Sunil Mohan Adapa 5a9d5730a7
names: Store domains in kvstore instead of /etc/hosts
As reported in discussion forum[1], when clients connected via 'shared' network
connection try to resolve the a static domain name configured in FreedomBox,
they resolve to 127.0.1.1. Since this refers to client's own IP address, they
fail to connect.

In the previous version, this was not a problem because the entry was stored as
<hostname>.<domainname>. To resolve this, store domain names in kvstore instead
of /etc/hosts.

Links:

1)
https://discuss.freedombox.org/t/freedombox-resolves-its-own-external-name-as-127-0-1-1/3660

Tests:

- Adding/removing static domains from Names app works. The order of added
domains is preserved in the stored configuration. When adding a existing domain,
a proper error message is shown.

- Without the patch, configure multiple domains. They show up in /etc/hosts.
Apply the patches and restart the service. Names app setup will run. Entries
from /etc/hosts are removed and will be added to kvstore. The list of domains
shows properly in Names app. After restarting the services, domains are show
properly.

- Without the patch on a version of FreedomBox without support for multiple
static domains, configure a static domain. Switch to latest version FreedomBox
with the patches. Restart the service. Names app setup will run. Entry from
/etc/hosts will be removed and will be added to kvstore. The list of domains
shows properly in Names app. After restarting the services, domains are show
properly.

Reviewed-by: James Valleroy <jvalleroy@mailbox.org>
2025-03-21 16:01:41 -04:00

305 lines
10 KiB
Python

# SPDX-License-Identifier: AGPL-3.0-or-later
"""
FreedomBox app to configure name services.
"""
import json
import logging
import pathlib
import subprocess
from typing import Iterator
from django.utils.translation import gettext_lazy as _
from django.utils.translation import gettext_noop
from plinth import app as app_module
from plinth import cfg, glib, kvstore, menu, network, setup
from plinth.daemon import Daemon
from plinth.diagnostic_check import (DiagnosticCheck,
DiagnosticCheckParameters, Result)
from plinth.modules.backups.components import BackupRestore
from plinth.modules.names.components import DomainType
from plinth.package import Packages
from plinth.privileged import service as service_privileged
from plinth.signals import (domain_added, domain_removed, post_hostname_change,
pre_hostname_change)
from plinth.utils import format_lazy
from . import components, manifest, privileged
logger = logging.getLogger(__name__)
_description = [
format_lazy(
_('Name Services provides an overview of the ways {box_name} can be '
'reached from the public Internet: domain name, Tor onion service, '
'and Pagekite. For each type of name, it is shown whether the HTTP, '
'HTTPS, and SSH services are enabled or disabled for incoming '
'connections through the given name.'), box_name=(cfg.box_name))
]
class NamesApp(app_module.App):
"""FreedomBox app for names."""
app_id = 'names'
_version = 4
can_be_disabled = False
def __init__(self) -> None:
"""Create components for the app."""
super().__init__()
info = app_module.Info(app_id=self.app_id, version=self._version,
is_essential=True, name=_('Name Services'),
icon='fa-tags', description=_description,
manual_page='NameServices', tags=manifest.tags)
self.add(info)
menu_item = menu.Menu('menu-names', info.name, info.icon, info.tags,
'names:index',
parent_url_name='system:visibility', order=10)
self.add(menu_item)
# 'ip' utility is needed from 'iproute2' package.
packages = Packages('packages-names', ['iproute2'])
self.add(packages)
domain_type = DomainType('domain-type-static', _('Domain (regular)'),
delete_url='names:domain-delete',
add_url='names:domain-add',
can_have_certificate=True, priority=100)
self.add(domain_type)
daemon = ResolvedDaemon('daemon-names', 'systemd-resolved')
self.add(daemon)
backup_restore = BackupRestore('backup-restore-names',
**manifest.backup)
self.add(backup_restore)
@staticmethod
def post_init():
"""Perform post initialization operations."""
domain_added.connect(on_domain_added)
domain_removed.connect(on_domain_removed)
# Register domain with Name Services module.
for domain in domains_list() + privileged.get_old_domains():
domain_added.send_robust(sender='names',
domain_type='domain-type-static',
name=domain, services='__all__')
# Schedule installation of systemd-resolved if not already installed.
if not is_resolved_installed():
# Try to install the package hourly.
glib.schedule(3600, install_systemd_resolved)
def diagnose(self) -> list[DiagnosticCheck]:
"""Run diagnostics and return the results."""
results = super().diagnose()
if is_resolved_installed():
results.append(diagnose_resolution('deb.debian.org'))
return results
def setup(self, old_version):
"""Install and configure the app."""
super().setup(old_version)
if not is_resolved_installed():
try:
# Requires internet connectivity and could fail
privileged.install_resolved()
privileged.set_resolved_configuration(dns_fallback=True)
except Exception:
pass
if old_version < 4:
domains = domains_list() + privileged.get_old_domains()
_domains_set(domains)
privileged.domain_delete_all()
if is_resolved_installed():
# Fresh install or upgrading to version 2
if old_version < 2:
privileged.set_resolved_configuration(dns_fallback=True)
# Load the configuration files for systemd-resolved provided by
# FreedomBox.
service_privileged.restart('systemd-resolved')
# After systemd-resolved is freshly installed, /etc/resolve.conf
# becomes a symlink to configuration pointing to systemd-resovled
# stub resolver. However, the old contents are not fed from
# network-manager (if it was present earlier and wrote to
# /etc/resolve.conf). Ask network-manager to feed the DNS servers
# from the connections it has established to systemd-resolved so
# that using fallback DNS servers is not necessary.
network.refeed_dns()
self.enable()
class ResolvedDaemon(Daemon):
"""Perform work only if systemd-resolved is installed."""
def is_enabled(self):
"""Return if the daemon/unit is enabled."""
if not is_resolved_installed():
return True
return super().is_enabled()
def enable(self):
"""Run operations to enable the daemon/unit."""
if is_resolved_installed():
super().enable()
def disable(self):
"""Run operations to disable the daemon/unit."""
if is_resolved_installed():
super().disable()
def is_running(self):
"""Return whether the daemon/unit is running."""
if not is_resolved_installed():
return True
return super().is_running()
def diagnose(self) -> list[DiagnosticCheck]:
"""Check if the daemon is running and listening on expected ports."""
if not is_resolved_installed():
return [
DiagnosticCheck(
'names-resolved-installed',
gettext_noop('Package systemd-resolved is installed'),
Result.WARNING, {}, self.component_id)
]
return super().diagnose()
def domains_list() -> list[str]:
"""Return a list of domains from configuration."""
return json.loads(kvstore.get_default('domains', '[]'))
def domain_add(domain_name: str):
"""Add a domain to configuration."""
domains = domains_list()
if domain_name in domains:
return
domains.append(domain_name)
_domains_set(domains)
def domain_delete(domain_name: str):
"""Remove a domain from configuration."""
domains = domains_list()
if domain_name not in domains:
return
domains.remove(domain_name)
_domains_set(domains)
def _domains_set(domains: list[str]):
"""Set the full list of domains in the configuration."""
kvstore.set('domains', json.dumps(domains))
def install_systemd_resolved(_data):
"""Re-run setup on app to install systemd-resolved."""
if not is_resolved_installed():
setup.run_setup_on_app('names', rerun=True)
def diagnose_resolution(domain: str) -> DiagnosticCheck:
"""Perform a diagnostic check for whether a domain can be resolved."""
result = Result.NOT_DONE
try:
subprocess.run(['resolvectl', 'query', '--cache=no', domain],
stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL,
check=True)
result = Result.PASSED
except subprocess.CalledProcessError:
result = Result.FAILED
description = gettext_noop('Resolve domain name: {domain}')
parameters: DiagnosticCheckParameters = {'domain': domain}
return DiagnosticCheck('names-resolve', description, result, parameters)
def on_domain_added(sender: str, domain_type: str, name: str = '',
description: str = '',
services: str | list[str] | None = None, **kwargs):
"""Add domain to global list."""
if not domain_type:
return
if not name:
return
if not services:
services = []
components.DomainName('domain-' + sender + '-' + name, name, domain_type,
services)
logger.info('Added domain %s of type %s with services %s', name,
domain_type, str(services))
def on_domain_removed(sender: str, domain_type: str, name: str = '', **kwargs):
"""Remove domain from global list."""
if name:
component_id = 'domain-' + sender + '-' + name
components.DomainName.get(component_id).remove()
logger.info('Removed domain %s of type %s', name, domain_type)
else:
for domain_name in components.DomainName.list():
if domain_name.domain_type.component_id == domain_type:
domain_name.remove()
logger.info('Remove domain %s of type %s', domain_name.name,
domain_type)
######################################################
# Domain utilities meant to be used by other modules #
######################################################
def get_hostname():
"""Return the hostname."""
process = subprocess.run(['hostnamectl', 'hostname', '--static'],
stdout=subprocess.PIPE, check=True)
return process.stdout.decode().strip()
def set_hostname(hostname):
"""Set machine hostname and send signals before and after."""
old_hostname = get_hostname()
pre_hostname_change.send_robust(sender='names', old_hostname=old_hostname,
new_hostname=hostname)
logger.info('Changing hostname to - %s', hostname)
privileged.set_hostname(hostname)
post_hostname_change.send_robust(sender='names', old_hostname=old_hostname,
new_hostname=hostname)
def get_available_tls_domains() -> Iterator[str]:
"""Return an iterator with all domains able to have a certificate."""
return (domain.name for domain in components.DomainName.list()
if domain.domain_type.can_have_certificate)
def is_resolved_installed():
"""Return whether systemd-resolved is installed."""
return pathlib.Path('/usr/bin/resolvectl').exists()