Initial Commit
This commit is contained in:
commit
341e5767be
1
.dockerignore
Normal file
1
.dockerignore
Normal file
@ -0,0 +1 @@
|
||||
bin
|
14
.drone.yml
Normal file
14
.drone.yml
Normal file
@ -0,0 +1,14 @@
|
||||
kind: pipeline
|
||||
type: docker
|
||||
name: amd64
|
||||
|
||||
steps:
|
||||
- name: build-linux-amd64
|
||||
image: docker.io/volkerraschek/build-image:latest
|
||||
commands:
|
||||
- make
|
||||
when:
|
||||
event:
|
||||
- push
|
||||
- pull_request
|
||||
- tag
|
12
.editorconfig
Normal file
12
.editorconfig
Normal file
@ -0,0 +1,12 @@
|
||||
root = true
|
||||
|
||||
[*]
|
||||
indent_style = space
|
||||
indent_size = 2
|
||||
end_of_line = lf
|
||||
charset = utf-8
|
||||
trim_trailing_whitespace = true
|
||||
insert_final_newline = false
|
||||
|
||||
[Makefile]
|
||||
indent_style = tab
|
1
.gitattributes
vendored
Normal file
1
.gitattributes
vendored
Normal file
@ -0,0 +1 @@
|
||||
**/Makefile eol=lf
|
7
.gitignore
vendored
Normal file
7
.gitignore
vendored
Normal file
@ -0,0 +1,7 @@
|
||||
bin
|
||||
|
||||
pkg/config/*.json
|
||||
!pkg/config/config.json
|
||||
|
||||
dyndns-client
|
||||
dyndns-client.rpm
|
27
Dockerfile
Normal file
27
Dockerfile
Normal file
@ -0,0 +1,27 @@
|
||||
ARG BASE_IMAGE
|
||||
ARG BUILD_IMAGE
|
||||
|
||||
# BUILD
|
||||
# ===========================================
|
||||
FROM ${BUILD_IMAGE} AS build
|
||||
ADD . /workspace
|
||||
|
||||
ARG EXECUTABLE
|
||||
ARG GONOPROXY
|
||||
ARG GONOSUMDB
|
||||
ARG GOPRIVATE
|
||||
ARG GOPROXY
|
||||
ARG GOSUMDB
|
||||
ARG VERSION
|
||||
|
||||
RUN make bin/linux/amd64/${EXECUTABLE}
|
||||
|
||||
# TARGET CONTAINER
|
||||
# ===========================================
|
||||
FROM ${BASE_IMAGE}
|
||||
|
||||
ARG EXECUTABLE
|
||||
|
||||
RUN apk add --update bind-tools
|
||||
COPY --from=build /workspace/bin/linux/amd64/${EXECUTABLE} /usr/bin/${EXECUTABLE}
|
||||
ENTRYPOINT [ "/usr/bin/dyndns-client" ]
|
13
LICENSE
Normal file
13
LICENSE
Normal file
@ -0,0 +1,13 @@
|
||||
Copyright 2021 Markus Pesch
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
146
Makefile
Normal file
146
Makefile
Normal file
@ -0,0 +1,146 @@
|
||||
# VERSION
|
||||
VERSION ?= $(shell git describe --abbrev=0)+hash.$(shell git rev-parse --short HEAD)
|
||||
|
||||
|
||||
DESTDIR ?=
|
||||
PREFIX ?= /usr/local
|
||||
EXECUTABLE := dyndns-client
|
||||
|
||||
# CONTAINER_RUNTIME
|
||||
CONTAINER_RUNTIME ?= $(shell which docker)
|
||||
|
||||
# BUILD_IMAGE
|
||||
BUILD_IMAGE_REGISTRY_HOST := docker.io
|
||||
BUILD_IMAGE_NAMESPACE := volkerraschek
|
||||
BUILD_IMAGE_REPOSITORY := build-image
|
||||
BUILD_IMAGE_VERSION := latest
|
||||
BUILD_IMAGE_FULLY_QUALIFIED := ${BUILD_IMAGE_REGISTRY_HOST}/${BUILD_IMAGE_NAMESPACE}/${BUILD_IMAGE_REPOSITORY}:${BUILD_IMAGE_VERSION:v%=%}
|
||||
|
||||
# BASE_IMAGE
|
||||
BASE_IMAGE_REGISTRY_HOST := docker.io
|
||||
BASE_IMAGE_NAMESPACE := library
|
||||
BASE_IMAGE_REPOSITORY := alpine
|
||||
BASE_IMAGE_VERSION := 3.12.0
|
||||
BASE_IMAGE_FULLY_QUALIFIED := ${BASE_IMAGE_REGISTRY_HOST}/${BASE_IMAGE_NAMESPACE}/${BASE_IMAGE_REPOSITORY}:${BASE_IMAGE_VERSION:v%=%}
|
||||
|
||||
# CONTAINER_IMAGE
|
||||
CONTAINER_IMAGE_REGISTRY_HOST := docker.io
|
||||
CONTAINER_IMAGE_NAMESPACE := volkerraschek
|
||||
CONTAINER_IMAGE_REPOSITORY := ${EXECUTABLE}
|
||||
CONTAINER_IMAGE_VERSION := latest
|
||||
CONTAINER_IMAGE_FULLY_QUALIFIED := ${CONTAINER_IMAGE_REGISTRY_HOST}/${CONTAINER_IMAGE_NAMESPACE}/${CONTAINER_IMAGE_REPOSITORY}:${CONTAINER_IMAGE_VERSION:v%=%}
|
||||
CONTAINER_IMAGE_UNQUALIFIED := ${CONTAINER_IMAGE_NAMESPACE}/${CONTAINER_IMAGE_REPOSITORY}:${CONTAINER_IMAGE_VERSION:v%=%}
|
||||
|
||||
# BINARIES
|
||||
# ==============================================================================
|
||||
${EXECUTABLE}: clean bin/tmp/${EXECUTABLE}
|
||||
|
||||
bin/linux/amd64/$(EXECUTABLE):
|
||||
CGO_ENABLED=0 \
|
||||
GONOPROXY=$(shell go env GONOPROXY) \
|
||||
GONOSUMDB=$(shell go env GONOSUMDB) \
|
||||
GOPRIVATE=$(shell go env GOPRIVATE) \
|
||||
GOPROXY=$(shell go env GOPROXY) \
|
||||
GOSUMDB=$(shell go env GOSUMDB) \
|
||||
GOOS=linux \
|
||||
GOARCH=amd64 \
|
||||
go build -ldflags "-X main.version=${VERSION:v%=%}" -o ${@}
|
||||
|
||||
bin/tmp/${EXECUTABLE}:
|
||||
CGO_ENABLED=0 \
|
||||
GONOPROXY=$(shell go env GONOPROXY) \
|
||||
GONOSUMDB=$(shell go env GONOSUMDB) \
|
||||
GOPRIVATE=$(shell go env GOPRIVATE) \
|
||||
GOPROXY=$(shell go env GOPROXY) \
|
||||
GOSUMDB=$(shell go env GOSUMDB) \
|
||||
go build -ldflags "-X main.version=${VERSION:v%=%}" -o ${@}
|
||||
|
||||
# TEST
|
||||
# ==============================================================================
|
||||
PHONY+=test
|
||||
test: clean bin/tmp/${EXECUTABLE}
|
||||
go test -v ./pkg/...
|
||||
|
||||
# CLEAN
|
||||
# ==============================================================================
|
||||
PHONY+=clean
|
||||
clean:
|
||||
rm --force ${EXECUTABLE} || true
|
||||
rm --force --recursive bin || true
|
||||
|
||||
# CONTAINER IMAGE
|
||||
# ==============================================================================
|
||||
container-image/build:
|
||||
${CONTAINER_RUNTIME} build \
|
||||
--build-arg BASE_IMAGE=${BASE_IMAGE_FULLY_QUALIFIED} \
|
||||
--build-arg BUILD_IMAGE=${BUILD_IMAGE_FULLY_QUALIFIED} \
|
||||
--build-arg EXECUTABLE=${EXECUTABLE} \
|
||||
--build-arg GONOPROXY=$(shell go env GONOPROXY) \
|
||||
--build-arg GONOSUMDB=$(shell go env GONOSUMDB) \
|
||||
--build-arg GOPRIVATE=$(shell go env GOPRIVATE) \
|
||||
--build-arg GOPROXY=$(shell go env GOPROXY) \
|
||||
--build-arg GOSUMDB=$(shell go env GOSUMDB) \
|
||||
--build-arg VERSION=${VERSION:v%=%} \
|
||||
--no-cache \
|
||||
--tag ${CONTAINER_IMAGE_FULLY_QUALIFIED} \
|
||||
--tag ${CONTAINER_IMAGE_UNQUALIFIED} \
|
||||
.
|
||||
|
||||
container-image/push: container-image/build
|
||||
${CONTAINER_RUNTIME} push ${CONTAINER_IMAGE_FULLY_QUALIFIED}
|
||||
|
||||
# CONTAINER RUN - TEST
|
||||
# ==============================================================================
|
||||
PHONY+=container-run/test
|
||||
container-run/test:
|
||||
$(MAKE) container-run COMMAND=${@:container-run/%=%}
|
||||
|
||||
# CONTAINER RUN - CLEAN
|
||||
# ==============================================================================
|
||||
PHONY+=container-run/clean
|
||||
container-run/clean:
|
||||
$(MAKE) container-run COMMAND=${@:container-run/%=%}
|
||||
|
||||
# CONTAINER RUN - COMMAND
|
||||
# ==============================================================================
|
||||
PHONY+=container-run
|
||||
container-run:
|
||||
${CONTAINER_RUNTIME} run \
|
||||
--env GONOPROXY=$(shell go env GONOPROXY) \
|
||||
--env GONOSUMDB=$(shell go env GONOSUMDB) \
|
||||
--env GOPRIVATE=$(shell go env GOPRIVATE) \
|
||||
--env GOPROXY=$(shell go env GOPROXY) \
|
||||
--env GOSUMDB=$(shell go env GOSUMDB) \
|
||||
--env EPOCH=${EPOCH} \
|
||||
--env VERSION=${VERSION:v%=%} \
|
||||
--env RELEASE=${RELEASE} \
|
||||
--rm \
|
||||
--volume $(shell pwd):/workspace \
|
||||
${BUILD_IMAGE_FULLY_QUALIFIED} \
|
||||
make ${COMMAND} \
|
||||
|
||||
# UN/INSTALL
|
||||
# ==============================================================================
|
||||
PHONY+=install
|
||||
install: bin/tmp/${EXECUTABLE}
|
||||
install --directory ${DESTDIR}${PREFIX}/bin
|
||||
install --mode 755 bin/tmp/${EXECUTABLE} ${DESTDIR}${PREFIX}/bin/${EXECUTABLE}
|
||||
|
||||
install --directory ${DESTDIR}/usr/lib/systemd/system
|
||||
install --mode 644 systemd/${EXECUTABLE}.service ${DESTDIR}/usr/lib/systemd/system
|
||||
install --mode 644 systemd/${EXECUTABLE}-docker.service ${DESTDIR}/usr/lib/systemd/system
|
||||
|
||||
install --directory ${DESTDIR}/usr/share/licenses/${EXECUTABLE}
|
||||
install --mode 644 LICENSE ${DESTDIR}/usr/share/licenses/${EXECUTABLE}/LICENSE
|
||||
|
||||
PHONY+=uninstall
|
||||
uninstall:
|
||||
-rm --recursive --force \
|
||||
${DESTDIR}${PREFIX}/bin/${EXECUTABLE} \
|
||||
${DESTDIR}/usr/lib/systemd/system/${EXECUTABLE}.service \
|
||||
${DESTDIR}/usr/lib/systemd/system/${EXECUTABLE}-docker.service \
|
||||
${DESTDIR}/usr/share/licenses/${EXECUTABLE}/LICENSE
|
||||
|
||||
# PHONY
|
||||
# ==============================================================================
|
||||
.PHONY: ${PHONY}
|
43
README.md
Normal file
43
README.md
Normal file
@ -0,0 +1,43 @@
|
||||
# dyndns-client
|
||||
|
||||
[![Build Status](https://drone.cryptic.systems/api/badges/dyndns-client/dyndns-client/status.svg)](https://drone.cryptic.systems/dyndns-client/dyndns-client)
|
||||
|
||||
dyndns-client is a Daemon to listen on interface notifications produced by the linux
|
||||
kernel of a client machine to update one or more DNS zones.
|
||||
|
||||
## Usage
|
||||
|
||||
To start dyndns-client just run `./dyndns-client`.
|
||||
|
||||
## Configuration
|
||||
|
||||
The program is compiled as standalone binary without third party libraries. If
|
||||
no configuration file available under `/etc/dyndns-client/config.json`, than
|
||||
will be the burned in configuration used. If also no configuration be burned
|
||||
into the source code, that the client returned an error.
|
||||
|
||||
The example below describes a configuration to update RRecords triggerd by the
|
||||
interface `br0` for the `example.com` zone. To update the zone is a TSIG-Key
|
||||
required.
|
||||
|
||||
```json
|
||||
{
|
||||
"interfaces": [
|
||||
"br0"
|
||||
],
|
||||
"zones": {
|
||||
"example.com": {
|
||||
"dns-server": "10.6.231.5",
|
||||
"name": "example.com",
|
||||
"tsig-key": "my-key"
|
||||
}
|
||||
},
|
||||
"tsig-keys": {
|
||||
"my-key": {
|
||||
"algorithm": "hmac-sha512",
|
||||
"name": "my-key",
|
||||
"secret": "asdasdasdasdjkhjk38hcn38haoü2390dndaskdTTWA=="
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
12
go.mod
Normal file
12
go.mod
Normal file
@ -0,0 +1,12 @@
|
||||
module git.cryptic.systems/volker.raschek/dyndns-client
|
||||
|
||||
go 1.16
|
||||
|
||||
require (
|
||||
github.com/asaskevich/govalidator v0.0.0-20210307081110-f21760c49a8d
|
||||
github.com/sirupsen/logrus v1.8.1
|
||||
github.com/stretchr/testify v1.6.1 // indirect
|
||||
github.com/vishvananda/netlink v1.1.0
|
||||
github.com/vishvananda/netns v0.0.0-20200520041808-52d707b772fe // indirect
|
||||
golang.org/x/sys v0.0.0-20200602225109-6fdc65e7d980 // indirect
|
||||
)
|
26
go.sum
Normal file
26
go.sum
Normal file
@ -0,0 +1,26 @@
|
||||
github.com/asaskevich/govalidator v0.0.0-20210307081110-f21760c49a8d h1:Byv0BzEl3/e6D5CLfI0j/7hiIEtvGVFPCZ7Ei2oq8iQ=
|
||||
github.com/asaskevich/govalidator v0.0.0-20210307081110-f21760c49a8d/go.mod h1:WaHUgvxTVq04UNunO+XhnAqY/wQc+bxr74GqbsZ/Jqw=
|
||||
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||
github.com/sirupsen/logrus v1.8.1 h1:dJKuHgqk1NNQlqoA6BTlM1Wf9DOH3NBjQyu0h9+AZZE=
|
||||
github.com/sirupsen/logrus v1.8.1/go.mod h1:yWOB1SBYBC5VeMP7gHvWumXLIWorT60ONWic61uBYv0=
|
||||
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||
github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
|
||||
github.com/stretchr/testify v1.6.1 h1:hDPOHmpOpP40lSULcqw7IrRb/u7w6RpDC9399XyoNd0=
|
||||
github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||
github.com/vishvananda/netlink v1.1.0 h1:1iyaYNBLmP6L0220aDnYQpo1QEV4t4hJ+xEEhhJH8j0=
|
||||
github.com/vishvananda/netlink v1.1.0/go.mod h1:cTgwzPIzzgDAYoQrMm0EdrjRUBkTqKYppBueQtXaqoE=
|
||||
github.com/vishvananda/netns v0.0.0-20191106174202-0a2b9b5464df/go.mod h1:JP3t17pCcGlemwknint6hfoeCVQrEMVwxRLRjXpq+BU=
|
||||
github.com/vishvananda/netns v0.0.0-20200520041808-52d707b772fe h1:mjAZxE1nh8yvuwhGHpdDqdhtNu2dgbpk93TwoXuk5so=
|
||||
github.com/vishvananda/netns v0.0.0-20200520041808-52d707b772fe/go.mod h1:DD4vA1DwXk04H54A1oHXtwZmA0grkVMdPxx/VGLCah0=
|
||||
golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||
golang.org/x/sys v0.0.0-20191026070338-33540a1f6037/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||
golang.org/x/sys v0.0.0-20200217220822-9197077df867/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||
golang.org/x/sys v0.0.0-20200602225109-6fdc65e7d980 h1:OjiUf46hAmXblsZdnoSXsEUSKU8r1UEzcL5RVZ4gO9Y=
|
||||
golang.org/x/sys v0.0.0-20200602225109-6fdc65e7d980/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c h1:dUUwHk2QECo/6vqA44rthZ8ie2QXMNeKRTHCNY2nXvo=
|
||||
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
52
main.go
Normal file
52
main.go
Normal file
@ -0,0 +1,52 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"os"
|
||||
|
||||
log "github.com/sirupsen/logrus"
|
||||
|
||||
"git.cryptic.systems/volker.raschek/dyndns-client/pkg/config"
|
||||
"git.cryptic.systems/volker.raschek/dyndns-client/pkg/daemon"
|
||||
)
|
||||
|
||||
var (
|
||||
version string
|
||||
)
|
||||
|
||||
func main() {
|
||||
|
||||
switch os.Getenv("DYNDNS_CLIENT_LOGGER_LEVEL") {
|
||||
case "DEBUG", "debug":
|
||||
log.SetLevel(log.DebugLevel)
|
||||
case "WARN", "warn":
|
||||
log.SetLevel(log.WarnLevel)
|
||||
case "ERROR", "error":
|
||||
log.SetLevel(log.ErrorLevel)
|
||||
case "FATAL", "fatal":
|
||||
log.SetLevel(log.FatalLevel)
|
||||
case "INFO", "info":
|
||||
fallthrough
|
||||
default:
|
||||
log.SetLevel(log.InfoLevel)
|
||||
}
|
||||
|
||||
switch os.Getenv("DYNDNS_CLIENT_LOGGER_FORMATTER") {
|
||||
case "JSON", "json":
|
||||
log.SetFormatter(&log.JSONFormatter{})
|
||||
case "TEXT", "text":
|
||||
fallthrough
|
||||
default:
|
||||
log.SetFormatter(&log.TextFormatter{
|
||||
FullTimestamp: true,
|
||||
})
|
||||
}
|
||||
|
||||
log.Infof("version %v", version)
|
||||
|
||||
cnf, err := config.Read("/etc/dyndns-client/config.json")
|
||||
if err != nil {
|
||||
log.Fatal(err.Error())
|
||||
}
|
||||
|
||||
daemon.Start(cnf)
|
||||
}
|
147
pkg/config/config.go
Normal file
147
pkg/config/config.go
Normal file
@ -0,0 +1,147 @@
|
||||
package config
|
||||
|
||||
import (
|
||||
_ "embed"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"net"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strings"
|
||||
|
||||
"git.cryptic.systems/volker.raschek/dyndns-client/pkg/types"
|
||||
log "github.com/sirupsen/logrus"
|
||||
)
|
||||
|
||||
//go:embed config.json
|
||||
var defaultConfig string
|
||||
|
||||
// GetDefaultConfiguration returns a default configuration
|
||||
func GetDefaultConfiguration() (*types.Config, error) {
|
||||
cnf := new(types.Config)
|
||||
jsonDecoder := json.NewDecoder(strings.NewReader(defaultConfig))
|
||||
|
||||
err := jsonDecoder.Decode(cnf)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to decode default config: %w", err)
|
||||
}
|
||||
|
||||
defaultInterface, err := getDefaultInterfaceByIP()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
cnf.Ifaces = []string{defaultInterface.Name}
|
||||
|
||||
return cnf, nil
|
||||
}
|
||||
|
||||
// Read config from a file
|
||||
func Read(cnfFile string) (*types.Config, error) {
|
||||
|
||||
// Load burned in configuration if config not available
|
||||
if _, err := os.Stat(cnfFile); os.IsNotExist(err) {
|
||||
if err := os.MkdirAll(filepath.Dir(cnfFile), 0755); err != nil {
|
||||
return nil, fmt.Errorf("failed to create directory: %w", err)
|
||||
}
|
||||
cnf, err := GetDefaultConfiguration()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
err = cnf.Validate()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
log.Infof("use embedded configuration")
|
||||
|
||||
return cnf, nil
|
||||
}
|
||||
|
||||
f, err := os.Open(cnfFile)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to open file: %w", err)
|
||||
}
|
||||
defer f.Close()
|
||||
|
||||
cnf := new(types.Config)
|
||||
jsonDecoder := json.NewDecoder(f)
|
||||
err = jsonDecoder.Decode(cnf)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to decode json: %w", err)
|
||||
}
|
||||
|
||||
for _, iface := range cnf.Ifaces {
|
||||
if _, err := net.InterfaceByName(iface); err != nil {
|
||||
return nil, fmt.Errorf("unknown interface: %v", iface)
|
||||
}
|
||||
}
|
||||
|
||||
err = cnf.Validate()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
log.Infof("use configuration from file %v", cnfFile)
|
||||
|
||||
return cnf, nil
|
||||
}
|
||||
|
||||
// Write config into a file
|
||||
func Write(cnf *types.Config, cnfFile string) error {
|
||||
if _, err := os.Stat(filepath.Dir(cnfFile)); os.IsNotExist(err) {
|
||||
err := os.MkdirAll(filepath.Dir(cnfFile), 0755)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
f, err := os.Create(cnfFile)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to create file %v: %v", cnfFile, err)
|
||||
}
|
||||
defer f.Close()
|
||||
|
||||
jsonEncoder := json.NewEncoder(f)
|
||||
jsonEncoder.SetIndent("", " ")
|
||||
err = jsonEncoder.Encode(cnf)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to encode json: %w", err)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func getDefaultInterfaceByIP() (*net.Interface, error) {
|
||||
ifaces, err := net.Interfaces()
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to fet network interfaces from kernel: %w", err)
|
||||
}
|
||||
|
||||
defaultIP := getOutboundIP()
|
||||
|
||||
for _, iface := range ifaces {
|
||||
addrs, err := iface.Addrs()
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to list ip addresses for interface %v: %w", iface.Name, err)
|
||||
}
|
||||
|
||||
for _, addr := range addrs {
|
||||
addrIP := strings.Split(addr.String(), "/")[0]
|
||||
if addrIP == defaultIP.String() {
|
||||
return &iface, nil
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return nil, fmt.Errorf("no interface found fo ip address %v", defaultIP)
|
||||
}
|
||||
|
||||
func getOutboundIP() net.IP {
|
||||
conn, err := net.Dial("udp", "8.8.8.8:80")
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
defer conn.Close()
|
||||
localAddr := conn.LocalAddr().(*net.UDPAddr)
|
||||
return localAddr.IP
|
||||
}
|
1
pkg/config/config.json
Normal file
1
pkg/config/config.json
Normal file
@ -0,0 +1 @@
|
||||
{}
|
335
pkg/daemon/daemon.go
Normal file
335
pkg/daemon/daemon.go
Normal file
@ -0,0 +1,335 @@
|
||||
package daemon
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"net"
|
||||
"os"
|
||||
"os/signal"
|
||||
"regexp"
|
||||
"strings"
|
||||
"sync"
|
||||
"syscall"
|
||||
"time"
|
||||
|
||||
"git.cryptic.systems/volker.raschek/dyndns-client/pkg/types"
|
||||
"git.cryptic.systems/volker.raschek/dyndns-client/pkg/updater"
|
||||
"github.com/asaskevich/govalidator"
|
||||
log "github.com/sirupsen/logrus"
|
||||
"github.com/vishvananda/netlink"
|
||||
)
|
||||
|
||||
func Start(cnf *types.Config) {
|
||||
addrUpdates := make(chan netlink.AddrUpdate, 1)
|
||||
done := make(chan struct{}, 1)
|
||||
err := netlink.AddrSubscribeWithOptions(addrUpdates, done, netlink.AddrSubscribeOptions{
|
||||
ListExisting: true,
|
||||
})
|
||||
if err != nil {
|
||||
log.Fatalf("failed to subscribe netlink notifications from kernel: %v", err.Error())
|
||||
}
|
||||
|
||||
interuptChannel := make(chan os.Signal, 1)
|
||||
signal.Notify(interuptChannel, syscall.SIGINT, syscall.SIGTERM)
|
||||
|
||||
ctx := context.Background()
|
||||
daemonCtx, cancle := context.WithCancel(ctx)
|
||||
defer cancle()
|
||||
|
||||
updaters, err := getUpdaterForEachZone(cnf)
|
||||
if err != nil {
|
||||
log.Fatalf("%v", err.Error())
|
||||
}
|
||||
|
||||
if err := pruneRecords(daemonCtx, updaters, cnf.Zones); err != nil {
|
||||
log.Fatalf("%v", err.Error())
|
||||
}
|
||||
|
||||
for {
|
||||
interfaces, err := netlink.LinkList()
|
||||
if err != nil {
|
||||
log.Fatal("%v", err.Error())
|
||||
}
|
||||
|
||||
select {
|
||||
case update := <-addrUpdates:
|
||||
|
||||
interfaceLogger := log.WithFields(log.Fields{
|
||||
"ip": update.LinkAddress.IP.String(),
|
||||
})
|
||||
|
||||
// search interface by index
|
||||
iface, err := searchInterfaceByIndex(update.LinkIndex, interfaces)
|
||||
if err != nil {
|
||||
log.Errorf("%v", err.Error())
|
||||
continue
|
||||
}
|
||||
interfaceLogger = interfaceLogger.WithField("device", iface.Attrs().Name)
|
||||
|
||||
var recordType string
|
||||
switch {
|
||||
case govalidator.IsIPv4(strings.TrimRight(update.LinkAddress.IP.String(), "/")):
|
||||
recordType = "A"
|
||||
case govalidator.IsIPv6(strings.TrimRight(update.LinkAddress.IP.String(), "/")):
|
||||
recordType = "AAAA"
|
||||
default:
|
||||
interfaceLogger.Error("failed to detect record type")
|
||||
continue
|
||||
}
|
||||
interfaceLogger = interfaceLogger.WithField("rr", recordType)
|
||||
|
||||
interfaceLogger.Debug("receive kernel notification for interface")
|
||||
|
||||
// filter out not configured interfaces
|
||||
if !matchInterfaces(iface.Attrs().Name, cnf.Ifaces) {
|
||||
interfaceLogger.Warn("interface is not part of the allowed interface list")
|
||||
continue
|
||||
}
|
||||
|
||||
// filter out notification for a bad interface ip address, for example link-local-addresses
|
||||
if update.LinkAddress.IP.IsLoopback() || strings.HasPrefix(update.LinkAddress.IP.String(), "fe80") {
|
||||
interfaceLogger.Warn("interface is a loopback device or part of a loopback network")
|
||||
continue
|
||||
}
|
||||
|
||||
// decide if trigger a add or delete event
|
||||
if update.NewAddr {
|
||||
err = addIPRecords(daemonCtx, interfaceLogger, updaters, cnf.Zones, recordType, update.LinkAddress.IP)
|
||||
if err != nil {
|
||||
interfaceLogger.Error(err.Error())
|
||||
}
|
||||
} else {
|
||||
err = removeIPRecords(daemonCtx, interfaceLogger, updaters, cnf.Zones, recordType, update.LinkAddress.IP)
|
||||
if err != nil {
|
||||
interfaceLogger.Error(err.Error())
|
||||
}
|
||||
}
|
||||
|
||||
case killSignal := <-interuptChannel:
|
||||
log.Debugf("got signal: %v", killSignal)
|
||||
log.Debugf("daemon was killed by: %v", killSignal)
|
||||
return
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func getUpdaterForEachZone(config *types.Config) (map[string]updater.Updater, error) {
|
||||
updaterCollection := make(map[string]updater.Updater)
|
||||
|
||||
for zoneName, zone := range config.Zones {
|
||||
nsUpdater, err := updater.NewNSUpdate(zone.DNSServer, config.TSIGKeys[zone.TSIGKeyName])
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
updaterCollection[zoneName] = nsUpdater
|
||||
}
|
||||
|
||||
return updaterCollection, nil
|
||||
}
|
||||
|
||||
func matchInterfaces(iface string, ifaces []string) bool {
|
||||
for _, i := range ifaces {
|
||||
if i == iface {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
func searchInterfaceByIndex(index int, interfaces []netlink.Link) (netlink.Link, error) {
|
||||
for _, iface := range interfaces {
|
||||
if iface.Attrs().Index == index {
|
||||
return iface, nil
|
||||
}
|
||||
}
|
||||
return nil, fmt.Errorf("can not find interface by index %v", index)
|
||||
}
|
||||
|
||||
func addIPRecords(ctx context.Context, logEntry *log.Entry, updaters map[string]updater.Updater, zones map[string]*types.Zone, recordType string, ip net.IP) error {
|
||||
|
||||
var (
|
||||
errorChannel = make(chan error, len(zones))
|
||||
wg = new(sync.WaitGroup)
|
||||
)
|
||||
|
||||
hostname, err := os.Hostname()
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to get host name from kernel: %w", err)
|
||||
}
|
||||
hostname = strings.ToLower(hostname)
|
||||
|
||||
if !verifyHostname(hostname) {
|
||||
return fmt.Errorf("host name not valid: %w", err)
|
||||
}
|
||||
|
||||
for zoneName := range zones {
|
||||
wg.Add(1)
|
||||
|
||||
go func(ctx context.Context, zoneName string, hostname string, recordType string, ip net.IP, wg *sync.WaitGroup) {
|
||||
|
||||
zoneLogger := logEntry.WithFields(log.Fields{
|
||||
"zone": zoneName,
|
||||
"hostname": hostname,
|
||||
})
|
||||
|
||||
defer wg.Done()
|
||||
|
||||
pruneRecordCtx, cancle := context.WithTimeout(ctx, time.Second*15)
|
||||
defer cancle()
|
||||
|
||||
fqdn := fmt.Sprintf("%v.%v", hostname, zoneName)
|
||||
|
||||
err := updaters[zoneName].AddRecord(pruneRecordCtx, fqdn, 60, recordType, ip.String())
|
||||
if err != nil {
|
||||
errorChannel <- fmt.Errorf("failed to remove record type %v for %v: %v", recordType, fqdn, err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
zoneLogger.Info("dns-record successfully updated")
|
||||
|
||||
}(ctx, zoneName, hostname, recordType, ip, wg)
|
||||
}
|
||||
|
||||
wg.Wait()
|
||||
close(errorChannel)
|
||||
|
||||
for err := range errorChannel {
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func pruneRecords(ctx context.Context, updaters map[string]updater.Updater, zones map[string]*types.Zone) error {
|
||||
|
||||
var (
|
||||
errorChannel = make(chan error, len(zones))
|
||||
wg = new(sync.WaitGroup)
|
||||
)
|
||||
|
||||
hostname, err := os.Hostname()
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to get host name from kernel: %w", err)
|
||||
}
|
||||
hostname = strings.ToLower(hostname)
|
||||
|
||||
if !verifyHostname(hostname) {
|
||||
return fmt.Errorf("host name not valid: %w", err)
|
||||
}
|
||||
|
||||
for zoneName := range zones {
|
||||
wg.Add(1)
|
||||
|
||||
go func(zoneName string, hostname string, errorChannel chan<- error, wg *sync.WaitGroup) {
|
||||
defer wg.Done()
|
||||
|
||||
pruneRecordCtx, cancle := context.WithTimeout(ctx, time.Second*15)
|
||||
defer cancle()
|
||||
|
||||
fqdn := fmt.Sprintf("%v.%v", hostname, zoneName)
|
||||
|
||||
err := updaters[zoneName].PruneRecords(pruneRecordCtx, fqdn)
|
||||
if err != nil {
|
||||
errorChannel <- fmt.Errorf("failed to prune %v: %v", fqdn, err)
|
||||
return
|
||||
}
|
||||
}(zoneName, hostname, errorChannel, wg)
|
||||
}
|
||||
|
||||
wg.Wait()
|
||||
close(errorChannel)
|
||||
|
||||
for err := range errorChannel {
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func removeIPRecords(ctx context.Context, logEntry *log.Entry, updaters map[string]updater.Updater, zones map[string]*types.Zone, recordType string, ip net.IP) error {
|
||||
|
||||
var (
|
||||
errorChannel = make(chan error, len(zones))
|
||||
wg = new(sync.WaitGroup)
|
||||
)
|
||||
|
||||
hostname, err := os.Hostname()
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to get host name from kernel: %w", err)
|
||||
}
|
||||
hostname = strings.ToLower(hostname)
|
||||
|
||||
if !verifyHostname(hostname) {
|
||||
return fmt.Errorf("host name not valid: %w", err)
|
||||
}
|
||||
|
||||
for zoneName := range zones {
|
||||
wg.Add(1)
|
||||
|
||||
go func(ctx context.Context, zoneName string, hostname string, recordType string, wg *sync.WaitGroup) {
|
||||
defer wg.Done()
|
||||
|
||||
zoneLogger := logEntry.WithFields(log.Fields{
|
||||
"zone": zoneName,
|
||||
"hostname": hostname,
|
||||
})
|
||||
|
||||
pruneRecordCtx, cancle := context.WithTimeout(ctx, time.Second*15)
|
||||
defer cancle()
|
||||
|
||||
fqdn := fmt.Sprintf("%v.%v", hostname, zoneName)
|
||||
|
||||
err := updaters[zoneName].DeleteRecord(pruneRecordCtx, fqdn, recordType)
|
||||
if err != nil {
|
||||
errorChannel <- fmt.Errorf("failed to remove record type %v for %v: %v", recordType, fqdn, err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
zoneLogger.Info("dns-record successfully removed")
|
||||
|
||||
}(ctx, zoneName, hostname, recordType, wg)
|
||||
}
|
||||
|
||||
wg.Wait()
|
||||
close(errorChannel)
|
||||
|
||||
for err := range errorChannel {
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// verifyHostname returns a boolean if the hostname id valid. The hostname does
|
||||
// not contains any dot or local, localhost, localdomain.
|
||||
func verifyHostname(hostname string) bool {
|
||||
|
||||
if !validHostname.MatchString(hostname) {
|
||||
return false
|
||||
}
|
||||
|
||||
hostnames := []string{
|
||||
"local",
|
||||
"localhost",
|
||||
"localdomain",
|
||||
"orbisos",
|
||||
}
|
||||
|
||||
for i := range hostnames {
|
||||
if hostnames[i] == hostname {
|
||||
return false
|
||||
}
|
||||
}
|
||||
|
||||
return true
|
||||
}
|
||||
|
||||
var (
|
||||
validHostname = regexp.MustCompile(`^[a-zA-Z0-9]+([\-][a-zA-Z0-9]+)*$`)
|
||||
)
|
42
pkg/types/config.go
Normal file
42
pkg/types/config.go
Normal file
@ -0,0 +1,42 @@
|
||||
package types
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
|
||||
"github.com/asaskevich/govalidator"
|
||||
)
|
||||
|
||||
type Config struct {
|
||||
Ifaces []string `json:"interfaces"`
|
||||
Zones map[string]*Zone `json:"zones"`
|
||||
TSIGKeys map[string]*TSIGKey `json:"tsig-keys"`
|
||||
}
|
||||
|
||||
func (c *Config) Validate() error {
|
||||
if len(c.Zones) <= 0 {
|
||||
return fmt.Errorf("no dns zones configured")
|
||||
}
|
||||
|
||||
if len(c.Ifaces) <= 0 {
|
||||
return fmt.Errorf("no interfaces configured")
|
||||
}
|
||||
|
||||
ZONE_LOOP:
|
||||
for _, zone := range c.Zones {
|
||||
if !govalidator.IsIP(zone.DNSServer) && !govalidator.IsDNSName(zone.DNSServer) {
|
||||
return fmt.Errorf("invalid dns server %v", zone.DNSServer)
|
||||
}
|
||||
|
||||
if !govalidator.IsDNSName(zone.Name) {
|
||||
return fmt.Errorf("invalid dns zone name %v", zone.Name)
|
||||
}
|
||||
|
||||
for _, tsigkey := range c.TSIGKeys {
|
||||
if tsigkey.Name == zone.TSIGKeyName {
|
||||
continue ZONE_LOOP
|
||||
}
|
||||
}
|
||||
return fmt.Errorf("no matching tsigkey found for zone %v", zone.Name)
|
||||
}
|
||||
return nil
|
||||
}
|
7
pkg/types/tsigkey.go
Normal file
7
pkg/types/tsigkey.go
Normal file
@ -0,0 +1,7 @@
|
||||
package types
|
||||
|
||||
type TSIGKey struct {
|
||||
Algorithm string `json:"algorithm"`
|
||||
Name string `json:"name"`
|
||||
Secret string `json:"secret"`
|
||||
}
|
7
pkg/types/zone.go
Normal file
7
pkg/types/zone.go
Normal file
@ -0,0 +1,7 @@
|
||||
package types
|
||||
|
||||
type Zone struct {
|
||||
DNSServer string `json:"dns-server"`
|
||||
Name string `json:"name"`
|
||||
TSIGKeyName string `json:"tsig-key"`
|
||||
}
|
72
pkg/updater/updater.go
Normal file
72
pkg/updater/updater.go
Normal file
@ -0,0 +1,72 @@
|
||||
package updater
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"bytes"
|
||||
"context"
|
||||
"fmt"
|
||||
"os/exec"
|
||||
"strings"
|
||||
|
||||
"git.cryptic.systems/volker.raschek/dyndns-client/pkg/types"
|
||||
)
|
||||
|
||||
type Updater interface {
|
||||
AddRecord(ctx context.Context, name string, ttl uint, recordType string, data string) error
|
||||
DeleteRecord(ctx context.Context, name string, recordType string) error
|
||||
PruneRecords(ctx context.Context, name string) error
|
||||
}
|
||||
|
||||
type NSUpdate struct {
|
||||
server string
|
||||
tsigKey *types.TSIGKey
|
||||
}
|
||||
|
||||
func (u *NSUpdate) AddRecord(ctx context.Context, name string, ttl uint, recordType string, data string) error {
|
||||
nsUpdateCmd := ""
|
||||
switch recordType {
|
||||
case "A", "AAAA":
|
||||
nsUpdateCmd = fmt.Sprintf("update add %v %v IN %v %v", name, ttl, recordType, data)
|
||||
case "TXT":
|
||||
nsUpdateCmd = fmt.Sprintf("update add %v %v IN %v \"%v\"", name, ttl, recordType, data)
|
||||
default:
|
||||
return fmt.Errorf("RecordType %v not supported", recordType)
|
||||
}
|
||||
|
||||
return u.execute(ctx, nsUpdateCmd)
|
||||
}
|
||||
|
||||
func (u *NSUpdate) DeleteRecord(ctx context.Context, name string, recordType string) error {
|
||||
nsUpdateCmd := fmt.Sprintf("update delete %v IN %v", name, recordType)
|
||||
return u.execute(ctx, nsUpdateCmd)
|
||||
}
|
||||
|
||||
func (u *NSUpdate) execute(ctx context.Context, nsUpdateCmd string) error {
|
||||
body := fmt.Sprintf("server %v\n%v\nsend\nquit", u.server, nsUpdateCmd)
|
||||
|
||||
errBuffer := new(bytes.Buffer)
|
||||
|
||||
cmd := exec.CommandContext(ctx, "nsupdate", "-y", fmt.Sprintf("%v:%v:%v", u.tsigKey.Algorithm, u.tsigKey.Name, u.tsigKey.Secret))
|
||||
// cmd.Stdout = os.Stdout
|
||||
cmd.Stderr = bufio.NewWriter(errBuffer)
|
||||
cmd.Stdin = strings.NewReader(body)
|
||||
|
||||
err := cmd.Run()
|
||||
if err != nil {
|
||||
return fmt.Errorf("nsupdate error %w: %v", err, errBuffer.String())
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (u *NSUpdate) PruneRecords(ctx context.Context, name string) error {
|
||||
nsUpdateCmd := fmt.Sprintf("update delete %v", name)
|
||||
return u.execute(ctx, nsUpdateCmd)
|
||||
}
|
||||
|
||||
func NewNSUpdate(server string, tsigKey *types.TSIGKey) (Updater, error) {
|
||||
return &NSUpdate{
|
||||
server: server,
|
||||
tsigKey: tsigKey,
|
||||
}, nil
|
||||
}
|
13
systemd/dyndns-client-docker.service
Normal file
13
systemd/dyndns-client-docker.service
Normal file
@ -0,0 +1,13 @@
|
||||
[Unit]
|
||||
Description=dyndns-client
|
||||
Requires=docker.service network-online.target time-sync.target
|
||||
After=docker.service network-online.target time-sync.target
|
||||
|
||||
[Service]
|
||||
Type=simple
|
||||
ExecStartPre=/usr/bin/docker pull docker.io/volkerraschek/dyndns-client:latest
|
||||
ExecStart=/usr/bin/docker run --name=dyndns-client --network=host --privileged --rm --volume /etc/dyndns-client:/etc/dyndns-client docker.io/volkerraschek/dyndns-client:latest
|
||||
ExecStop=/usr/bin/docker stop dyndns-client
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
13
systemd/dyndns-client.service
Normal file
13
systemd/dyndns-client.service
Normal file
@ -0,0 +1,13 @@
|
||||
[Unit]
|
||||
Description=dyndns-client
|
||||
Requires=network-online.target time-sync.target
|
||||
After=network-online.target time-sync.target
|
||||
|
||||
[Service]
|
||||
Type=simple
|
||||
Environment=DYNDNS_CLIENT_LOGGER_LEVEL=INFO
|
||||
ExecStart=/usr/bin/dyndns-client
|
||||
KillSignal=SIGTERM
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
Loading…
Reference in New Issue
Block a user