2017-06-05 19:55:58 +00:00
#!/usr/bin/env bash
2016-03-20 01:32:11 +00:00
# Pi-hole: A black hole for Internet advertisements
2017-02-22 17:55:20 +00:00
# (c) 2017 Pi-hole, LLC (https://pi-hole.net)
# Network-wide ad blocking via your own hardware.
#
2016-09-27 01:06:31 +00:00
# Generates pihole_debug.log to be used for troubleshooting.
2016-03-20 01:32:11 +00:00
#
2017-02-22 17:55:20 +00:00
# This file is copyright under the latest version of the EUPL.
# Please see LICENSE file for your rights under this license.
2018-04-15 20:33:10 +00:00
# shellcheck source=/dev/null
2017-02-22 17:55:20 +00:00
2017-05-26 17:16:22 +00:00
# -e option instructs bash to immediately exit if any command [1] has a non-zero exit status
# -u a reference to any variable you haven't previously defined
# with the exceptions of $* and $@ - is an error, and causes the program to immediately exit
# -o pipefail prevents errors in a pipeline from being masked. If any command in a pipeline fails,
# that return code will be used as the return code of the whole pipeline. By default, the
# pipeline's return code is that of the last command - even if it succeeds
2016-09-28 02:30:37 +00:00
set -o pipefail
2017-05-26 19:26:02 +00:00
#IFS=$'\n\t'
2016-03-20 01:32:11 +00:00
######## GLOBAL VARS ########
2017-06-10 04:22:37 +00:00
# These variables would normally be next to the other files
# but we need them to be first in order to get the colors needed for the script output
PIHOLE_SCRIPTS_DIRECTORY = "/opt/pihole"
PIHOLE_COLTABLE_FILE = " ${ PIHOLE_SCRIPTS_DIRECTORY } /COL_TABLE "
2017-05-20 06:34:13 +00:00
2017-05-25 03:07:15 +00:00
# These provide the colors we need for making the log more readable
2017-06-10 04:22:37 +00:00
if [ [ -f ${ PIHOLE_COLTABLE_FILE } ] ] ; then
2021-11-25 06:41:40 +00:00
source ${ PIHOLE_COLTABLE_FILE }
2017-05-20 06:34:13 +00:00
else
2018-07-20 22:25:35 +00:00
COL_NC = '\e[0m' # No Color
COL_RED = '\e[1;91m'
COL_GREEN = '\e[1;32m'
COL_YELLOW = '\e[1;33m'
COL_PURPLE = '\e[1;35m'
COL_CYAN = '\e[0;36m'
TICK = " [ ${ COL_GREEN } ✓ ${ COL_NC } ] "
CROSS = " [ ${ COL_RED } ✗ ${ COL_NC } ] "
INFO = "[i]"
2018-07-22 19:18:26 +00:00
#OVER="\r\033[K"
2017-05-20 06:34:13 +00:00
fi
2016-03-24 21:21:29 +00:00
2022-09-14 21:49:37 +00:00
# shellcheck disable=SC1091
. /etc/pihole/versions
2017-06-10 04:22:37 +00:00
# FAQ URLs for use in showing the debug log
2020-07-30 19:57:19 +00:00
FAQ_HARDWARE_REQUIREMENTS = " ${ COL_CYAN } https://docs.pi-hole.net/main/prerequisites/ ${ COL_NC } "
FAQ_HARDWARE_REQUIREMENTS_PORTS = " ${ COL_CYAN } https://docs.pi-hole.net/main/prerequisites/#ports ${ COL_NC } "
2020-10-12 04:20:31 +00:00
FAQ_HARDWARE_REQUIREMENTS_FIREWALLD = " ${ COL_CYAN } https://docs.pi-hole.net/main/prerequisites/#firewalld ${ COL_NC } "
2017-06-05 19:55:58 +00:00
FAQ_GATEWAY = " ${ COL_CYAN } https://discourse.pi-hole.net/t/why-is-a-default-gateway-important-for-pi-hole/3546 ${ COL_NC } "
2017-06-01 06:15:11 +00:00
2017-06-10 04:22:37 +00:00
# Other URLs we may use
FORUMS_URL = " ${ COL_CYAN } https://discourse.pi-hole.net ${ COL_NC } "
# Directories required by Pi-hole
# https://discourse.pi-hole.net/t/what-files-does-pi-hole-use/1684
CORE_GIT_DIRECTORY = "/etc/.pihole"
CRON_D_DIRECTORY = "/etc/cron.d"
DNSMASQ_D_DIRECTORY = "/etc/dnsmasq.d"
PIHOLE_DIRECTORY = "/etc/pihole"
PIHOLE_SCRIPTS_DIRECTORY = "/opt/pihole"
BIN_DIRECTORY = "/usr/local/bin"
RUN_DIRECTORY = "/run"
2020-09-05 14:00:37 +00:00
LOG_DIRECTORY = "/var/log/pihole"
2017-06-10 04:22:37 +00:00
HTML_DIRECTORY = "/var/www/html"
WEB_GIT_DIRECTORY = " ${ HTML_DIRECTORY } /admin "
2019-02-02 18:37:12 +00:00
SHM_DIRECTORY = "/dev/shm"
2021-09-05 18:44:39 +00:00
ETC = "/etc"
2017-06-10 04:22:37 +00:00
# Files required by Pi-hole
# https://discourse.pi-hole.net/t/what-files-does-pi-hole-use/1684
PIHOLE_CRON_FILE = " ${ CRON_D_DIRECTORY } /pihole "
PIHOLE_INSTALL_LOG_FILE = " ${ PIHOLE_DIRECTORY } /install.log "
2018-04-15 20:33:10 +00:00
PIHOLE_RAW_BLOCKLIST_FILES = " ${ PIHOLE_DIRECTORY } /list.* "
2017-06-10 04:22:37 +00:00
PIHOLE_LOCAL_HOSTS_FILE = " ${ PIHOLE_DIRECTORY } /local.list "
PIHOLE_LOGROTATE_FILE = " ${ PIHOLE_DIRECTORY } /logrotate "
2023-10-28 06:03:09 +00:00
PIHOLE_FTL_CONF_FILE = " ${ PIHOLE_DIRECTORY } /pihole.toml "
2022-10-14 17:11:19 +00:00
PIHOLE_VERSIONS_FILE = " ${ PIHOLE_DIRECTORY } /versions "
2019-07-08 01:10:39 +00:00
# Read the value of an FTL config key. The value is printed to stdout.
get_ftl_conf_value( ) {
local key = $1
local value
2023-11-12 19:45:45 +00:00
# Obtain setting from FTL directly
value = " $( pihole-FTL --config " ${ key } " ) "
2019-07-08 01:10:39 +00:00
echo " $value "
}
2023-11-12 19:45:45 +00:00
PIHOLE_GRAVITY_DB_FILE = " $( get_ftl_conf_value "files.gravity" ) "
2017-06-10 04:22:37 +00:00
2023-11-12 19:45:45 +00:00
PIHOLE_FTL_DB_FILE = " $( get_ftl_conf_value "files.database" ) "
2020-11-24 15:06:45 +00:00
2017-06-10 04:22:37 +00:00
PIHOLE_COMMAND = " ${ BIN_DIRECTORY } /pihole "
PIHOLE_COLTABLE_FILE = " ${ BIN_DIRECTORY } /COL_TABLE "
FTL_PID = " ${ RUN_DIRECTORY } /pihole-FTL.pid "
PIHOLE_LOG = " ${ LOG_DIRECTORY } /pihole.log "
2018-04-15 20:33:10 +00:00
PIHOLE_LOG_GZIPS = " ${ LOG_DIRECTORY } /pihole.log.[0-9].* "
2017-06-10 04:22:37 +00:00
PIHOLE_DEBUG_LOG = " ${ LOG_DIRECTORY } /pihole_debug.log "
2023-11-12 19:45:45 +00:00
PIHOLE_FTL_LOG = " $( get_ftl_conf_value "files.log.ftl" ) "
PIHOLE_WEBSERVER_LOG = " $( get_ftl_conf_value "files.log.webserver" ) "
2017-06-10 04:22:37 +00:00
2021-09-05 18:44:39 +00:00
RESOLVCONF = " ${ ETC } /resolv.conf "
2021-09-06 15:16:36 +00:00
DNSMASQ_CONF = " ${ ETC } /dnsmasq.conf "
2021-09-05 18:44:39 +00:00
2017-06-10 20:54:27 +00:00
# Store Pi-hole's processes in an array for easy use and parsing
2023-01-01 12:34:40 +00:00
PIHOLE_PROCESSES = ( "pihole-FTL" )
2017-06-10 20:54:27 +00:00
# Store the required directories in an array so it can be parsed through
2018-04-15 20:33:10 +00:00
REQUIRED_FILES = ( " ${ PIHOLE_CRON_FILE } "
" ${ PIHOLE_INSTALL_LOG_FILE } "
" ${ PIHOLE_RAW_BLOCKLIST_FILES } "
" ${ PIHOLE_LOCAL_HOSTS_FILE } "
" ${ PIHOLE_LOGROTATE_FILE } "
2020-05-21 21:25:00 +00:00
" ${ PIHOLE_FTL_CONF_FILE } "
2018-04-15 20:33:10 +00:00
" ${ PIHOLE_COMMAND } "
" ${ PIHOLE_COLTABLE_FILE } "
" ${ FTL_PID } "
" ${ PIHOLE_LOG } "
" ${ PIHOLE_LOG_GZIPS } "
" ${ PIHOLE_DEBUG_LOG } "
" ${ PIHOLE_FTL_LOG } "
2023-11-06 21:38:01 +00:00
" ${ PIHOLE_WEBSERVER_LOG } "
2021-09-06 15:16:36 +00:00
" ${ RESOLVCONF } "
2021-10-26 20:46:52 +00:00
" ${ DNSMASQ_CONF } "
2022-10-14 17:11:19 +00:00
" ${ PIHOLE_VERSIONS_FILE } " )
2017-06-10 04:22:37 +00:00
2017-07-14 15:53:45 +00:00
DISCLAIMER = " This process collects information from your Pi-hole, and optionally uploads it to a unique and random directory on tricorder.pi-hole.net.
The intent of this script is to allow users to self-diagnose their installations. This is accomplished by running tests against our software and providing the user with links to FAQ articles when a problem is detected. Since we are a small team and Pi-hole has been growing steadily, it is our hope that this will help us spend more time on development.
NOTE: All log files auto-delete after 48 hours and ONLY the Pi-hole developers can access your data via the given token. We have taken these extra steps to secure your data and will work to further reduce any personal information gathered.
"
show_disclaimer( ) {
2018-07-20 22:25:35 +00:00
log_write " ${ DISCLAIMER } "
2017-07-14 15:53:45 +00:00
}
2017-05-26 17:16:22 +00:00
make_temporary_log( ) {
2018-07-20 22:25:35 +00:00
# Create a random temporary file for the log
TEMPLOG = $( mktemp /tmp/pihole_temp.XXXXXX)
# Open handle 3 for templog
# https://stackoverflow.com/questions/18460186/writing-outputs-to-log-file-and-console
exec 3>" $TEMPLOG "
# Delete templog, but allow for addressing via file handle
# This lets us write to the log without having a temporary file on the drive, which
# is meant to be a security measure so there is not a lingering file on the drive during the debug process
rm " $TEMPLOG "
2017-05-26 17:16:22 +00:00
}
log_write( ) {
2018-07-20 22:25:35 +00:00
# echo arguments to both the log and the console
echo -e " ${ @ } " | tee -a /proc/$$ /fd/3
2017-05-26 17:16:22 +00:00
}
copy_to_debug_log( ) {
2018-07-20 22:25:35 +00:00
# Copy the contents of file descriptor 3 into the debug log
cat /proc/$$ /fd/3 > " ${ PIHOLE_DEBUG_LOG } "
2017-05-26 17:16:22 +00:00
}
2017-12-24 13:26:32 +00:00
initialize_debug( ) {
2021-08-07 18:07:14 +00:00
local system_uptime
2018-07-20 22:25:35 +00:00
# Clear the screen so the debug log is readable
clear
show_disclaimer
# Display that the debug process is beginning
log_write " ${ COL_PURPLE } *** [ INITIALIZING ] ${ COL_NC } "
# Timestamp the start of the log
log_write " ${ INFO } $( date "+%Y-%m-%d:%H:%M:%S" ) debug log has been initialized. "
2021-08-07 18:07:14 +00:00
# Uptime of the system
# credits to https://stackoverflow.com/questions/28353409/bash-format-uptime-to-show-days-hours-minutes
system_uptime = $( uptime | awk -F'( |,|:)+' '{if ($7=="min") m=$6; else {if ($7~/^day/){if ($9=="min") {d=$6;m=$8} else {d=$6;h=$8;m=$9}} else {h=$6;m=$7}}} {print d+0,"days,",h+0,"hours,",m+0,"minutes"}' )
log_write " ${ INFO } System has been running for ${ system_uptime } "
2016-10-28 21:52:08 +00:00
}
2016-09-27 01:06:31 +00:00
2021-01-19 18:33:38 +00:00
# This is a function for visually displaying the current test that is being run.
2017-05-20 06:34:13 +00:00
# Accepts one variable: the name of what is being diagnosed
echo_current_diagnostic( ) {
2018-07-20 22:25:35 +00:00
# Colors are used for visually distinguishing each test in the output
2018-07-22 19:18:26 +00:00
log_write " \\n ${ COL_PURPLE } *** [ DIAGNOSING ]: ${ COL_NC } ${ 1 } "
2016-09-27 01:06:31 +00:00
}
2017-05-27 20:47:15 +00:00
compare_local_version_to_git_version( ) {
2018-07-20 22:25:35 +00:00
# The git directory to check
local git_dir = " ${ 1 } "
# The named component of the project (Core or Web)
local pihole_component = " ${ 2 } "
2022-10-14 08:29:14 +00:00
2018-07-20 22:25:35 +00:00
# Display what we are checking
echo_current_diagnostic " ${ pihole_component } version "
# Store the error message in a variable in case we want to change and/or reuse it
local error_msg = "git status failed"
# If the pihole git directory exists,
if [ [ -d " ${ git_dir } " ] ] ; then
# move into it
cd " ${ git_dir } " || \
# If not, show an error
log_write " ${ COL_RED } Could not cd into ${ git_dir } $COL_NC "
if git status & > /dev/null; then
# The current version the user is on
2022-10-13 12:16:56 +00:00
local local_version
local_version = $( git describe --tags --abbrev= 0) ;
2018-07-20 22:25:35 +00:00
# What branch they are on
2022-10-13 12:16:56 +00:00
local local_branch
local_branch = $( git rev-parse --abbrev-ref HEAD) ;
2018-07-20 22:25:35 +00:00
# The commit they are on
2022-10-13 12:16:56 +00:00
local local_commit
local_commit = $( git describe --long --dirty --tags --always)
2019-02-18 22:32:53 +00:00
# Status of the repo
local local_status
local_status = $( git status -s)
2018-07-20 22:25:35 +00:00
# echo this information out to the user in a nice format
2022-10-15 07:06:57 +00:00
log_write " ${ TICK } Version: ${ local_version } "
2018-07-20 22:25:35 +00:00
2020-05-21 20:23:26 +00:00
# Print the repo upstreams
remotes = $( git remote -v)
log_write " ${ INFO } Remotes: ${ remotes // $'\n' / '\n ' } "
2020-07-05 12:04:30 +00:00
# If the repo is on the master branch, they are on the stable codebase
2022-10-13 12:16:56 +00:00
if [ [ " ${ local_branch } " = = "master" ] ] ; then
2018-07-20 22:25:35 +00:00
# so the color of the text is green
2022-10-13 12:16:56 +00:00
log_write " ${ INFO } Branch: ${ COL_GREEN } ${ local_branch } ${ COL_NC } "
2020-03-08 23:53:14 +00:00
# If it is any other branch, they are in a development branch
2018-07-20 22:25:35 +00:00
else
# So show that in yellow, signifying it's something to take a look at, but not a critical error
2022-10-14 06:43:39 +00:00
log_write " ${ INFO } Branch: ${ COL_YELLOW } ${ local_branch :- Detached } ${ COL_NC } "
2018-07-20 22:25:35 +00:00
fi
# echo the current commit
2022-10-13 12:16:56 +00:00
log_write " ${ INFO } Commit: ${ local_commit } "
2019-02-18 22:32:53 +00:00
# if `local_status` is non-null, then the repo is not clean, display details here
if [ [ ${ local_status } ] ] ; then
2020-07-05 12:04:30 +00:00
# Replace new lines in the status with 12 spaces to make the output cleaner
2019-02-18 22:32:53 +00:00
log_write " ${ INFO } Status: ${ local_status // $'\n' / '\n ' } "
local local_diff
local_diff = $( git diff)
if [ [ ${ local_diff } ] ] ; then
log_write " ${ INFO } Diff: ${ local_diff // $'\n' / '\n ' } "
fi
fi
2018-07-20 22:25:35 +00:00
# If git status failed,
else
# Return an error message
log_write " ${ error_msg } "
# and exit with a non zero code
return 1
fi
2017-05-22 07:39:00 +00:00
else
2023-02-05 18:39:48 +00:00
# Return an error message
log_write " ${ COL_RED } Directory ${ git_dir } doesn't exist ${ COL_NC } "
# and exit with a non zero code
return 1
2017-05-22 07:39:00 +00:00
fi
}
check_ftl_version( ) {
2022-08-08 11:52:20 +00:00
local FTL_VERSION FTL_COMMIT FTL_BRANCH
2022-10-13 12:16:56 +00:00
echo_current_diagnostic "FTL version"
2018-07-20 22:25:35 +00:00
# Use the built in command to check FTL's version
2022-11-14 22:09:26 +00:00
FTL_VERSION = $( pihole-FTL version)
FTL_BRANCH = $( pihole-FTL branch)
FTL_COMMIT = $( pihole-FTL --hash)
2022-08-08 11:52:20 +00:00
2022-10-13 12:16:56 +00:00
2022-10-15 07:06:57 +00:00
log_write " ${ TICK } Version: ${ FTL_VERSION } "
2022-08-08 11:52:20 +00:00
# If they use the master branch, they are on the stable codebase
if [ [ " ${ FTL_BRANCH } " = = "master" ] ] ; then
# so the color of the text is green
log_write " ${ INFO } Branch: ${ COL_GREEN } ${ FTL_BRANCH } ${ COL_NC } "
# If it is any other branch, they are in a development branch
else
# So show that in yellow, signifying it's something to take a look at, but not a critical error
2022-10-14 06:43:39 +00:00
log_write " ${ INFO } Branch: ${ COL_YELLOW } ${ FTL_BRANCH } ${ COL_NC } "
2022-08-08 11:52:20 +00:00
fi
# echo the current commit
log_write " ${ INFO } Commit: ${ FTL_COMMIT } "
2017-05-22 07:39:00 +00:00
}
2017-05-27 20:47:15 +00:00
# Checks the core version of the Pi-hole codebase
check_component_versions( ) {
2018-07-20 22:25:35 +00:00
# Check the Web version, branch, and commit
compare_local_version_to_git_version " ${ CORE_GIT_DIRECTORY } " "Core"
# Check the Web version, branch, and commit
compare_local_version_to_git_version " ${ WEB_GIT_DIRECTORY } " "Web"
# Check the FTL version
check_ftl_version
2017-05-27 20:47:15 +00:00
}
2020-06-03 16:57:22 +00:00
os_check( ) {
# This function gets a list of supported OS versions from a TXT record at versions.pi-hole.net
# and determines whether or not the script is running on one of those systems
2020-08-23 09:48:15 +00:00
local remote_os_domain valid_os valid_version detected_os detected_version cmdResult digReturnCode response
2021-04-15 13:59:10 +00:00
remote_os_domain = ${ OS_CHECK_DOMAIN_NAME :- "versions.pi-hole.net" }
2020-06-03 16:57:22 +00:00
2020-08-14 21:37:58 +00:00
detected_os = $( grep "\bID\b" /etc/os-release | cut -d '=' -f2 | tr -d '"' )
detected_version = $( grep VERSION_ID /etc/os-release | cut -d '=' -f2 | tr -d '"' )
2020-06-03 16:57:22 +00:00
2023-06-04 20:51:10 +00:00
cmdResult = " $( dig -4 +short -t txt " ${ remote_os_domain } " @ns1.pi-hole.net 2>& 1; echo $? ) "
2020-08-23 09:48:15 +00:00
#Get the return code of the previous command (last line)
digReturnCode = " ${ cmdResult ##* $'\n' } "
2020-06-03 16:57:22 +00:00
2020-08-23 13:35:02 +00:00
# Extract dig response
2020-08-23 09:48:15 +00:00
response = " ${ cmdResult %% $'\n' * } "
2022-12-06 18:42:36 +00:00
if [ " ${ digReturnCode } " -ne 0 ] ; then
2022-12-06 20:38:38 +00:00
log_write " ${ INFO } Distro: ${ detected_os ^ } "
2022-12-11 14:31:44 +00:00
log_write " ${ INFO } Version: ${ detected_version } "
2023-06-04 20:51:10 +00:00
log_write " ${ CROSS } dig IPv4 return code: ${ COL_RED } ${ digReturnCode } ${ COL_NC } "
log_write " ${ CROSS } dig response: ${ response } "
log_write " ${ INFO } Retrying via IPv6 "
cmdResult = " $( dig -6 +short -t txt " ${ remote_os_domain } " @ns1.pi-hole.net 2>& 1; echo $? ) "
#Get the return code of the previous command (last line)
digReturnCode = " ${ cmdResult ##* $'\n' } "
# Extract dig response
response = " ${ cmdResult %% $'\n' * } "
fi
# If also no success via IPv6
if [ " ${ digReturnCode } " -ne 0 ] ; then
log_write " ${ CROSS } dig IPv6 return code: ${ COL_RED } ${ digReturnCode } ${ COL_NC } "
2022-12-06 20:38:38 +00:00
log_write " ${ CROSS } dig response: ${ response } "
log_write " ${ CROSS } Error: ${ COL_RED } dig command failed - Unable to check OS ${ COL_NC } "
2022-12-06 17:39:06 +00:00
else
IFS = " " read -r -a supportedOS < <( echo " ${ response } " | tr -d '"' )
for distro_and_versions in " ${ supportedOS [@] } "
do
distro_part = " ${ distro_and_versions %%=* } "
versions_part = " ${ distro_and_versions ##*= } "
if [ [ " ${ detected_os ^^ } " = ~ ${ distro_part ^^ } ] ] ; then
valid_os = true
IFS = "," read -r -a supportedVer <<< " ${ versions_part } "
for version in " ${ supportedVer [@] } "
do
if [ [ " ${ detected_version } " = ~ $version ] ] ; then
valid_version = true
break
fi
done
break
fi
done
2022-12-06 20:38:38 +00:00
local finalmsg
2022-12-06 17:39:06 +00:00
if [ " $valid_os " = true ] ; then
log_write " ${ TICK } Distro: ${ COL_GREEN } ${ detected_os ^ } ${ COL_NC } "
2020-06-03 16:57:22 +00:00
2022-12-06 17:39:06 +00:00
if [ " $valid_version " = true ] ; then
log_write " ${ TICK } Version: ${ COL_GREEN } ${ detected_version } ${ COL_NC } "
2022-12-06 20:38:38 +00:00
finalmsg = " ${ TICK } ${ COL_GREEN } Distro and version supported ${ COL_NC } "
2022-12-06 17:39:06 +00:00
else
log_write " ${ CROSS } Version: ${ COL_RED } ${ detected_version } ${ COL_NC } "
2022-12-06 23:34:18 +00:00
finalmsg = " ${ CROSS } Error: ${ COL_RED } ${ detected_os ^ } is supported but version ${ detected_version } is currently unsupported ${ COL_NC } ( ${ FAQ_HARDWARE_REQUIREMENTS } ) ${ COL_NC } "
2022-12-06 17:39:06 +00:00
fi
2018-07-20 22:25:35 +00:00
else
2022-12-06 17:39:06 +00:00
log_write " ${ CROSS } Distro: ${ COL_RED } ${ detected_os ^ } ${ COL_NC } "
2022-12-06 23:34:18 +00:00
finalmsg = " ${ CROSS } Error: ${ COL_RED } ${ detected_os ^ } is not a supported distro ${ COL_NC } ( ${ FAQ_HARDWARE_REQUIREMENTS } ) ${ COL_NC } "
2018-07-20 22:25:35 +00:00
fi
2022-12-06 20:38:38 +00:00
# Print dig response and the final check result
2022-12-11 14:31:44 +00:00
log_write " ${ TICK } dig return code: ${ COL_GREEN } ${ digReturnCode } ${ COL_NC } "
2022-12-06 20:38:38 +00:00
log_write " ${ INFO } dig response: ${ response } "
log_write " ${ finalmsg } "
2020-06-03 16:57:22 +00:00
fi
2016-10-26 21:33:47 +00:00
}
2017-05-20 06:34:13 +00:00
diagnose_operating_system( ) {
2023-10-04 15:22:01 +00:00
# error message in a variable so we can easily modify it later (or reuse it)
2018-07-20 22:25:35 +00:00
local error_msg = "Distribution unknown -- most likely you are on an unsupported platform and may run into issues."
# Display the current test that is running
echo_current_diagnostic "Operating system"
2022-09-14 21:49:37 +00:00
# If DOCKER_VERSION is set (Sourced from /etc/pihole/versions at start of script), include this information in the debug output
[ -n " ${ DOCKER_VERSION } " ] && log_write " ${ INFO } Pi-hole Docker Container: ${ DOCKER_VERSION } "
2022-01-04 21:46:06 +00:00
2018-07-20 22:25:35 +00:00
# If there is a /etc/*release file, it's probably a supported operating system, so we can
if ls /etc/*release 1> /dev/null 2>& 1; then
# display the attributes to the user from the function made earlier
2020-06-03 16:57:22 +00:00
os_check
2018-07-20 22:25:35 +00:00
else
# If it doesn't exist, it's not a system we currently support and link to FAQ
log_write " ${ CROSS } ${ COL_RED } ${ error_msg } ${ COL_NC } ( ${ FAQ_HARDWARE_REQUIREMENTS } ) "
fi
2016-09-27 03:39:39 +00:00
}
2017-10-13 02:32:33 +00:00
check_selinux( ) {
2018-07-20 22:25:35 +00:00
# SELinux is not supported by the Pi-hole
echo_current_diagnostic "SELinux"
# Check if a SELinux configuration file exists
if [ [ -f /etc/selinux/config ] ] ; then
# If a SELinux configuration file was found, check the default SELinux mode.
DEFAULT_SELINUX = $( awk -F= '/^SELINUX=/ {print $2}' /etc/selinux/config)
case " ${ DEFAULT_SELINUX ,, } " in
enforcing)
log_write " ${ CROSS } ${ COL_RED } Default SELinux: $DEFAULT_SELINUX ${ COL_NC } "
; ;
*) # 'permissive' and 'disabled'
log_write " ${ TICK } ${ COL_GREEN } Default SELinux: $DEFAULT_SELINUX ${ COL_NC } " ;
; ;
esac
# Check the current state of SELinux
CURRENT_SELINUX = $( getenforce)
case " ${ CURRENT_SELINUX ,, } " in
enforcing)
log_write " ${ CROSS } ${ COL_RED } Current SELinux: $CURRENT_SELINUX ${ COL_NC } "
; ;
*) # 'permissive' and 'disabled'
log_write " ${ TICK } ${ COL_GREEN } Current SELinux: $CURRENT_SELINUX ${ COL_NC } " ;
; ;
esac
else
log_write " ${ INFO } ${ COL_GREEN } SELinux not detected ${ COL_NC } " ;
fi
2017-10-13 02:32:33 +00:00
}
2020-10-12 04:20:31 +00:00
check_firewalld( ) {
# FirewallD ships by default on Fedora/CentOS/RHEL and enabled upon clean install
# FirewallD is not configured by the installer and is the responsibility of the user
echo_current_diagnostic "FirewallD"
# Check if FirewallD service is enabled
if command -v systemctl & > /dev/null; then
# get its status via systemctl
local firewalld_status
firewalld_status = $( systemctl is-active firewalld)
log_write " ${ INFO } ${ COL_GREEN } Firewalld service ${ firewalld_status } ${ COL_NC } " ;
if [ " ${ firewalld_status } " = = "active" ] ; then
# test common required service ports
local firewalld_enabled_services
firewalld_enabled_services = $( firewall-cmd --list-services)
local firewalld_expected_services = ( "http" "dns" "dhcp" "dhcpv6" )
for i in " ${ firewalld_expected_services [@] } " ; do
if [ [ " ${ firewalld_enabled_services } " = ~ ${ i } ] ] ; then
log_write " ${ TICK } ${ COL_GREEN } Allow Service: ${ i } ${ COL_NC } " ;
else
log_write " ${ CROSS } ${ COL_RED } Allow Service: ${ i } ${ COL_NC } ( ${ FAQ_HARDWARE_REQUIREMENTS_FIREWALLD } ) "
fi
done
# check for custom FTL FirewallD zone
local firewalld_zones
firewalld_zones = $( firewall-cmd --get-zones)
if [ [ " ${ firewalld_zones } " = ~ "ftl" ] ] ; then
log_write " ${ TICK } ${ COL_GREEN } FTL Custom Zone Detected ${ COL_NC } " ;
# check FTL custom zone interface: lo
local firewalld_ftl_zone_interfaces
firewalld_ftl_zone_interfaces = $( firewall-cmd --zone= ftl --list-interfaces)
if [ [ " ${ firewalld_ftl_zone_interfaces } " = ~ "lo" ] ] ; then
log_write " ${ TICK } ${ COL_GREEN } Local Interface Detected ${ COL_NC } " ;
else
log_write " ${ CROSS } ${ COL_RED } Local Interface Not Detected ${ COL_NC } ( ${ FAQ_HARDWARE_REQUIREMENTS_FIREWALLD } ) "
fi
# check FTL custom zone port: 4711
local firewalld_ftl_zone_ports
firewalld_ftl_zone_ports = $( firewall-cmd --zone= ftl --list-ports)
if [ [ " ${ firewalld_ftl_zone_ports } " = ~ "4711/tcp" ] ] ; then
log_write " ${ TICK } ${ COL_GREEN } FTL Port 4711/tcp Detected ${ COL_NC } " ;
else
log_write " ${ CROSS } ${ COL_RED } FTL Port 4711/tcp Not Detected ${ COL_NC } ( ${ FAQ_HARDWARE_REQUIREMENTS_FIREWALLD } ) "
fi
else
log_write " ${ CROSS } ${ COL_RED } FTL Custom Zone Not Detected ${ COL_NC } ( ${ FAQ_HARDWARE_REQUIREMENTS_FIREWALLD } ) "
fi
fi
else
log_write " ${ TICK } ${ COL_GREEN } Firewalld service not detected ${ COL_NC } " ;
fi
}
2023-10-28 06:13:31 +00:00
run_and_print_command( ) {
# Run the command passed as an argument
local cmd = " ${ 1 } "
# Show the command that is being run
log_write " ${ INFO } ${ cmd } "
# Run the command and store the output in a variable
local output
output = $( ${ cmd } 2>& 1)
# If the command was successful,
if [ [ $? -eq 0 ] ] ; then
# show the output
log_write " ${ output } "
2018-07-20 22:25:35 +00:00
else
2023-10-28 06:13:31 +00:00
# otherwise, show an error
log_write " ${ CROSS } ${ COL_RED } Command failed ${ COL_NC } "
2018-07-20 22:25:35 +00:00
fi
2017-05-22 17:05:42 +00:00
}
2023-10-28 06:13:31 +00:00
hardware_check( ) {
echo_current_diagnostic "System hardware configuration"
# Store the output of the command in a variable
run_and_print_command "lshw -short"
echo_current_diagnostic "Processor details"
# Store the output of the command in a variable
run_and_print_command "lscpu"
}
2021-10-08 19:50:46 +00:00
disk_usage( ) {
2021-10-11 15:31:03 +00:00
local file_system
2021-10-11 16:02:47 +00:00
local hide
2021-10-08 19:50:46 +00:00
echo_current_diagnostic "Disk usage"
2021-10-11 15:31:03 +00:00
mapfile -t file_system < <( df -h)
2021-10-11 16:02:47 +00:00
# Some lines of df might contain sensitive information like usernames and passwords.
# E.g. curlftpfs filesystems (https://www.looklinux.com/mount-ftp-share-on-linux-using-curlftps/)
# We are not interested in those lines so we collect keyword, to remove them from the output
2022-07-08 20:00:36 +00:00
# Additional keywords can be added, separated by "|"
2021-10-11 16:02:47 +00:00
hide = "curlftpfs"
2022-07-02 13:00:17 +00:00
# only show those lines not containing a sensitive phrase
2021-10-11 15:31:03 +00:00
for line in " ${ file_system [@] } " ; do
2021-10-11 16:02:47 +00:00
if [ [ ! $line = ~ $hide ] ] ; then
2021-10-11 15:31:03 +00:00
log_write " ${ line } "
2021-10-11 16:02:47 +00:00
fi
2021-10-11 15:31:03 +00:00
done
2021-10-08 19:50:46 +00:00
}
2018-04-01 11:40:48 +00:00
parse_locale( ) {
2018-07-20 22:25:35 +00:00
local pihole_locale
echo_current_diagnostic "Locale"
pihole_locale = " $( locale) "
parse_file " ${ pihole_locale } "
2018-04-01 11:40:48 +00:00
}
2017-06-01 06:15:11 +00:00
ping_ipv4_or_ipv6( ) {
2018-07-20 22:25:35 +00:00
# Give the first argument a readable name (a 4 or a six should be the argument)
local protocol = " ${ 1 } "
# If the protocol is 6,
if [ [ ${ protocol } = = "6" ] ] ; then
# use ping6
cmd = "ping6"
# and Google's public IPv6 address
public_address = "2001:4860:4860::8888"
else
# Otherwise, just use ping
cmd = "ping"
# and Google's public IPv4 address
public_address = "8.8.8.8"
fi
2017-06-01 06:15:11 +00:00
}
2017-05-22 17:35:57 +00:00
2017-06-01 06:15:11 +00:00
ping_gateway( ) {
2018-07-20 22:25:35 +00:00
local protocol = " ${ 1 } "
ping_ipv4_or_ipv6 " ${ protocol } "
# Check if we are using IPv4 or IPv6
2022-09-25 15:49:24 +00:00
# Find the default gateways using IPv4 or IPv6
2018-07-20 22:25:35 +00:00
local gateway
2022-09-25 15:49:24 +00:00
log_write " ${ INFO } Default IPv ${ protocol } gateway(s): "
while IFS = read -r gateway; do
log_write " ${ gateway } "
2023-10-28 06:07:11 +00:00
done < <( ip -" ${ protocol } " route | grep default | cut -d ' ' -f 3)
2022-09-25 15:49:24 +00:00
2023-10-28 06:07:11 +00:00
gateway = $( ip -" ${ protocol } " route | grep default | cut -d ' ' -f 3 | head -n 1)
2022-09-25 15:49:24 +00:00
# If there was at least one gateway
if [ -n " ${ gateway } " ] ; then
2018-07-20 22:25:35 +00:00
# Let the user know we will ping the gateway for a response
2022-09-25 15:49:24 +00:00
log_write " * Pinging first gateway ${ gateway } ... "
2018-07-20 22:25:35 +00:00
# Try to quietly ping the gateway 3 times, with a timeout of 3 seconds, using numeric output only,
# on the pihole interface, and tail the last three lines of the output
# If pinging the gateway is not successful,
2023-10-28 06:07:11 +00:00
if ! ${ cmd } -c 1 -W 2 -n " ${ gateway } " >/dev/null; then
2018-07-20 22:25:35 +00:00
# let the user know
2018-07-22 19:18:26 +00:00
log_write " ${ CROSS } ${ COL_RED } Gateway did not respond. ${ COL_NC } ( $FAQ_GATEWAY )\\n "
2018-07-20 22:25:35 +00:00
# and return an error code
return 1
# Otherwise,
else
# show a success
log_write " ${ TICK } ${ COL_GREEN } Gateway responded. ${ COL_NC } "
# and return a success code
return 0
fi
2017-05-22 17:35:57 +00:00
fi
}
2017-05-22 17:57:55 +00:00
ping_internet( ) {
2018-07-20 22:25:35 +00:00
local protocol = " ${ 1 } "
# Ping a public address using the protocol passed as an argument
ping_ipv4_or_ipv6 " ${ protocol } "
log_write " * Checking Internet connectivity via IPv ${ protocol } ... "
# Try to ping the address 3 times
2018-07-22 19:18:26 +00:00
if ! ${ cmd } -c 1 -W 2 -n ${ public_address } -I " ${ PIHOLE_INTERFACE } " >/dev/null; then
2018-07-20 22:25:35 +00:00
# if it's unsuccessful, show an error
2018-07-22 19:18:26 +00:00
log_write " ${ CROSS } ${ COL_RED } Cannot reach the Internet. ${ COL_NC } \\n "
2018-07-20 22:25:35 +00:00
return 1
else
# Otherwise, show success
2018-07-22 19:18:26 +00:00
log_write " ${ TICK } ${ COL_GREEN } Query responded. ${ COL_NC } \\n "
2018-07-20 22:25:35 +00:00
return 0
fi
2017-05-22 17:57:55 +00:00
}
2017-05-28 02:21:18 +00:00
compare_port_to_service_assigned( ) {
2020-02-24 18:00:19 +00:00
local service_name
local expected_service
local port
service_name = " ${ 2 } "
expected_service = " ${ 1 } "
port = " ${ 3 } "
2018-08-16 22:10:55 +00:00
# If the service is a Pi-hole service, highlight it in green
2020-02-24 18:00:19 +00:00
if [ [ " ${ service_name } " = = " ${ expected_service } " ] ] ; then
2022-01-05 16:41:46 +00:00
log_write " ${ TICK } ${ COL_GREEN } ${ port } ${ COL_NC } is in use by ${ COL_GREEN } ${ service_name } ${ COL_NC } "
2018-07-20 22:25:35 +00:00
# Otherwise,
else
2017-05-28 02:21:18 +00:00
# Show the service name in red since it's non-standard
2022-01-05 16:41:46 +00:00
log_write " ${ CROSS } ${ COL_RED } ${ port } ${ COL_NC } is in use by ${ COL_RED } ${ service_name } ${ COL_NC } ( ${ FAQ_HARDWARE_REQUIREMENTS_PORTS } ) "
2018-07-20 22:25:35 +00:00
fi
2017-05-28 02:21:18 +00:00
}
2017-05-24 03:32:30 +00:00
check_required_ports( ) {
2018-07-20 22:25:35 +00:00
echo_current_diagnostic "Ports in use"
2023-11-12 20:20:03 +00:00
# Since Pi-hole needs various ports, check what they are being used by
2018-07-20 22:25:35 +00:00
# so we can detect any issues
local ftl = "pihole-FTL"
# Create an array for these ports in use
ports_in_use = ( )
# Sort the addresses and remove duplicates
while IFS = read -r line; do
ports_in_use += ( " $line " )
2022-01-09 06:13:51 +00:00
done < <( ss --listening --numeric --tcp --udp --processes --no-header )
2018-07-20 22:25:35 +00:00
2023-11-12 20:20:03 +00:00
local ports_configured
# Get all configured ports
ports_configured = " $( pihole-FTL --config "webserver.port" ) "
# Remove all non-didgits, split into an array at ","
ports_configured = " ${ ports_configured //[!0-9,]/ } "
mapfile -d "," -t ports_configured < <( echo " ${ ports_configured } " )
# Add port 53
ports_configured += ( "53" )
2018-07-20 22:25:35 +00:00
# Now that we have the values stored,
for i in " ${ !ports_in_use[@] } " ; do
# loop through them and assign some local variables
local service_name
2022-01-05 16:41:46 +00:00
service_name = $( echo " ${ ports_in_use [ $i ] } " | awk '{gsub(/users:\(\("/,"",$7);gsub(/".*/,"",$7);print $7}' )
2018-07-20 22:25:35 +00:00
local protocol_type
2022-01-05 16:41:46 +00:00
protocol_type = $( echo " ${ ports_in_use [ $i ] } " | awk '{print $1}' )
2018-07-20 22:25:35 +00:00
local port_number
2022-01-05 16:41:46 +00:00
port_number = " $( echo " ${ ports_in_use [ $i ] } " | awk '{print $5}' ) " # | awk '{gsub(/^.*:/,"",$5);print $5}')
2018-07-20 22:25:35 +00:00
2023-11-08 20:28:05 +00:00
# Check if the right services are using the right ports
2023-11-12 20:20:03 +00:00
if [ [ ${ ports_configured [*] } = ~ $( echo " ${ port_number } " | rev | cut -d: -f1 | rev) ] ] ; then
2023-11-08 20:28:05 +00:00
compare_port_to_service_assigned " ${ ftl } " " ${ service_name } " " ${ protocol_type } : ${ port_number } "
else
2018-07-20 22:25:35 +00:00
# If it's not a default port that Pi-hole needs, just print it out for the user to see
2023-11-08 20:28:05 +00:00
log_write " ${ protocol_type } : ${ port_number } is in use by ${ service_name : =<unknown> } " ;
fi
2018-07-20 22:25:35 +00:00
done
2017-05-24 03:32:30 +00:00
}
2022-01-09 10:31:47 +00:00
ip_command( ) {
# Obtain and log information from "ip XYZ show" commands
echo_current_diagnostic " ${ 2 } "
local entries = ( )
mapfile -t entries < <( ip " ${ 1 } " show)
for line in " ${ entries [@] } " ; do
log_write " ${ line } "
done
}
check_ip_command( ) {
ip_command "addr" "Network interfaces and addresses"
ip_command "route" "Network routing table"
}
2017-05-22 17:35:57 +00:00
check_networking( ) {
2018-07-20 22:25:35 +00:00
# Runs through several of the functions made earlier; we just clump them
# together since they are all related to the networking aspect of things
echo_current_diagnostic "Networking"
ping_gateway "4"
ping_gateway "6"
2022-01-08 12:57:49 +00:00
# Skip the following check if installed in docker container. Unpriv'ed containers do not have access to the information required
# to resolve the service name listening - and the container should not start if there was a port conflict anyway
2022-09-14 21:49:37 +00:00
[ -z " ${ DOCKER_VERSION } " ] && check_required_ports
2017-05-22 17:35:57 +00:00
}
2017-05-24 20:29:31 +00:00
dig_at( ) {
2018-07-20 22:25:35 +00:00
# We need to test if Pi-hole can properly resolve domain names
# as it is an essential piece of the software
# Store the arguments as variables with names
local protocol = " ${ 1 } "
echo_current_diagnostic " Name resolution (IPv ${ protocol } ) using a random blocked domain and a known ad-serving domain "
# Set more local variables
# We need to test name resolution locally, via Pi-hole, and via a public resolver
local local_dig
local remote_dig
2021-04-16 10:24:46 +00:00
local interfaces
local addresses
2018-07-20 22:25:35 +00:00
# Use a static domain that we know has IPv4 and IPv6 to avoid false positives
# Sometimes the randomly chosen domains don't use IPv6, or something else is wrong with them
local remote_url = "doubleclick.com"
# If the protocol (4 or 6) is 6,
if [ [ ${ protocol } = = "6" ] ] ; then
# Set the IPv6 variables and record type
local local_address = "::1"
local remote_address = "2001:4860:4860::8888"
2021-04-16 10:14:05 +00:00
local sed_selector = "inet6"
2018-07-20 22:25:35 +00:00
local record_type = "AAAA"
2021-01-19 18:33:38 +00:00
# Otherwise, it should be 4
2018-07-20 22:25:35 +00:00
else
# so use the IPv4 values
local local_address = "127.0.0.1"
local remote_address = "8.8.8.8"
2021-04-16 10:14:05 +00:00
local sed_selector = "inet"
2018-07-20 22:25:35 +00:00
local record_type = "A"
fi
2017-05-24 20:29:31 +00:00
2023-09-07 20:27:49 +00:00
# Find a random blocked url that has not been whitelisted and is not ABP style.
2018-07-20 22:25:35 +00:00
# This helps emulate queries to different domains that a user might query
# It will also give extra assurance that Pi-hole is correctly resolving and blocking domains
local random_url
2023-09-07 20:27:49 +00:00
random_url = $( pihole-FTL sqlite3 " ${ PIHOLE_GRAVITY_DB_FILE } " "SELECT domain FROM vw_gravity WHERE domain not like '||%^' ORDER BY RANDOM() LIMIT 1" )
2023-10-04 15:22:01 +00:00
# Fallback if no non-ABP style domains were found
2023-09-07 20:27:49 +00:00
if [ -z " ${ random_url } " ] ; then
random_url = "flurry.com"
fi
2018-07-20 22:25:35 +00:00
# Next we need to check if Pi-hole can resolve a domain when the query is sent to it's IP address
# This better emulates how clients will interact with Pi-hole as opposed to above where Pi-hole is
# just asing itself locally
2021-04-16 10:14:05 +00:00
# The default timeouts and tries are reduced in case the DNS server isn't working, so the user isn't
# waiting for too long
#
# Turn off history expansion such that the "!" in the sed command cannot do silly things
set +H
# Get interfaces
# sed logic breakdown:
# / master /d;
# Removes all interfaces that are slaves of others (e.g. virtual docker interfaces)
# /UP/!d;
# Removes all interfaces which are not UP
# s/^[0-9]*: //g;
# Removes interface index
2022-03-31 00:32:18 +00:00
# s/@.*//g;
# Removes everything after @ (if found)
2021-04-16 10:14:05 +00:00
# s/: <.*//g;
# Removes everything after the interface name
2022-03-31 00:32:18 +00:00
interfaces = " $( ip link show | sed "/ master /d;/UP/!d;s/^[0-9]*: //g;s/@.*//g;s/: <.*//g;" ) "
2021-04-16 10:14:05 +00:00
while IFS = read -r iface ; do
# Get addresses of current interface
# sed logic breakdown:
# /inet(|6) /!d;
# Removes all lines from ip a that do not contain either "inet " or "inet6 "
# s/^.*inet(|6) //g;
# Removes all leading whitespace as well as the "inet " or "inet6 " string
# s/\/.*$//g;
# Removes CIDR and everything thereafter (e.g., scope properties)
2021-04-16 10:24:46 +00:00
addresses = " $( ip address show dev " ${ iface } " | sed " / ${ sed_selector } /!d;s/^.* ${ sed_selector } //g;s/\/.* $//g; " ) "
2021-07-28 19:38:36 +00:00
if [ -n " ${ addresses } " ] ; then
while IFS = read -r local_address ; do
# Check if Pi-hole can use itself to block a domain
2023-10-28 06:20:31 +00:00
if local_dig = " $( dig +tries= 1 +time= 2 -" ${ protocol } " " ${ random_url } " @" ${ local_address } " " ${ record_type } " ) " ; then
2021-07-28 19:38:36 +00:00
# If it can, show success
2023-10-28 06:20:31 +00:00
if [ [ " ${ local_dig } " = = *"status: NOERROR" * ] ] ; then
local_dig = "NOERROR"
elif [ [ " ${ local_dig } " = = *"status: NXDOMAIN" * ] ] ; then
local_dig = "NXDOMAIN"
else
2023-10-28 06:34:30 +00:00
# Extract the first entry in the answer section from dig's output,
# replacing any multiple spaces and tabs with a single space
local_dig = " $( echo " ${ local_dig } " | grep -A1 "ANSWER SECTION" | grep -v "ANSWER SECTION" | tr -s " \t" " " ) "
2023-10-28 06:20:31 +00:00
fi
2021-07-28 19:38:36 +00:00
log_write " ${ TICK } ${ random_url } ${ COL_GREEN } is ${ local_dig } ${ COL_NC } on ${ COL_CYAN } ${ iface } ${ COL_NC } ( ${ COL_CYAN } ${ local_address } ${ COL_NC } ) "
else
# Otherwise, show a failure
log_write " ${ CROSS } ${ COL_RED } Failed to resolve ${ COL_NC } ${ random_url } on ${ COL_RED } ${ iface } ${ COL_NC } ( ${ COL_RED } ${ local_address } ${ COL_NC } ) "
fi
done <<< " ${ addresses } "
else
log_write " ${ TICK } No IPv ${ protocol } address available on ${ COL_CYAN } ${ iface } ${ COL_NC } "
fi
2021-04-16 10:14:05 +00:00
done <<< " ${ interfaces } "
2018-07-20 22:25:35 +00:00
# Finally, we need to make sure legitimate queries can out to the Internet using an external, public DNS server
# We are using the static remote_url here instead of a random one because we know it works with IPv4 and IPv6
2021-04-16 10:24:46 +00:00
if remote_dig = $( dig +tries= 1 +time= 2 -" ${ protocol } " " ${ remote_url } " @" ${ remote_address } " +short " ${ record_type } " | head -n1) ; then
2018-07-20 22:25:35 +00:00
# If successful, the real IP of the domain will be returned instead of Pi-hole's IP
log_write " ${ TICK } ${ remote_url } ${ COL_GREEN } is ${ remote_dig } ${ COL_NC } via ${ COL_CYAN } a remote, public DNS server ${ COL_NC } ( ${ remote_address } ) "
2017-05-26 19:26:02 +00:00
else
2018-07-20 22:25:35 +00:00
# Otherwise, show an error
log_write " ${ CROSS } ${ COL_RED } Failed to resolve ${ COL_NC } ${ remote_url } via ${ COL_RED } a remote, public DNS server ${ COL_NC } ( ${ remote_address } ) "
2017-05-26 19:26:02 +00:00
fi
2018-07-20 22:25:35 +00:00
}
process_status( ) {
# Check to make sure Pi-hole's services are running and active
echo_current_diagnostic "Pi-hole processes"
# Local iterator
local i
# For each process,
for i in " ${ PIHOLE_PROCESSES [@] } " ; do
# If systemd
if command -v systemctl & > /dev/null; then
# get its status via systemctl
2018-07-22 19:18:26 +00:00
local status_of_process
status_of_process = $( systemctl is-active " ${ i } " )
2018-07-20 22:25:35 +00:00
else
2018-10-24 16:06:11 +00:00
# Otherwise, use the service command and mock the output of `systemctl is-active`
2018-07-22 19:18:26 +00:00
local status_of_process
2022-11-13 20:53:59 +00:00
# If DOCKER_VERSION is set, the output is slightly different (s6 init system on Docker)
if [ -n " ${ DOCKER_VERSION } " ] ; then
if service " ${ i } " status | grep -E '^up' & > /dev/null; then
status_of_process = "active"
else
status_of_process = "inactive"
fi
2018-10-24 16:06:11 +00:00
else
2022-11-13 20:53:59 +00:00
# non-Docker system
if service " ${ i } " status | grep -E 'is\srunning' & > /dev/null; then
status_of_process = "active"
else
status_of_process = "inactive"
fi
2018-10-24 16:06:11 +00:00
fi
2018-07-20 22:25:35 +00:00
fi
# and print it out to the user
if [ [ " ${ status_of_process } " = = "active" ] ] ; then
# If it's active, show it in green
log_write " ${ TICK } ${ COL_GREEN } ${ i } ${ COL_NC } daemon is ${ COL_GREEN } ${ status_of_process } ${ COL_NC } "
else
# If it's not, show it in red
log_write " ${ CROSS } ${ COL_RED } ${ i } ${ COL_NC } daemon is ${ COL_RED } ${ status_of_process } ${ COL_NC } "
fi
done
2017-05-24 03:57:22 +00:00
}
2020-11-24 04:57:13 +00:00
ftl_full_status( ) {
2020-11-23 20:09:35 +00:00
# if using systemd print the full status of pihole-FTL
echo_current_diagnostic "Pi-hole-FTL full status"
local FTL_status
if command -v systemctl & > /dev/null; then
FTL_status = $( systemctl status --full --no-pager pihole-FTL.service)
log_write " ${ FTL_status } "
2020-11-24 05:02:18 +00:00
else
log_write " ${ INFO } systemctl: command not found "
2020-11-23 20:09:35 +00:00
fi
}
2017-05-27 05:04:42 +00:00
make_array_from_file( ) {
2018-07-20 22:25:35 +00:00
local filename = " ${ 1 } "
# The second argument can put a limit on how many line should be read from the file
# Since some of the files are so large, this is helpful to limit the output
local limit = ${ 2 }
# A local iterator for testing if we are at the limit above
local i = 0
# Set the array to be empty so we can start fresh when the function is used
local file_content = ( )
# If the file is a directory
if [ [ -d " ${ filename } " ] ] ; then
# do nothing since it cannot be parsed
2017-06-11 02:57:17 +00:00
:
2018-07-20 22:25:35 +00:00
else
# Otherwise, read the file line by line
while IFS = read -r line; do
2022-07-08 20:00:36 +00:00
# Otherwise, strip out comments and blank lines
2020-12-02 19:52:39 +00:00
new_line = $( echo " ${ line } " | sed -e 's/^\s*#.*$//' -e '/^$/d' )
2018-07-20 22:25:35 +00:00
# If the line still has content (a non-zero value)
if [ [ -n " ${ new_line } " ] ] ; then
# Put it into the array
file_content += ( " ${ new_line } " )
else
# Otherwise, it's a blank line or comment, so do nothing
:
fi
# Increment the iterator +1
i = $(( i+1))
# but if the limit of lines we want to see is exceeded
if [ [ -z ${ limit } ] ] ; then
# do nothing
:
elif [ [ $i -eq ${ limit } ] ] ; then
break
fi
done < " ${ filename } "
# Now the we have made an array of the file's content
for each_line in " ${ file_content [@] } " ; do
# Print each line
# At some point, we may want to check the file line-by-line, so that's the reason for an array
log_write " ${ each_line } "
done
fi
2017-05-27 05:04:42 +00:00
}
2017-05-20 06:34:13 +00:00
parse_file( ) {
2018-07-20 22:25:35 +00:00
# Set the first argument passed to this function as a named variable for better readability
local filename = " ${ 1 } "
# Put the current Internal Field Separator into another variable so it can be restored later
OLD_IFS = " $IFS "
# Get the lines that are in the file(s) and store them in an array for parsing later
2018-07-22 19:18:26 +00:00
local file_info
2018-07-20 22:25:35 +00:00
if [ [ -f " $filename " ] ] ; then
2018-07-22 19:18:26 +00:00
#shellcheck disable=SC2016
2018-07-20 22:25:35 +00:00
IFS = $'\r\n' command eval 'file_info=( $(cat "${filename}") )'
else
2018-10-26 18:24:43 +00:00
read -r -a file_info <<< " $filename "
2017-06-01 06:15:11 +00:00
fi
2018-07-20 22:25:35 +00:00
# Set a named variable for better readability
local file_lines
# For each line in the file,
for file_lines in " ${ file_info [@] } " ; do
2021-04-16 10:24:46 +00:00
if [ [ -n " ${ file_lines } " ] ] ; then
2023-10-28 06:03:09 +00:00
# skip empty and comment lines line
[ [ " ${ file_lines } " = ~ ^[ [ :space:] ] *\# .*$ || ! " ${ file_lines } " ] ] && continue
# remove the password hash from the output (*"pwhash = "*)
[ [ " ${ file_lines } " = = *"pwhash =" * ] ] && file_lines = $( echo " ${ file_lines } " | sed -e 's/\(pwhash = \).*/\1<removed>/' )
2018-07-20 22:25:35 +00:00
# otherwise, display the lines of the file
log_write " ${ file_lines } "
fi
done
# Set the IFS back to what it was
IFS = " $OLD_IFS "
2017-03-04 23:06:34 +00:00
}
2017-05-24 20:29:31 +00:00
check_name_resolution( ) {
2022-07-08 20:00:36 +00:00
# Check name resolution from localhost, Pi-hole's IP, and Google's name servers
2018-07-20 22:25:35 +00:00
# using the function we created earlier
2021-04-16 10:14:05 +00:00
dig_at 4
dig_at 6
2017-05-24 20:29:31 +00:00
}
2017-05-22 04:25:53 +00:00
# This function can check a directory exists
# Pi-hole has files in several places, so we will reuse this function
2017-05-20 06:34:13 +00:00
dir_check( ) {
2020-03-08 23:53:14 +00:00
# Set the first argument passed to this function as a named variable for better readability
2018-07-20 22:25:35 +00:00
local directory = " ${ 1 } "
# Display the current test that is running
echo_current_diagnostic " contents of ${ COL_CYAN } ${ directory } ${ COL_NC } "
# For each file in the directory,
for filename in ${ directory } ; do
# check if exists first; if it does,
if ls " ${ filename } " 1> /dev/null 2>& 1; then
# do nothing
2023-01-22 21:37:19 +00:00
true
return
2018-07-20 22:25:35 +00:00
else
# Otherwise, show an error
log_write " ${ COL_RED } ${ directory } does not exist. ${ COL_NC } "
2023-01-22 21:37:19 +00:00
false
return
2018-07-20 22:25:35 +00:00
fi
done
2016-04-11 23:35:44 +00:00
}
2017-05-20 06:34:13 +00:00
list_files_in_dir( ) {
2020-03-08 23:53:14 +00:00
# Set the first argument passed to this function as a named variable for better readability
2018-07-20 22:25:35 +00:00
local dir_to_parse = " ${ 1 } "
2023-01-24 22:02:38 +00:00
# show files and sizes of some directories, don't print the file content (yet)
if [ [ " ${ dir_to_parse } " = = " ${ SHM_DIRECTORY } " ] ] ; then
# SHM file - we do not want to see the content, but we want to see the files and their sizes
log_write " $( ls -lh " ${ dir_to_parse } / " ) "
fi
2018-07-20 22:25:35 +00:00
# Store the files found in an array
2018-07-22 19:18:26 +00:00
mapfile -t files_found < <( ls " ${ dir_to_parse } " )
2018-07-20 22:25:35 +00:00
# For each file in the array,
for each_file in " ${ files_found [@] } " ; do
if [ [ -d " ${ dir_to_parse } / ${ each_file } " ] ] ; then
2020-03-08 23:53:14 +00:00
# If it's a directory, do nothing
2018-07-20 22:25:35 +00:00
:
2019-05-21 03:58:57 +00:00
elif [ [ " ${ dir_to_parse } / ${ each_file } " = = " ${ PIHOLE_DEBUG_LOG } " ] ] || \
2018-07-22 19:18:26 +00:00
[ [ " ${ dir_to_parse } / ${ each_file } " = = " ${ PIHOLE_RAW_BLOCKLIST_FILES } " ] ] || \
2018-07-20 22:25:35 +00:00
[ [ " ${ dir_to_parse } / ${ each_file } " = = " ${ PIHOLE_INSTALL_LOG_FILE } " ] ] || \
[ [ " ${ dir_to_parse } / ${ each_file } " = = " ${ PIHOLE_LOG } " ] ] || \
2018-07-22 19:18:26 +00:00
[ [ " ${ dir_to_parse } / ${ each_file } " = = " ${ PIHOLE_LOG_GZIPS } " ] ] ; then
2018-07-20 22:25:35 +00:00
:
2021-07-28 20:51:04 +00:00
elif [ [ " ${ dir_to_parse } " = = " ${ DNSMASQ_D_DIRECTORY } " ] ] ; then
2023-01-24 22:02:38 +00:00
# in case of the dnsmasq directory include all files in the debug output
2021-07-28 20:53:30 +00:00
log_write " \\n ${ COL_GREEN } $( ls -lhd " ${ dir_to_parse } " /" ${ each_file } " ) ${ COL_NC } "
2021-07-28 20:51:04 +00:00
make_array_from_file " ${ dir_to_parse } / ${ each_file } "
2017-06-10 17:27:05 +00:00
else
2018-07-20 22:25:35 +00:00
# Then, parse the file's content into an array so each line can be analyzed if need be
for i in " ${ !REQUIRED_FILES[@] } " ; do
2018-07-22 19:18:26 +00:00
if [ [ " ${ dir_to_parse } / ${ each_file } " = = " ${ REQUIRED_FILES [ $i ] } " ] ] ; then
2018-07-20 22:25:35 +00:00
# display the filename
2021-07-28 20:53:30 +00:00
log_write " \\n ${ COL_GREEN } $( ls -lhd " ${ dir_to_parse } " /" ${ each_file } " ) ${ COL_NC } "
2018-07-20 22:25:35 +00:00
# Check if the file we want to view has a limit (because sometimes we just need a little bit of info from the file, not the entire thing)
case " ${ dir_to_parse } / ${ each_file } " in
2023-11-06 21:38:01 +00:00
# If it's Web server log, give the first and last 25 lines
" ${ PIHOLE_WEBSERVER_LOG } " ) head_tail_log " ${ dir_to_parse } / ${ each_file } " 25
2018-07-20 22:25:35 +00:00
; ;
# Same for the FTL log
" ${ PIHOLE_FTL_LOG } " ) head_tail_log " ${ dir_to_parse } / ${ each_file } " 35
; ;
# parse the file into an array in case we ever need to analyze it line-by-line
*) make_array_from_file " ${ dir_to_parse } / ${ each_file } " ;
esac
else
# Otherwise, do nothing since it's not a file needed for Pi-hole so we don't care about it
:
fi
done
2017-06-10 17:27:05 +00:00
fi
2018-07-20 22:25:35 +00:00
done
2016-03-20 01:32:11 +00:00
}
2017-06-07 17:25:00 +00:00
show_content_of_files_in_dir( ) {
2018-07-20 22:25:35 +00:00
# Set a local variable for better readability
local directory = " ${ 1 } "
# Check if the directory exists
2023-01-22 21:37:19 +00:00
if dir_check " ${ directory } " ; then
# if it does, list the files in it
list_files_in_dir " ${ directory } "
fi
2017-05-24 20:29:31 +00:00
}
2017-06-07 17:25:00 +00:00
show_content_of_pihole_files( ) {
2018-07-20 22:25:35 +00:00
# Show the content of the files in each of Pi-hole's folders
show_content_of_files_in_dir " ${ PIHOLE_DIRECTORY } "
show_content_of_files_in_dir " ${ DNSMASQ_D_DIRECTORY } "
show_content_of_files_in_dir " ${ CRON_D_DIRECTORY } "
show_content_of_files_in_dir " ${ LOG_DIRECTORY } "
2019-01-01 16:56:02 +00:00
show_content_of_files_in_dir " ${ SHM_DIRECTORY } "
2021-09-05 18:44:39 +00:00
show_content_of_files_in_dir " ${ ETC } "
2017-05-24 20:29:31 +00:00
}
2018-03-23 11:56:40 +00:00
head_tail_log( ) {
2018-07-20 22:25:35 +00:00
# The file being processed
local filename = " ${ 1 } "
# The number of lines to use for head and tail
local qty = " ${ 2 } "
local head_line
local tail_line
# Put the current Internal Field Separator into another variable so it can be restored later
OLD_IFS = " $IFS "
# Get the lines that are in the file(s) and store them in an array for parsing later
IFS = $'\r\n'
local log_head = ( )
2018-07-22 19:18:26 +00:00
mapfile -t log_head < <( head -n " ${ qty } " " ${ filename } " )
log_write " ${ COL_CYAN } -----head of $( basename " ${ filename } " ) ------ ${ COL_NC } "
2018-07-20 22:25:35 +00:00
for head_line in " ${ log_head [@] } " ; do
log_write " ${ head_line } "
done
log_write ""
local log_tail = ( )
2018-07-22 19:18:26 +00:00
mapfile -t log_tail < <( tail -n " ${ qty } " " ${ filename } " )
log_write " ${ COL_CYAN } -----tail of $( basename " ${ filename } " ) ------ ${ COL_NC } "
2018-07-20 22:25:35 +00:00
for tail_line in " ${ log_tail [@] } " ; do
log_write " ${ tail_line } "
done
# Set the IFS back to what it was
IFS = " $OLD_IFS "
2018-03-23 11:56:40 +00:00
}
2019-05-21 04:15:22 +00:00
show_db_entries( ) {
local title = " ${ 1 } "
local query = " ${ 2 } "
2019-05-21 04:33:09 +00:00
local widths = " ${ 3 } "
2019-05-21 04:15:22 +00:00
echo_current_diagnostic " ${ title } "
2019-05-21 03:58:57 +00:00
2018-07-20 22:25:35 +00:00
OLD_IFS = " $IFS "
IFS = $'\r\n'
2019-05-21 04:15:22 +00:00
local entries = ( )
2019-05-21 04:33:09 +00:00
mapfile -t entries < <( \
2022-01-30 09:42:13 +00:00
pihole-FTL sqlite3 " ${ PIHOLE_GRAVITY_DB_FILE } " \
2019-05-21 04:33:09 +00:00
-cmd ".headers on" \
-cmd ".mode column" \
-cmd " .width ${ widths } " \
" ${ query } " \
)
2019-05-21 03:58:57 +00:00
2019-05-21 04:15:22 +00:00
for line in " ${ entries [@] } " ; do
2019-05-21 03:58:57 +00:00
log_write " ${ line } "
done
IFS = " $OLD_IFS "
}
2020-11-24 15:06:45 +00:00
show_FTL_db_entries( ) {
local title = " ${ 1 } "
local query = " ${ 2 } "
local widths = " ${ 3 } "
echo_current_diagnostic " ${ title } "
OLD_IFS = " $IFS "
IFS = $'\r\n'
local entries = ( )
mapfile -t entries < <( \
2022-01-30 09:42:13 +00:00
pihole-FTL sqlite3 " ${ PIHOLE_FTL_DB_FILE } " \
2020-11-24 15:06:45 +00:00
-cmd ".headers on" \
-cmd ".mode column" \
-cmd " .width ${ widths } " \
" ${ query } " \
)
for line in " ${ entries [@] } " ; do
log_write " ${ line } "
done
IFS = " $OLD_IFS "
}
2020-09-07 21:14:35 +00:00
check_dhcp_servers( ) {
echo_current_diagnostic "Discovering active DHCP servers (takes 10 seconds)"
OLD_IFS = " $IFS "
IFS = $'\n'
local entries = ( )
2022-07-11 04:34:51 +00:00
mapfile -t entries < <( pihole-FTL dhcp-discover & spinner)
2020-09-07 21:14:35 +00:00
for line in " ${ entries [@] } " ; do
log_write " ${ line } "
done
IFS = " $OLD_IFS "
}
2019-07-22 18:18:15 +00:00
show_groups( ) {
2020-04-23 13:16:48 +00:00
show_db_entries "Groups" "SELECT id,CASE enabled WHEN '0' THEN ' 0' WHEN '1' THEN ' 1' ELSE enabled END enabled,name,datetime(date_added,'unixepoch','localtime') date_added,datetime(date_modified,'unixepoch','localtime') date_modified,description FROM \"group\"" "4 7 50 19 19 50"
2019-07-22 18:18:15 +00:00
}
2019-05-21 04:15:22 +00:00
show_adlists( ) {
2021-08-04 18:13:41 +00:00
show_db_entries "Adlists" "SELECT id,CASE enabled WHEN '0' THEN ' 0' WHEN '1' THEN ' 1' ELSE enabled END enabled,GROUP_CONCAT(adlist_by_group.group_id) group_ids,address,datetime(date_added,'unixepoch','localtime') date_added,datetime(date_modified,'unixepoch','localtime') date_modified,comment FROM adlist LEFT JOIN adlist_by_group ON adlist.id = adlist_by_group.adlist_id GROUP BY id;" "5 7 12 100 19 19 50"
2019-05-21 04:15:22 +00:00
}
2020-02-12 18:43:55 +00:00
show_domainlist( ) {
2021-08-04 18:13:41 +00:00
show_db_entries "Domainlist (0/1 = exact white-/blacklist, 2/3 = regex white-/blacklist)" "SELECT id,CASE type WHEN '0' THEN '0 ' WHEN '1' THEN ' 1 ' WHEN '2' THEN ' 2 ' WHEN '3' THEN ' 3' ELSE type END type,CASE enabled WHEN '0' THEN ' 0' WHEN '1' THEN ' 1' ELSE enabled END enabled,GROUP_CONCAT(domainlist_by_group.group_id) group_ids,domain,datetime(date_added,'unixepoch','localtime') date_added,datetime(date_modified,'unixepoch','localtime') date_modified,comment FROM domainlist LEFT JOIN domainlist_by_group ON domainlist.id = domainlist_by_group.domainlist_id GROUP BY id;" "5 4 7 12 100 19 19 50"
2019-05-21 04:15:22 +00:00
}
2020-02-12 18:43:55 +00:00
show_clients( ) {
2020-04-24 08:33:46 +00:00
show_db_entries "Clients" "SELECT id,GROUP_CONCAT(client_by_group.group_id) group_ids,ip,datetime(date_added,'unixepoch','localtime') date_added,datetime(date_modified,'unixepoch','localtime') date_modified,comment FROM client LEFT JOIN client_by_group ON client.id = client_by_group.client_id GROUP BY id;" "4 12 100 19 19 50"
2019-05-21 04:15:22 +00:00
}
2020-11-24 15:06:45 +00:00
show_messages( ) {
2022-03-14 18:54:46 +00:00
show_FTL_db_entries "Pi-hole diagnosis messages" "SELECT count (message) as count, datetime(max(timestamp),'unixepoch','localtime') as 'last timestamp', type, message, blob1, blob2, blob3, blob4, blob5 FROM message GROUP BY type, message, blob1, blob2, blob3, blob4, blob5;" "6 19 20 60 20 20 20 20 20"
2020-11-24 15:06:45 +00:00
}
2022-05-29 07:51:33 +00:00
database_permissions( ) {
local permissions
permissions = $( ls -lhd " ${ 1 } " )
log_write " ${ COL_GREEN } ${ permissions } ${ COL_NC } "
}
2019-05-21 03:58:57 +00:00
analyze_gravity_list( ) {
2021-10-06 22:19:25 +00:00
echo_current_diagnostic "Gravity Database"
2019-05-21 03:58:57 +00:00
2022-05-29 07:51:33 +00:00
database_permissions " ${ PIHOLE_GRAVITY_DB_FILE } "
# if users want to check database integrity
if [ [ " ${ CHECK_DATABASE } " = true ] ] ; then
2022-09-18 07:01:22 +00:00
database_integrity_check " ${ PIHOLE_GRAVITY_DB_FILE } "
2022-05-29 07:51:33 +00:00
fi
2019-05-21 03:58:57 +00:00
2020-02-12 18:39:12 +00:00
show_db_entries "Info table" "SELECT property,value FROM info" "20 40"
2022-01-30 09:42:13 +00:00
gravity_updated_raw = " $( pihole-FTL sqlite3 " ${ PIHOLE_GRAVITY_DB_FILE } " "SELECT value FROM info where property = 'updated'" ) "
2020-02-17 03:24:05 +00:00
gravity_updated = " $( date -d @" ${ gravity_updated_raw } " ) "
2020-02-12 18:51:40 +00:00
log_write " Last gravity run finished at: ${ COL_CYAN } ${ gravity_updated } ${ COL_NC } "
2019-05-21 04:02:31 +00:00
log_write ""
2019-05-21 03:58:57 +00:00
OLD_IFS = " $IFS "
IFS = $'\r\n'
local gravity_sample = ( )
2022-01-30 09:42:13 +00:00
mapfile -t gravity_sample < <( pihole-FTL sqlite3 " ${ PIHOLE_GRAVITY_DB_FILE } " "SELECT domain FROM vw_gravity LIMIT 10" )
2020-02-12 18:39:12 +00:00
log_write " ${ COL_CYAN } ----- First 10 Gravity Domains ----- ${ COL_NC } "
2019-05-21 03:58:57 +00:00
for line in " ${ gravity_sample [@] } " ; do
log_write " ${ line } "
2018-07-20 22:25:35 +00:00
done
2019-05-21 03:58:57 +00:00
2018-07-20 22:25:35 +00:00
log_write ""
IFS = " $OLD_IFS "
2017-06-11 04:20:27 +00:00
}
2022-05-29 07:51:33 +00:00
analyze_ftl_db( ) {
echo_current_diagnostic "Pi-hole FTL Query Database"
database_permissions " ${ PIHOLE_FTL_DB_FILE } "
# if users want to check database integrity
if [ [ " ${ CHECK_DATABASE } " = true ] ] ; then
database_integrity_check " ${ PIHOLE_FTL_DB_FILE } "
fi
}
database_integrity_check( ) {
local result
local database = " ${ 1 } "
log_write " ${ INFO } Checking integrity of ${ database } ... (this can take several minutes) "
2022-07-11 04:34:51 +00:00
result = " $( pihole-FTL " ${ database } " "PRAGMA integrity_check" 2>& 1 & spinner) "
2022-05-29 07:51:33 +00:00
if [ [ ${ result } = "ok" ] ] ; then
log_write " ${ TICK } Integrity of ${ database } intact "
log_write " ${ INFO } Checking foreign key constraints of ${ database } ... (this can take several minutes) "
unset result
2022-07-11 04:53:30 +00:00
result = " $( pihole-FTL sqlite3 " ${ database } " -cmd ".headers on" -cmd ".mode column" "PRAGMA foreign_key_check" 2>& 1 & spinner) "
2022-05-29 07:51:33 +00:00
if [ [ -z ${ result } ] ] ; then
log_write " ${ TICK } No foreign key errors in ${ database } "
else
log_write " ${ CROSS } ${ COL_RED } Foreign key errors in ${ database } found. ${ COL_NC } "
while IFS = read -r line ; do
log_write " $line "
done <<< " $result "
fi
else
log_write " ${ CROSS } ${ COL_RED } Integrity errors in ${ database } found.\n ${ COL_NC } "
while IFS = read -r line ; do
log_write " $line "
done <<< " $result "
fi
}
2022-07-11 04:34:51 +00:00
# Show a text spinner during a long process run
spinner( ) {
2022-07-24 20:52:17 +00:00
# Show the spinner only if there is a tty
if tty -s; then
2022-07-24 23:15:20 +00:00
# PID of the most recent background process
_PID = $!
_spin = "/-\|"
_start = 0
_elapsed = 0
_i = 1
# Start the counter
_start = $( date +%s)
2022-07-24 20:52:17 +00:00
2022-07-24 23:15:20 +00:00
# Hide the cursor
tput civis > /dev/tty
2022-07-24 20:52:17 +00:00
2022-07-24 23:15:20 +00:00
# ensures cursor is visible again, in case of premature exit
trap 'tput cnorm > /dev/tty' EXIT
2022-07-24 20:52:17 +00:00
2022-07-24 23:15:20 +00:00
while [ -d /proc/$_PID ] ; do
_elapsed = $(( $( date +%s) - _start ))
2022-07-24 20:52:17 +00:00
# use hours only if needed
2022-07-24 23:15:20 +00:00
if [ " $_elapsed " -lt 3600 ] ; then
printf " \r ${ _spin : _i ++% ${# _spin } : 1 } %02d:%02d " $(( _elapsed/60)) $(( _elapsed%60)) >" $( tty) "
2022-07-24 20:52:17 +00:00
else
2022-07-24 23:15:20 +00:00
printf " \r ${ _spin : _i ++% ${# _spin } : 1 } %02d:%02d:%02d " $(( _elapsed/3600)) $(( ( _elapsed/60) % 60 )) $(( _elapsed%60)) >" $( tty) "
2022-07-24 20:52:17 +00:00
fi
sleep 0.25
done
2022-07-11 04:34:51 +00:00
2022-07-24 23:15:20 +00:00
# Return to the begin of the line after completion (the spinner will be overwritten)
printf "\r" >" $( tty) "
# Restore cursor visibility
tput cnorm > /dev/tty
2022-07-24 20:52:17 +00:00
fi
2022-07-11 04:34:51 +00:00
}
2022-05-29 07:51:33 +00:00
2017-06-11 04:20:27 +00:00
analyze_pihole_log( ) {
2021-06-03 11:15:44 +00:00
echo_current_diagnostic "Pi-hole log"
local pihole_log_permissions
2023-11-06 21:38:01 +00:00
local queryLogging
2021-06-03 11:15:44 +00:00
2023-11-12 19:45:45 +00:00
queryLogging = " $( get_ftl_conf_value "dns.queryLogging" ) "
2023-11-06 21:38:01 +00:00
if [ [ " ${ queryLogging } " = = "false" ] ] ; then
2021-06-04 19:19:07 +00:00
# Inform user that logging has been disabled and pihole.log does not contain queries
2021-06-03 11:15:44 +00:00
log_write " ${ INFO } Query logging is disabled "
log_write ""
fi
2022-10-13 19:21:40 +00:00
2021-10-06 22:19:25 +00:00
pihole_log_permissions = $( ls -lhd " ${ PIHOLE_LOG } " )
2021-06-04 19:19:07 +00:00
log_write " ${ COL_GREEN } ${ pihole_log_permissions } ${ COL_NC } "
2022-10-13 19:21:40 +00:00
head_tail_log " ${ PIHOLE_LOG } " 20
2017-05-24 23:31:55 +00:00
}
2021-08-05 03:57:09 +00:00
curl_to_tricorder( ) {
# Users can submit their debug logs using curl (encrypted)
log_write " * Using ${ COL_GREEN } curl ${ COL_NC } for transmission. "
2021-09-07 09:15:36 +00:00
# transmit the log via TLS and store the token returned in a variable
2021-09-07 09:13:09 +00:00
tricorder_token = $( curl --silent --fail --show-error --upload-file ${ PIHOLE_DEBUG_LOG } https://tricorder.pi-hole.net 2>& 1)
if [ [ " ${ tricorder_token } " != "https://tricorder.pi-hole.net/" * ] ] ; then
2021-08-05 03:57:09 +00:00
log_write " * ${ COL_GREEN } curl ${ COL_NC } failed, contact Pi-hole support for assistance. "
2021-09-07 09:13:09 +00:00
# Log curl error (if available)
2021-09-07 09:20:42 +00:00
if [ -n " ${ tricorder_token } " ] ; then
2021-09-07 09:13:09 +00:00
log_write " * Error message: ${ COL_RED } ${ tricorder_token } ${ COL_NC } \\n "
tricorder_token = ""
fi
2018-07-20 22:25:35 +00:00
fi
2017-05-25 02:11:15 +00:00
}
2017-05-24 23:31:55 +00:00
2017-05-25 02:11:15 +00:00
upload_to_tricorder( ) {
2018-07-20 22:25:35 +00:00
local username = "pihole"
# Set the permissions and owner
2022-06-19 21:09:05 +00:00
chmod 640 ${ PIHOLE_DEBUG_LOG }
2018-07-20 22:25:35 +00:00
chown " $USER " :" ${ username } " ${ PIHOLE_DEBUG_LOG }
# Let the user know debugging is complete with something strikingly visual
2017-06-01 06:15:11 +00:00
log_write ""
2018-07-20 22:25:35 +00:00
log_write " ${ COL_PURPLE } ******************************************** ${ COL_NC } "
log_write " ${ COL_PURPLE } ******************************************** ${ COL_NC } "
2018-07-22 19:18:26 +00:00
log_write " ${ TICK } ${ COL_GREEN } ** FINISHED DEBUGGING! ** ${ COL_NC } \\n "
2018-07-20 22:25:35 +00:00
# Provide information on what they should do with their token
2022-01-04 19:06:41 +00:00
log_write " * The debug log can be uploaded to tricorder.pi-hole.net for sharing with developers only."
2021-08-05 03:57:09 +00:00
2022-01-04 19:06:41 +00:00
# If pihole -d is running automatically
2018-07-20 22:25:35 +00:00
if [ [ " ${ AUTOMATED } " ] ] ; then
# let the user know
log_write " ${ INFO } Debug script running in automated mode "
# and then decide again which tool to use to submit it
2021-08-05 03:57:09 +00:00
curl_to_tricorder
2018-07-20 22:25:35 +00:00
# If we're not running in automated mode,
else
2022-01-04 19:06:41 +00:00
# if not being called from the web interface
if [ [ ! " ${ WEBCALL } " ] ] ; then
echo ""
# give the user a choice of uploading it or not
# Users can review the log file locally (or the output of the script since they are the same) and try to self-diagnose their problem
read -r -p "[?] Would you like to upload the log? [y/N] " response
case ${ response } in
# If they say yes, run our function for uploading the log
[ yY] [ eE] [ sS] | [ yY] ) curl_to_tricorder; ;
# If they choose no, just exit out of the script
*) log_write " * Log will ${ COL_GREEN } NOT ${ COL_NC } be uploaded to tricorder.\\n * A local copy of the debug log can be found at: ${ COL_CYAN } ${ PIHOLE_DEBUG_LOG } ${ COL_NC } \\n " ; exit;
esac
fi
2020-07-15 22:49:17 +00:00
fi
2018-07-20 22:25:35 +00:00
# Check if tricorder.pi-hole.net is reachable and provide token
# along with some additional useful information
if [ [ -n " ${ tricorder_token } " ] ] ; then
# Again, try to make this visually striking so the user realizes they need to do something with this information
# Namely, provide the Pi-hole devs with the token
log_write ""
2021-09-07 09:20:42 +00:00
log_write " ${ COL_PURPLE } ***************************************************************** ${ COL_NC } "
log_write " ${ COL_PURPLE } ***************************************************************** ${ COL_NC } \\n "
2018-07-20 22:25:35 +00:00
log_write " ${ TICK } Your debug token is: ${ COL_GREEN } ${ tricorder_token } ${ COL_NC } "
2021-09-07 09:20:42 +00:00
log_write " ${ INFO } ${ COL_RED } Logs are deleted 48 hours after upload. ${ COL_NC } \\n "
log_write " ${ COL_PURPLE } ***************************************************************** ${ COL_NC } "
log_write " ${ COL_PURPLE } ***************************************************************** ${ COL_NC } "
2018-07-20 22:25:35 +00:00
log_write ""
2021-09-07 09:20:42 +00:00
log_write " * Provide the token above to the Pi-hole team for assistance at ${ FORUMS_URL } "
2021-08-05 03:57:09 +00:00
2018-07-20 22:25:35 +00:00
# If no token was generated
else
# Show an error and some help instructions
2023-10-04 15:22:01 +00:00
# Skip this if being called from web interface and automatic mode was not chosen (users opt-out to upload)
2022-01-04 19:06:41 +00:00
if [ [ " ${ WEBCALL } " ] ] && [ [ ! " ${ AUTOMATED } " ] ] ; then
:
else
2022-05-29 07:51:33 +00:00
log_write " ${ CROSS } ${ COL_RED } There was an error uploading your debug log. ${ COL_NC } "
2022-01-04 19:06:41 +00:00
log_write " * Please try again or contact the Pi-hole team for assistance."
fi
2018-07-20 22:25:35 +00:00
fi
2017-06-10 20:54:27 +00:00
# Finally, show where the log file is no matter the outcome of the function so users can look at it
2019-02-23 12:13:44 +00:00
log_write " * A local copy of the debug log can be found at: ${ COL_CYAN } ${ PIHOLE_DEBUG_LOG } ${ COL_NC } \\n "
2017-05-24 20:29:31 +00:00
}
2017-05-25 03:07:15 +00:00
# Run through all the functions we made
2017-05-26 17:16:22 +00:00
make_temporary_log
2017-12-24 13:26:32 +00:00
initialize_debug
2017-05-27 20:47:15 +00:00
check_component_versions
2023-01-01 12:34:40 +00:00
# check_critical_program_versions
2017-05-20 06:34:13 +00:00
diagnose_operating_system
2017-10-13 02:32:33 +00:00
check_selinux
2020-10-12 04:20:31 +00:00
check_firewalld
2023-10-28 06:13:31 +00:00
hardware_check
2021-10-08 19:50:46 +00:00
disk_usage
2022-01-09 10:31:47 +00:00
check_ip_command
2017-05-22 17:35:57 +00:00
check_networking
2017-05-24 20:29:31 +00:00
check_name_resolution
2020-09-07 21:14:35 +00:00
check_dhcp_servers
2017-05-24 03:57:22 +00:00
process_status
2020-11-24 04:57:13 +00:00
ftl_full_status
2022-05-29 07:51:33 +00:00
analyze_ftl_db
2017-05-27 03:05:50 +00:00
analyze_gravity_list
2019-07-22 18:18:15 +00:00
show_groups
2020-02-12 18:43:55 +00:00
show_domainlist
show_clients
2019-05-21 03:58:57 +00:00
show_adlists
2017-06-07 17:25:00 +00:00
show_content_of_pihole_files
2020-11-24 15:06:45 +00:00
show_messages
2018-04-01 11:40:48 +00:00
parse_locale
2017-06-11 04:20:27 +00:00
analyze_pihole_log
2017-05-26 17:16:22 +00:00
copy_to_debug_log
2017-05-25 02:11:15 +00:00
upload_to_tricorder