTimeout time.Duration // WriteTimeout is an option to pass to http.Server for setting an // appropriate field. WriteTimeout time.Duration firstRun bool // disableUpdate, if true, tells AdGuard Home to not check for updates. disableUpdate bool // runningAsService flag is set to true when options are passed from the // service runner. runningAsService bool serveHTTP3 bool } // httpsServer contains the data for the HTTPS server. type httpsServer struct { // server is the pre-HTTP/3 HTTPS server. server *http.Server // server3 is the HTTP/3 HTTPS server. If it is not nil, // [httpsServer.server] must also be non-nil. server3 *http3.Server // TODO(a.garipov): Why is there a *sync.Cond here? Remove. cond *sync.Cond condLock sync.Mutex cert tls.Certificate inShutdown bool enabled bool } // webAPI is the web UI and API server. type webAPI struct { conf *webConfig // TODO(a.garipov): Refactor all these servers. httpServer *http.Server // logger is a slog logger used in webAPI. It must not be nil. logger *slog.Logger // baseLogger is used to create loggers for other entities. It must not be // nil. baseLogger *slog.Logger // httpsServer is the server that handles HTTPS traffic. If it is not nil, // [Web.http3Server] must also not be nil. httpsServer httpsServer } // newWebAPI creates a new instance of the web UI and API server. baseLogger // must not be nil. // // TODO(a.garipov): Return a proper error. func newWebAPI(ctx context.Context, conf *webConfig, baseLogger *slog.Logger) (w *webAPI) { logger := baseLogger.With(slogutil.KeyPrefix, "webapi") logger.InfoContext(ctx, "initializing") w = &webAPI{ conf: conf, logger: logger, baseLogger: baseLogger, } clientFS := http.FileServer(http.FS(conf.clientFS)) // if not configured, redirect / to /install.html, otherwise redirect /install.html to / Context.mux.Handle("/", withMiddlewares(clientFS, gziphandler.GzipHandler, optionalAuthHandler, postInstallHandler)) // add handlers for /install paths, we only need them when we're not configured yet if conf.firstRun { logger.InfoContext( ctx, "This is the first launch of AdGuard Home, redirecting everything to /install.html", ) Context.mux.Handle("/install.html", preInstallHandler(clientFS)) w.registerInstallHandlers() } else { registerControlHandlers(w) } w.httpsServer.cond = sync.NewCond(&w.httpsServer.condLock) return w } // webCheckPortAvailable checks if port, which is considered an HTTPS port, is // available, unless the HTTPS server isn't active. // // TODO(a.garipov): Adapt for HTTP/3. func webCheckPortAvailable(port uint16) (ok bool) { if Context.web.httpsServer.server != nil { return true } addrPort := netip.AddrPortFrom(config.HTTPConfig.Address.Addr(), port) err := aghnet.CheckPort("tcp", addrPort) if err != nil { log.Info("web: warning: checking https port: %s", err) return false } return true } // tlsConfigChanged updates the TLS configuration and restarts the HTTPS server // if necessary. func (web *webAPI) tlsConfigChanged(ctx context.Context, tlsConf tlsConfigSettings) { defer slogutil.RecoverAndLog(ctx, web.logger) web.logger.DebugContext(ctx, "applying new tls configuration") enabled := tlsConf.Enabled && tlsConf.PortHTTPS != 0 && len(tlsConf.PrivateKeyData) != 0 && len(tlsConf.CertificateChainData) != 0 var cert tls.Certificate var err error if enabled { cert, err = tls.X509KeyPair(tlsConf.CertificateChainData, tlsConf.PrivateKeyData) if err != nil { panic(err) } } web.httpsServer.cond.L.Lock() if web.httpsServer.server != nil { var cancel context.CancelFunc ctx, cancel = context.WithTimeout(ctx, shutdownTimeout) shutdownSrv(ctx, web.httpsServer.server) shutdownSrv3(web.httpsServer.server3) cancel() } web.httpsServer.enabled = enabled web.httpsServer.cert = cert web.httpsServer.cond.Broadcast() web.httpsServer.cond.L.Unlock() } // loggerKeyServer is the key used by [webAPI] to identify servers. const loggerKeyServer = "server" // start - start serving HTTP requests func (web *webAPI) start(ctx context.Context) { web.logger.InfoContext(ctx, "AdGuard Home is available at the following addresses:") defer slogutil.RecoverAndLog(ctx, web.logger) // for https, we have a separate goroutine loop go web.tlsServerLoop(ctx) // this loop is used as an ability to change listening host and/or port for !web.httpsServer.inShutdown { printHTTPAddresses(urlutil.SchemeHTTP) errs := make(chan error, 2) // Use an h2c handler to support unencrypted HTTP/2, e.g. for proxies. hdlr := h2c.NewHandler(withMiddlewares(Context.mux, limitRequestBody), &http2.Server{}) logger := web.baseLogger.With(loggerKeyServer, "plain") // Create a new instance, because the Web is not usable after Shutdown. web.httpServer = &http.Server{ Addr: web.conf.BindAddr.String(), Handler: hdlr, ReadTimeout: web.conf.ReadTimeout, ReadHeaderTimeout: web.conf.ReadHeaderTimeout, WriteTimeout: web.conf.WriteTimeout, ErrorLog: slog.NewLogLogger(logger.Handler(), slog.LevelError), } go func() { errs <- web.httpServer.ListenAndServe() }() err := <-errs if !errors.Is(err, http.ErrServerClosed) { cleanupAlways() panic(err) } // We use ErrServerClosed as a sign that we need to rebind on a new // address, so go back to the start of the loop. } } // close gracefully shuts down the HTTP servers. func (web *webAPI) close(ctx context.Context) { web.logger.InfoContext(ctx, "stopping http server") web.httpsServer.cond.L.Lock() web.httpsServer.inShutdown = true web.httpsServer.cond.L.Unlock() var cancel context.CancelFunc ctx, cancel = context.WithTimeout(ctx, shutdownTimeout) defer cancel() shutdownSrv(ctx, web.httpsServer.server) shutdownSrv3(web.httpsServer.server3) shutdownSrv(ctx, web.httpServer) web.logger.InfoContext(ctx, "stopped http server") } func (web *webAPI) tlsServerLoop(ctx context.Context) { defer slogutil.RecoverAndLog(ctx, web.logger) for { web.httpsServer.cond.L.Lock() if web.httpsServer.inShutdown { web.httpsServer.cond.L.Unlock() break } // this mechanism doesn't let us through until all conditions are met for !web.httpsServer.enabled { // sleep until necessary data is supplied web.httpsServer.cond.Wait() if web.httpsServer.inShutdown { web.httpsServer.cond.L.Unlock() return } } web.httpsServer.cond.L.Unlock() var portHTTPS uint16 func() { config.RLock() defer config.RUnlock() portHTTPS = config.TLS.PortHTTPS }() addr := netip.AddrPortFrom(web.conf.BindAddr.Addr(), portHTTPS).String() logger := web.baseLogger.With(loggerKeyServer, "https") web.httpsServer.server = &http.Server{ Addr: addr, Handler: withMiddlewares(Context.mux, limitRequestBody), TLSConfig: &tls.Config{ Certificates: []tls.Certificate{web.httpsServer.cert}, RootCAs: Context.tlsRoots, CipherSuites: Context.tlsCipherIDs, MinVersion: tls.VersionTLS12, }, ReadTimeout: web.conf.ReadTimeout, ReadHeaderTimeout: web.conf.ReadHeaderTimeout, WriteTimeout: web.conf.WriteTimeout, ErrorLog: slog.NewLogLogger(logger.Handler(), slog.LevelError), } printHTTPAddresses(urlutil.SchemeHTTPS) if web.conf.serveHTTP3 { go web.mustStartHTTP3(ctx, addr) } web.logger.DebugContext(ctx, "starting https server") err := web.httpsServer.server.ListenAndServeTLS("", "") if !errors.Is(err, http.ErrServerClosed) { cleanupAlways() panic(fmt.Errorf("https: %w", err)) } } } func (web *webAPI) mustStartHTTP3(ctx context.Context, address string) { web.httpsServer.server3 = &http3.Server{ // TODO(a.garipov): See if there is a way to use the error log as // well as timeouts here. Addr: address, TLSConfig: &tls.Config{ Certificates: []tls.Certificate{web.httpsServer.cert}, RootCAs: Context.tlsRoots, CipherSuites: Context.tlsCipherIDs, MinVersion: tls.VersionTLS12, }, Handler: withMiddlewares(Context.mux, limitRequestBody), } web.logger.DebugContext(ctx, "starting http/3 server") err := web.httpsServer.server3.ListenAndServe() if !errors.Is(err, http.ErrServerClosed) { cleanupAlways() panic(fmt.Errorf("http3: %w", err)) } } // startPprof launches the debug and profiling server on the provided port. func startPprof(baseLogger *slog.Logger, port uint16) { addr := netip.AddrPortFrom(netutil.IPv4Localhost(), port) runtime.SetBlockProfileRate(1) runtime.SetMutexProfileFraction(1) mux := http.NewServeMux() httputil.RoutePprof(mux) go func() { ctx := context.Background() logger := baseLogger.With(slogutil.KeyPrefix, "pprof") defer slogutil.RecoverAndLog(ctx, logger) logger.InfoContext(ctx, "listening", "addr", addr) err := http.ListenAndServe(addr.String(), mux) if !errors.Is(err, http.ErrServerClosed) { logger.ErrorContext(ctx, "shutting down", slogutil.KeyError, err) } }() }