summaryrefslogtreecommitdiff
path: root/src/conf_mode/service_dns_dynamic.py
blob: 5f5303856589764b83a72424c90ebef407c28868 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
#!/usr/bin/env python3
#
# Copyright (C) 2018-2024 VyOS maintainers and contributors
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 or later as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

import os
import re
from sys import exit

from vyos.base import Warning
from vyos.config import Config
from vyos.configverify import verify_interface_exists
from vyos.configverify import dynamic_interface_pattern
from vyos.template import render
from vyos.utils.process import call
from vyos.utils.network import interface_exists
from vyos import ConfigError
from vyos import airbag
airbag.enable()

config_file = r'/run/ddclient/ddclient.conf'
systemd_override = r'/run/systemd/system/ddclient.service.d/override.conf'

# Protocols that require zone
zone_necessary = ['cloudflare', 'digitalocean', 'godaddy', 'hetzner', 'gandi',
                  'nfsn', 'nsupdate']
zone_supported = zone_necessary + ['dnsexit2', 'zoneedit1']

# Protocols that do not require username
username_unnecessary = ['1984', 'cloudflare', 'cloudns', 'digitalocean', 'dnsexit2',
                        'duckdns', 'freemyip', 'hetzner', 'keysystems', 'njalla',
                        'nsupdate', 'regfishde']

# Protocols that support TTL
ttl_supported = ['cloudflare', 'dnsexit2', 'gandi', 'hetzner', 'godaddy', 'nfsn',
                 'nsupdate']

# Protocols that support both IPv4 and IPv6
dualstack_supported = ['cloudflare', 'digitalocean', 'dnsexit2', 'duckdns',
                       'dyndns2', 'easydns', 'freedns', 'hetzner', 'infomaniak',
                       'njalla']

# dyndns2 protocol in ddclient honors dual stack for selective servers
# because of the way it is implemented in ddclient
dyndns_dualstack_servers = ['members.dyndns.org', 'dynv6.com']

def get_config(config=None):
    if config:
        conf = config
    else:
        conf = Config()

    base = ['service', 'dns', 'dynamic']
    if not conf.exists(base):
        return None

    dyndns = conf.get_config_dict(base, key_mangling=('-', '_'),
                                  no_tag_node_value_mangle=True,
                                  get_first_key=True,
                                  with_recursive_defaults=True)

    dyndns['config_file'] = config_file
    return dyndns

def verify(dyndns):
    # bail out early - looks like removal from running config
    if not dyndns or 'name' not in dyndns:
        return None

    # Dynamic DNS service provider - configuration validation
    for service, config in dyndns['name'].items():
        error_msg_req = f'is required for Dynamic DNS service "{service}"'
        error_msg_uns = f'is not supported for Dynamic DNS service "{service}"'

        for field in ['protocol', 'address', 'host_name']:
            if field not in config:
                raise ConfigError(f'"{field.replace("_", "-")}" {error_msg_req}')

        if not any(x in config['address'] for x in ['interface', 'web']):
            raise ConfigError(f'Either "interface" or "web" {error_msg_req} '
                              f'with protocol "{config["protocol"]}"')
        if all(x in config['address'] for x in ['interface', 'web']):
            raise ConfigError(f'Both "interface" and "web" at the same time {error_msg_uns} '
                              f'with protocol "{config["protocol"]}"')

        # If dyndns address is an interface, ensure that the interface exists
        # and warn if a non-active dynamic interface is used
        if 'interface' in config['address']:
            tmp = re.compile(dynamic_interface_pattern)
            # exclude check interface for dynamic interfaces
            if tmp.match(config['address']['interface']):
                if not interface_exists(config['address']['interface']):
                    Warning(f'Interface "{config["address"]["interface"]}" does not exist yet and '
                            f'cannot be used for Dynamic DNS service "{service}" until it is up!')
            else:
                verify_interface_exists(dyndns, config['address']['interface'])

        if 'web' in config['address']:
            # If 'skip' is specified, 'url' is required as well
            if 'skip' in config['address']['web'] and 'url' not in config['address']['web']:
                raise ConfigError(f'"url" along with "skip" {error_msg_req} '
                                  f'with protocol "{config["protocol"]}"')
            if 'url' in config['address']['web']:
                # Warn if using checkip.dyndns.org, as it does not support HTTPS
                # See: https://github.com/ddclient/ddclient/issues/597
                if re.search("^(https?://)?checkip\.dyndns\.org", config['address']['web']['url']):
                    Warning(f'"checkip.dyndns.org" does not support HTTPS requests for IP address '
                            f'lookup. Please use a different IP address lookup service.')

        # RFC2136 uses 'key' instead of 'password'
        if config['protocol'] != 'nsupdate' and 'password' not in config:
            raise ConfigError(f'"password" {error_msg_req}')

        # Other RFC2136 specific configuration validation
        if config['protocol'] == 'nsupdate':
            if 'password' in config:
                raise ConfigError(f'"password" {error_msg_uns} with protocol "{config["protocol"]}"')
            for field in ['server', 'key']:
                if field not in config:
                    raise ConfigError(f'"{field}" {error_msg_req} with protocol "{config["protocol"]}"')

        if config['protocol'] in zone_necessary and 'zone' not in config:
            raise ConfigError(f'"zone" {error_msg_req} with protocol "{config["protocol"]}"')

        if config['protocol'] not in zone_supported and 'zone' in config:
            raise ConfigError(f'"zone" {error_msg_uns} with protocol "{config["protocol"]}"')

        if config['protocol'] not in username_unnecessary and 'username' not in config:
            raise ConfigError(f'"username" {error_msg_req} with protocol "{config["protocol"]}"')

        if config['protocol'] not in ttl_supported and 'ttl' in config:
            raise ConfigError(f'"ttl" {error_msg_uns} with protocol "{config["protocol"]}"')

        if config['ip_version'] == 'both':
            if config['protocol'] not in dualstack_supported:
                raise ConfigError(f'Both IPv4 and IPv6 at the same time {error_msg_uns} '
                                  f'with protocol "{config["protocol"]}"')
            # dyndns2 protocol in ddclient honors dual stack only for dyn.com (dyndns.org)
            if config['protocol'] == 'dyndns2' and 'server' in config and config['server'] not in dyndns_dualstack_servers:
                raise ConfigError(f'Both IPv4 and IPv6 at the same time {error_msg_uns} '
                                  f'for "{config["server"]}" with protocol "{config["protocol"]}"')

        if {'wait_time', 'expiry_time'} <= config.keys() and int(config['expiry_time']) < int(config['wait_time']):
                raise ConfigError(f'"expiry-time" must be greater than "wait-time" for '
                                  f'Dynamic DNS service "{service}"')

    return None

def generate(dyndns):
    # bail out early - looks like removal from running config
    if not dyndns or 'name' not in dyndns:
        return None

    render(config_file, 'dns-dynamic/ddclient.conf.j2', dyndns, permission=0o600)
    render(systemd_override, 'dns-dynamic/override.conf.j2', dyndns)
    return None

def apply(dyndns):
    systemd_service = 'ddclient.service'
    # Reload systemd manager configuration
    call('systemctl daemon-reload')

    # bail out early - looks like removal from running config
    if not dyndns or 'name' not in dyndns:
        call(f'systemctl stop {systemd_service}')
        if os.path.exists(config_file):
            os.unlink(config_file)
    else:
        call(f'systemctl reload-or-restart {systemd_service}')

    return None

if __name__ == '__main__':
    try:
        c = get_config()
        verify(c)
        generate(c)
        apply(c)
    except ConfigError as e:
        print(e)
        exit(1)