mirror of
https://github.com/StackExchange/dnscontrol.git
synced 2025-01-13 02:50:27 +08:00
8dea9edc34
TXT records are now handled different. 1. The raw input from dnsconfig.js is passed all the way to the provider. The provider can determine if it can or can't handle such records (auditrecords.go) and processes them internally as such. 2. The CanUseTXTMulti capability is no longer needed. * DSPs now register a table of functions * Use audits for txt record variations * unit tests pass. integration fails. * fix deepcopy problem * rename to AuditRecordSupport * Reduce use of TXTMulti * Remove CanUseTXTMulti * fix Test Skip * fix DO * fix vultr * fix NDC * msdns fixes * Fix powerdns and cloudflare * HEDNS: Fix usage of target field to resolve TXT handling (#1067) * Fix HEXONET Co-authored-by: Robert Blenkinsopp <robert@blenkinsopp.net> Co-authored-by: Jakob Ackermann <das7pad@outlook.com>
303 lines
9.1 KiB
Go
303 lines
9.1 KiB
Go
package cloudns
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"strconv"
|
|
|
|
"github.com/miekg/dns/dnsutil"
|
|
|
|
"github.com/StackExchange/dnscontrol/v3/models"
|
|
"github.com/StackExchange/dnscontrol/v3/pkg/diff"
|
|
"github.com/StackExchange/dnscontrol/v3/pkg/txtutil"
|
|
"github.com/StackExchange/dnscontrol/v3/providers"
|
|
)
|
|
|
|
/*
|
|
CloDNS API DNS provider:
|
|
Info required in `creds.json`:
|
|
- auth-id or sub-auth-id
|
|
- auth-password
|
|
*/
|
|
|
|
// NewCloudns creates the provider.
|
|
func NewCloudns(m map[string]string, metadata json.RawMessage) (providers.DNSServiceProvider, error) {
|
|
c := &cloudnsProvider{}
|
|
|
|
c.creds.id, c.creds.password, c.creds.subid = m["auth-id"], m["auth-password"], m["sub-auth-id"]
|
|
|
|
if (c.creds.id == "" && c.creds.subid == "") || c.creds.password == "" {
|
|
return nil, fmt.Errorf("missing ClouDNS auth-id or sub-auth-id and auth-password")
|
|
}
|
|
|
|
// Get a domain to validate authentication
|
|
if err := c.fetchDomainList(); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return c, nil
|
|
}
|
|
|
|
var features = providers.DocumentationNotes{
|
|
providers.DocDualHost: providers.Unimplemented(),
|
|
providers.DocOfficiallySupported: providers.Cannot(),
|
|
providers.DocCreateDomains: providers.Can(),
|
|
providers.CanUseAlias: providers.Can(),
|
|
providers.CanUseSRV: providers.Can(),
|
|
providers.CanUseSSHFP: providers.Can(),
|
|
providers.CanUseCAA: providers.Can(),
|
|
providers.CanUseTLSA: providers.Can(),
|
|
providers.CanUsePTR: providers.Can(),
|
|
providers.CanGetZones: providers.Can(),
|
|
providers.CanUseDSForChildren: providers.Can(),
|
|
//providers.CanUseDS: providers.Can(), // in ClouDNS we can add DS record just for a subdomain(child)
|
|
}
|
|
|
|
func init() {
|
|
fns := providers.DspFuncs{
|
|
Initializer: NewCloudns,
|
|
AuditRecordsor: AuditRecords,
|
|
}
|
|
providers.RegisterDomainServiceProviderType("CLOUDNS", fns, features)
|
|
}
|
|
|
|
// GetNameservers returns the nameservers for a domain.
|
|
func (c *cloudnsProvider) GetNameservers(domain string) ([]*models.Nameserver, error) {
|
|
if len(c.nameserversNames) == 0 {
|
|
c.fetchAvailableNameservers()
|
|
}
|
|
return models.ToNameservers(c.nameserversNames)
|
|
}
|
|
|
|
// GetDomainCorrections returns the corrections for a domain.
|
|
func (c *cloudnsProvider) GetDomainCorrections(dc *models.DomainConfig) ([]*models.Correction, error) {
|
|
dc, err := dc.Copy()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
dc.Punycode()
|
|
|
|
if c.domainIndex == nil {
|
|
if err := c.fetchDomainList(); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
domainID, ok := c.domainIndex[dc.Name]
|
|
if !ok {
|
|
return nil, fmt.Errorf("'%s' not a zone in ClouDNS account", dc.Name)
|
|
}
|
|
|
|
existingRecords, err := c.GetZoneRecords(dc.Name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// Normalize
|
|
models.PostProcessRecords(existingRecords)
|
|
txtutil.SplitSingleLongTxt(dc.Records) // Autosplit long TXT records
|
|
|
|
// ClouDNS doesn't allow selecting an arbitrary TTL, only a set of predefined values https://asia.cloudns.net/wiki/article/188/
|
|
// We need to make sure we don't change it every time if it is as close as it's going to get
|
|
for _, record := range dc.Records {
|
|
record.TTL = fixTTL(record.TTL)
|
|
}
|
|
|
|
differ := diff.New(dc)
|
|
_, create, del, modify, err := differ.IncrementalDiff(existingRecords)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var corrections []*models.Correction
|
|
|
|
// Deletes first so changing type works etc.
|
|
for _, m := range del {
|
|
id := m.Existing.Original.(*domainRecord).ID
|
|
corr := &models.Correction{
|
|
Msg: fmt.Sprintf("%s, ClouDNS ID: %s", m.String(), id),
|
|
F: func() error {
|
|
return c.deleteRecord(domainID, id)
|
|
},
|
|
}
|
|
// at ClouDNS, we MUST have a NS for a DS
|
|
// So, when deleting, we must delete the DS first, otherwise deleting the NS throws an error
|
|
if m.Existing.Type == "DS" {
|
|
// type DS is prepended - so executed first
|
|
corrections = append([]*models.Correction{corr}, corrections...)
|
|
} else {
|
|
corrections = append(corrections, corr)
|
|
}
|
|
}
|
|
|
|
var createCorrections []*models.Correction
|
|
for _, m := range create {
|
|
req, err := toReq(m.Desired)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
corr := &models.Correction{
|
|
Msg: m.String(),
|
|
F: func() error {
|
|
return c.createRecord(domainID, req)
|
|
},
|
|
}
|
|
// at ClouDNS, we MUST have a NS for a DS
|
|
// So, when creating, we must create the NS first, otherwise creating the DS throws an error
|
|
if m.Desired.Type == "NS" {
|
|
// type NS is prepended - so executed first
|
|
createCorrections = append([]*models.Correction{corr}, createCorrections...)
|
|
} else {
|
|
createCorrections = append(createCorrections, corr)
|
|
}
|
|
}
|
|
corrections = append(corrections, createCorrections...)
|
|
|
|
for _, m := range modify {
|
|
id := m.Existing.Original.(*domainRecord).ID
|
|
req, err := toReq(m.Desired)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
corr := &models.Correction{
|
|
Msg: fmt.Sprintf("%s, ClouDNS ID: %s: ", m.String(), id),
|
|
F: func() error {
|
|
return c.modifyRecord(domainID, id, req)
|
|
},
|
|
}
|
|
corrections = append(corrections, corr)
|
|
}
|
|
|
|
return corrections, nil
|
|
}
|
|
|
|
// GetZoneRecords gets the records of a zone and returns them in RecordConfig format.
|
|
func (c *cloudnsProvider) GetZoneRecords(domain string) (models.Records, error) {
|
|
records, err := c.getRecords(domain)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
existingRecords := make([]*models.RecordConfig, len(records))
|
|
for i := range records {
|
|
existingRecords[i] = toRc(domain, &records[i])
|
|
}
|
|
return existingRecords, nil
|
|
}
|
|
|
|
// EnsureDomainExists returns an error if domain doesn't exist.
|
|
func (c *cloudnsProvider) EnsureDomainExists(domain string) error {
|
|
if err := c.fetchDomainList(); err != nil {
|
|
return err
|
|
}
|
|
// domain already exists
|
|
if _, ok := c.domainIndex[domain]; ok {
|
|
return nil
|
|
}
|
|
return c.createDomain(domain)
|
|
}
|
|
|
|
//parses the ClouDNS format into our standard RecordConfig
|
|
func toRc(domain string, r *domainRecord) *models.RecordConfig {
|
|
|
|
ttl, _ := strconv.ParseUint(r.TTL, 10, 32)
|
|
priority, _ := strconv.ParseUint(r.Priority, 10, 32)
|
|
weight, _ := strconv.ParseUint(r.Weight, 10, 32)
|
|
port, _ := strconv.ParseUint(r.Port, 10, 32)
|
|
|
|
rc := &models.RecordConfig{
|
|
Type: r.Type,
|
|
TTL: uint32(ttl),
|
|
MxPreference: uint16(priority),
|
|
SrvPriority: uint16(priority),
|
|
SrvWeight: uint16(weight),
|
|
SrvPort: uint16(port),
|
|
Original: r,
|
|
}
|
|
rc.SetLabel(r.Host, domain)
|
|
|
|
switch rtype := r.Type; rtype { // #rtype_variations
|
|
case "TXT":
|
|
rc.SetTargetTXT(r.Target)
|
|
case "CNAME", "MX", "NS", "SRV", "ALIAS", "PTR":
|
|
rc.SetTarget(dnsutil.AddOrigin(r.Target+".", domain))
|
|
case "CAA":
|
|
caaFlag, _ := strconv.ParseUint(r.CaaFlag, 10, 32)
|
|
rc.CaaFlag = uint8(caaFlag)
|
|
rc.CaaTag = r.CaaTag
|
|
rc.SetTarget(r.CaaValue)
|
|
case "TLSA":
|
|
tlsaUsage, _ := strconv.ParseUint(r.TlsaUsage, 10, 32)
|
|
rc.TlsaUsage = uint8(tlsaUsage)
|
|
tlsaSelector, _ := strconv.ParseUint(r.TlsaSelector, 10, 32)
|
|
rc.TlsaSelector = uint8(tlsaSelector)
|
|
tlsaMatchingType, _ := strconv.ParseUint(r.TlsaMatchingType, 10, 32)
|
|
rc.TlsaMatchingType = uint8(tlsaMatchingType)
|
|
rc.SetTarget(r.Target)
|
|
case "SSHFP":
|
|
sshfpAlgorithm, _ := strconv.ParseUint(r.SshfpAlgorithm, 10, 32)
|
|
rc.SshfpAlgorithm = uint8(sshfpAlgorithm)
|
|
sshfpFingerprint, _ := strconv.ParseUint(r.SshfpFingerprint, 10, 32)
|
|
rc.SshfpFingerprint = uint8(sshfpFingerprint)
|
|
rc.SetTarget(r.Target)
|
|
case "DS":
|
|
dsKeyTag, _ := strconv.ParseUint(r.DsKeyTag, 10, 32)
|
|
rc.DsKeyTag = uint16(dsKeyTag)
|
|
dsAlgorithm, _ := strconv.ParseUint(r.SshfpAlgorithm, 10, 32) // SshFpAlgorithm and DsAlgorithm both use json field "algorithm"
|
|
rc.DsAlgorithm = uint8(dsAlgorithm)
|
|
dsDigestType, _ := strconv.ParseUint(r.DsDigestType, 10, 32)
|
|
rc.DsDigestType = uint8(dsDigestType)
|
|
rc.DsDigest = r.Target
|
|
rc.SetTarget(r.Target)
|
|
default:
|
|
rc.SetTarget(r.Target)
|
|
}
|
|
|
|
return rc
|
|
}
|
|
|
|
//toReq takes a RecordConfig and turns it into the native format used by the API.
|
|
func toReq(rc *models.RecordConfig) (requestParams, error) {
|
|
req := requestParams{
|
|
"record-type": rc.Type,
|
|
"host": rc.GetLabel(),
|
|
"record": rc.GetTargetField(),
|
|
"ttl": strconv.Itoa(int(rc.TTL)),
|
|
}
|
|
|
|
// ClouDNS doesn't use "@", it uses an empty name
|
|
if req["host"] == "@" {
|
|
req["host"] = ""
|
|
}
|
|
|
|
switch rc.Type { // #rtype_variations
|
|
case "A", "AAAA", "NS", "PTR", "TXT", "SOA", "ALIAS", "CNAME":
|
|
// Nothing special.
|
|
case "MX":
|
|
req["priority"] = strconv.Itoa(int(rc.MxPreference))
|
|
case "SRV":
|
|
req["priority"] = strconv.Itoa(int(rc.SrvPriority))
|
|
req["weight"] = strconv.Itoa(int(rc.SrvWeight))
|
|
req["port"] = strconv.Itoa(int(rc.SrvPort))
|
|
case "CAA":
|
|
req["caa_flag"] = strconv.Itoa(int(rc.CaaFlag))
|
|
req["caa_type"] = rc.CaaTag
|
|
req["caa_value"] = rc.GetTargetField()
|
|
case "TLSA":
|
|
req["tlsa_usage"] = strconv.Itoa(int(rc.TlsaUsage))
|
|
req["tlsa_selector"] = strconv.Itoa(int(rc.TlsaSelector))
|
|
req["tlsa_matching_type"] = strconv.Itoa(int(rc.TlsaMatchingType))
|
|
case "SSHFP":
|
|
req["algorithm"] = strconv.Itoa(int(rc.SshfpAlgorithm))
|
|
req["fptype"] = strconv.Itoa(int(rc.SshfpFingerprint))
|
|
case "DS":
|
|
req["key-tag"] = strconv.Itoa(int(rc.DsKeyTag))
|
|
req["algorithm"] = strconv.Itoa(int(rc.DsAlgorithm))
|
|
req["digest-type"] = strconv.Itoa(int(rc.DsDigestType))
|
|
req["record"] = rc.DsDigest
|
|
default:
|
|
return nil, fmt.Errorf("ClouDNS.toReq rtype %q unimplemented", rc.Type)
|
|
}
|
|
|
|
return req, nil
|
|
}
|