mirror of
https://github.com/bakito/adguardhome-sync.git
synced 2024-11-10 17:22:46 +08:00
82a61aef09
Add support api tls mode
216 lines
6.5 KiB
Go
216 lines
6.5 KiB
Go
package types
|
|
|
|
import (
|
|
"fmt"
|
|
"net/url"
|
|
"path/filepath"
|
|
"strings"
|
|
"time"
|
|
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
const (
|
|
// DefaultAPIPath default api path
|
|
DefaultAPIPath = "/control"
|
|
)
|
|
|
|
// Config application configuration struct
|
|
// +k8s:deepcopy-gen=true
|
|
type Config struct {
|
|
Origin AdGuardInstance `json:"origin" yaml:"origin" env:"ORIGIN"`
|
|
Replica *AdGuardInstance `json:"replica,omitempty" yaml:"replica,omitempty" env:"REPLICA"`
|
|
Replicas []AdGuardInstance `json:"replicas,omitempty" yaml:"replicas,omitempty"`
|
|
Cron string `json:"cron,omitempty" yaml:"cron,omitempty" env:"CRON"`
|
|
RunOnStart bool `json:"runOnStart,omitempty" yaml:"runOnStart,omitempty" env:"RUN_ON_START"`
|
|
PrintConfigOnly bool `json:"printConfigOnly,omitempty" yaml:"printConfigOnly,omitempty" env:"PRINT_CONFIG_ONLY"`
|
|
ContinueOnError bool `json:"continueOnError,omitempty" yaml:"continueOnError,omitempty" env:"CONTINUE_ON_ERROR"`
|
|
API API `json:"api,omitempty" yaml:"api,omitempty" env:"API"`
|
|
Features Features `json:"features,omitempty" yaml:"features,omitempty" env:"FEATURES_"`
|
|
}
|
|
|
|
// API configuration
|
|
type API struct {
|
|
Port int `json:"port,omitempty" yaml:"port,omitempty" env:"API_PORT"`
|
|
Username string `json:"username,omitempty" yaml:"username,omitempty" env:"API_USERNAME"`
|
|
Password string `json:"password,omitempty" yaml:"password,omitempty" env:"API_PASSWORD"`
|
|
DarkMode bool `json:"darkMode,omitempty" yaml:"darkMode,omitempty" env:"API_DARK_MODE"`
|
|
Metrics Metrics `json:"metrics,omitempty" yaml:"metrics,omitempty" env:"API_METRICS"`
|
|
TLS TLS `json:"tls,omitempty" yaml:"tls,omitempty" env:"API_TLS"`
|
|
}
|
|
|
|
// Metrics configuration
|
|
type Metrics struct {
|
|
Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty" env:"API_METRICS_ENABLED"`
|
|
ScrapeInterval time.Duration `json:"scrapeInterval,omitempty" yaml:"scrapeInterval,omitempty" env:"API_METRICS_SCRAPE_INTERVAL"`
|
|
QueryLogLimit int `json:"queryLogLimit,omitempty" yaml:"queryLogLimit,omitempty" env:"API_METRICS_QUERY_LOG_LIMIT"`
|
|
}
|
|
|
|
// TLS configuration
|
|
type TLS struct {
|
|
CertDir string `json:"certDir,omitempty" yaml:"certDir,omitempty" env:"API_TLS_CERT_DIR"`
|
|
CertName string `json:"certName,omitempty" yaml:"certName,omitempty" env:"API_TLS_CERT_NAME"`
|
|
KeyName string `json:"keyName,omitempty" yaml:"keyName,omitempty" env:"API_TLS_KEY_NAME"`
|
|
}
|
|
|
|
func (t TLS) Enabled() bool {
|
|
return strings.TrimSpace(t.CertDir) != ""
|
|
}
|
|
|
|
func (t TLS) Certs() (cert string, key string) {
|
|
cert = filepath.Join(t.CertDir, defaultIfEmpty(t.CertName, "tls.crt"))
|
|
key = filepath.Join(t.CertDir, defaultIfEmpty(t.KeyName, "tls.key"))
|
|
return
|
|
}
|
|
|
|
func defaultIfEmpty(val string, fallback string) string {
|
|
if strings.TrimSpace(val) == "" {
|
|
return fallback
|
|
}
|
|
return val
|
|
}
|
|
|
|
// Mask maks username and password
|
|
func (a *API) Mask() {
|
|
a.Username = mask(a.Username)
|
|
a.Password = mask(a.Password)
|
|
}
|
|
|
|
// UniqueReplicas get unique replication instances
|
|
func (cfg *Config) UniqueReplicas() []AdGuardInstance {
|
|
dedup := make(map[string]AdGuardInstance)
|
|
if cfg.Replica != nil && cfg.Replica.URL != "" {
|
|
if cfg.Replica.APIPath == "" {
|
|
cfg.Replica.APIPath = DefaultAPIPath
|
|
}
|
|
dedup[cfg.Replica.Key()] = *cfg.Replica
|
|
}
|
|
for _, replica := range cfg.Replicas {
|
|
if replica.APIPath == "" {
|
|
replica.APIPath = DefaultAPIPath
|
|
}
|
|
if replica.URL != "" {
|
|
dedup[replica.Key()] = replica
|
|
}
|
|
}
|
|
|
|
var r []AdGuardInstance
|
|
for _, replica := range dedup {
|
|
r = append(r, replica)
|
|
}
|
|
return r
|
|
}
|
|
|
|
// Log the current config
|
|
func (cfg *Config) Log(l *zap.SugaredLogger) {
|
|
c := cfg.mask()
|
|
l.With("config", c).Debug("Using config")
|
|
}
|
|
|
|
func (cfg *Config) mask() *Config {
|
|
c := cfg.DeepCopy()
|
|
c.Origin.Mask()
|
|
if c.Replica != nil {
|
|
if c.Replica.URL == "" {
|
|
c.Replica = nil
|
|
} else {
|
|
c.Replica.Mask()
|
|
}
|
|
}
|
|
for i := range c.Replicas {
|
|
c.Replicas[i].Mask()
|
|
}
|
|
c.API.Mask()
|
|
return c
|
|
}
|
|
|
|
func (cfg *Config) Init() error {
|
|
if err := cfg.Origin.Init(); err != nil {
|
|
return err
|
|
}
|
|
for i := range cfg.Replicas {
|
|
replica := &cfg.Replicas[i]
|
|
if err := replica.Init(); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// AdGuardInstance AdguardHome config instance
|
|
// +k8s:deepcopy-gen=true
|
|
type AdGuardInstance struct {
|
|
URL string `json:"url" yaml:"url" env:"URL"`
|
|
WebURL string `json:"webURL" yaml:"webURL" env:"WEB_URL"`
|
|
APIPath string `json:"apiPath,omitempty" yaml:"apiPath,omitempty" env:"API_PATH"`
|
|
Username string `json:"username,omitempty" yaml:"username,omitempty" env:"USERNAME"`
|
|
Password string `json:"password,omitempty" yaml:"password,omitempty" env:"PASSWORD"`
|
|
Cookie string `json:"cookie,omitempty" yaml:"cookie,omitempty" env:"COOKIE"`
|
|
InsecureSkipVerify bool `json:"insecureSkipVerify" yaml:"insecureSkipVerify" env:"INSECURE_SKIP_VERIFY"`
|
|
AutoSetup bool `json:"autoSetup" yaml:"autoSetup" env:"AUTO_SETUP"`
|
|
InterfaceName string `json:"interfaceName,omitempty" yaml:"interfaceName,omitempty" env:"INTERFACE_NAME"`
|
|
DHCPServerEnabled *bool `json:"dhcpServerEnabled,omitempty" yaml:"dhcpServerEnabled,omitempty" env:"DHCP_SERVER_ENABLED"`
|
|
|
|
Host string `json:"-" yaml:"-"`
|
|
WebHost string `json:"-" yaml:"-"`
|
|
}
|
|
|
|
// Key AdGuardInstance key
|
|
func (i *AdGuardInstance) Key() string {
|
|
return fmt.Sprintf("%s#%s", i.URL, i.APIPath)
|
|
}
|
|
|
|
// Mask maks username and password
|
|
func (i *AdGuardInstance) Mask() {
|
|
i.Username = mask(i.Username)
|
|
i.Password = mask(i.Password)
|
|
}
|
|
|
|
func (i *AdGuardInstance) Init() error {
|
|
u, err := url.Parse(i.URL)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
i.Host = u.Host
|
|
|
|
if i.WebURL == "" {
|
|
i.WebHost = i.Host
|
|
i.WebURL = i.URL
|
|
} else {
|
|
u, err := url.Parse(i.WebURL)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
i.WebHost = u.Host
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func mask(s string) string {
|
|
if s == "" {
|
|
return "***"
|
|
}
|
|
mask := strings.Repeat("*", len(s)-2)
|
|
return fmt.Sprintf("%v%s%v", string(s[0]), mask, string(s[len(s)-1]))
|
|
}
|
|
|
|
// Protection API struct
|
|
type Protection struct {
|
|
ProtectionEnabled bool `json:"protection_enabled"`
|
|
}
|
|
|
|
// InstallConfig AdguardHome install config
|
|
type InstallConfig struct {
|
|
Web InstallPort `json:"web"`
|
|
DNS InstallPort `json:"dns"`
|
|
Username string `json:"username"`
|
|
Password string `json:"password"`
|
|
}
|
|
|
|
// InstallPort AdguardHome install config port
|
|
type InstallPort struct {
|
|
IP string `json:"ip"`
|
|
Port int `json:"port"`
|
|
Status string `json:"status"`
|
|
CanAutofix bool `json:"can_autofix"`
|
|
}
|