1
0
mirror of https://github.com/StackExchange/dnscontrol.git synced 2024-05-11 05:55:12 +00:00

Merge branch 'master' into tlim_corrector

This commit is contained in:
Tom Limoncelli
2023-03-09 08:29:21 -08:00
10 changed files with 531 additions and 0 deletions

1
OWNERS
View File

@ -25,6 +25,7 @@ providers/internetbs @pragmaton
providers/inwx @patschi
providers/msdns @tlimoncelli
providers/linode @koesie10
providers/luadns @riku22
providers/namecheap @willpower232
# providers/namedotcom NEEDS VOLUNTEER
providers/netcup @kordianbruck

View File

@ -42,6 +42,7 @@ Currently supported DNS providers:
- Hurricane Electric DNS
- INWX
- Linode
- LuaDNS
- Microsoft Windows Server DNS Server
- NS1
- Name.com

View File

@ -111,6 +111,7 @@
* [Internet.bs](providers/internetbs.md)
* [INWX](providers/inwx.md)
* [Linode](providers/linode.md)
* [LuaDNS](providers/luadns.md)
* [Microsoft DNS Server on Microsoft Windows Server](providers/msdns.md)
* [Namecheap](providers/namecheap.md)
* [Name.com](providers/namedotcom.md)

View File

@ -40,6 +40,7 @@ If a feature is definitively not supported for whatever reason, we would also li
| `INTERNETBS` | ❌ | ❌ | ✅ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ❌ | ✅ | ❔ |
| `INWX` | ❌ | ✅ | ✅ | ❌ | ❔ | ✅ | ✅ | ✅ | ❔ | ✅ | ✅ | ✅ | ❔ | ✅ | ✅ | ✅ | ✅ |
| `LINODE` | ❌ | ✅ | ❌ | ❔ | ❔ | ✅ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ❔ | ❌ | ❌ | ✅ | ✅ |
| `LUADNS` | ✅ | ✅ | ❌ | ✅ | ❔ | ✅ | ✅ | ❔ | ❔ | ✅ | ✅ | ✅ | ❔ | ✅ | ✅ | ✅ | ✅ |
| `MSDNS` | ✅ | ✅ | ❌ | ❌ | ❔ | ❌ | ✅ | ✅ | ❔ | ✅ | ❔ | ❔ | ❔ | ❌ | ❌ | ✅ | ✅ |
| `NAMECHEAP` | ❌ | ✅ | ✅ | ✅ | ❔ | ✅ | ❌ | ❔ | ❔ | ❌ | ❔ | ❌ | ❔ | ❌ | ❌ | ❌ | ✅ |
| `NAMEDOTCOM` | ✅ | ✅ | ✅ | ✅ | ❔ | ❔ | ❌ | ❔ | ❔ | ✅ | ❔ | ❔ | ❔ | ✅ | ❌ | ✅ | ✅ |
@ -120,6 +121,7 @@ Providers in this category and their maintainers are:
|`INTERNETBS`|@pragmaton|
|`INWX`|@svenpeter42|
|`LINODE`|@koesie10|
|`LUADNS`|@riku22|
|`NAMECHEAP`|@willpower232|
|`NETCUP`|@kordianbruck|
|`NETLIFY`|@SphericalKat|

View File

@ -0,0 +1,42 @@
## Configuration
To use this provider, add an entry to `creds.json` with `TYPE` set to `LUADNS`
along with your [email and API key](https://www.luadns.com/api.html#authentication).
Example:
{% code title="creds.json" %}
```json
{
"luadns": {
"TYPE": "LUADNS",
"email": "your-email",
"apikey": "your-api-key"
}
}
```
{% endcode %}
## Metadata
This provider does not recognize any special metadata fields unique to LuaDNS.
## Usage
An example `dnsconfig.js` configuration:
```javascript
var REG_NONE = NewRegistrar("none");
var DSP_LUADNS = NewDnsProvider("luadns");
D("example.tld", REG_NONE, DnsProvider(DSP_LUADNS),
A("test", "1.2.3.4")
);
```
## Activation
[Create API key](https://api.luadns.com/api_keys).
## Caveats
- LuaDNS cannot change the default nameserver TTL in `nameserver_ttl`, it is forced to fixed at 86400("1d").
This is not the case if you are using vanity nameservers.
- This provider does not currently support the "FORWARD" and "REDIRECT" record types.
- The API is available on the LuaDNS free plan, but due to the limit of 30 records, some tests will fail when doing integration tests.

View File

@ -134,6 +134,11 @@
"domain": "$LINODE_DOMAIN",
"token": "$LINODE_TOKEN"
},
"LUADNS": {
"domain": "$LUADNS_DOMAIN",
"email": "$LUADNS_EMAIL",
"apikey": "$LUADNS_APIKEY"
},
"MSDNS": {
"domain": "$MSDNS_DOMAIN",
"dnsserver": "$MSDNS_DNSSERVER",

View File

@ -29,6 +29,7 @@ import (
_ "github.com/StackExchange/dnscontrol/v3/providers/internetbs"
_ "github.com/StackExchange/dnscontrol/v3/providers/inwx"
_ "github.com/StackExchange/dnscontrol/v3/providers/linode"
_ "github.com/StackExchange/dnscontrol/v3/providers/luadns"
_ "github.com/StackExchange/dnscontrol/v3/providers/msdns"
_ "github.com/StackExchange/dnscontrol/v3/providers/namecheap"
_ "github.com/StackExchange/dnscontrol/v3/providers/namedotcom"

251
providers/luadns/api.go Normal file
View File

@ -0,0 +1,251 @@
package luadns
import (
"bytes"
"encoding/json"
"fmt"
"io"
"net/http"
"strings"
"time"
"github.com/StackExchange/dnscontrol/v3/models"
)
// Api layer for LuaDNS
const (
apiURL = "https://api.luadns.com/v1"
)
type luadnsProvider struct {
domainIndex map[string]uint32
nameserversNames []string
creds struct {
email string
apikey string
}
}
type errorResponse struct {
Status string `json:"status"`
RequestID string `json:"request_id"`
Message string `json:"message"`
}
type userInfoResponse struct {
Email string `json:"email"`
Name string `json:"name"`
TTL uint32 `json:"ttl"`
NameServers []string `json:"name_servers"`
}
type zoneRecord struct {
ID uint32 `json:"id"`
Name string `json:"name"`
}
type zoneResponse []zoneRecord
type domainRecord struct {
ID uint32 `json:"id"`
Type string `json:"type"`
Name string `json:"name"`
Content string `json:"content"`
TTL uint32 `json:"ttl"`
}
type recordResponse []domainRecord
type requestParams map[string]string
type jsonRequestParams map[string]any
func (l *luadnsProvider) fetchAvailableNameservers() error {
l.nameserversNames = nil
var bodyString, err = l.get("/users/me", "GET", requestParams{})
if err != nil {
return fmt.Errorf("failed fetching available nameservers list from LuaDNS: %s", err)
}
var ui userInfoResponse
json.Unmarshal(bodyString, &ui)
l.nameserversNames = ui.NameServers
return nil
}
func (l *luadnsProvider) fetchDomainList() error {
l.domainIndex = map[string]uint32{}
var bodyString, err = l.get("/zones", "GET", requestParams{})
if err != nil {
return fmt.Errorf("failed fetching domain list from LuaDNS: %s", err)
}
var dr zoneResponse
json.Unmarshal(bodyString, &dr)
for _, domain := range dr {
l.domainIndex[domain.Name] = domain.ID
}
return nil
}
func (l *luadnsProvider) getDomainID(name string) (uint32, error) {
if l.domainIndex == nil {
if err := l.fetchDomainList(); err != nil {
return 0, err
}
}
id, ok := l.domainIndex[name]
if !ok {
return 0, fmt.Errorf("'%s' not a zone in luadns account", name)
}
return id, nil
}
func (l *luadnsProvider) createDomain(domain string) error {
params := jsonRequestParams{
"name": domain,
}
if _, err := l.get("/zones", "POST", params); err != nil {
return fmt.Errorf("failed create domain (LuaDNS): %s", err)
}
return nil
}
func (l *luadnsProvider) createRecord(domainID uint32, rec jsonRequestParams) error {
if _, err := l.get(fmt.Sprintf("/zones/%d/records", domainID), "POST", rec); err != nil {
return fmt.Errorf("failed create record (LuaDNS): %s", err)
}
return nil
}
func (l *luadnsProvider) deleteRecord(domainID uint32, recordID uint32) error {
if _, err := l.get(fmt.Sprintf("/zones/%d/records/%d", domainID, recordID), "DELETE", requestParams{}); err != nil {
return fmt.Errorf("failed delete record (LuaDNS): %s", err)
}
return nil
}
func (l *luadnsProvider) modifyRecord(domainID uint32, recordID uint32, rec jsonRequestParams) error {
if _, err := l.get(fmt.Sprintf("/zones/%d/records/%d", domainID, recordID), "PUT", rec); err != nil {
return fmt.Errorf("failed update (LuaDNS): %s", err)
}
return nil
}
func (l *luadnsProvider) getRecords(domainID uint32) ([]domainRecord, error) {
var bodyString, err = l.get(fmt.Sprintf("/zones/%d/records", domainID), "GET", requestParams{})
if err != nil {
return nil, fmt.Errorf("failed fetching record list from LuaDNS: %s", err)
}
var dr recordResponse
json.Unmarshal(bodyString, &dr)
var records []domainRecord
for _, rec := range dr {
if rec.Type == "SOA" {
continue
}
records = append(records, rec)
}
return records, nil
}
func (l *luadnsProvider) get(endpoint string, method string, params any) ([]byte, error) {
client := &http.Client{}
var req, err = l.makeRequest(endpoint, method, params)
if err != nil {
return []byte{}, err
}
req.Header.Set("Accept", "application/json")
req.SetBasicAuth(l.creds.email, l.creds.apikey)
// LuaDNS has a rate limit of 1200 request per 5 minute.
// So we do a very primitive rate limiting here - delay every request for 250ms - so max. 4 requests/second.
time.Sleep(250 * time.Millisecond)
resp, err := client.Do(req)
if err != nil {
return nil, err
}
if resp.StatusCode == 200 {
bodyString, _ := io.ReadAll(resp.Body)
return bodyString, nil
}
bodyString, _ := io.ReadAll(resp.Body)
var errResp errorResponse
err = json.Unmarshal(bodyString, &errResp)
if err != nil {
return bodyString, fmt.Errorf("LuaDNS API Error: %s URL:%s%s", string(bodyString), req.Host, req.URL.RequestURI())
}
return bodyString, fmt.Errorf("LuaDNS API error: %s URL:%s%s", errResp.Message, req.Host, req.URL.RequestURI())
}
func (l *luadnsProvider) makeRequest(endpoint string, method string, params any) (*http.Request, error) {
switch v := params.(type) {
case requestParams:
req, err := http.NewRequest(method, apiURL+endpoint, nil)
if err != nil {
return nil, err
}
q := req.URL.Query()
for pName, pValue := range v {
q.Add(pName, pValue)
}
req.URL.RawQuery = q.Encode()
return req, nil
case jsonRequestParams:
requestJSON, err := json.Marshal(params)
if err != nil {
return nil, err
}
req, err := http.NewRequest(method, apiURL+endpoint, bytes.NewBuffer(requestJSON))
if err != nil {
return nil, err
}
req.Header.Set("Content-Type", "application/json")
return req, nil
default:
return nil, fmt.Errorf("invalid request type")
}
}
func nativeToRecord(domain string, r *domainRecord) *models.RecordConfig {
rc := &models.RecordConfig{
Type: r.Type,
TTL: r.TTL,
Original: r,
}
rc.SetLabelFromFQDN(r.Name, domain)
switch rtype := rc.Type; rtype {
case "TXT":
rc.SetTargetTXT(r.Content)
default:
rc.PopulateFromString(rtype, r.Content, domain)
}
return rc
}
func recordsToNative(rc *models.RecordConfig) jsonRequestParams {
r := jsonRequestParams{
"name": fmt.Sprintf("%s.", rc.GetLabelFQDN()),
"type": rc.Type,
"ttl": rc.TTL,
}
switch rtype := rc.Type; rtype {
case "TXT":
r["content"] = rc.GetTargetTXTJoined()
default:
r["content"] = rc.GetTargetCombined()
}
return r
}
func checkNS(dc *models.DomainConfig) {
newList := make([]*models.RecordConfig, 0, len(dc.Records))
for _, rec := range dc.Records {
// LuaDNS does not support changing the TTL of the default nameservers, so forcefully change the TTL to 86400.
if rec.Type == "NS" && strings.HasSuffix(rec.GetTargetField(), ".luadns.net.") && rec.TTL != 86400 {
rec.TTL = 86400
}
newList = append(newList, rec)
}
dc.Records = newList
}

View File

@ -0,0 +1,15 @@
package luadns
import (
"github.com/StackExchange/dnscontrol/v3/models"
"github.com/StackExchange/dnscontrol/v3/pkg/rejectif"
)
// AuditRecords returns a list of errors corresponding to the records
// that aren't supported by this provider. If all records are
// supported, an empty list is returned.
func AuditRecords(records []*models.RecordConfig) []error {
a := rejectif.Auditor{}
a.Add("TXT", rejectif.TxtIsEmpty) // Last verified 2023-03-03
return a.Audit(records)
}

View File

@ -0,0 +1,212 @@
package luadns
import (
"encoding/json"
"fmt"
"github.com/StackExchange/dnscontrol/v3/models"
"github.com/StackExchange/dnscontrol/v3/pkg/diff"
"github.com/StackExchange/dnscontrol/v3/pkg/diff2"
// "github.com/StackExchange/dnscontrol/v3/pkg/transform"
"github.com/StackExchange/dnscontrol/v3/providers"
// "github.com/miekg/dns/dnsutil"
)
/*
LuaDNS API DNS provider:
Info required in `creds.json`:
- email
- apikey
*/
var features = providers.DocumentationNotes{
providers.CanGetZones: providers.Can(),
providers.CanUseAlias: providers.Can(),
providers.CanUseCAA: providers.Can(),
providers.CanUsePTR: providers.Can(),
providers.CanUseSRV: providers.Can(),
providers.CanUseSSHFP: providers.Can(),
providers.CanUseTLSA: providers.Can(),
providers.DocCreateDomains: providers.Can(),
providers.DocDualHost: providers.Can(),
providers.DocOfficiallySupported: providers.Can(),
}
func init() {
fns := providers.DspFuncs{
Initializer: NewLuaDNS,
RecordAuditor: AuditRecords,
}
providers.RegisterDomainServiceProviderType("LUADNS", fns, features)
}
// NewLuaDNS creates the provider.
func NewLuaDNS(m map[string]string, metadata json.RawMessage) (providers.DNSServiceProvider, error) {
l := &luadnsProvider{}
l.creds.email, l.creds.apikey = m["email"], m["apikey"]
if l.creds.email == "" || l.creds.apikey == "" {
return nil, fmt.Errorf("missing LuaDNS email or apikey")
}
// Get a domain to validate authentication
if err := l.fetchDomainList(); err != nil {
return nil, err
}
return l, nil
}
// GetNameservers returns the nameservers for a domain.
func (l *luadnsProvider) GetNameservers(domain string) ([]*models.Nameserver, error) {
if len(l.nameserversNames) == 0 {
l.fetchAvailableNameservers()
}
return models.ToNameserversStripTD(l.nameserversNames)
}
// ListZones returns a list of the DNS zones.
func (l *luadnsProvider) ListZones() ([]string, error) {
if err := l.fetchDomainList(); err != nil {
return nil, err
}
zones := make([]string, 0, len(l.domainIndex))
for d := range l.domainIndex {
zones = append(zones, d)
}
return zones, nil
}
// GetZoneRecords gets the records of a zone and returns them in RecordConfig format.
func (l *luadnsProvider) GetZoneRecords(domain string) (models.Records, error) {
domainID, err := l.getDomainID(domain)
if err != nil {
return nil, err
}
records, err := l.getRecords(domainID)
if err != nil {
return nil, err
}
existingRecords := make([]*models.RecordConfig, len(records))
for i := range records {
existingRecords[i] = nativeToRecord(domain, &records[i])
}
return existingRecords, nil
}
// GetDomainCorrections returns a list of corrections to update a domain.
func (l *luadnsProvider) GetDomainCorrections(dc *models.DomainConfig) ([]*models.Correction, error) {
err := dc.Punycode()
if err != nil {
return nil, err
}
domainID, err := l.getDomainID(dc.Name)
if err != nil {
return nil, err
}
records, err := l.GetZoneRecords(dc.Name)
if err != nil {
return nil, err
}
checkNS(dc)
// Normalize
models.PostProcessRecords(records)
var corrections []*models.Correction
var corrs []*models.Correction
if !diff2.EnableDiff2 {
differ := diff.New(dc)
_, create, del, mod, err := differ.IncrementalDiff(records)
if err != nil {
return nil, err
}
corrections := []*models.Correction{}
for _, d := range del {
corrs := l.makeDeleteCorrection(d.Existing, domainID, d.String())
corrections = append(corrections, corrs...)
}
for _, d := range create {
corrs := l.makeCreateCorrection(d.Desired, domainID, d.String())
corrections = append(corrections, corrs...)
}
for _, d := range mod {
corrs := l.makeChangeCorrection(d.Existing, d.Desired, domainID, d.String())
corrections = append(corrections, corrs...)
}
return corrections, nil
}
changes, err := diff2.ByRecord(records, dc, nil)
if err != nil {
return nil, err
}
for _, change := range changes {
msg := change.Msgs[0]
switch change.Type {
case diff2.REPORT:
corrs = []*models.Correction{{Msg: change.MsgsJoined}}
case diff2.CREATE:
corrs = l.makeCreateCorrection(change.New[0], domainID, msg)
case diff2.CHANGE:
corrs = l.makeChangeCorrection(change.Old[0], change.New[0], domainID, msg)
case diff2.DELETE:
corrs = l.makeDeleteCorrection(change.Old[0], domainID, msg)
default:
panic(fmt.Sprintf("unhandled inst.Type %s", change.Type))
}
corrections = append(corrections, corrs...)
}
return corrections, nil
}
func (l *luadnsProvider) makeCreateCorrection(newrec *models.RecordConfig, domainID uint32, msg string) []*models.Correction {
req := recordsToNative(newrec)
return []*models.Correction{{
Msg: msg,
F: func() error {
return l.createRecord(domainID, req)
},
}}
}
func (l *luadnsProvider) makeChangeCorrection(oldrec *models.RecordConfig, newrec *models.RecordConfig, domainID uint32, msg string) []*models.Correction {
recordID := oldrec.Original.(*domainRecord).ID
req := recordsToNative(newrec)
return []*models.Correction{{
Msg: fmt.Sprintf("%s, LuaDNS ID: %d", msg, recordID),
F: func() error {
return l.modifyRecord(domainID, recordID, req)
},
}}
}
func (l *luadnsProvider) makeDeleteCorrection(deleterec *models.RecordConfig, domainID uint32, msg string) []*models.Correction {
recordID := deleterec.Original.(*domainRecord).ID
return []*models.Correction{{
Msg: fmt.Sprintf("%s, LuaDNS ID: %d", msg, recordID),
F: func() error {
return l.deleteRecord(domainID, recordID)
},
}}
}
// EnsureZoneExists creates a zone if it does not exist
func (l *luadnsProvider) EnsureZoneExists(domain string) error {
if l.domainIndex == nil {
if err := l.fetchDomainList(); err != nil {
return err
}
}
if _, ok := l.domainIndex[domain]; ok {
return nil
}
return l.createDomain(domain)
}