mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2024-11-22 13:05:36 +03:00
aac36a2d2f
Updates #951. Squashed commit of the following: commit 6b840fd516f5a87fde0420e3aceb9c239b22c974 Author: Stanislav Chzhen <s.chzhen@adguard.com> Date: Tue Aug 29 19:53:03 2023 +0300 client: imp docs more commit 7fc8f0363fbe4c4266cb0f67428fe4d18c351d2d Author: Stanislav Chzhen <s.chzhen@adguard.com> Date: Tue Aug 29 19:40:00 2023 +0300 client: imp docs commit 00bc14d5760614f2797714cdc2c4c19b1a94b86e Author: Ildar Kamalov <ik@adguard.com> Date: Mon Aug 28 18:43:49 2023 +0300 try to fix lock file commit d749df74b576091e0b58928d86ea8b3b49f919da Merge: c69f9230be1f6229e5
Author: Stanislav Chzhen <s.chzhen@adguard.com> Date: Mon Aug 28 18:14:02 2023 +0300 Merge branch 'master' into 951-blocked-services-schedule-api commit c69f9230b12f7c983db06b74324b3df77d74b32b Author: Ildar Kamalov <ik@adguard.com> Date: Mon Aug 28 17:16:20 2023 +0300 revert eslintrc commit b37916c2dff0ddea5293d87570bb58e3443d2d21 Author: Ildar Kamalov <ik@adguard.com> Date: Mon Aug 28 12:02:39 2023 +0300 fix translations commit f5bb67d81506c687d0abd580049a3eee0af808e0 Author: Ildar Kamalov <ik@adguard.com> Date: Mon Aug 28 11:43:57 2023 +0300 fix helpers commit 13ec6a8b3a0acfb62762ae7e46c6e98eb7c82212 Author: Ildar Kamalov <ik@adguard.com> Date: Mon Aug 28 11:24:57 2023 +0300 remove todo commit 23724ec2fd683ed17b9f1cee841ad9aaf4c9d04f Author: Ildar Kamalov <ik@adguard.com> Date: Mon Aug 28 09:56:56 2023 +0300 add clients schedule form commit 84d29e558a329068e64e7a95ee183946aa4515b5 Author: Ildar Kamalov <ik@adguard.com> Date: Fri Aug 25 17:44:40 2023 +0300 fix schedule form commit 83e4017688082e9eb670091d5a24d98157050502 Author: Ildar Kamalov <ik@adguard.com> Date: Fri Aug 18 12:58:16 2023 +0300 remove unused commit ef2b68e138da382e3cf42586ae604e12d9493504 Author: Ildar Kamalov <ik@adguard.com> Date: Fri Aug 18 12:57:37 2023 +0300 client: fix translation string commit 32ea80c968f52f18adbc811b2f06874644cdfe20 Author: Ildar Kamalov <ik@adguard.com> Date: Fri Aug 18 12:26:26 2023 +0300 wip schedule commit 9b770873859186c9424c8d108812e32ddff33bad Author: Stanislav Chzhen <s.chzhen@adguard.com> Date: Fri Jul 21 14:29:50 2023 +0300 all: imp naming commit ea4e9514ea3b264bcce7f2a301db817de4e87059 Author: Stanislav Chzhen <s.chzhen@adguard.com> Date: Wed Jul 19 18:09:27 2023 +0300 all: imp code commit 98a705bdaa5c1e79394c73e5d75af2416fe9f297 Author: Stanislav Chzhen <s.chzhen@adguard.com> Date: Tue Jul 18 18:23:26 2023 +0300 all: imp naming commit 4f84b55c7bfc9f7b680feac0ec45f5ea9189299a Author: Stanislav Chzhen <s.chzhen@adguard.com> Date: Fri Jul 14 15:01:17 2023 +0300 all: add global schedule api commit 87cf1646869ee9138964b47a27b7493674c8854a Merge: cabb80ac12adc8624c
Author: Stanislav Chzhen <s.chzhen@adguard.com> Date: Fri Jul 14 12:09:29 2023 +0300 Merge branch 'master' into 951-blocked-services-schedule-api commit cabb80ac16de437a8118bb0166479574379c97a3 Author: Stanislav Chzhen <s.chzhen@adguard.com> Date: Thu Jul 13 13:37:23 2023 +0300 openapi: fix typo commit 2279b03acbcfc3d76216f8aaf30ae1c7894127bc Author: Stanislav Chzhen <s.chzhen@adguard.com> Date: Thu Jul 13 12:26:19 2023 +0300 all: imp docs ... and 3 more commits
225 lines
5.8 KiB
Go
225 lines
5.8 KiB
Go
package home
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
"os/exec"
|
|
"runtime"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghalg"
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghhttp"
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
|
|
"github.com/AdguardTeam/AdGuardHome/internal/updater"
|
|
"github.com/AdguardTeam/golibs/errors"
|
|
"github.com/AdguardTeam/golibs/log"
|
|
)
|
|
|
|
// temporaryError is the interface for temporary errors from the Go standard
|
|
// library.
|
|
type temporaryError interface {
|
|
error
|
|
Temporary() (ok bool)
|
|
}
|
|
|
|
// handleVersionJSON is the handler for the POST /control/version.json HTTP API.
|
|
//
|
|
// TODO(a.garipov): Find out if this API used with a GET method by anyone.
|
|
func (web *webAPI) handleVersionJSON(w http.ResponseWriter, r *http.Request) {
|
|
resp := &versionResponse{}
|
|
if web.conf.disableUpdate {
|
|
resp.Disabled = true
|
|
aghhttp.WriteJSONResponseOK(w, r, resp)
|
|
|
|
return
|
|
}
|
|
|
|
req := &struct {
|
|
Recheck bool `json:"recheck_now"`
|
|
}{}
|
|
|
|
var err error
|
|
if r.ContentLength != 0 {
|
|
err = json.NewDecoder(r.Body).Decode(req)
|
|
if err != nil {
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "parsing request: %s", err)
|
|
|
|
return
|
|
}
|
|
}
|
|
|
|
err = web.requestVersionInfo(resp, req.Recheck)
|
|
if err != nil {
|
|
// Don't wrap the error, because it's informative enough as is.
|
|
aghhttp.Error(r, w, http.StatusBadGateway, "%s", err)
|
|
|
|
return
|
|
}
|
|
|
|
err = resp.setAllowedToAutoUpdate()
|
|
if err != nil {
|
|
// Don't wrap the error, because it's informative enough as is.
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "%s", err)
|
|
|
|
return
|
|
}
|
|
|
|
aghhttp.WriteJSONResponseOK(w, r, resp)
|
|
}
|
|
|
|
// requestVersionInfo sets the VersionInfo field of resp if it can reach the
|
|
// update server.
|
|
func (web *webAPI) requestVersionInfo(resp *versionResponse, recheck bool) (err error) {
|
|
updater := web.conf.updater
|
|
for i := 0; i != 3; i++ {
|
|
resp.VersionInfo, err = updater.VersionInfo(recheck)
|
|
if err != nil {
|
|
var terr temporaryError
|
|
if errors.As(err, &terr) && terr.Temporary() {
|
|
// Temporary network error. This case may happen while we're
|
|
// restarting our DNS server. Log and sleep for some time.
|
|
//
|
|
// See https://github.com/AdguardTeam/AdGuardHome/issues/934.
|
|
d := time.Duration(i) * time.Second
|
|
log.Info("update: temp net error: %q; sleeping for %s and retrying", err, d)
|
|
time.Sleep(d)
|
|
|
|
continue
|
|
}
|
|
}
|
|
|
|
break
|
|
}
|
|
|
|
if err != nil {
|
|
vcu := updater.VersionCheckURL()
|
|
|
|
return fmt.Errorf("getting version info from %s: %w", vcu, err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// handleUpdate performs an update to the latest available version procedure.
|
|
func (web *webAPI) handleUpdate(w http.ResponseWriter, r *http.Request) {
|
|
updater := web.conf.updater
|
|
if updater.NewVersion() == "" {
|
|
aghhttp.Error(r, w, http.StatusBadRequest, "/update request isn't allowed now")
|
|
|
|
return
|
|
}
|
|
|
|
// Retain the current absolute path of the executable, since the updater is
|
|
// likely to change the position current one to the backup directory.
|
|
//
|
|
// See https://github.com/AdguardTeam/AdGuardHome/issues/4735.
|
|
execPath, err := os.Executable()
|
|
if err != nil {
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "getting path: %s", err)
|
|
|
|
return
|
|
}
|
|
|
|
err = updater.Update(false)
|
|
if err != nil {
|
|
aghhttp.Error(r, w, http.StatusInternalServerError, "%s", err)
|
|
|
|
return
|
|
}
|
|
|
|
aghhttp.OK(w)
|
|
if f, ok := w.(http.Flusher); ok {
|
|
f.Flush()
|
|
}
|
|
|
|
// The background context is used because the underlying functions wrap it
|
|
// with timeout and shut down the server, which handles current request. It
|
|
// also should be done in a separate goroutine for the same reason.
|
|
go finishUpdate(context.Background(), execPath, web.conf.runningAsService)
|
|
}
|
|
|
|
// versionResponse is the response for /control/version.json endpoint.
|
|
type versionResponse struct {
|
|
updater.VersionInfo
|
|
Disabled bool `json:"disabled"`
|
|
}
|
|
|
|
// setAllowedToAutoUpdate sets CanAutoUpdate to true if AdGuard Home is actually
|
|
// allowed to perform an automatic update by the OS.
|
|
func (vr *versionResponse) setAllowedToAutoUpdate() (err error) {
|
|
if vr.CanAutoUpdate != aghalg.NBTrue {
|
|
return nil
|
|
}
|
|
|
|
tlsConf := &tlsConfigSettings{}
|
|
Context.tls.WriteDiskConfig(tlsConf)
|
|
|
|
canUpdate := true
|
|
if tlsConfUsesPrivilegedPorts(tlsConf) ||
|
|
config.HTTPConfig.Address.Port() < 1024 ||
|
|
config.DNS.Port < 1024 {
|
|
canUpdate, err = aghnet.CanBindPrivilegedPorts()
|
|
if err != nil {
|
|
return fmt.Errorf("checking ability to bind privileged ports: %w", err)
|
|
}
|
|
}
|
|
|
|
vr.CanAutoUpdate = aghalg.BoolToNullBool(canUpdate)
|
|
|
|
return nil
|
|
}
|
|
|
|
// tlsConfUsesPrivilegedPorts returns true if the provided TLS configuration
|
|
// indicates that privileged ports are used.
|
|
func tlsConfUsesPrivilegedPorts(c *tlsConfigSettings) (ok bool) {
|
|
return c.Enabled && (c.PortHTTPS < 1024 || c.PortDNSOverTLS < 1024 || c.PortDNSOverQUIC < 1024)
|
|
}
|
|
|
|
// finishUpdate completes an update procedure.
|
|
func finishUpdate(ctx context.Context, execPath string, runningAsService bool) {
|
|
var err error
|
|
|
|
log.Info("stopping all tasks")
|
|
|
|
cleanup(ctx)
|
|
cleanupAlways()
|
|
|
|
if runtime.GOOS == "windows" {
|
|
if runningAsService {
|
|
// NOTE: We can't restart the service via "kardianos/service"
|
|
// package, because it kills the process first we can't start a new
|
|
// instance, because Windows doesn't allow it.
|
|
//
|
|
// TODO(a.garipov): Recheck the claim above.
|
|
cmd := exec.Command("cmd", "/c", "net stop AdGuardHome & net start AdGuardHome")
|
|
err = cmd.Start()
|
|
if err != nil {
|
|
log.Fatalf("restarting: stopping: %s", err)
|
|
}
|
|
|
|
os.Exit(0)
|
|
}
|
|
|
|
cmd := exec.Command(execPath, os.Args[1:]...)
|
|
log.Info("restarting: %q %q", execPath, os.Args[1:])
|
|
cmd.Stdin = os.Stdin
|
|
cmd.Stdout = os.Stdout
|
|
cmd.Stderr = os.Stderr
|
|
err = cmd.Start()
|
|
if err != nil {
|
|
log.Fatalf("restarting:: %s", err)
|
|
}
|
|
|
|
os.Exit(0)
|
|
}
|
|
|
|
log.Info("restarting: %q %q", execPath, os.Args[1:])
|
|
err = syscall.Exec(execPath, os.Args, os.Environ())
|
|
if err != nil {
|
|
log.Fatalf("restarting: %s", err)
|
|
}
|
|
}
|