mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2024-11-16 02:18:28 -07:00
9671050e5b
Squashed commit of the following:
commit 96d185cf4acc55b21a00d10072e0a641ef7655b8
Merge: 3b75a8cb 9b7c1181
Author: Simon Zolin <s.zolin@adguard.com>
Date: Wed Apr 22 15:57:50 2020 +0300
Merge remote-tracking branch 'origin/master' into add-pprof
commit 3b75a8cbec5d72be8865a56bfd7ebb8b0673c3bc
Author: Simon Zolin <s.zolin@adguard.com>
Date: Wed Apr 22 13:52:36 2020 +0300
* use localhost:6060 for pprof
commit f66f2fbd7409b98cd9f7d297c268fca998f85e3b
Author: Simon Zolin <s.zolin@adguard.com>
Date: Wed Apr 22 12:46:25 2020 +0300
minor
commit 6e38712fb5542f612675858eb957efdefc38f9b0
Author: Simon Zolin <s.zolin@adguard.com>
Date: Wed Apr 22 11:59:39 2020 +0300
use separate HTTP server for pprof
commit 988d95b5fad22f536bf9204b6b96f3697cf9a589
Author: Simon Zolin <s.zolin@adguard.com>
Date: Tue Apr 21 17:04:04 2020 +0300
minor
commit 90ee6e9753be2af49467687cdf71c35b3943b78b
Author: Simon Zolin <s.zolin@adguard.com>
Date: Tue Apr 21 16:57:38 2020 +0300
* use modified version of pprof
commit 413002220fe0717950539a8b7e6b0f31cef31bb8
Author: Simon Zolin <s.zolin@adguard.com>
Date: Mon Apr 20 16:35:21 2020 +0300
minor
commit d4655d3849de1d9fe97efdb7f18fc21d5ac19eda
Author: Simon Zolin <s.zolin@adguard.com>
Date: Mon Apr 20 15:57:57 2020 +0300
+ config: add "enable_pprof" setting
284 lines
9.2 KiB
Go
284 lines
9.2 KiB
Go
package home
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/dhcpd"
|
|
"github.com/AdguardTeam/AdGuardHome/dnsfilter"
|
|
"github.com/AdguardTeam/AdGuardHome/dnsforward"
|
|
"github.com/AdguardTeam/AdGuardHome/querylog"
|
|
"github.com/AdguardTeam/AdGuardHome/stats"
|
|
"github.com/AdguardTeam/golibs/file"
|
|
"github.com/AdguardTeam/golibs/log"
|
|
yaml "gopkg.in/yaml.v2"
|
|
)
|
|
|
|
const (
|
|
dataDir = "data" // data storage
|
|
filterDir = "filters" // cache location for downloaded filters, it's under DataDir
|
|
)
|
|
|
|
// logSettings
|
|
type logSettings struct {
|
|
LogFile string `yaml:"log_file"` // Path to the log file. If empty, write to stdout. If "syslog", writes to syslog
|
|
Verbose bool `yaml:"verbose"` // If true, verbose logging is enabled
|
|
}
|
|
|
|
// configuration is loaded from YAML
|
|
// field ordering is important -- yaml fields will mirror ordering from here
|
|
type configuration struct {
|
|
// Raw file data to avoid re-reading of configuration file
|
|
// It's reset after config is parsed
|
|
fileData []byte
|
|
|
|
// cached version.json to avoid hammering github.io for each page reload
|
|
versionCheckJSON []byte
|
|
versionCheckLastTime time.Time
|
|
|
|
BindHost string `yaml:"bind_host"` // BindHost is the IP address of the HTTP server to bind to
|
|
BindPort int `yaml:"bind_port"` // BindPort is the port the HTTP server
|
|
Users []User `yaml:"users"` // Users that can access HTTP server
|
|
ProxyURL string `yaml:"http_proxy"` // Proxy address for our HTTP client
|
|
Language string `yaml:"language"` // two-letter ISO 639-1 language code
|
|
RlimitNoFile uint `yaml:"rlimit_nofile"` // Maximum number of opened fd's per process (0: default)
|
|
DebugPProf bool `yaml:"debug_pprof"` // Enable pprof HTTP server on port 6060
|
|
|
|
// TTL for a web session (in hours)
|
|
// An active session is automatically refreshed once a day.
|
|
WebSessionTTLHours uint32 `yaml:"web_session_ttl"`
|
|
|
|
DNS dnsConfig `yaml:"dns"`
|
|
TLS tlsConfigSettings `yaml:"tls"`
|
|
|
|
Filters []filter `yaml:"filters"`
|
|
WhitelistFilters []filter `yaml:"whitelist_filters"`
|
|
UserRules []string `yaml:"user_rules"`
|
|
|
|
DHCP dhcpd.ServerConfig `yaml:"dhcp"`
|
|
|
|
// Note: this array is filled only before file read/write and then it's cleared
|
|
Clients []clientObject `yaml:"clients"`
|
|
|
|
logSettings `yaml:",inline"`
|
|
|
|
sync.RWMutex `yaml:"-"`
|
|
|
|
SchemaVersion int `yaml:"schema_version"` // keeping last so that users will be less tempted to change it -- used when upgrading between versions
|
|
}
|
|
|
|
// field ordering is important -- yaml fields will mirror ordering from here
|
|
type dnsConfig struct {
|
|
BindHost string `yaml:"bind_host"`
|
|
Port int `yaml:"port"`
|
|
|
|
// time interval for statistics (in days)
|
|
StatsInterval uint32 `yaml:"statistics_interval"`
|
|
|
|
QueryLogEnabled bool `yaml:"querylog_enabled"` // if true, query log is enabled
|
|
QueryLogInterval uint32 `yaml:"querylog_interval"` // time interval for query log (in days)
|
|
QueryLogMemSize uint32 `yaml:"querylog_size_memory"` // number of entries kept in memory before they are flushed to disk
|
|
AnonymizeClientIP bool `yaml:"anonymize_client_ip"` // anonymize clients' IP addresses in logs and stats
|
|
|
|
dnsforward.FilteringConfig `yaml:",inline"`
|
|
|
|
FilteringEnabled bool `yaml:"filtering_enabled"` // whether or not use filter lists
|
|
FiltersUpdateIntervalHours uint32 `yaml:"filters_update_interval"` // time period to update filters (in hours)
|
|
DnsfilterConf dnsfilter.Config `yaml:",inline"`
|
|
}
|
|
|
|
type tlsConfigSettings struct {
|
|
Enabled bool `yaml:"enabled" json:"enabled"` // Enabled is the encryption (DOT/DOH/HTTPS) status
|
|
ServerName string `yaml:"server_name" json:"server_name,omitempty"` // ServerName is the hostname of your HTTPS/TLS server
|
|
ForceHTTPS bool `yaml:"force_https" json:"force_https,omitempty"` // ForceHTTPS: if true, forces HTTP->HTTPS redirect
|
|
PortHTTPS int `yaml:"port_https" json:"port_https,omitempty"` // HTTPS port. If 0, HTTPS will be disabled
|
|
PortDNSOverTLS int `yaml:"port_dns_over_tls" json:"port_dns_over_tls,omitempty"` // DNS-over-TLS port. If 0, DOT will be disabled
|
|
|
|
// Allow DOH queries via unencrypted HTTP (e.g. for reverse proxying)
|
|
AllowUnencryptedDOH bool `yaml:"allow_unencrypted_doh" json:"allow_unencrypted_doh"`
|
|
|
|
dnsforward.TLSConfig `yaml:",inline" json:",inline"`
|
|
}
|
|
|
|
// initialize to default values, will be changed later when reading config or parsing command line
|
|
var config = configuration{
|
|
BindPort: 3000,
|
|
BindHost: "0.0.0.0",
|
|
DNS: dnsConfig{
|
|
BindHost: "0.0.0.0",
|
|
Port: 53,
|
|
StatsInterval: 1,
|
|
FilteringConfig: dnsforward.FilteringConfig{
|
|
ProtectionEnabled: true, // whether or not use any of dnsfilter features
|
|
BlockingMode: "default", // mode how to answer filtered requests
|
|
BlockedResponseTTL: 10, // in seconds
|
|
Ratelimit: 20,
|
|
RefuseAny: true,
|
|
AllServers: false,
|
|
},
|
|
FilteringEnabled: true, // whether or not use filter lists
|
|
FiltersUpdateIntervalHours: 24,
|
|
},
|
|
TLS: tlsConfigSettings{
|
|
PortHTTPS: 443,
|
|
PortDNSOverTLS: 853, // needs to be passed through to dnsproxy
|
|
},
|
|
DHCP: dhcpd.ServerConfig{
|
|
LeaseDuration: 86400,
|
|
ICMPTimeout: 1000,
|
|
},
|
|
SchemaVersion: currentSchemaVersion,
|
|
}
|
|
|
|
// initConfig initializes default configuration for the current OS&ARCH
|
|
func initConfig() {
|
|
config.WebSessionTTLHours = 30 * 24
|
|
|
|
config.DNS.QueryLogEnabled = true
|
|
config.DNS.QueryLogInterval = 90
|
|
config.DNS.QueryLogMemSize = 1000
|
|
|
|
config.DNS.CacheSize = 4 * 1024 * 1024
|
|
config.DNS.DnsfilterConf.SafeBrowsingCacheSize = 1 * 1024 * 1024
|
|
config.DNS.DnsfilterConf.SafeSearchCacheSize = 1 * 1024 * 1024
|
|
config.DNS.DnsfilterConf.ParentalCacheSize = 1 * 1024 * 1024
|
|
config.DNS.DnsfilterConf.CacheTime = 30
|
|
config.Filters = defaultFilters()
|
|
}
|
|
|
|
// getConfigFilename returns path to the current config file
|
|
func (c *configuration) getConfigFilename() string {
|
|
configFile, err := filepath.EvalSymlinks(Context.configFilename)
|
|
if err != nil {
|
|
if !os.IsNotExist(err) {
|
|
log.Error("unexpected error while config file path evaluation: %s", err)
|
|
}
|
|
configFile = Context.configFilename
|
|
}
|
|
if !filepath.IsAbs(configFile) {
|
|
configFile = filepath.Join(Context.workDir, configFile)
|
|
}
|
|
return configFile
|
|
}
|
|
|
|
// getLogSettings reads logging settings from the config file.
|
|
// we do it in a separate method in order to configure logger before the actual configuration is parsed and applied.
|
|
func getLogSettings() logSettings {
|
|
l := logSettings{}
|
|
yamlFile, err := readConfigFile()
|
|
if err != nil {
|
|
return l
|
|
}
|
|
err = yaml.Unmarshal(yamlFile, &l)
|
|
if err != nil {
|
|
log.Error("Couldn't get logging settings from the configuration: %s", err)
|
|
}
|
|
return l
|
|
}
|
|
|
|
// parseConfig loads configuration from the YAML file
|
|
func parseConfig() error {
|
|
configFile := config.getConfigFilename()
|
|
log.Debug("Reading config file: %s", configFile)
|
|
yamlFile, err := readConfigFile()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
config.fileData = nil
|
|
err = yaml.Unmarshal(yamlFile, &config)
|
|
if err != nil {
|
|
log.Error("Couldn't parse config file: %s", err)
|
|
return err
|
|
}
|
|
|
|
if !checkFiltersUpdateIntervalHours(config.DNS.FiltersUpdateIntervalHours) {
|
|
config.DNS.FiltersUpdateIntervalHours = 24
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// readConfigFile reads config file contents if it exists
|
|
func readConfigFile() ([]byte, error) {
|
|
if len(config.fileData) != 0 {
|
|
return config.fileData, nil
|
|
}
|
|
|
|
configFile := config.getConfigFilename()
|
|
d, err := ioutil.ReadFile(configFile)
|
|
if err != nil {
|
|
log.Error("Couldn't read config file %s: %s", configFile, err)
|
|
return nil, err
|
|
}
|
|
return d, nil
|
|
}
|
|
|
|
// Saves configuration to the YAML file and also saves the user filter contents to a file
|
|
func (c *configuration) write() error {
|
|
c.Lock()
|
|
defer c.Unlock()
|
|
|
|
Context.clients.WriteDiskConfig(&config.Clients)
|
|
|
|
if Context.auth != nil {
|
|
config.Users = Context.auth.GetUsers()
|
|
}
|
|
if Context.tls != nil {
|
|
tlsConf := tlsConfigSettings{}
|
|
Context.tls.WriteDiskConfig(&tlsConf)
|
|
config.TLS = tlsConf
|
|
}
|
|
|
|
if Context.stats != nil {
|
|
sdc := stats.DiskConfig{}
|
|
Context.stats.WriteDiskConfig(&sdc)
|
|
config.DNS.StatsInterval = sdc.Interval
|
|
}
|
|
|
|
if Context.queryLog != nil {
|
|
dc := querylog.DiskConfig{}
|
|
Context.queryLog.WriteDiskConfig(&dc)
|
|
config.DNS.QueryLogEnabled = dc.Enabled
|
|
config.DNS.QueryLogInterval = dc.Interval
|
|
config.DNS.QueryLogMemSize = dc.MemSize
|
|
config.DNS.AnonymizeClientIP = dc.AnonymizeClientIP
|
|
}
|
|
|
|
if Context.dnsFilter != nil {
|
|
c := dnsfilter.Config{}
|
|
Context.dnsFilter.WriteDiskConfig(&c)
|
|
config.DNS.DnsfilterConf = c
|
|
}
|
|
|
|
if Context.dnsServer != nil {
|
|
c := dnsforward.FilteringConfig{}
|
|
Context.dnsServer.WriteDiskConfig(&c)
|
|
config.DNS.FilteringConfig = c
|
|
}
|
|
|
|
if Context.dhcpServer != nil {
|
|
c := dhcpd.ServerConfig{}
|
|
Context.dhcpServer.WriteDiskConfig(&c)
|
|
config.DHCP = c
|
|
}
|
|
|
|
configFile := config.getConfigFilename()
|
|
log.Debug("Writing YAML file: %s", configFile)
|
|
yamlText, err := yaml.Marshal(&config)
|
|
config.Clients = nil
|
|
if err != nil {
|
|
log.Error("Couldn't generate YAML file: %s", err)
|
|
return err
|
|
}
|
|
err = file.SafeWrite(configFile, yamlText)
|
|
if err != nil {
|
|
log.Error("Couldn't save YAML config: %s", err)
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|