8.6 KiB
This provider maintains a directory with a collection of .zone files as appropriate for ISC BIND, and other systems that use the RFC 1035 zone-file format.
This provider does not generate or update the named.conf file, nor does it deploy the .zone files to the BIND master. Both of those tasks are different at each site, so they are best done by a locally-written script.
Configuration
To use this provider, add an entry to creds.json with TYPE set to BIND.
Optional fields include:
directory: Location of the zone files. Default:zones(in the current directory).filenameformat: The formula used to generate the zone filenames. The default is usually sufficient. Default:"%U.zone"
Example:
{% code title="creds.json" %}
{
"bind": {
"TYPE": "BIND",
"directory": "myzones"
}
}
{% endcode %}
As of v4.2.0 dnscontrol push will create subdirectories along the path to
the filename. This includes both the portion of the path created by the
directory setting and the filenameformat setting. For security reasons, the
automatic creation of subdirectories is disabled if dnscontrol is running as
root. (Running DNSControl as root is not recommended in general.)
Meta configuration
This provider accepts some optional metadata in the NewDnsProvider() call.
default_soa: If no SOA record exists in a zone file, one will be created based on the values specified here. UseSOA()to update existing zone files.default_ns: Inject these NS records into the zone. Use this whenNS()is insufficient.
In this example we set the default SOA settings and NS records.
{% code title="dnsconfig.js" %}
var DSP_BIND = NewDnsProvider("bind", {
"default_soa": {
"master": "ns1.example.com.",
"mbox": "spamtrap.example.com.",
"refresh": 3600,
"retry": 600,
"expire": 604800,
"minttl": 1440,
},
"default_ns": [
"ns1.example.com.",
"ns2.example.com.",
"ns3.example.com.",
"ns4.example.com."
]
})
{% endcode %}
FYI: SOA Records
SOA records are a bit weird in DNSControl. Most providers auto-generate SOA records and do not permit any modifications. BIND is unique in that it requires users to manage the SOA records themselves.
Because BIND is unique, BIND's SOA support is kind of a hack. It leaves the SOA record alone, with 2 exceptions:
- The serial number: If something in the zone changes, the serial number is incremented (see below).
- Missing SOAs: If there is no SOA record in a zone (or the zone is being created for the first time), the SOA is created. The initial values are taken from the
default_soasettings.
The default_soa values are only used when creating an SOA for the first time. The values are not used to update an SOA. Most people edit the SOA values by manually editing the zonefile or using the SOA() function.
FYI: SOA serial numbers
DNSControl maintains beautiful zone serial numbers.
DNSControl tries to maintain the serial number as yyyymmddvv. The algorithm for increasing the serial number is to select the max of (current serial + 1) and (yyyymmdd00). If you use a number larger than today's date (say, 2099000099) DNSControl will simply increment it forever.
The good news is that DNSControl is smart enough to only increment a zone's serial number if something in the zone changed. It does not increment the serial number just because DNSControl ran.
DNSControl does not handle special serial number math such as "looping through zero" nor does it pay attention to the rules around the maximum delta permitted. Those are simply avoided because yyyymmdd99 fits in the first quadrant of the 32-bit serial number space. If you don't understand this paragraph consider yourself lucky; with DNSControl you don't need to.
filenameformat
The filenameformat parameter specifies the file name to be used when
writing the zone file. The default (%c.zone) is acceptable in most cases: the
file name is the name as specified in the D() function plus ".zone".
The filenameformat is a string with a few printf-like % verbs:
| Verb | Description | EXAMple.com |
EXAMple.com!MyTag |
рф.com!myTag |
|---|---|---|---|---|
%T |
the tag | "" (null) | myTag |
myTag |
%c |
canonical name, globally unique and comparable | example.com |
example.com!myTag |
xn--p1ai.com!myTag |
%a |
ASCII domain (Punycode, downcased) | example.com |
example.com |
xn--p1ai.com |
%u |
Unicode domain (non-Unicode parts downcased) | example.com |
example.com |
рф.com |
%r |
Raw (unmodified) Domain from D() (risky!) |
EXAMple.com |
EXAMple.com |
рф.com |
%f |
like %c but better for filenames (%a%?_%T) |
example.com |
example.com_myTag |
xn--p1ai.com_myTag |
%F |
like %f but reversed order (%T%?_%a) |
example.com |
myTag_example.com |
myTag_xn--p1ai.com |
%?x |
returns x if tag exists, otherwise "" |
"" (null) | x |
x |
%% |
a literal percent sign | % |
% |
% |
a-Z./ |
other printable characters are copied exactly | a-Z./ |
a-Z./ |
a-Z./ |
%U |
(deprecated, use %c) Same as %D%?!%T (risky!) |
example.com |
example.com!myTag |
рф.com!myTag |
%D |
(deprecated, use %r) mangles Unicode (risky!) |
example.com |
example.com |
рф.com |
%?xis typically used to generate an optional!or_if there is a tag.%ris considered "risky" because it can produce a domain name that is not canonical. For example, if you useD("FOO.com")and later change it toD("foo.com"), your file names will change.- Format strings must not end with an incomplete
%or%? - Generating a filename without a tag is risky. For example, if the same
dnsconfig.jshasD("example.com!inside", DSP_BIND)andD("example.com!outside", DSP_BIND), both will use the same filename. DNSControl will write both zone files to the same file, flapping between the two. No error or warning will be output.
Useful examples:
| Verb | Description | EXAMple.com |
EXAMple.com!MyTag |
рф.com!myTag |
|---|---|---|---|---|
%c.zone |
Default format (v4.28 and later) | example.com.zone |
example.com!myTag.zone |
xn--p1ai.com!myTag.zone |
%U.zone |
Default format (pre-v4.28) (risky!) | example.com.zone |
example.com!myTag.zone |
рф.com!myTag.zone |
db_%f |
Recommended in a popular DNS book | db_example.com |
db_example.com_myTag |
db_xn--p1ai.com_myTag |
db_%a%?_%T |
same as above but using %?_ |
db_example.com |
db_example.com_myTag |
db_xn--p1ai.com_myTag |
Compatibility notes:
%Dshould not be used. It downcases the string in a way that is probably incompatible with Unicode characters. It is retained for compatibility with pre-v4.28 releases. If your domain has capital Unicode characters, backwards compatibility is not guaranteed. Use%rinstead.%Urelies on%Dwhich is deprecated. Use%cinstead.- As of v4.28 the default format string changed from
%U.zoneto%c.zone. This should only matter if yourD()statements included non-ASCII (Unicode) runes that were capitalized. - If you are using pre-v4.28 releases the above table is slightly misleading
because uppercase ASCII letters do not always work. If you are using
pre-v4.28 releases, assume the above table lists
example.cominstead ofEXAMpl.com.
FYI: get-zones
The DNSControl get-zones all subcommand scans the directory for
any files named *.zone and assumes they are zone files.
dnscontrol get-zones --format=nameonly - BIND all
If filenameformat is defined, dnscontrol makes a guess at which filenames
are zones by reversing the logic of the format string. It doesn't try very hard
to get this right, as getting it right in all situations is mathematically
impossible. Feel free to file an issue if find a situation where it doesn't
work. I love a challenge!