mirror of
https://github.com/StackExchange/dnscontrol.git
synced 2025-02-23 15:12:57 +08:00
commit901a3ac1c9
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Tue Jan 21 14:43:33 2025 -0500 CHORE: Update dependencies (#3397) commit70e9659014
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Tue Jan 21 14:29:53 2025 -0500 MSDNS: Provider is failing due to lint fix gone wrong (#3396) commit5e15bbe676
Author: Jakob Ackermann <das7pad@outlook.com> Date: Sat Jan 18 13:54:37 2025 +0000 BUG: fetch zones once in ZoneCache (#3394) commita631c5bfdd
Author: Kai Schwarz <kai.schwarz@centralnic.com> Date: Fri Jan 17 20:15:10 2025 +0100 CNR: Initial Performance improvement; golint review (#3391) commite1c9785159
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Fri Jan 17 07:11:10 2025 -0500 CHORE: Update dependencies (#3385) commit9e88b6a801
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Thu Jan 16 21:47:10 2025 -0500 CICD: Make pager tests more visible (#3387) commit67db0e287d
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Thu Jan 16 14:41:18 2025 -0500 GCLOUD: remove (irrelevant) slow test (#3384) commitc348e354ff
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Thu Jan 16 14:32:32 2025 -0500 GCLOUD: CICD: Skip the pager1201 integration test (#3383) commit5cfb9073a2
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Thu Jan 16 14:17:47 2025 -0500 TRANSIP: Pause when rate-limited (#3378) commitf666af8714
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Thu Jan 16 13:56:46 2025 -0500 GCLOUD: Re-try on 502 errors (#3376) commit1a1a4bf00d
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Thu Jan 16 12:54:48 2025 -0500 INWX: Enable SRV to have "." target (#3380) commit355643988e
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Thu Jan 16 10:58:11 2025 -0500 CLOUDFLAREAPI: No longer treat TTL=300 as special (#3368) Co-authored-by: Sukka <github@skk.moe> commit89c65b6683
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Thu Jan 16 10:03:00 2025 -0500 INWX: Permit "." target for SRV records (#3377) commitfc2c506920
Author: Tom Limoncelli <tlimoncelli@stackoverflow.com> Date: Wed Jan 15 18:28:15 2025 -0500 CICD: Warn user if -provider does not match profiles.json:TYPE (#3375) commit0d5b3c22b7
Author: Jakob Ackermann <das7pad@outlook.com> Date: Wed Jan 15 22:43:24 2025 +0000 CLOUDFLARE: adopt ZoneCache (#3373) commit2ef23621b5
Author: Jakob Ackermann <das7pad@outlook.com> Date: Wed Jan 15 20:23:02 2025 +0000 HETZNER: adopt ZoneCache (#3372) commitab00797f89
Author: Tom Hughes <tom@compton.nu> Date: Wed Jan 15 02:07:19 2025 +0000 FEATURE: Extend PTR magic handling to support RFC4183 names (#3364) commit5c9b17039e
Author: Jakob Ackermann <das7pad@outlook.com> Date: Wed Jan 15 02:05:17 2025 +0000 FEAT: Add ZoneCache primitive (#3365)
106 lines
3 KiB
Go
106 lines
3 KiB
Go
package cnr
|
|
|
|
import (
|
|
"fmt"
|
|
"regexp"
|
|
"sort"
|
|
"strings"
|
|
|
|
"github.com/StackExchange/dnscontrol/v4/models"
|
|
)
|
|
|
|
var defaultNameservers = []*models.Nameserver{
|
|
{Name: "ns1.rrpproxy.net"},
|
|
{Name: "ns2.rrpproxy.net"},
|
|
{Name: "ns3.rrpproxy.net"},
|
|
}
|
|
|
|
var nsRegex = regexp.MustCompile(`ns([1-3]{1})[0-9]+\.rrpproxy\.net`)
|
|
|
|
// GetNameservers gets the nameservers set on a domain.
|
|
func (n *Client) GetNameservers(domain string) ([]*models.Nameserver, error) {
|
|
// NOTE: This information is taken over from HX and adapted to CNR... might be wrong...
|
|
// This is an interesting edge case. CNR expects you to SET the nameservers to ns[1-3].rrpproxy.net,
|
|
// but it will internally set it to (ns1xyz|ns2uvw|ns3asd).rrpproxy.net, where xyz/uvw/asd is a uniqueish number.
|
|
// In order to avoid endless loops, we will use the unique nameservers if present, or else the generic ones if not.
|
|
nss, err := n.getNameserversRaw(domain)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
toUse := []string{
|
|
defaultNameservers[0].Name,
|
|
defaultNameservers[1].Name,
|
|
defaultNameservers[2].Name,
|
|
}
|
|
for _, ns := range nss {
|
|
if matches := nsRegex.FindStringSubmatch(ns); len(matches) == 2 && len(matches[1]) == 1 {
|
|
idx := matches[1][0] - '1' // regex ensures proper range
|
|
toUse[idx] = matches[0]
|
|
}
|
|
}
|
|
return models.ToNameservers(toUse)
|
|
}
|
|
|
|
func (n *Client) getNameserversRaw(domain string) ([]string, error) {
|
|
r := n.client.Request(map[string]interface{}{
|
|
"COMMAND": "StatusDomain",
|
|
"DOMAIN": domain,
|
|
})
|
|
code := r.GetCode()
|
|
if code != 200 {
|
|
return nil, n.GetAPIError("Could not get status for domain", domain, r)
|
|
}
|
|
nsColumn := r.GetColumn("NAMESERVER")
|
|
if nsColumn == nil {
|
|
fmt.Println("No nameservers found")
|
|
return []string{}, nil // No nameserver assigned
|
|
}
|
|
ns := nsColumn.GetData()
|
|
sort.Strings(ns)
|
|
return ns, nil
|
|
}
|
|
|
|
// GetRegistrarCorrections gathers corrections that would being n to match dc.
|
|
func (n *Client) GetRegistrarCorrections(dc *models.DomainConfig) ([]*models.Correction, error) {
|
|
nss, err := n.getNameserversRaw(dc.Name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
foundNameservers := strings.Join(nss, ",")
|
|
|
|
expected := []string{}
|
|
for _, ns := range dc.Nameservers {
|
|
name := strings.TrimRight(ns.Name, ".")
|
|
expected = append(expected, name)
|
|
}
|
|
sort.Strings(expected)
|
|
expectedNameservers := strings.Join(expected, ",")
|
|
|
|
if foundNameservers != expectedNameservers {
|
|
return []*models.Correction{
|
|
{
|
|
Msg: fmt.Sprintf("Update nameservers %s -> %s", foundNameservers, expectedNameservers),
|
|
F: n.updateNameservers(expected, dc.Name),
|
|
},
|
|
}, nil
|
|
}
|
|
return nil, nil
|
|
}
|
|
|
|
func (n *Client) updateNameservers(ns []string, domain string) func() error {
|
|
return func() error {
|
|
cmd := map[string]interface{}{
|
|
"COMMAND": "ModifyDomain",
|
|
"DOMAIN": domain,
|
|
}
|
|
for idx, ns := range ns {
|
|
cmd[fmt.Sprintf("NAMESERVER%d", idx)] = ns
|
|
}
|
|
response := n.client.Request(cmd)
|
|
code := response.GetCode()
|
|
if code != 200 {
|
|
return fmt.Errorf("%d %s", code, response.GetDescription())
|
|
}
|
|
return nil
|
|
}
|
|
}
|