mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2024-12-29 18:18:25 +03:00
e77de2e67d
Closes #7314. Squashed commit of the following: commit f8b6ffeec2f0f96c947cf896c75d05efaca77caf Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Oct 29 14:14:41 2024 +0300 all: fix chlog commit9417b7dc51
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Oct 28 19:41:30 2024 +0300 aghos: imp doc commitb91f0e72a7
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Oct 28 19:26:15 2024 +0300 all: rm bin commit9008ee93b1
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Oct 28 18:23:54 2024 +0300 all: revert permcheck commitbcc85d50f5
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Oct 28 17:48:55 2024 +0300 all: use aghos more commit993e351712
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Oct 28 16:24:56 2024 +0300 all: fix more bugs commita22b0d265e
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Fri Oct 25 18:30:52 2024 +0300 all: fix bugs commita2309f812a
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Fri Oct 25 17:05:08 2024 +0300 all: fix chlog, imp api commit42c3f8e91c
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Fri Oct 25 16:04:47 2024 +0300 scripts: fix docs commit9e781ff18d
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Fri Oct 25 16:03:19 2024 +0300 scripts: imp docs commit1dbc784982
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Fri Oct 25 15:55:16 2024 +0300 all: use new functions, add tests commitdcbabaf4e3
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Fri Oct 25 13:23:50 2024 +0300 aghos: add stat commit72d7c0f881
Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Thu Oct 24 17:10:30 2024 +0300 aghos: add windows functions
301 lines
8 KiB
Go
301 lines
8 KiB
Go
// Package configmgr defines the AdGuard Home on-disk configuration entities and
|
|
// configuration manager.
|
|
//
|
|
// TODO(a.garipov): Add tests.
|
|
package configmgr
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"io/fs"
|
|
"net/netip"
|
|
"os"
|
|
"slices"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghos"
|
|
"github.com/AdguardTeam/AdGuardHome/internal/next/agh"
|
|
"github.com/AdguardTeam/AdGuardHome/internal/next/dnssvc"
|
|
"github.com/AdguardTeam/AdGuardHome/internal/next/websvc"
|
|
"github.com/AdguardTeam/golibs/errors"
|
|
"github.com/AdguardTeam/golibs/log"
|
|
"github.com/AdguardTeam/golibs/timeutil"
|
|
"gopkg.in/yaml.v3"
|
|
)
|
|
|
|
// Configuration Manager
|
|
|
|
// Manager handles full and partial changes in the configuration, persisting
|
|
// them to disk if necessary.
|
|
//
|
|
// TODO(a.garipov): Support missing configs and default values.
|
|
type Manager struct {
|
|
// updMu makes sure that at most one reconfiguration is performed at a time.
|
|
// updMu protects all fields below.
|
|
updMu *sync.RWMutex
|
|
|
|
// dns is the DNS service.
|
|
dns *dnssvc.Service
|
|
|
|
// Web is the Web API service.
|
|
web *websvc.Service
|
|
|
|
// current is the current configuration.
|
|
current *config
|
|
|
|
// fileName is the name of the configuration file.
|
|
fileName string
|
|
}
|
|
|
|
// Validate returns an error if the configuration file with the given name does
|
|
// not exist or is invalid.
|
|
func Validate(fileName string) (err error) {
|
|
conf, err := read(fileName)
|
|
if err != nil {
|
|
// Don't wrap the error, because it's informative enough as is.
|
|
return err
|
|
}
|
|
|
|
// Don't wrap the error, because it's informative enough as is.
|
|
return conf.validate()
|
|
}
|
|
|
|
// Config contains the configuration parameters for the configuration manager.
|
|
type Config struct {
|
|
// Frontend is the filesystem with the frontend files.
|
|
Frontend fs.FS
|
|
|
|
// WebAddr is the initial or override address for the Web UI. It is not
|
|
// written to the configuration file.
|
|
WebAddr netip.AddrPort
|
|
|
|
// Start is the time of start of AdGuard Home.
|
|
Start time.Time
|
|
|
|
// FileName is the path to the configuration file.
|
|
FileName string
|
|
}
|
|
|
|
// New creates a new *Manager that persists changes to the file pointed to by
|
|
// c.FileName. It reads the configuration file and populates the service
|
|
// fields. c must not be nil.
|
|
func New(ctx context.Context, c *Config) (m *Manager, err error) {
|
|
conf, err := read(c.FileName)
|
|
if err != nil {
|
|
// Don't wrap the error, because it's informative enough as is.
|
|
return nil, err
|
|
}
|
|
|
|
err = conf.validate()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("validating config: %w", err)
|
|
}
|
|
|
|
m = &Manager{
|
|
updMu: &sync.RWMutex{},
|
|
current: conf,
|
|
fileName: c.FileName,
|
|
}
|
|
|
|
err = m.assemble(ctx, conf, c.Frontend, c.WebAddr, c.Start)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("creating config manager: %w", err)
|
|
}
|
|
|
|
return m, nil
|
|
}
|
|
|
|
// read reads and decodes configuration from the provided filename.
|
|
func read(fileName string) (conf *config, err error) {
|
|
defer func() { err = errors.Annotate(err, "reading config: %w") }()
|
|
|
|
conf = &config{}
|
|
f, err := os.Open(fileName)
|
|
if err != nil {
|
|
// Don't wrap the error, because it's informative enough as is.
|
|
return nil, err
|
|
}
|
|
defer func() { err = errors.WithDeferred(err, f.Close()) }()
|
|
|
|
err = yaml.NewDecoder(f).Decode(conf)
|
|
if err != nil {
|
|
// Don't wrap the error, because it's informative enough as is.
|
|
return nil, err
|
|
}
|
|
|
|
return conf, nil
|
|
}
|
|
|
|
// assemble creates all services and puts them into the corresponding fields.
|
|
// The fields of conf must not be modified after calling assemble.
|
|
func (m *Manager) assemble(
|
|
ctx context.Context,
|
|
conf *config,
|
|
frontend fs.FS,
|
|
webAddr netip.AddrPort,
|
|
start time.Time,
|
|
) (err error) {
|
|
dnsConf := &dnssvc.Config{
|
|
Addresses: conf.DNS.Addresses,
|
|
BootstrapServers: conf.DNS.BootstrapDNS,
|
|
UpstreamServers: conf.DNS.UpstreamDNS,
|
|
DNS64Prefixes: conf.DNS.DNS64Prefixes,
|
|
UpstreamTimeout: conf.DNS.UpstreamTimeout.Duration,
|
|
BootstrapPreferIPv6: conf.DNS.BootstrapPreferIPv6,
|
|
UseDNS64: conf.DNS.UseDNS64,
|
|
}
|
|
err = m.updateDNS(ctx, dnsConf)
|
|
if err != nil {
|
|
return fmt.Errorf("assembling dnssvc: %w", err)
|
|
}
|
|
|
|
webSvcConf := &websvc.Config{
|
|
Pprof: &websvc.PprofConfig{
|
|
Port: conf.HTTP.Pprof.Port,
|
|
Enabled: conf.HTTP.Pprof.Enabled,
|
|
},
|
|
ConfigManager: m,
|
|
Frontend: frontend,
|
|
// TODO(a.garipov): Fill from config file.
|
|
TLS: nil,
|
|
Start: start,
|
|
Addresses: conf.HTTP.Addresses,
|
|
SecureAddresses: conf.HTTP.SecureAddresses,
|
|
OverrideAddress: webAddr,
|
|
Timeout: conf.HTTP.Timeout.Duration,
|
|
ForceHTTPS: conf.HTTP.ForceHTTPS,
|
|
}
|
|
|
|
err = m.updateWeb(ctx, webSvcConf)
|
|
if err != nil {
|
|
return fmt.Errorf("assembling websvc: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// write writes the current configuration to disk.
|
|
func (m *Manager) write() (err error) {
|
|
b, err := yaml.Marshal(m.current)
|
|
if err != nil {
|
|
return fmt.Errorf("encoding: %w", err)
|
|
}
|
|
|
|
err = aghos.WriteFile(m.fileName, b, aghos.DefaultPermFile)
|
|
if err != nil {
|
|
return fmt.Errorf("writing: %w", err)
|
|
}
|
|
|
|
log.Info("configmgr: written to %q", m.fileName)
|
|
|
|
return nil
|
|
}
|
|
|
|
// DNS returns the current DNS service. It is safe for concurrent use.
|
|
func (m *Manager) DNS() (dns agh.ServiceWithConfig[*dnssvc.Config]) {
|
|
m.updMu.RLock()
|
|
defer m.updMu.RUnlock()
|
|
|
|
return m.dns
|
|
}
|
|
|
|
// UpdateDNS implements the [websvc.ConfigManager] interface for *Manager. The
|
|
// fields of c must not be modified after calling UpdateDNS.
|
|
func (m *Manager) UpdateDNS(ctx context.Context, c *dnssvc.Config) (err error) {
|
|
m.updMu.Lock()
|
|
defer m.updMu.Unlock()
|
|
|
|
// TODO(a.garipov): Update and write the configuration file. Return an
|
|
// error if something went wrong.
|
|
|
|
err = m.updateDNS(ctx, c)
|
|
if err != nil {
|
|
return fmt.Errorf("reassembling dnssvc: %w", err)
|
|
}
|
|
|
|
m.updateCurrentDNS(c)
|
|
|
|
return m.write()
|
|
}
|
|
|
|
// updateDNS recreates the DNS service. m.updMu is expected to be locked.
|
|
func (m *Manager) updateDNS(ctx context.Context, c *dnssvc.Config) (err error) {
|
|
if prev := m.dns; prev != nil {
|
|
err = prev.Shutdown(ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("shutting down dns svc: %w", err)
|
|
}
|
|
}
|
|
|
|
svc, err := dnssvc.New(c)
|
|
if err != nil {
|
|
return fmt.Errorf("creating dns svc: %w", err)
|
|
}
|
|
|
|
m.dns = svc
|
|
|
|
return nil
|
|
}
|
|
|
|
// updateCurrentDNS updates the DNS configuration in the current config.
|
|
func (m *Manager) updateCurrentDNS(c *dnssvc.Config) {
|
|
m.current.DNS.Addresses = slices.Clone(c.Addresses)
|
|
m.current.DNS.BootstrapDNS = slices.Clone(c.BootstrapServers)
|
|
m.current.DNS.UpstreamDNS = slices.Clone(c.UpstreamServers)
|
|
m.current.DNS.DNS64Prefixes = slices.Clone(c.DNS64Prefixes)
|
|
m.current.DNS.UpstreamTimeout = timeutil.Duration{Duration: c.UpstreamTimeout}
|
|
m.current.DNS.BootstrapPreferIPv6 = c.BootstrapPreferIPv6
|
|
m.current.DNS.UseDNS64 = c.UseDNS64
|
|
}
|
|
|
|
// Web returns the current web service. It is safe for concurrent use.
|
|
func (m *Manager) Web() (web agh.ServiceWithConfig[*websvc.Config]) {
|
|
m.updMu.RLock()
|
|
defer m.updMu.RUnlock()
|
|
|
|
return m.web
|
|
}
|
|
|
|
// UpdateWeb implements the [websvc.ConfigManager] interface for *Manager. The
|
|
// fields of c must not be modified after calling UpdateWeb.
|
|
func (m *Manager) UpdateWeb(ctx context.Context, c *websvc.Config) (err error) {
|
|
m.updMu.Lock()
|
|
defer m.updMu.Unlock()
|
|
|
|
err = m.updateWeb(ctx, c)
|
|
if err != nil {
|
|
return fmt.Errorf("reassembling websvc: %w", err)
|
|
}
|
|
|
|
m.updateCurrentWeb(c)
|
|
|
|
return m.write()
|
|
}
|
|
|
|
// updateWeb recreates the web service. m.upd is expected to be locked.
|
|
func (m *Manager) updateWeb(ctx context.Context, c *websvc.Config) (err error) {
|
|
if prev := m.web; prev != nil {
|
|
err = prev.Shutdown(ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("shutting down web svc: %w", err)
|
|
}
|
|
}
|
|
|
|
m.web, err = websvc.New(c)
|
|
if err != nil {
|
|
return fmt.Errorf("creating web svc: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// updateCurrentWeb updates the web configuration in the current config.
|
|
func (m *Manager) updateCurrentWeb(c *websvc.Config) {
|
|
// TODO(a.garipov): Update pprof from API?
|
|
|
|
m.current.HTTP.Addresses = slices.Clone(c.Addresses)
|
|
m.current.HTTP.SecureAddresses = slices.Clone(c.SecureAddresses)
|
|
m.current.HTTP.Timeout = timeutil.Duration{Duration: c.Timeout}
|
|
m.current.HTTP.ForceHTTPS = c.ForceHTTPS
|
|
}
|