mirror of
https://github.com/freedombox/FreedomBox.git
synced 2026-02-04 08:13:38 +00:00
- The get_domain_name() has some problem. It returns only static domain names but not a dynamic domain name. It may not always return the same domain when multiple static domains are configured. It may return return an empty string. Tests: - JSXC page shows the alphabetically first static domain. If no static domain is configured, first dynamic domain is shown, next pagekite domain, next pagekite domain, next tor onion domain, and finally .local domain. - Downloading profile from OpenVPN will set the first domain in it. - When ejabberd is installed, the first domain is configured by default. Signed-off-by: Sunil Mohan Adapa <sunil@medhas.org> Reviewed-by: James Valleroy <jvalleroy@mailbox.org>
272 lines
9.6 KiB
Python
272 lines
9.6 KiB
Python
# SPDX-License-Identifier: AGPL-3.0-or-later
|
|
"""
|
|
FreedomBox app to configure name services.
|
|
"""
|
|
|
|
import logging
|
|
import pathlib
|
|
import subprocess
|
|
from typing import Iterator
|
|
|
|
from django.utils.translation import gettext_lazy as _
|
|
from django.utils.translation import gettext_noop
|
|
|
|
from plinth import app as app_module
|
|
from plinth import cfg, glib, menu, network, setup
|
|
from plinth.daemon import Daemon
|
|
from plinth.diagnostic_check import (DiagnosticCheck,
|
|
DiagnosticCheckParameters, Result)
|
|
from plinth.modules.backups.components import BackupRestore
|
|
from plinth.modules.names.components import DomainType
|
|
from plinth.package import Packages
|
|
from plinth.privileged import service as service_privileged
|
|
from plinth.signals import (domain_added, domain_removed, post_hostname_change,
|
|
pre_hostname_change)
|
|
from plinth.utils import format_lazy
|
|
|
|
from . import components, manifest, privileged
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
_description = [
|
|
format_lazy(
|
|
_('Name Services provides an overview of the ways {box_name} can be '
|
|
'reached from the public Internet: domain name, Tor onion service, '
|
|
'and Pagekite. For each type of name, it is shown whether the HTTP, '
|
|
'HTTPS, and SSH services are enabled or disabled for incoming '
|
|
'connections through the given name.'), box_name=(cfg.box_name))
|
|
]
|
|
|
|
|
|
class NamesApp(app_module.App):
|
|
"""FreedomBox app for names."""
|
|
|
|
app_id = 'names'
|
|
|
|
_version = 3
|
|
|
|
can_be_disabled = False
|
|
|
|
def __init__(self) -> None:
|
|
"""Create components for the app."""
|
|
super().__init__()
|
|
info = app_module.Info(app_id=self.app_id, version=self._version,
|
|
is_essential=True, name=_('Name Services'),
|
|
icon='fa-tags', description=_description,
|
|
manual_page='NameServices', tags=manifest.tags)
|
|
self.add(info)
|
|
|
|
menu_item = menu.Menu('menu-names', info.name, info.icon, info.tags,
|
|
'names:index',
|
|
parent_url_name='system:visibility', order=10)
|
|
self.add(menu_item)
|
|
|
|
# 'ip' utility is needed from 'iproute2' package.
|
|
packages = Packages('packages-names', ['iproute2'])
|
|
self.add(packages)
|
|
|
|
domain_type = DomainType('domain-type-static', _('Domain (regular)'),
|
|
delete_url='names:domain-delete',
|
|
add_url='names:domain-add',
|
|
can_have_certificate=True, priority=100)
|
|
self.add(domain_type)
|
|
|
|
daemon = ResolvedDaemon('daemon-names', 'systemd-resolved')
|
|
self.add(daemon)
|
|
|
|
backup_restore = BackupRestore('backup-restore-names',
|
|
**manifest.backup)
|
|
self.add(backup_restore)
|
|
|
|
@staticmethod
|
|
def post_init():
|
|
"""Perform post initialization operations."""
|
|
domain_added.connect(on_domain_added)
|
|
domain_removed.connect(on_domain_removed)
|
|
|
|
# Register domain with Name Services module.
|
|
for domain in privileged.get_domains():
|
|
domain_added.send_robust(sender='names',
|
|
domain_type='domain-type-static',
|
|
name=domain, services='__all__')
|
|
|
|
# Schedule installation of systemd-resolved if not already installed.
|
|
if not is_resolved_installed():
|
|
# Try to install the package hourly.
|
|
glib.schedule(3600, install_systemd_resolved)
|
|
|
|
def diagnose(self) -> list[DiagnosticCheck]:
|
|
"""Run diagnostics and return the results."""
|
|
results = super().diagnose()
|
|
if is_resolved_installed():
|
|
results.append(diagnose_resolution('deb.debian.org'))
|
|
|
|
return results
|
|
|
|
def setup(self, old_version):
|
|
"""Install and configure the app."""
|
|
super().setup(old_version)
|
|
|
|
if not is_resolved_installed():
|
|
try:
|
|
# Requires internet connectivity and could fail
|
|
privileged.install_resolved()
|
|
privileged.set_resolved_configuration(dns_fallback=True)
|
|
except Exception:
|
|
pass
|
|
|
|
if old_version < 3:
|
|
privileged.domains_migrate()
|
|
|
|
if is_resolved_installed():
|
|
# Fresh install or upgrading to version 2
|
|
if old_version < 2:
|
|
privileged.set_resolved_configuration(dns_fallback=True)
|
|
|
|
# Load the configuration files for systemd-resolved provided by
|
|
# FreedomBox.
|
|
service_privileged.restart('systemd-resolved')
|
|
|
|
# After systemd-resolved is freshly installed, /etc/resolve.conf
|
|
# becomes a symlink to configuration pointing to systemd-resovled
|
|
# stub resolver. However, the old contents are not fed from
|
|
# network-manager (if it was present earlier and wrote to
|
|
# /etc/resolve.conf). Ask network-manager to feed the DNS servers
|
|
# from the connections it has established to systemd-resolved so
|
|
# that using fallback DNS servers is not necessary.
|
|
network.refeed_dns()
|
|
|
|
self.enable()
|
|
|
|
|
|
class ResolvedDaemon(Daemon):
|
|
"""Perform work only if systemd-resolved is installed."""
|
|
|
|
def is_enabled(self):
|
|
"""Return if the daemon/unit is enabled."""
|
|
if not is_resolved_installed():
|
|
return True
|
|
|
|
return super().is_enabled()
|
|
|
|
def enable(self):
|
|
"""Run operations to enable the daemon/unit."""
|
|
if is_resolved_installed():
|
|
super().enable()
|
|
|
|
def disable(self):
|
|
"""Run operations to disable the daemon/unit."""
|
|
if is_resolved_installed():
|
|
super().disable()
|
|
|
|
def is_running(self):
|
|
"""Return whether the daemon/unit is running."""
|
|
if not is_resolved_installed():
|
|
return True
|
|
|
|
return super().is_running()
|
|
|
|
def diagnose(self) -> list[DiagnosticCheck]:
|
|
"""Check if the daemon is running and listening on expected ports."""
|
|
if not is_resolved_installed():
|
|
return [
|
|
DiagnosticCheck(
|
|
'names-resolved-installed',
|
|
gettext_noop('Package systemd-resolved is installed'),
|
|
Result.WARNING, {}, self.component_id)
|
|
]
|
|
|
|
return super().diagnose()
|
|
|
|
|
|
def install_systemd_resolved(_data):
|
|
"""Re-run setup on app to install systemd-resolved."""
|
|
if not is_resolved_installed():
|
|
setup.run_setup_on_app('names', rerun=True)
|
|
|
|
|
|
def diagnose_resolution(domain: str) -> DiagnosticCheck:
|
|
"""Perform a diagnostic check for whether a domain can be resolved."""
|
|
result = Result.NOT_DONE
|
|
try:
|
|
subprocess.run(['resolvectl', 'query', '--cache=no', domain],
|
|
stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL,
|
|
check=True)
|
|
result = Result.PASSED
|
|
except subprocess.CalledProcessError:
|
|
result = Result.FAILED
|
|
|
|
description = gettext_noop('Resolve domain name: {domain}')
|
|
parameters: DiagnosticCheckParameters = {'domain': domain}
|
|
return DiagnosticCheck('names-resolve', description, result, parameters)
|
|
|
|
|
|
def on_domain_added(sender: str, domain_type: str, name: str = '',
|
|
description: str = '',
|
|
services: str | list[str] | None = None, **kwargs):
|
|
"""Add domain to global list."""
|
|
if not domain_type:
|
|
return
|
|
|
|
if not name:
|
|
return
|
|
if not services:
|
|
services = []
|
|
|
|
components.DomainName('domain-' + sender + '-' + name, name, domain_type,
|
|
services)
|
|
logger.info('Added domain %s of type %s with services %s', name,
|
|
domain_type, str(services))
|
|
|
|
|
|
def on_domain_removed(sender: str, domain_type: str, name: str = '', **kwargs):
|
|
"""Remove domain from global list."""
|
|
if name:
|
|
component_id = 'domain-' + sender + '-' + name
|
|
components.DomainName.get(component_id).remove()
|
|
logger.info('Removed domain %s of type %s', name, domain_type)
|
|
else:
|
|
for domain_name in components.DomainName.list():
|
|
if domain_name.domain_type.component_id == domain_type:
|
|
domain_name.remove()
|
|
|
|
logger.info('Remove domain %s of type %s', domain_name.name,
|
|
domain_type)
|
|
|
|
|
|
######################################################
|
|
# Domain utilities meant to be used by other modules #
|
|
######################################################
|
|
|
|
|
|
def get_hostname():
|
|
"""Return the hostname."""
|
|
process = subprocess.run(['hostnamectl', 'hostname', '--static'],
|
|
stdout=subprocess.PIPE, check=True)
|
|
return process.stdout.decode().strip()
|
|
|
|
|
|
def set_hostname(hostname):
|
|
"""Set machine hostname and send signals before and after."""
|
|
old_hostname = get_hostname()
|
|
|
|
pre_hostname_change.send_robust(sender='names', old_hostname=old_hostname,
|
|
new_hostname=hostname)
|
|
|
|
logger.info('Changing hostname to - %s', hostname)
|
|
privileged.set_hostname(hostname)
|
|
|
|
post_hostname_change.send_robust(sender='names', old_hostname=old_hostname,
|
|
new_hostname=hostname)
|
|
|
|
|
|
def get_available_tls_domains() -> Iterator[str]:
|
|
"""Return an iterator with all domains able to have a certificate."""
|
|
return (domain.name for domain in components.DomainName.list()
|
|
if domain.domain_type.can_have_certificate)
|
|
|
|
|
|
def is_resolved_installed():
|
|
"""Return whether systemd-resolved is installed."""
|
|
return pathlib.Path('/usr/bin/resolvectl').exists()
|