ad20bf90ff
* refactor: linting. - errcheck - govet - golint - goconst - spellcheck - ... * refactor: migrate from gometalinter to golangci-lint.
185 lines
5.2 KiB
Go
185 lines
5.2 KiB
Go
package fastdns
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"reflect"
|
|
"time"
|
|
|
|
configdns "github.com/akamai/AkamaiOPEN-edgegrid-golang/configdns-v1"
|
|
"github.com/akamai/AkamaiOPEN-edgegrid-golang/edgegrid"
|
|
"github.com/xenolf/lego/acme"
|
|
"github.com/xenolf/lego/platform/config/env"
|
|
)
|
|
|
|
// Config is used to configure the creation of the DNSProvider
|
|
type Config struct {
|
|
edgegrid.Config
|
|
PropagationTimeout time.Duration
|
|
PollingInterval time.Duration
|
|
TTL int
|
|
}
|
|
|
|
// NewDefaultConfig returns a default configuration for the DNSProvider
|
|
func NewDefaultConfig() *Config {
|
|
return &Config{
|
|
PropagationTimeout: env.GetOrDefaultSecond("AKAMAI_PROPAGATION_TIMEOUT", acme.DefaultPropagationTimeout),
|
|
PollingInterval: env.GetOrDefaultSecond("AKAMAI_POLLING_INTERVAL", acme.DefaultPollingInterval),
|
|
TTL: env.GetOrDefaultInt("AKAMAI_TTL", 120),
|
|
}
|
|
}
|
|
|
|
// DNSProvider is an implementation of the acme.ChallengeProvider interface.
|
|
type DNSProvider struct {
|
|
config *Config
|
|
}
|
|
|
|
// NewDNSProvider uses the supplied environment variables to return a DNSProvider instance:
|
|
// AKAMAI_HOST, AKAMAI_CLIENT_TOKEN, AKAMAI_CLIENT_SECRET, AKAMAI_ACCESS_TOKEN
|
|
func NewDNSProvider() (*DNSProvider, error) {
|
|
values, err := env.Get("AKAMAI_HOST", "AKAMAI_CLIENT_TOKEN", "AKAMAI_CLIENT_SECRET", "AKAMAI_ACCESS_TOKEN")
|
|
if err != nil {
|
|
return nil, fmt.Errorf("fastdns: %v", err)
|
|
}
|
|
|
|
config := NewDefaultConfig()
|
|
config.Config = edgegrid.Config{
|
|
Host: values["AKAMAI_HOST"],
|
|
ClientToken: values["AKAMAI_CLIENT_TOKEN"],
|
|
ClientSecret: values["AKAMAI_CLIENT_SECRET"],
|
|
AccessToken: values["AKAMAI_ACCESS_TOKEN"],
|
|
MaxBody: 131072,
|
|
}
|
|
|
|
return NewDNSProviderConfig(config)
|
|
}
|
|
|
|
// NewDNSProviderClient uses the supplied parameters
|
|
// to return a DNSProvider instance configured for FastDNS.
|
|
// Deprecated
|
|
func NewDNSProviderClient(host, clientToken, clientSecret, accessToken string) (*DNSProvider, error) {
|
|
config := NewDefaultConfig()
|
|
config.Config = edgegrid.Config{
|
|
Host: host,
|
|
ClientToken: clientToken,
|
|
ClientSecret: clientSecret,
|
|
AccessToken: accessToken,
|
|
MaxBody: 131072,
|
|
}
|
|
|
|
return NewDNSProviderConfig(config)
|
|
}
|
|
|
|
// NewDNSProviderConfig return a DNSProvider instance configured for FastDNS.
|
|
func NewDNSProviderConfig(config *Config) (*DNSProvider, error) {
|
|
if config == nil {
|
|
return nil, errors.New("fastdns: the configuration of the DNS provider is nil")
|
|
}
|
|
|
|
if config.ClientToken == "" || config.ClientSecret == "" || config.AccessToken == "" || config.Host == "" {
|
|
return nil, fmt.Errorf("FastDNS credentials are missing")
|
|
}
|
|
|
|
return &DNSProvider{config: config}, nil
|
|
}
|
|
|
|
// Present creates a TXT record to fullfil the dns-01 challenge.
|
|
func (d *DNSProvider) Present(domain, token, keyAuth string) error {
|
|
fqdn, value, _ := acme.DNS01Record(domain, keyAuth)
|
|
zoneName, recordName, err := d.findZoneAndRecordName(fqdn, domain)
|
|
if err != nil {
|
|
return fmt.Errorf("fastdns: %v", err)
|
|
}
|
|
|
|
configdns.Init(d.config.Config)
|
|
|
|
zone, err := configdns.GetZone(zoneName)
|
|
if err != nil {
|
|
return fmt.Errorf("fastdns: %v", err)
|
|
}
|
|
|
|
record := configdns.NewTxtRecord()
|
|
_ = record.SetField("name", recordName)
|
|
_ = record.SetField("ttl", d.config.TTL)
|
|
_ = record.SetField("target", value)
|
|
_ = record.SetField("active", true)
|
|
|
|
existingRecord := d.findExistingRecord(zone, recordName)
|
|
|
|
if existingRecord != nil {
|
|
if reflect.DeepEqual(existingRecord.ToMap(), record.ToMap()) {
|
|
return nil
|
|
}
|
|
err = zone.RemoveRecord(existingRecord)
|
|
if err != nil {
|
|
return fmt.Errorf("fastdns: %v", err)
|
|
}
|
|
}
|
|
|
|
return d.createRecord(zone, record)
|
|
}
|
|
|
|
// CleanUp removes the record matching the specified parameters.
|
|
func (d *DNSProvider) CleanUp(domain, token, keyAuth string) error {
|
|
fqdn, _, _ := acme.DNS01Record(domain, keyAuth)
|
|
zoneName, recordName, err := d.findZoneAndRecordName(fqdn, domain)
|
|
if err != nil {
|
|
return fmt.Errorf("fastdns: %v", err)
|
|
}
|
|
|
|
configdns.Init(d.config.Config)
|
|
|
|
zone, err := configdns.GetZone(zoneName)
|
|
if err != nil {
|
|
return fmt.Errorf("fastdns: %v", err)
|
|
}
|
|
|
|
existingRecord := d.findExistingRecord(zone, recordName)
|
|
|
|
if existingRecord != nil {
|
|
err := zone.RemoveRecord(existingRecord)
|
|
if err != nil {
|
|
return fmt.Errorf("fastdns: %v", err)
|
|
}
|
|
return zone.Save()
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Timeout returns the timeout and interval to use when checking for DNS propagation.
|
|
// Adjusting here to cope with spikes in propagation times.
|
|
func (d *DNSProvider) Timeout() (timeout, interval time.Duration) {
|
|
return d.config.PropagationTimeout, d.config.PollingInterval
|
|
}
|
|
|
|
func (d *DNSProvider) findZoneAndRecordName(fqdn, domain string) (string, string, error) {
|
|
zone, err := acme.FindZoneByFqdn(acme.ToFqdn(domain), acme.RecursiveNameservers)
|
|
if err != nil {
|
|
return "", "", err
|
|
}
|
|
zone = acme.UnFqdn(zone)
|
|
name := acme.UnFqdn(fqdn)
|
|
name = name[:len(name)-len("."+zone)]
|
|
|
|
return zone, name, nil
|
|
}
|
|
|
|
func (d *DNSProvider) findExistingRecord(zone *configdns.Zone, recordName string) *configdns.TxtRecord {
|
|
for _, r := range zone.Zone.Txt {
|
|
if r.Name == recordName {
|
|
return r
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (d *DNSProvider) createRecord(zone *configdns.Zone, record *configdns.TxtRecord) error {
|
|
err := zone.AddRecord(record)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return zone.Save()
|
|
}
|