forked from TrueCloudLab/lego
Add DNS provider for Checkdomain (#1017)
This commit is contained in:
parent
914d481a07
commit
cda5995ab4
10 changed files with 1050 additions and 14 deletions
|
@ -118,3 +118,6 @@
|
||||||
[[issues.exclude-rules]]
|
[[issues.exclude-rules]]
|
||||||
path = "cmd/zz_gen_cmd_dnshelp.go"
|
path = "cmd/zz_gen_cmd_dnshelp.go"
|
||||||
linters = ["gocyclo", "funlen"]
|
linters = ["gocyclo", "funlen"]
|
||||||
|
[[issues.exclude-rules]]
|
||||||
|
path = "providers/dns/checkdomain/client.go"
|
||||||
|
text = "`payed` is a misspelling of `paid`"
|
||||||
|
|
28
README.md
28
README.md
|
@ -45,17 +45,17 @@ Detailed documentation is available [here](https://go-acme.github.io/lego/dns).
|
||||||
|---------------------------------------------------------------------------------|---------------------------------------------------------------------------------|---------------------------------------------------------------------------------|---------------------------------------------------------------------------------|
|
|---------------------------------------------------------------------------------|---------------------------------------------------------------------------------|---------------------------------------------------------------------------------|---------------------------------------------------------------------------------|
|
||||||
| [Alibaba Cloud DNS](https://go-acme.github.io/lego/dns/alidns/) | [Amazon Lightsail](https://go-acme.github.io/lego/dns/lightsail/) | [Amazon Route 53](https://go-acme.github.io/lego/dns/route53/) | [Aurora DNS](https://go-acme.github.io/lego/dns/auroradns/) |
|
| [Alibaba Cloud DNS](https://go-acme.github.io/lego/dns/alidns/) | [Amazon Lightsail](https://go-acme.github.io/lego/dns/lightsail/) | [Amazon Route 53](https://go-acme.github.io/lego/dns/route53/) | [Aurora DNS](https://go-acme.github.io/lego/dns/auroradns/) |
|
||||||
| [Autodns](https://go-acme.github.io/lego/dns/autodns/) | [Azure](https://go-acme.github.io/lego/dns/azure/) | [Bindman](https://go-acme.github.io/lego/dns/bindman/) | [Bluecat](https://go-acme.github.io/lego/dns/bluecat/) |
|
| [Autodns](https://go-acme.github.io/lego/dns/autodns/) | [Azure](https://go-acme.github.io/lego/dns/azure/) | [Bindman](https://go-acme.github.io/lego/dns/bindman/) | [Bluecat](https://go-acme.github.io/lego/dns/bluecat/) |
|
||||||
| [Cloudflare](https://go-acme.github.io/lego/dns/cloudflare/) | [ClouDNS](https://go-acme.github.io/lego/dns/cloudns/) | [CloudXNS](https://go-acme.github.io/lego/dns/cloudxns/) | [ConoHa](https://go-acme.github.io/lego/dns/conoha/) |
|
| [Checkdomain](https://go-acme.github.io/lego/dns/checkdomain/) | [Cloudflare](https://go-acme.github.io/lego/dns/cloudflare/) | [ClouDNS](https://go-acme.github.io/lego/dns/cloudns/) | [CloudXNS](https://go-acme.github.io/lego/dns/cloudxns/) |
|
||||||
| [Designate DNSaaS for Openstack](https://go-acme.github.io/lego/dns/designate/) | [Digital Ocean](https://go-acme.github.io/lego/dns/digitalocean/) | [DNS Made Easy](https://go-acme.github.io/lego/dns/dnsmadeeasy/) | [DNSimple](https://go-acme.github.io/lego/dns/dnsimple/) |
|
| [ConoHa](https://go-acme.github.io/lego/dns/conoha/) | [Designate DNSaaS for Openstack](https://go-acme.github.io/lego/dns/designate/) | [Digital Ocean](https://go-acme.github.io/lego/dns/digitalocean/) | [DNS Made Easy](https://go-acme.github.io/lego/dns/dnsmadeeasy/) |
|
||||||
| [DNSPod](https://go-acme.github.io/lego/dns/dnspod/) | [Domain Offensive (do.de)](https://go-acme.github.io/lego/dns/dode/) | [DreamHost](https://go-acme.github.io/lego/dns/dreamhost/) | [Duck DNS](https://go-acme.github.io/lego/dns/duckdns/) |
|
| [DNSimple](https://go-acme.github.io/lego/dns/dnsimple/) | [DNSPod](https://go-acme.github.io/lego/dns/dnspod/) | [Domain Offensive (do.de)](https://go-acme.github.io/lego/dns/dode/) | [DreamHost](https://go-acme.github.io/lego/dns/dreamhost/) |
|
||||||
| [Dyn](https://go-acme.github.io/lego/dns/dyn/) | [EasyDNS](https://go-acme.github.io/lego/dns/easydns/) | [Exoscale](https://go-acme.github.io/lego/dns/exoscale/) | [External program](https://go-acme.github.io/lego/dns/exec/) |
|
| [Duck DNS](https://go-acme.github.io/lego/dns/duckdns/) | [Dyn](https://go-acme.github.io/lego/dns/dyn/) | [EasyDNS](https://go-acme.github.io/lego/dns/easydns/) | [Exoscale](https://go-acme.github.io/lego/dns/exoscale/) |
|
||||||
| [FastDNS](https://go-acme.github.io/lego/dns/fastdns/) | [Gandi Live DNS (v5)](https://go-acme.github.io/lego/dns/gandiv5/) | [Gandi](https://go-acme.github.io/lego/dns/gandi/) | [Glesys](https://go-acme.github.io/lego/dns/glesys/) |
|
| [External program](https://go-acme.github.io/lego/dns/exec/) | [FastDNS](https://go-acme.github.io/lego/dns/fastdns/) | [Gandi Live DNS (v5)](https://go-acme.github.io/lego/dns/gandiv5/) | [Gandi](https://go-acme.github.io/lego/dns/gandi/) |
|
||||||
| [Go Daddy](https://go-acme.github.io/lego/dns/godaddy/) | [Google Cloud](https://go-acme.github.io/lego/dns/gcloud/) | [Hosting.de](https://go-acme.github.io/lego/dns/hostingde/) | [HTTP request](https://go-acme.github.io/lego/dns/httpreq/) |
|
| [Glesys](https://go-acme.github.io/lego/dns/glesys/) | [Go Daddy](https://go-acme.github.io/lego/dns/godaddy/) | [Google Cloud](https://go-acme.github.io/lego/dns/gcloud/) | [Hosting.de](https://go-acme.github.io/lego/dns/hostingde/) |
|
||||||
| [Internet Initiative Japan](https://go-acme.github.io/lego/dns/iij/) | [INWX](https://go-acme.github.io/lego/dns/inwx/) | [Joker](https://go-acme.github.io/lego/dns/joker/) | [Joohoi's ACME-DNS](https://go-acme.github.io/lego/dns/acme-dns) |
|
| [HTTP request](https://go-acme.github.io/lego/dns/httpreq/) | [Internet Initiative Japan](https://go-acme.github.io/lego/dns/iij/) | [INWX](https://go-acme.github.io/lego/dns/inwx/) | [Joker](https://go-acme.github.io/lego/dns/joker/) |
|
||||||
| [Linode (deprecated)](https://go-acme.github.io/lego/dns/linode/) | [Linode (v4)](https://go-acme.github.io/lego/dns/linodev4/) | [Liquid Web](https://go-acme.github.io/lego/dns/liquidweb/) | [Manual](https://go-acme.github.io/lego/dns/manual/) |
|
| [Joohoi's ACME-DNS](https://go-acme.github.io/lego/dns/acme-dns) | [Linode (deprecated)](https://go-acme.github.io/lego/dns/linode/) | [Linode (v4)](https://go-acme.github.io/lego/dns/linodev4/) | [Liquid Web](https://go-acme.github.io/lego/dns/liquidweb/) |
|
||||||
| [MyDNS.jp](https://go-acme.github.io/lego/dns/mydnsjp/) | [Name.com](https://go-acme.github.io/lego/dns/namedotcom/) | [Namecheap](https://go-acme.github.io/lego/dns/namecheap/) | [Namesilo](https://go-acme.github.io/lego/dns/namesilo/) |
|
| [Manual](https://go-acme.github.io/lego/dns/manual/) | [MyDNS.jp](https://go-acme.github.io/lego/dns/mydnsjp/) | [Name.com](https://go-acme.github.io/lego/dns/namedotcom/) | [Namecheap](https://go-acme.github.io/lego/dns/namecheap/) |
|
||||||
| [Netcup](https://go-acme.github.io/lego/dns/netcup/) | [NIFCloud](https://go-acme.github.io/lego/dns/nifcloud/) | [NS1](https://go-acme.github.io/lego/dns/ns1/) | [Open Telekom Cloud](https://go-acme.github.io/lego/dns/otc/) |
|
| [Namesilo](https://go-acme.github.io/lego/dns/namesilo/) | [Netcup](https://go-acme.github.io/lego/dns/netcup/) | [NIFCloud](https://go-acme.github.io/lego/dns/nifcloud/) | [NS1](https://go-acme.github.io/lego/dns/ns1/) |
|
||||||
| [Oracle Cloud](https://go-acme.github.io/lego/dns/oraclecloud/) | [OVH](https://go-acme.github.io/lego/dns/ovh/) | [PowerDNS](https://go-acme.github.io/lego/dns/pdns/) | [Rackspace](https://go-acme.github.io/lego/dns/rackspace/) |
|
| [Open Telekom Cloud](https://go-acme.github.io/lego/dns/otc/) | [Oracle Cloud](https://go-acme.github.io/lego/dns/oraclecloud/) | [OVH](https://go-acme.github.io/lego/dns/ovh/) | [PowerDNS](https://go-acme.github.io/lego/dns/pdns/) |
|
||||||
| [RFC2136](https://go-acme.github.io/lego/dns/rfc2136/) | [Sakura Cloud](https://go-acme.github.io/lego/dns/sakuracloud/) | [Selectel](https://go-acme.github.io/lego/dns/selectel/) | [Stackpath](https://go-acme.github.io/lego/dns/stackpath/) |
|
| [Rackspace](https://go-acme.github.io/lego/dns/rackspace/) | [RFC2136](https://go-acme.github.io/lego/dns/rfc2136/) | [Sakura Cloud](https://go-acme.github.io/lego/dns/sakuracloud/) | [Selectel](https://go-acme.github.io/lego/dns/selectel/) |
|
||||||
| [TransIP](https://go-acme.github.io/lego/dns/transip/) | [VegaDNS](https://go-acme.github.io/lego/dns/vegadns/) | [Vscale](https://go-acme.github.io/lego/dns/vscale/) | [Versio](https://go-acme.github.io/lego/dns/versio/) |
|
| [Stackpath](https://go-acme.github.io/lego/dns/stackpath/) | [TransIP](https://go-acme.github.io/lego/dns/transip/) | [VegaDNS](https://go-acme.github.io/lego/dns/vegadns/) | [Vscale](https://go-acme.github.io/lego/dns/vscale/) |
|
||||||
| [Vultr](https://go-acme.github.io/lego/dns/vultr/) | [Zone.ee](https://go-acme.github.io/lego/dns/zoneee/)
|
| [Versio](https://go-acme.github.io/lego/dns/versio/) | [Vultr](https://go-acme.github.io/lego/dns/vultr/) | [Zone.ee](https://go-acme.github.io/lego/dns/zoneee/) | |
|
||||||
|
|
|
@ -21,6 +21,7 @@ func allDNSCodes() string {
|
||||||
"azure",
|
"azure",
|
||||||
"bindman",
|
"bindman",
|
||||||
"bluecat",
|
"bluecat",
|
||||||
|
"checkdomain",
|
||||||
"cloudflare",
|
"cloudflare",
|
||||||
"cloudns",
|
"cloudns",
|
||||||
"cloudxns",
|
"cloudxns",
|
||||||
|
@ -233,6 +234,27 @@ func displayDNSHelp(name string) error {
|
||||||
ew.writeln()
|
ew.writeln()
|
||||||
ew.writeln(`More information: https://go-acme.github.io/lego/dns/bluecat`)
|
ew.writeln(`More information: https://go-acme.github.io/lego/dns/bluecat`)
|
||||||
|
|
||||||
|
case "checkdomain":
|
||||||
|
// generated from: providers/dns/checkdomain/checkdomain.toml
|
||||||
|
ew.writeln(`Configuration for Checkdomain.`)
|
||||||
|
ew.writeln(`Code: 'checkdomain'`)
|
||||||
|
ew.writeln(`Since: 'v3.3.0'`)
|
||||||
|
ew.writeln()
|
||||||
|
|
||||||
|
ew.writeln(`Credentials:`)
|
||||||
|
ew.writeln(` - "CHECKDOMAIN_TOKEN": API token`)
|
||||||
|
ew.writeln()
|
||||||
|
|
||||||
|
ew.writeln(`Additional Configuration:`)
|
||||||
|
ew.writeln(` - "CHECKDOMAIN_ENDPOINT": API endpoint URL, defaults to https://api.checkdomain.de`)
|
||||||
|
ew.writeln(` - "CHECKDOMAIN_HTTP_TIMEOUT": API request timeout, defaults to 30 seconds`)
|
||||||
|
ew.writeln(` - "CHECKDOMAIN_POLLING_INTERVAL": Time between DNS propagation check`)
|
||||||
|
ew.writeln(` - "CHECKDOMAIN_PROPAGATION_TIMEOUT": Maximum waiting time for DNS propagation`)
|
||||||
|
ew.writeln(` - "CHECKDOMAIN_TTL": The TTL of the TXT record used for the DNS challenge`)
|
||||||
|
|
||||||
|
ew.writeln()
|
||||||
|
ew.writeln(`More information: https://go-acme.github.io/lego/dns/checkdomain`)
|
||||||
|
|
||||||
case "cloudflare":
|
case "cloudflare":
|
||||||
// generated from: providers/dns/cloudflare/cloudflare.toml
|
// generated from: providers/dns/cloudflare/cloudflare.toml
|
||||||
ew.writeln(`Configuration for Cloudflare.`)
|
ew.writeln(`Configuration for Cloudflare.`)
|
||||||
|
|
63
docs/content/dns/zz_gen_checkdomain.md
Normal file
63
docs/content/dns/zz_gen_checkdomain.md
Normal file
|
@ -0,0 +1,63 @@
|
||||||
|
---
|
||||||
|
title: "Checkdomain"
|
||||||
|
date: 2019-03-03T16:39:46+01:00
|
||||||
|
draft: false
|
||||||
|
slug: checkdomain
|
||||||
|
---
|
||||||
|
|
||||||
|
<!-- THIS DOCUMENTATION IS AUTO-GENERATED. PLEASE DO NOT EDIT. -->
|
||||||
|
<!-- providers/dns/checkdomain/checkdomain.toml -->
|
||||||
|
<!-- THIS DOCUMENTATION IS AUTO-GENERATED. PLEASE DO NOT EDIT. -->
|
||||||
|
|
||||||
|
Since: v3.3.0
|
||||||
|
|
||||||
|
Configuration for [Checkdomain](https://checkdomain.de/).
|
||||||
|
|
||||||
|
|
||||||
|
<!--more-->
|
||||||
|
|
||||||
|
- Code: `checkdomain`
|
||||||
|
|
||||||
|
Here is an example bash command using the Checkdomain provider:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
CHECKDOMAIN_TOKEN=yoursecrettoken \
|
||||||
|
lego --dns checkdomain --domains my.domain.com --email my@email.com run
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## Credentials
|
||||||
|
|
||||||
|
| Environment Variable Name | Description |
|
||||||
|
|-----------------------|-------------|
|
||||||
|
| `CHECKDOMAIN_TOKEN` | API token |
|
||||||
|
|
||||||
|
The environment variable names can be suffixed by `_FILE` to reference a file instead of a value.
|
||||||
|
More information [here](/lego/dns/#configuration-and-credentials).
|
||||||
|
|
||||||
|
|
||||||
|
## Additional Configuration
|
||||||
|
|
||||||
|
| Environment Variable Name | Description |
|
||||||
|
|--------------------------------|-------------|
|
||||||
|
| `CHECKDOMAIN_ENDPOINT` | API endpoint URL, defaults to https://api.checkdomain.de |
|
||||||
|
| `CHECKDOMAIN_HTTP_TIMEOUT` | API request timeout, defaults to 30 seconds |
|
||||||
|
| `CHECKDOMAIN_POLLING_INTERVAL` | Time between DNS propagation check |
|
||||||
|
| `CHECKDOMAIN_PROPAGATION_TIMEOUT` | Maximum waiting time for DNS propagation |
|
||||||
|
| `CHECKDOMAIN_TTL` | The TTL of the TXT record used for the DNS challenge |
|
||||||
|
|
||||||
|
The environment variable names can be suffixed by `_FILE` to reference a file instead of a value.
|
||||||
|
More information [here](/lego/dns/#configuration-and-credentials).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## More information
|
||||||
|
|
||||||
|
- [API documentation](https://developer.checkdomain.de/reference/)
|
||||||
|
|
||||||
|
<!-- THIS DOCUMENTATION IS AUTO-GENERATED. PLEASE DO NOT EDIT. -->
|
||||||
|
<!-- providers/dns/checkdomain/checkdomain.toml -->
|
||||||
|
<!-- THIS DOCUMENTATION IS AUTO-GENERATED. PLEASE DO NOT EDIT. -->
|
152
providers/dns/checkdomain/checkdomain.go
Normal file
152
providers/dns/checkdomain/checkdomain.go
Normal file
|
@ -0,0 +1,152 @@
|
||||||
|
package checkdomain
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/go-acme/lego/v3/challenge/dns01"
|
||||||
|
"github.com/go-acme/lego/v3/platform/config/env"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
envEndpoint = "CHECKDOMAIN_ENDPOINT"
|
||||||
|
envToken = "CHECKDOMAIN_TOKEN"
|
||||||
|
envTTL = "CHECKDOMAIN_TTL"
|
||||||
|
envHTTPTimeout = "CHECKDOMAIN_HTTP_TIMEOUT"
|
||||||
|
envPropagationTimeout = "CHECKDOMAIN_PROPAGATION_TIMEOUT"
|
||||||
|
envPollingInterval = "CHECKDOMAIN_POLLING_INTERVAL"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
defaultEndpoint = "https://api.checkdomain.de"
|
||||||
|
defaultTTL = 300
|
||||||
|
)
|
||||||
|
|
||||||
|
// Config is used to configure the creation of the DNSProvider
|
||||||
|
type Config struct {
|
||||||
|
Endpoint *url.URL
|
||||||
|
Token string
|
||||||
|
TTL int
|
||||||
|
PropagationTimeout time.Duration
|
||||||
|
PollingInterval time.Duration
|
||||||
|
HTTPClient *http.Client
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDefaultConfig returns a default configuration for the DNSProvider
|
||||||
|
func NewDefaultConfig() *Config {
|
||||||
|
return &Config{
|
||||||
|
TTL: env.GetOrDefaultInt(envTTL, defaultTTL),
|
||||||
|
PropagationTimeout: env.GetOrDefaultSecond(envPropagationTimeout, 5*time.Minute),
|
||||||
|
PollingInterval: env.GetOrDefaultSecond(envPollingInterval, 7*time.Second),
|
||||||
|
HTTPClient: &http.Client{
|
||||||
|
Timeout: env.GetOrDefaultSecond(envHTTPTimeout, 30*time.Second),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DNSProvider implements challenge.Provider for the checkdomain API
|
||||||
|
// specified at https://developer.checkdomain.de/reference/.
|
||||||
|
type DNSProvider struct {
|
||||||
|
config *Config
|
||||||
|
|
||||||
|
domainIDMu sync.Mutex
|
||||||
|
domainIDMapping map[string]int
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewDNSProvider() (*DNSProvider, error) {
|
||||||
|
values, err := env.Get(envToken)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("checkdomain: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
config := NewDefaultConfig()
|
||||||
|
config.Token = values[envToken]
|
||||||
|
|
||||||
|
endpoint, err := url.Parse(env.GetOrDefaultString(envEndpoint, defaultEndpoint))
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("checkdomain: invalid %s: %v", envEndpoint, err)
|
||||||
|
}
|
||||||
|
config.Endpoint = endpoint
|
||||||
|
|
||||||
|
return NewDNSProviderConfig(config)
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewDNSProviderConfig(config *Config) (*DNSProvider, error) {
|
||||||
|
if config.Endpoint == nil {
|
||||||
|
return nil, fmt.Errorf("checkdomain: invalid endpoint")
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.Token == "" {
|
||||||
|
return nil, fmt.Errorf("checkdomain: missing token")
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.HTTPClient == nil {
|
||||||
|
config.HTTPClient = http.DefaultClient
|
||||||
|
}
|
||||||
|
|
||||||
|
return &DNSProvider{
|
||||||
|
config: config,
|
||||||
|
domainIDMapping: make(map[string]int),
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Present creates a TXT record to fulfill the dns-01 challenge
|
||||||
|
func (p *DNSProvider) Present(domain, token, keyAuth string) error {
|
||||||
|
domainID, err := p.getDomainIDByName(domain)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("checkdomain: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = p.checkNameservers(domainID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("checkdomain: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
name, value := dns01.GetRecord(domain, keyAuth)
|
||||||
|
|
||||||
|
err = p.createRecord(domainID, &Record{
|
||||||
|
Name: name,
|
||||||
|
TTL: p.config.TTL,
|
||||||
|
Type: "TXT",
|
||||||
|
Value: value,
|
||||||
|
})
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("checkdomain: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// CleanUp removes the TXT record previously created
|
||||||
|
func (p *DNSProvider) CleanUp(domain, token, keyAuth string) error {
|
||||||
|
domainID, err := p.getDomainIDByName(domain)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("checkdomain: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = p.checkNameservers(domainID)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("checkdomain: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
name, value := dns01.GetRecord(domain, keyAuth)
|
||||||
|
|
||||||
|
err = p.deleteTXTRecord(domainID, name, value)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("checkdomain: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
p.domainIDMu.Lock()
|
||||||
|
delete(p.domainIDMapping, name)
|
||||||
|
p.domainIDMu.Unlock()
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *DNSProvider) Timeout() (timeout, interval time.Duration) {
|
||||||
|
return p.config.PropagationTimeout, p.config.PollingInterval
|
||||||
|
}
|
25
providers/dns/checkdomain/checkdomain.toml
Normal file
25
providers/dns/checkdomain/checkdomain.toml
Normal file
|
@ -0,0 +1,25 @@
|
||||||
|
Name = "Checkdomain"
|
||||||
|
Description = ''''''
|
||||||
|
URL = "https://checkdomain.de/"
|
||||||
|
Code = "checkdomain"
|
||||||
|
Since = "v3.3.0"
|
||||||
|
|
||||||
|
Example = '''
|
||||||
|
CHECKDOMAIN_TOKEN=yoursecrettoken \
|
||||||
|
lego --dns checkdomain --domains my.domain.com --email my@email.com run
|
||||||
|
'''
|
||||||
|
|
||||||
|
[Configuration]
|
||||||
|
[Configuration.Credentials]
|
||||||
|
CHECKDOMAIN_TOKEN = "API token"
|
||||||
|
[Configuration.Additional]
|
||||||
|
CHECKDOMAIN_ENDPOINT = "API endpoint URL, defaults to https://api.checkdomain.de"
|
||||||
|
CHECKDOMAIN_TTL = "The TTL of the TXT record used for the DNS challenge"
|
||||||
|
CHECKDOMAIN_POLLING_INTERVAL = "Time between DNS propagation check"
|
||||||
|
CHECKDOMAIN_PROPAGATION_TIMEOUT = "Maximum waiting time for DNS propagation"
|
||||||
|
CHECKDOMAIN_HTTP_TIMEOUT = "API request timeout, defaults to 30 seconds"
|
||||||
|
|
||||||
|
[Links]
|
||||||
|
API = "https://developer.checkdomain.de/reference/"
|
||||||
|
Guide = "https://developer.checkdomain.de/guide/"
|
||||||
|
Settings = "https://www.checkdomain.net/en/login/data/api/"
|
124
providers/dns/checkdomain/checkdomain_test.go
Normal file
124
providers/dns/checkdomain/checkdomain_test.go
Normal file
|
@ -0,0 +1,124 @@
|
||||||
|
package checkdomain
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/url"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/go-acme/lego/v3/platform/tester"
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
var envTest = tester.NewEnvTest(envEndpoint, envToken)
|
||||||
|
|
||||||
|
func TestNewDNSProvider(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
desc string
|
||||||
|
envVars map[string]string
|
||||||
|
expected string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
desc: "success",
|
||||||
|
envVars: map[string]string{
|
||||||
|
envToken: "dummy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "no token",
|
||||||
|
envVars: map[string]string{},
|
||||||
|
expected: "checkdomain: some credentials information are missing: CHECKDOMAIN_TOKEN",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "invalid endpoint",
|
||||||
|
envVars: map[string]string{
|
||||||
|
envToken: "dummy",
|
||||||
|
envEndpoint: ":",
|
||||||
|
},
|
||||||
|
expected: "checkdomain: invalid CHECKDOMAIN_ENDPOINT: parse :: missing protocol scheme",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range testCases {
|
||||||
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
|
defer envTest.RestoreEnv()
|
||||||
|
envTest.ClearEnv()
|
||||||
|
|
||||||
|
envTest.Apply(test.envVars)
|
||||||
|
|
||||||
|
p, err := NewDNSProvider()
|
||||||
|
|
||||||
|
if len(test.expected) == 0 {
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, p)
|
||||||
|
require.NotNil(t, p.config)
|
||||||
|
} else {
|
||||||
|
require.EqualError(t, err, test.expected)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestNewDNSProviderConfig(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
desc string
|
||||||
|
token string
|
||||||
|
expected string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
desc: "success",
|
||||||
|
token: "dummy",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "missing token",
|
||||||
|
token: "",
|
||||||
|
expected: "checkdomain: missing token",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range testCases {
|
||||||
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
|
config := NewDefaultConfig()
|
||||||
|
config.Endpoint, _ = url.Parse(defaultEndpoint)
|
||||||
|
|
||||||
|
if test.token != "" {
|
||||||
|
config.Token = test.token
|
||||||
|
}
|
||||||
|
|
||||||
|
p, err := NewDNSProviderConfig(config)
|
||||||
|
|
||||||
|
if len(test.expected) == 0 {
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, p)
|
||||||
|
require.NotNil(t, p.config)
|
||||||
|
} else {
|
||||||
|
require.EqualError(t, err, test.expected)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestLivePresent(t *testing.T) {
|
||||||
|
if !envTest.IsLiveTest() {
|
||||||
|
t.Skip("skipping live test")
|
||||||
|
}
|
||||||
|
|
||||||
|
envTest.RestoreEnv()
|
||||||
|
provider, err := NewDNSProvider()
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
err = provider.Present(envTest.GetDomain(), "", "123d==")
|
||||||
|
assert.NoError(t, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestLiveCleanUp(t *testing.T) {
|
||||||
|
if !envTest.IsLiveTest() {
|
||||||
|
t.Skip("skipping live test")
|
||||||
|
}
|
||||||
|
|
||||||
|
envTest.RestoreEnv()
|
||||||
|
provider, err := NewDNSProvider()
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
err = provider.CleanUp(envTest.GetDomain(), "", "123d==")
|
||||||
|
assert.NoError(t, err)
|
||||||
|
}
|
416
providers/dns/checkdomain/client.go
Normal file
416
providers/dns/checkdomain/client.go
Normal file
|
@ -0,0 +1,416 @@
|
||||||
|
package checkdomain
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"io/ioutil"
|
||||||
|
"net/http"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
ns1 = "ns.checkdomain.de"
|
||||||
|
ns2 = "ns2.checkdomain.de"
|
||||||
|
)
|
||||||
|
|
||||||
|
const domainNotFound = -1
|
||||||
|
|
||||||
|
// max page limit that the checkdomain api allows
|
||||||
|
const maxLimit = 100
|
||||||
|
|
||||||
|
// max integer value
|
||||||
|
const maxInt = int((^uint(0)) >> 1)
|
||||||
|
|
||||||
|
type (
|
||||||
|
// Some fields have been omitted from the structs
|
||||||
|
// because they are not required for this application.
|
||||||
|
|
||||||
|
DomainListingResponse struct {
|
||||||
|
Page int `json:"page"`
|
||||||
|
Limit int `json:"limit"`
|
||||||
|
Pages int `json:"pages"`
|
||||||
|
Total int `json:"total"`
|
||||||
|
Embedded EmbeddedDomainList `json:"_embedded"`
|
||||||
|
}
|
||||||
|
|
||||||
|
EmbeddedDomainList struct {
|
||||||
|
Domains []*Domain `json:"domains"`
|
||||||
|
}
|
||||||
|
|
||||||
|
Domain struct {
|
||||||
|
ID int `json:"id"`
|
||||||
|
Name string `json:"name"`
|
||||||
|
}
|
||||||
|
|
||||||
|
DomainResponse struct {
|
||||||
|
ID int `json:"id"`
|
||||||
|
Name string `json:"name"`
|
||||||
|
Created string `json:"created"`
|
||||||
|
PaidUp string `json:"payed_up"`
|
||||||
|
Active bool `json:"active"`
|
||||||
|
}
|
||||||
|
|
||||||
|
NameserverResponse struct {
|
||||||
|
General NameserverGeneral `json:"general"`
|
||||||
|
Nameservers []*Nameserver `json:"nameservers"`
|
||||||
|
SOA NameserverSOA `json:"soa"`
|
||||||
|
}
|
||||||
|
|
||||||
|
NameserverGeneral struct {
|
||||||
|
IPv4 string `json:"ip_v4"`
|
||||||
|
IPv6 string `json:"ip_v6"`
|
||||||
|
IncludeWWW bool `json:"include_www"`
|
||||||
|
}
|
||||||
|
|
||||||
|
NameserverSOA struct {
|
||||||
|
Mail string `json:"mail"`
|
||||||
|
Refresh int `json:"refresh"`
|
||||||
|
Retry int `json:"retry"`
|
||||||
|
Expiry int `json:"expiry"`
|
||||||
|
TTL int `json:"ttl"`
|
||||||
|
}
|
||||||
|
|
||||||
|
Nameserver struct {
|
||||||
|
Name string `json:"name"`
|
||||||
|
}
|
||||||
|
|
||||||
|
RecordListingResponse struct {
|
||||||
|
Page int `json:"page"`
|
||||||
|
Limit int `json:"limit"`
|
||||||
|
Pages int `json:"pages"`
|
||||||
|
Total int `json:"total"`
|
||||||
|
Embedded EmbeddedRecordList `json:"_embedded"`
|
||||||
|
}
|
||||||
|
|
||||||
|
EmbeddedRecordList struct {
|
||||||
|
Records []*Record `json:"records"`
|
||||||
|
}
|
||||||
|
|
||||||
|
Record struct {
|
||||||
|
Name string `json:"name"`
|
||||||
|
Value string `json:"value"`
|
||||||
|
TTL int `json:"ttl"`
|
||||||
|
Priority int `json:"priority"`
|
||||||
|
Type string `json:"type"`
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
func (p *DNSProvider) getDomainIDByName(name string) (int, error) {
|
||||||
|
// Load from cache if exists
|
||||||
|
p.domainIDMu.Lock()
|
||||||
|
id, ok := p.domainIDMapping[name]
|
||||||
|
p.domainIDMu.Unlock()
|
||||||
|
if ok {
|
||||||
|
return id, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Find out by querying API
|
||||||
|
domains, err := p.listDomains()
|
||||||
|
if err != nil {
|
||||||
|
return domainNotFound, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Linear search over all registered domains
|
||||||
|
for _, domain := range domains {
|
||||||
|
if domain.Name == name || strings.HasSuffix(name, "."+domain.Name) {
|
||||||
|
p.domainIDMu.Lock()
|
||||||
|
p.domainIDMapping[name] = domain.ID
|
||||||
|
p.domainIDMu.Unlock()
|
||||||
|
|
||||||
|
return domain.ID, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return domainNotFound, fmt.Errorf("domain not found")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *DNSProvider) listDomains() ([]*Domain, error) {
|
||||||
|
req, err := p.makeRequest(http.MethodGet, "/v1/domains", http.NoBody)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to make request: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Checkdomain also provides a query param 'query' which allows filtering domains for a string.
|
||||||
|
// But that functionality is kinda broken,
|
||||||
|
// so we scan through the whole list of registered domains to later find the one that is of interest to us.
|
||||||
|
q := req.URL.Query()
|
||||||
|
q.Set("limit", strconv.Itoa(maxLimit))
|
||||||
|
|
||||||
|
currentPage := 1
|
||||||
|
totalPages := maxInt
|
||||||
|
|
||||||
|
var domainList []*Domain
|
||||||
|
for currentPage <= totalPages {
|
||||||
|
q.Set("page", strconv.Itoa(currentPage))
|
||||||
|
req.URL.RawQuery = q.Encode()
|
||||||
|
|
||||||
|
var res DomainListingResponse
|
||||||
|
if err := p.sendRequest(req, &res); err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to send domain listing request: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// This is the first response,
|
||||||
|
// so we update totalPages and allocate the slice memory.
|
||||||
|
if totalPages == maxInt {
|
||||||
|
totalPages = res.Pages
|
||||||
|
domainList = make([]*Domain, 0, res.Total)
|
||||||
|
}
|
||||||
|
|
||||||
|
domainList = append(domainList, res.Embedded.Domains...)
|
||||||
|
currentPage++
|
||||||
|
}
|
||||||
|
|
||||||
|
return domainList, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *DNSProvider) getNameserverInfo(domainID int) (*NameserverResponse, error) {
|
||||||
|
req, err := p.makeRequest(http.MethodGet, fmt.Sprintf("/v1/domains/%d/nameservers", domainID), http.NoBody)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
res := &NameserverResponse{}
|
||||||
|
if err := p.sendRequest(req, res); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *DNSProvider) checkNameservers(domainID int) error {
|
||||||
|
info, err := p.getNameserverInfo(domainID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
var found1, found2 bool
|
||||||
|
for _, item := range info.Nameservers {
|
||||||
|
switch item.Name {
|
||||||
|
case ns1:
|
||||||
|
found1 = true
|
||||||
|
case ns2:
|
||||||
|
found2 = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if !found1 || !found2 {
|
||||||
|
return fmt.Errorf("not using checkdomain nameservers, can not update records")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *DNSProvider) createRecord(domainID int, record *Record) error {
|
||||||
|
bs, err := json.Marshal(record)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("encoding record failed: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
req, err := p.makeRequest(http.MethodPost, fmt.Sprintf("/v1/domains/%d/nameservers/records", domainID), bytes.NewReader(bs))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return p.sendRequest(req, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Checkdomain doesn't seem provide a way to delete records but one can replace all records at once.
|
||||||
|
// The current solution is to fetch all records and then use that list minus the record deleted as the new record list.
|
||||||
|
// TODO: Simplify this function once Checkdomain do provide the functionality.
|
||||||
|
func (p *DNSProvider) deleteTXTRecord(domainID int, recordName, recordValue string) error {
|
||||||
|
domainInfo, err := p.getDomainInfo(domainID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
nsInfo, err := p.getNameserverInfo(domainID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
allRecords, err := p.listRecords(domainID, "")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
recordName = strings.TrimSuffix(recordName, "."+domainInfo.Name+".")
|
||||||
|
|
||||||
|
var recordsToKeep []*Record
|
||||||
|
|
||||||
|
// Find and delete matching records
|
||||||
|
for _, record := range allRecords {
|
||||||
|
if skipRecord(recordName, recordValue, record, nsInfo) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// Checkdomain API can return records without any TTL set (indicated by the value of 0).
|
||||||
|
// The API Call to replace the records would fail if we wouldn't specify a value.
|
||||||
|
// Thus, we use the default TTL queried beforehand
|
||||||
|
if record.TTL == 0 {
|
||||||
|
record.TTL = nsInfo.SOA.TTL
|
||||||
|
}
|
||||||
|
|
||||||
|
recordsToKeep = append(recordsToKeep, record)
|
||||||
|
}
|
||||||
|
|
||||||
|
return p.replaceRecords(domainID, recordsToKeep)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *DNSProvider) getDomainInfo(domainID int) (*DomainResponse, error) {
|
||||||
|
req, err := p.makeRequest(http.MethodGet, fmt.Sprintf("/v1/domains/%d", domainID), http.NoBody)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
var res DomainResponse
|
||||||
|
err = p.sendRequest(req, &res)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &res, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *DNSProvider) listRecords(domainID int, recordType string) ([]*Record, error) {
|
||||||
|
req, err := p.makeRequest(http.MethodGet, fmt.Sprintf("/v1/domains/%d/nameservers/records", domainID), http.NoBody)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to make request: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
q := req.URL.Query()
|
||||||
|
q.Set("limit", strconv.Itoa(maxLimit))
|
||||||
|
if recordType != "" {
|
||||||
|
q.Set("type", recordType)
|
||||||
|
}
|
||||||
|
|
||||||
|
currentPage := 1
|
||||||
|
totalPages := maxInt
|
||||||
|
|
||||||
|
var recordList []*Record
|
||||||
|
for currentPage <= totalPages {
|
||||||
|
q.Set("page", strconv.Itoa(currentPage))
|
||||||
|
req.URL.RawQuery = q.Encode()
|
||||||
|
|
||||||
|
var res RecordListingResponse
|
||||||
|
if err := p.sendRequest(req, &res); err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to send record listing request: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// This is the first response, so we update totalPages and allocate the slice memory.
|
||||||
|
if totalPages == maxInt {
|
||||||
|
totalPages = res.Pages
|
||||||
|
recordList = make([]*Record, 0, res.Total)
|
||||||
|
}
|
||||||
|
|
||||||
|
recordList = append(recordList, res.Embedded.Records...)
|
||||||
|
currentPage++
|
||||||
|
}
|
||||||
|
|
||||||
|
return recordList, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *DNSProvider) replaceRecords(domainID int, records []*Record) error {
|
||||||
|
bs, err := json.Marshal(records)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("encoding record failed: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
req, err := p.makeRequest(http.MethodPut, fmt.Sprintf("/v1/domains/%d/nameservers/records", domainID), bytes.NewReader(bs))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return p.sendRequest(req, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
func skipRecord(recordName, recordValue string, record *Record, nsInfo *NameserverResponse) bool {
|
||||||
|
// Skip empty records
|
||||||
|
if record.Value == "" {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// Skip some special records, otherwise we would get a "Nameserver update failed"
|
||||||
|
if record.Type == "SOA" || record.Type == "NS" || record.Name == "@" || (nsInfo.General.IncludeWWW && record.Name == "www") {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
nameMatch := recordName == "" || record.Name == recordName
|
||||||
|
valueMatch := recordValue == "" || record.Value == recordValue
|
||||||
|
|
||||||
|
// Skip our matching record
|
||||||
|
if record.Type == "TXT" && nameMatch && valueMatch {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *DNSProvider) makeRequest(method, resource string, body io.Reader) (*http.Request, error) {
|
||||||
|
uri, err := p.config.Endpoint.Parse(resource)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
req, err := http.NewRequest(method, uri.String(), body)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
req.Header.Set("Accept", "application/json")
|
||||||
|
req.Header.Set("Authorization", "Bearer "+p.config.Token)
|
||||||
|
if method != http.MethodGet {
|
||||||
|
req.Header.Set("Content-Type", "application/json")
|
||||||
|
}
|
||||||
|
|
||||||
|
return req, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *DNSProvider) sendRequest(req *http.Request, result interface{}) error {
|
||||||
|
resp, err := p.config.HTTPClient.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = checkResponse(resp); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
defer func() { _ = resp.Body.Close() }()
|
||||||
|
|
||||||
|
if result == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
raw, err := ioutil.ReadAll(resp.Body)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
err = json.Unmarshal(raw, result)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unmarshaling %T error [status code=%d]: %v: %s", result, resp.StatusCode, err, string(raw))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func checkResponse(resp *http.Response) error {
|
||||||
|
if resp.StatusCode < http.StatusBadRequest {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if resp.Body == nil {
|
||||||
|
return fmt.Errorf("response body is nil, status code=%d", resp.StatusCode)
|
||||||
|
}
|
||||||
|
|
||||||
|
defer func() { _ = resp.Body.Close() }()
|
||||||
|
|
||||||
|
raw, err := ioutil.ReadAll(resp.Body)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to read body: status code=%d, error=%v", resp.StatusCode, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return fmt.Errorf("status code=%d: %s", resp.StatusCode, string(raw))
|
||||||
|
}
|
228
providers/dns/checkdomain/client_test.go
Normal file
228
providers/dns/checkdomain/client_test.go
Normal file
|
@ -0,0 +1,228 @@
|
||||||
|
package checkdomain
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"net/url"
|
||||||
|
"reflect"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/go-acme/lego/v3/challenge/dns01"
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func setupTestProvider(t *testing.T) (*DNSProvider, *http.ServeMux, func()) {
|
||||||
|
handler := http.NewServeMux()
|
||||||
|
svr := httptest.NewServer(handler)
|
||||||
|
|
||||||
|
config := NewDefaultConfig()
|
||||||
|
config.Endpoint, _ = url.Parse(svr.URL)
|
||||||
|
config.Token = "secret"
|
||||||
|
|
||||||
|
prd, err := NewDNSProviderConfig(config)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
return prd, handler, svr.Close
|
||||||
|
}
|
||||||
|
|
||||||
|
func Test_getDomainIDByName(t *testing.T) {
|
||||||
|
prd, handler, tearDown := setupTestProvider(t)
|
||||||
|
defer tearDown()
|
||||||
|
|
||||||
|
handler.HandleFunc("/v1/domains", func(rw http.ResponseWriter, req *http.Request) {
|
||||||
|
if req.Method != http.MethodGet {
|
||||||
|
http.Error(rw, "invalid method: "+req.Method, http.StatusBadRequest)
|
||||||
|
}
|
||||||
|
|
||||||
|
domainList := DomainListingResponse{
|
||||||
|
Embedded: EmbeddedDomainList{Domains: []*Domain{
|
||||||
|
{ID: 1, Name: "test.com"},
|
||||||
|
{ID: 2, Name: "test.org"},
|
||||||
|
}},
|
||||||
|
}
|
||||||
|
|
||||||
|
err := json.NewEncoder(rw).Encode(domainList)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
id, err := prd.getDomainIDByName("test.com")
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
assert.Equal(t, 1, id)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Test_checkNameservers(t *testing.T) {
|
||||||
|
prd, handler, tearDown := setupTestProvider(t)
|
||||||
|
defer tearDown()
|
||||||
|
|
||||||
|
handler.HandleFunc("/v1/domains/1/nameservers", func(rw http.ResponseWriter, req *http.Request) {
|
||||||
|
if req.Method != http.MethodGet {
|
||||||
|
http.Error(rw, "invalid method: "+req.Method, http.StatusBadRequest)
|
||||||
|
}
|
||||||
|
|
||||||
|
nsResp := NameserverResponse{
|
||||||
|
Nameservers: []*Nameserver{
|
||||||
|
{Name: ns1},
|
||||||
|
{Name: ns2},
|
||||||
|
// {Name: "ns.fake.de"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
err := json.NewEncoder(rw).Encode(nsResp)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
err := prd.checkNameservers(1)
|
||||||
|
require.NoError(t, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Test_createRecord(t *testing.T) {
|
||||||
|
prd, handler, tearDown := setupTestProvider(t)
|
||||||
|
defer tearDown()
|
||||||
|
|
||||||
|
handler.HandleFunc("/v1/domains/1/nameservers/records", func(rw http.ResponseWriter, req *http.Request) {
|
||||||
|
if req.Method != http.MethodPost {
|
||||||
|
http.Error(rw, "invalid method: "+req.Method, http.StatusBadRequest)
|
||||||
|
}
|
||||||
|
|
||||||
|
content, err := ioutil.ReadAll(req.Body)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(rw, err.Error(), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if string(content) != `{"name":"test.com","value":"value","ttl":300,"priority":0,"type":"TXT"}` {
|
||||||
|
http.Error(rw, "invalid request body: "+string(content), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
record := &Record{
|
||||||
|
Name: "test.com",
|
||||||
|
TTL: 300,
|
||||||
|
Type: "TXT",
|
||||||
|
Value: "value",
|
||||||
|
}
|
||||||
|
|
||||||
|
err := prd.createRecord(1, record)
|
||||||
|
require.NoError(t, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Test_deleteTXTRecord(t *testing.T) {
|
||||||
|
prd, handler, tearDown := setupTestProvider(t)
|
||||||
|
defer tearDown()
|
||||||
|
|
||||||
|
domainName := "lego.test"
|
||||||
|
recordValue := "test"
|
||||||
|
|
||||||
|
records := []*Record{
|
||||||
|
{
|
||||||
|
Name: "_acme-challenge",
|
||||||
|
Value: recordValue,
|
||||||
|
Type: "TXT",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Name: "_acme-challenge",
|
||||||
|
Value: recordValue,
|
||||||
|
Type: "A",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Name: "foobar",
|
||||||
|
Value: recordValue,
|
||||||
|
Type: "TXT",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
expectedRecords := []*Record{
|
||||||
|
{
|
||||||
|
Name: "_acme-challenge",
|
||||||
|
Value: recordValue,
|
||||||
|
Type: "A",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Name: "foobar",
|
||||||
|
Value: recordValue,
|
||||||
|
Type: "TXT",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
handler.HandleFunc("/v1/domains/1", func(rw http.ResponseWriter, req *http.Request) {
|
||||||
|
resp := DomainResponse{
|
||||||
|
ID: 1,
|
||||||
|
Name: domainName,
|
||||||
|
}
|
||||||
|
|
||||||
|
err := json.NewEncoder(rw).Encode(resp)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
handler.HandleFunc("/v1/domains/1/nameservers", func(rw http.ResponseWriter, req *http.Request) {
|
||||||
|
if req.Method != http.MethodGet {
|
||||||
|
http.Error(rw, "invalid method: "+req.Method, http.StatusBadRequest)
|
||||||
|
}
|
||||||
|
|
||||||
|
nsResp := NameserverResponse{
|
||||||
|
Nameservers: []*Nameserver{{Name: ns1}, {Name: ns2}},
|
||||||
|
}
|
||||||
|
|
||||||
|
err := json.NewEncoder(rw).Encode(nsResp)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
handler.HandleFunc("/v1/domains/1/nameservers/records", func(rw http.ResponseWriter, req *http.Request) {
|
||||||
|
switch req.Method {
|
||||||
|
case http.MethodGet:
|
||||||
|
resp := RecordListingResponse{
|
||||||
|
Embedded: EmbeddedRecordList{
|
||||||
|
Records: records,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
err := json.NewEncoder(rw).Encode(resp)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
case http.MethodPut:
|
||||||
|
var records []*Record
|
||||||
|
err := json.NewDecoder(req.Body).Decode(&records)
|
||||||
|
if err != nil {
|
||||||
|
http.Error(rw, err.Error(), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(records) == 0 {
|
||||||
|
http.Error(rw, "empty request body", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if !reflect.DeepEqual(expectedRecords, records) {
|
||||||
|
http.Error(rw, fmt.Sprintf("invalid records: %v", records), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
http.Error(rw, "invalid method: "+req.Method, http.StatusBadRequest)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
fqdn, _ := dns01.GetRecord(domainName, "abc")
|
||||||
|
err := prd.deleteTXTRecord(1, fqdn, recordValue)
|
||||||
|
require.NoError(t, err)
|
||||||
|
}
|
|
@ -12,6 +12,7 @@ import (
|
||||||
"github.com/go-acme/lego/v3/providers/dns/azure"
|
"github.com/go-acme/lego/v3/providers/dns/azure"
|
||||||
"github.com/go-acme/lego/v3/providers/dns/bindman"
|
"github.com/go-acme/lego/v3/providers/dns/bindman"
|
||||||
"github.com/go-acme/lego/v3/providers/dns/bluecat"
|
"github.com/go-acme/lego/v3/providers/dns/bluecat"
|
||||||
|
"github.com/go-acme/lego/v3/providers/dns/checkdomain"
|
||||||
"github.com/go-acme/lego/v3/providers/dns/cloudflare"
|
"github.com/go-acme/lego/v3/providers/dns/cloudflare"
|
||||||
"github.com/go-acme/lego/v3/providers/dns/cloudns"
|
"github.com/go-acme/lego/v3/providers/dns/cloudns"
|
||||||
"github.com/go-acme/lego/v3/providers/dns/cloudxns"
|
"github.com/go-acme/lego/v3/providers/dns/cloudxns"
|
||||||
|
@ -85,6 +86,8 @@ func NewDNSChallengeProviderByName(name string) (challenge.Provider, error) {
|
||||||
return bindman.NewDNSProvider()
|
return bindman.NewDNSProvider()
|
||||||
case "bluecat":
|
case "bluecat":
|
||||||
return bluecat.NewDNSProvider()
|
return bluecat.NewDNSProvider()
|
||||||
|
case "checkdomain":
|
||||||
|
return checkdomain.NewDNSProvider()
|
||||||
case "cloudflare":
|
case "cloudflare":
|
||||||
return cloudflare.NewDNSProvider()
|
return cloudflare.NewDNSProvider()
|
||||||
case "cloudns":
|
case "cloudns":
|
||||||
|
|
Loading…
Reference in a new issue