1: | <?php |
2: | declare(strict_types=1); |
3: | |
4: | |
5: | |
6: | |
7: | |
8: | |
9: | |
10: | |
11: | |
12: | |
13: | |
14: | |
15: | use Module\Support\Dns; |
16: | use Opcenter\Account\Ephemeral; |
17: | use Opcenter\Dns\Record; |
18: | use Opcenter\SiteConfiguration; |
19: | |
20: | |
21: | |
22: | |
23: | |
24: | |
25: | class Dns_Module extends Dns |
26: | { |
27: | const DEPENDENCY_MAP = [ |
28: | 'siteinfo' |
29: | ]; |
30: | |
31: | |
32: | |
33: | protected const HAS_ORIGIN_MARKER = false; |
34: | |
35: | |
36: | |
37: | protected const HAS_CONTIGUOUS_LIMIT = false; |
38: | |
39: | |
40: | const MASTER_NAMESERVER = DNS_INTERNAL_MASTER; |
41: | |
42: | |
43: | |
44: | const AUTHORITATIVE_NAMESERVERS = DNS_AUTHORITATIVE_NS; |
45: | |
46: | |
47: | |
48: | const RECURSIVE_NAMESERVERS = DNS_RECURSIVE_NS; |
49: | const UUID_RECORD = DNS_UUID_NAME; |
50: | |
51: | |
52: | const DYNDNS_TTL = 300; |
53: | |
54: | |
55: | const DNS_TTL_MIN = 5; |
56: | |
57: | |
58: | const DNS_TTL = DNS_DEFAULT_TTL; |
59: | |
60: | |
61: | const HOSTS_FILE = '/etc/hosts'; |
62: | |
63: | |
64: | const DIG_SHLOOKUP = ['dig', '+norec', '+time=3', '+tcp', '+short', '@%(nameserver)s', '%(hostname)s', '%(rr)s']; |
65: | |
66: | |
67: | public const SHOW_NS_APEX = true; |
68: | |
69: | |
70: | protected $zoneExistsCache = []; |
71: | |
72: | |
73: | |
74: | |
75: | protected static $dns_key = DNS_TSIG_KEY; |
76: | |
77: | protected static $rec_2_const = array( |
78: | 'ANY' => DNS_ANY, |
79: | 'A' => DNS_A, |
80: | 'AAAA' => DNS_AAAA, |
81: | 'MX' => DNS_MX, |
82: | 'NS' => DNS_NS, |
83: | 'SOA' => DNS_SOA, |
84: | 'TXT' => DNS_TXT, |
85: | 'CNAME' => DNS_CNAME, |
86: | 'SRV' => DNS_SRV, |
87: | 'PTR' => DNS_PTR, |
88: | 'HINFO' => DNS_HINFO, |
89: | 'A6' => DNS_A6, |
90: | 'NAPTR' => DNS_NAPTR, |
91: | 'CAA' => DNS_CAA, |
92: | 'TLSA' => 0, |
93: | 'DS' => 0, |
94: | 'RP' => 0, |
95: | 'SSHFP' => 0, |
96: | 'SPF' => 0, |
97: | 'URI' => 0, |
98: | 'CERT' => 0 |
99: | |
100: | ); |
101: | |
102: | protected static $nameservers; |
103: | |
104: | |
105: | |
106: | |
107: | |
108: | |
109: | |
110: | |
111: | |
112: | |
113: | |
114: | |
115: | |
116: | |
117: | |
118: | protected static $permitted_records = array( |
119: | 'A', |
120: | 'AAAA', |
121: | 'A6', |
122: | 'CAA', |
123: | 'CNAME', |
124: | 'DNAME', |
125: | 'HINFO', |
126: | 'MX', |
127: | 'NAPTR', |
128: | 'NS', |
129: | 'SOA', |
130: | 'SRV', |
131: | 'TXT', |
132: | ); |
133: | |
134: | protected $exportedFunctions = [ |
135: | '*' => PRIVILEGE_SITE, |
136: | 'get_public_ip' => PRIVILEGE_SITE | PRIVILEGE_USER, |
137: | 'get_public_ip6' => PRIVILEGE_SITE | PRIVILEGE_USER, |
138: | 'enabled' => PRIVILEGE_SITE | PRIVILEGE_USER, |
139: | 'configured' => PRIVILEGE_ALL, |
140: | 'get_whois_record' => PRIVILEGE_ALL, |
141: | 'get_records_by_rr' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
142: | 'get_records' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
143: | 'record_exists' => PRIVILEGE_ALL, |
144: | 'modify_record' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
145: | 'remove_record' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
146: | 'add_record' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
147: | 'empty_zone' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
148: | 'get_zone_information' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
149: | 'get_all_domains' => PRIVILEGE_ADMIN, |
150: | 'zones' => PRIVILEGE_ADMIN | PRIVILEGE_SITE, |
151: | 'get_parent_domain' => PRIVILEGE_ADMIN, |
152: | 'get_server_from_domain' => PRIVILEGE_ADMIN, |
153: | 'release_ip' => PRIVILEGE_ADMIN, |
154: | 'ip_allocated' => PRIVILEGE_ADMIN, |
155: | 'gethostbyaddr_t' => PRIVILEGE_ALL, |
156: | 'gethostbyname_t' => PRIVILEGE_ALL, |
157: | 'get_provider' => PRIVILEGE_ALL, |
158: | 'uuid' => PRIVILEGE_ALL, |
159: | 'get_default' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
160: | 'provisioning_records' => PRIVILEGE_SITE, |
161: | 'remove_zone' => PRIVILEGE_ADMIN, |
162: | 'remove_zone_backend' => PRIVILEGE_ADMIN | PRIVILEGE_SITE | PRIVILEGE_SERVER_EXEC, |
163: | 'add_zone' => PRIVILEGE_ADMIN, |
164: | 'add_zone_backend' => PRIVILEGE_ADMIN | PRIVILEGE_SITE | PRIVILEGE_SERVER_EXEC, |
165: | 'providers' => PRIVILEGE_ADMIN, |
166: | 'zone_exists' => PRIVILEGE_ADMIN | PRIVILEGE_SITE, |
167: | 'validate_template' => PRIVILEGE_ADMIN, |
168: | 'import_from_domain' => PRIVILEGE_ADMIN | PRIVILEGE_SITE, |
169: | 'export' => PRIVILEGE_ADMIN | PRIVILEGE_SITE, |
170: | 'import' => PRIVILEGE_ADMIN | PRIVILEGE_SITE, |
171: | 'auth_test' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
172: | 'raw' => PRIVILEGE_ADMIN |
173: | ]; |
174: | |
175: | |
176: | |
177: | |
178: | private array $ownershipCache = []; |
179: | |
180: | |
181: | |
182: | |
183: | |
184: | |
185: | public function _proxy(): \Module_Skeleton |
186: | { |
187: | $provider = $this->get_provider(); |
188: | |
189: | if ($provider === \Opcenter\Service\Contracts\DefaultNullable::NULLABLE_MARKER) { |
190: | |
191: | |
192: | |
193: | $provider = \Opcenter\Dns::default(); |
194: | } |
195: | |
196: | if ($provider === 'builtin') { |
197: | return $this; |
198: | } |
199: | |
200: | return \Module\Provider::get('dns', $provider, $this->getAuthContext()); |
201: | } |
202: | |
203: | |
204: | |
205: | |
206: | |
207: | |
208: | public function get_provider(): string |
209: | { |
210: | if ($this->permission_level & (PRIVILEGE_SITE|PRIVILEGE_USER)) { |
211: | if (!$this->enabled()) { |
212: | return 'null'; |
213: | } |
214: | return $this->getServiceValue('dns', 'provider', DNS_PROVIDER_DEFAULT); |
215: | } |
216: | return \Opcenter\Dns::default(); |
217: | } |
218: | |
219: | |
220: | |
221: | |
222: | |
223: | |
224: | public function providers(): array |
225: | { |
226: | return \Opcenter\Dns::providers(); |
227: | } |
228: | |
229: | |
230: | |
231: | |
232: | |
233: | |
234: | public function uuid_name(): string |
235: | { |
236: | return static::UUID_RECORD; |
237: | } |
238: | |
239: | |
240: | |
241: | |
242: | |
243: | |
244: | |
245: | |
246: | |
247: | |
248: | |
249: | |
250: | |
251: | |
252: | public function domain_expiration(string $domain): ?int |
253: | { |
254: | return null; |
255: | } |
256: | |
257: | |
258: | |
259: | |
260: | |
261: | |
262: | |
263: | |
264: | public function get_all_domains(): array |
265: | { |
266: | if (!Auth_Lookup::extendedAvailable()) { |
267: | return array_keys(\Opcenter\Map::load(\Opcenter\Map::DOMAIN_MAP)->fetchAll()); |
268: | } |
269: | |
270: | return \Auth_Lookup::all(); |
271: | } |
272: | |
273: | |
274: | |
275: | |
276: | |
277: | |
278: | public function zones(): array |
279: | { |
280: | if ($this->permission_level & PRIVILEGE_ADMIN) { |
281: | return $this->get_all_domains(); |
282: | } |
283: | |
284: | $domains = [ |
285: | -1 => $this->getServiceValue('siteinfo', 'domain') |
286: | ] + $this->aliases_list_aliases(); |
287: | |
288: | return array_values(array_filter($domains, function ($domain) { |
289: | return !$this->parented($domain); |
290: | })); |
291: | } |
292: | |
293: | |
294: | |
295: | |
296: | |
297: | |
298: | |
299: | |
300: | |
301: | public function get_server_from_domain(string $domain, bool $all = false, bool $extended = false) |
302: | { |
303: | if (!Auth_Lookup::extendedAvailable()) { |
304: | return SERVER_NAME_SHORT; |
305: | } |
306: | |
307: | $servers = Auth_Lookup::serverLocator($domain, $all); |
308: | |
309: | if (!$all && count($servers) > 1) { |
310: | warn("domain `%s' present on `%d' servers", |
311: | $domain, count($servers)); |
312: | } |
313: | |
314: | if ($all) { |
315: | return $extended ? $servers : array_column($servers, 'server'); |
316: | } |
317: | |
318: | return array_shift($servers); |
319: | |
320: | } |
321: | |
322: | |
323: | |
324: | |
325: | |
326: | |
327: | |
328: | |
329: | |
330: | |
331: | |
332: | public function get_parent_domain(string $domain) |
333: | { |
334: | if (false !== ($id = \Opcenter\Map::load(\Opcenter\Map::DOMAIN_MAP)->fetch($domain))) { |
335: | return \Auth::get_domain_from_site_id((int)substr($id, 4)); |
336: | } |
337: | |
338: | if (!Auth_Lookup::extendedAvailable()) { |
339: | return false; |
340: | } |
341: | |
342: | return \Auth_Lookup::parent($domain) ?? false; |
343: | } |
344: | |
345: | |
346: | |
347: | |
348: | |
349: | |
350: | |
351: | |
352: | public function get_whois_record(string $domain) |
353: | { |
354: | Error_Reporter::suppress_php_error('require_once'); |
355: | if (!preg_match(Regex::DOMAIN, $domain)) { |
356: | return error('%s: invalid domain', $domain); |
357: | } |
358: | if (!class_exists('Net_Whois', false) && |
359: | !include 'Net/Whois.php' |
360: | ) { |
361: | return error('Unable to include Whois module'); |
362: | } |
363: | |
364: | $whois = new Net_Whois(); |
365: | $data = $whois->query($domain); |
366: | if (PEAR::isError($data)) { |
367: | return error("Failed to lookup whois data: `%s'", $data->message); |
368: | } |
369: | |
370: | return $data; |
371: | } |
372: | |
373: | |
374: | |
375: | |
376: | |
377: | |
378: | |
379: | public function zone_exists(string $zone): bool |
380: | { |
381: | if (!$this->configured()) { |
382: | return false; |
383: | } |
384: | if (!$this->owned_zone($zone)) { |
385: | return false; |
386: | } |
387: | if (!isset($this->zoneExistsCache[$zone])) { |
388: | $resp = ($this->zoneAxfr($zone)); |
389: | $this->zoneExistsCache[$zone] = (null !== $resp); |
390: | } |
391: | return $this->zoneExistsCache[$zone]; |
392: | } |
393: | |
394: | |
395: | |
396: | |
397: | |
398: | |
399: | |
400: | |
401: | public function configured(): bool |
402: | { |
403: | return static::class !== self::class; |
404: | } |
405: | |
406: | |
407: | |
408: | |
409: | |
410: | |
411: | |
412: | |
413: | |
414: | public function enabled(): bool |
415: | { |
416: | return (bool)$this->getServiceValue('dns', 'enabled'); |
417: | } |
418: | |
419: | |
420: | |
421: | |
422: | |
423: | |
424: | |
425: | protected function owned_zone(string $zone): bool |
426: | { |
427: | if ($this->getAuthContext()->level & PRIVILEGE_ADMIN) { |
428: | return true; |
429: | } |
430: | |
431: | if (isset($this->ownershipCache[$zone])) { |
432: | return $this->ownershipCache[$zone]; |
433: | } |
434: | |
435: | if ($zone === $this->domain || $this->parented($zone) || |
436: | in_array($zone, $this->aliases_list_aliases(), true) || |
437: | $zone === array_get((array)$this->getOldServices('siteinfo'), 'domain', null)) |
438: | { |
439: | return $this->ownershipCache[$zone] = true; |
440: | } |
441: | |
442: | $res = \in_array($zone, array_get((array)$this->getOldServices('aliases'), 'aliases', []), true); |
443: | |
444: | return $res ? ($this->ownershipCache[$zone] = true) : false; |
445: | } |
446: | |
447: | |
448: | |
449: | |
450: | |
451: | |
452: | |
453: | protected function zoneAxfr(string $domain): ?string |
454: | { |
455: | if (!static::MASTER_NAMESERVER) { |
456: | error("Cannot fetch zone information for `%s': no master nameserver configured in config.ini", |
457: | $domain); |
458: | |
459: | return null; |
460: | } |
461: | $data = Util_Process::exec(['dig', '-t', 'AXFR', '-y', '%s', '@%s', '%s'], |
462: | $this->getTsigKey($domain), static::MASTER_NAMESERVER, $domain, [-1, 0]); |
463: | |
464: | |
465: | if (false !== strpos($data['output'], '; Transfer failed.')) { |
466: | return null; |
467: | } |
468: | |
469: | return $data['success'] ? $data['output'] : null; |
470: | } |
471: | |
472: | |
473: | |
474: | |
475: | |
476: | |
477: | |
478: | private function getTsigKey(string $domain): ?string |
479: | { |
480: | return static::$dns_key; |
481: | } |
482: | |
483: | |
484: | |
485: | |
486: | |
487: | |
488: | |
489: | public function export(string $zone = null) |
490: | { |
491: | if (null === $zone) { |
492: | $zone = $this->domain; |
493: | } |
494: | |
495: | if (!$this->permission_level & PRIVILEGE_ADMIN && !$this->owned_zone($zone)) { |
496: | return error("access denied - cannot view zone `%s'", $zone); |
497: | } |
498: | $recs = $this->get_zone_data($zone); |
499: | if (null === $recs) { |
500: | return error("failed to export zone `%s'", $zone); |
501: | } |
502: | if (!$recs) { |
503: | return ''; |
504: | } |
505: | $soa = $recs['SOA'][0]; |
506: | $soadata = preg_split('/\s+/', $soa['parameter']); |
507: | $format = ';; ' . "\n" . |
508: | ";; Domain:\t" . $zone . "\n" . |
509: | ";; Exported:\t" . date('r') . "\n" . |
510: | ';; ' . "\n" . |
511: | '$ORIGIN . ' . "\n" . |
512: | "@\t" . $soa['ttl'] . "\tIN\tSOA\t$zone.\t" . $soadata[1] . ' ( ' . "\n" . |
513: | "\t" . $soadata[2] . "\t; serial" . "\n" . |
514: | "\t" . $soadata[3] . "\t; refresh" . "\n" . |
515: | "\t" . $soadata[4] . "\t; retry" . "\n" . |
516: | "\t" . $soadata[5] . "\t; expire" . "\n" . |
517: | "\t" . $soadata[6] . ")\t; minimum" . "\n\n"; |
518: | $buffer = array(); |
519: | |
520: | if (empty($recs['NS'])) { |
521: | $recs['NS'] = array_build($this->get_hosting_nameservers($zone), function ($idx, $ns) { |
522: | return [$idx, [ |
523: | 'name' => '@', |
524: | 'ttl' => $this->get_default('ttl'), |
525: | 'parameter' => $ns |
526: | ]]; |
527: | }); |
528: | } |
529: | |
530: | $buffer[] = ';; NS Records (YOU MUST CHANGE THIS)'; |
531: | foreach ($recs['NS'] as $ns) { |
532: | $ns['parameter'] = 'YOU_MUST_CHANGE_THIS_VALUE'; |
533: | $buffer[] = $ns['name'] . "\t" . $ns['ttl'] . |
534: | "\t" . "IN NS\t" . $ns['parameter']; |
535: | } |
536: | $buffer[] = ''; |
537: | $ignore = array('SOA', 'NS', 'TSIG'); |
538: | foreach (static::$permitted_records as $rr) { |
539: | $rr = strtoupper($rr); |
540: | if (!isset($recs[$rr]) || in_array($rr, $ignore, true)) { |
541: | continue; |
542: | } |
543: | $buffer[] = ';; ' . $rr . ' Records'; |
544: | foreach ($recs[$rr] as $r) { |
545: | $buffer[] = $r['name'] . "\t" . $r['ttl'] . |
546: | "\t" . 'IN ' . $rr . "\t" . $r['parameter']; |
547: | } |
548: | $buffer[] = "\n"; |
549: | } |
550: | $format .= implode("\n", $buffer); |
551: | |
552: | return $format; |
553: | } |
554: | |
555: | |
556: | |
557: | |
558: | |
559: | |
560: | |
561: | protected function get_zone_data(string $domain): ?array |
562: | { |
563: | if (!$this->owned_zone($domain)) { |
564: | return nerror("Domain `%s' not owned by account", $domain); |
565: | } |
566: | |
567: | if ($this->parented($domain)) { |
568: | return nerror("Domain `%s' is parented", $domain); |
569: | } |
570: | |
571: | if (null === ($data = $this->zoneAxfr($domain))) { |
572: | return nerror('Non-authoritative for zone %s', $domain); |
573: | } |
574: | |
575: | $zoneData = array(); |
576: | $offset = strlen($domain) + 1; |
577: | $regexp = \Regex::compile(\Regex::DNS_AXFR_REC, |
578: | ['rr' => implode('|', static::$permitted_records + [99999 => 'SOA'])]); |
579: | |
580: | foreach (explode("\n", $data) as $line) { |
581: | if (false !== strpos($line, 'Transfer failed.')) { |
582: | return null; |
583: | } |
584: | if (!preg_match($regexp, $line, $match)) { |
585: | continue; |
586: | } |
587: | [$name, $ttl, $class, $rr, $parameter] = array_slice($match, 1); |
588: | $rr = strtoupper($rr); |
589: | |
590: | |
591: | |
592: | if ($rr == 'TXT' && $parameter[0] == '"') { |
593: | $end = strlen($parameter) - 1; |
594: | if (strpos($parameter, '"', 1) === $end && strpos($parameter, '"', 1) === $end) { |
595: | |
596: | |
597: | $parameter = substr($parameter, 1, -1); |
598: | } |
599: | } |
600: | $zoneData[$rr][] = array( |
601: | 'name' => $name, |
602: | 'subdomain' => rtrim(substr($name, 0, strlen($name) - $offset), '.'), |
603: | 'domain' => $domain, |
604: | 'class' => $class, |
605: | 'ttl' => (int)$ttl, |
606: | 'parameter' => $parameter, |
607: | 'rr' => $rr |
608: | ); |
609: | } |
610: | |
611: | return $zoneData; |
612: | } |
613: | |
614: | |
615: | |
616: | |
617: | |
618: | |
619: | public function permitted_records(): array |
620: | { |
621: | return static::$permitted_records; |
622: | } |
623: | |
624: | |
625: | |
626: | |
627: | |
628: | |
629: | |
630: | |
631: | |
632: | |
633: | |
634: | |
635: | public function get_records_external( |
636: | string $subdomain = '', |
637: | string $rr = 'any', |
638: | string $domain = null, |
639: | array $nameservers = null |
640: | ) { |
641: | if (!$domain) { |
642: | $domain = $this->domain; |
643: | } |
644: | $host = $domain; |
645: | if ($subdomain) { |
646: | $host = $subdomain . '.' . $host; |
647: | } |
648: | $rr = strtoupper($rr); |
649: | if (null === self::record2const($rr)) { |
650: | return error("unknown rr record type `%s'", $rr); |
651: | } |
652: | if (!$nameservers) { |
653: | $nameservers = static::RECURSIVE_NAMESERVERS; |
654: | } |
655: | $resolvers = []; |
656: | foreach ($nameservers as $ns) { |
657: | if (strspn($ns, '1234567890.') === \strlen($ns)) { |
658: | $resolvers[] = $ns; |
659: | } else if ($ip = Net_Gethost::gethostbyname_t($ns)) { |
660: | $resolvers[] = $ip; |
661: | } |
662: | } |
663: | |
664: | if (!$resolvers) { |
665: | return error("No resolvers could be found"); |
666: | } |
667: | |
668: | $resolver = new Net_DNS2_Resolver([ |
669: | 'nameservers' => $resolvers, |
670: | 'ns_random' => true |
671: | ]); |
672: | |
673: | for ($i = 0; $i < 5; $i++) { |
674: | |
675: | $recraw = Error_Reporter::silence(static function () use ($host, $rr, $resolver) { |
676: | try { |
677: | return $resolver->query($host, $rr); |
678: | } catch (Net_DNS2_Exception $e) { |
679: | return false; |
680: | } |
681: | }); |
682: | if (!empty($recraw->answer)) { |
683: | break; |
684: | } |
685: | usleep(50000); |
686: | } |
687: | if (empty($recraw->answer)) { |
688: | $host = ltrim(implode('.', array($subdomain, $domain)), '.'); |
689: | warn("failed to get external raw records for `%s' on `%s'", $rr, $host); |
690: | |
691: | return []; |
692: | } |
693: | |
694: | $records = array(); |
695: | foreach ($recraw->answer as $r) { |
696: | $target = null; |
697: | |
698: | |
699: | if (isset($r->target)) { |
700: | $target = $r->target; |
701: | } |
702: | |
703: | if (isset($r->ip)) { |
704: | $target = $r->ip; |
705: | } else if (isset($r->address)) { |
706: | $target = $r->address; |
707: | } |
708: | |
709: | if (isset($r->weight)) { |
710: | |
711: | |
712: | $target = $r->weight . ' ' . $target . |
713: | $r->port; |
714: | } |
715: | |
716: | if (isset($r->pri)) { |
717: | $target = $r->pri . ' ' . $target; |
718: | } |
719: | |
720: | if (isset($r->txt)) { |
721: | $target = $r->txt; |
722: | } |
723: | |
724: | if (isset($r->cpu)) { |
725: | $target = $r->cpu . ' ' . $r->os; |
726: | } |
727: | |
728: | if (isset($r->mname)) { |
729: | $target = $r->mname . ' ' . $r->rname . ' ' . |
730: | $r->serial . ' ' . $r->refresh . ' ' . |
731: | $r->retry . ' ' . $r->expire . ' ' . |
732: | $r->minimum; |
733: | } |
734: | |
735: | if (isset($r->ipv6)) { |
736: | $target = $r->ipv6; |
737: | } |
738: | |
739: | if (isset($r->masklen)) { |
740: | $target = $r->masklen . ' ' . $target . ' ' . |
741: | $r->chain; |
742: | } |
743: | |
744: | if (isset($r->order)) { |
745: | $target = $r->order . ' ' . $r->pref . ' ' . |
746: | $r->flags . ' ' . $r->services . ' ' . |
747: | $r->regex . ' ' . $r->replacement; |
748: | } |
749: | $records[] = array( |
750: | 'name' => $host, |
751: | 'subdomain' => $subdomain, |
752: | 'domain' => $domain, |
753: | 'class' => 'IN', |
754: | 'type' => $rr, |
755: | 'ttl' => $r->ttl, |
756: | 'parameter' => $target |
757: | ); |
758: | } |
759: | |
760: | return $records; |
761: | } |
762: | |
763: | |
764: | |
765: | |
766: | |
767: | |
768: | |
769: | |
770: | |
771: | public static function record2const(string $rr): ?int |
772: | { |
773: | $rr = strtoupper($rr); |
774: | |
775: | return static::$rec_2_const[$rr] ?? null; |
776: | } |
777: | |
778: | |
779: | |
780: | |
781: | |
782: | |
783: | |
784: | |
785: | public function gethostbyaddr_t(string $ip, int $timeout = DNS_LOOKUP_TIMEOUT) |
786: | { |
787: | return Net_Gethost::gethostbyaddr_t($ip, $timeout); |
788: | } |
789: | |
790: | |
791: | |
792: | |
793: | |
794: | |
795: | |
796: | |
797: | public function gethostbyname_t(string $name, int $timeout = DNS_LOOKUP_TIMEOUT) |
798: | { |
799: | return Net_Gethost::gethostbyname_t($name, $timeout); |
800: | } |
801: | |
802: | |
803: | |
804: | |
805: | |
806: | |
807: | |
808: | |
809: | |
810: | |
811: | |
812: | public function domain_hosted(string $domain, bool $ignore_on_account = false): bool |
813: | { |
814: | $domain = strtolower($domain); |
815: | if (str_starts_with($domain, "www.")) { |
816: | $domain = substr($domain, 4); |
817: | } |
818: | |
819: | $site_id = \Auth::get_site_id_from_domain($domain); |
820: | |
821: | if ($ignore_on_account && $site_id) { |
822: | return $site_id !== $this->site_id; |
823: | } |
824: | |
825: | |
826: | if ($ignore_on_account && $this->domain_on_account($domain)) { |
827: | return false; |
828: | } |
829: | |
830: | $server = $this->get_server_from_domain($domain); |
831: | return $server && $server !== SERVER_NAME_SHORT; |
832: | } |
833: | |
834: | |
835: | |
836: | |
837: | |
838: | |
839: | |
840: | |
841: | |
842: | |
843: | |
844: | |
845: | |
846: | public function domain_on_account(string $domain): bool |
847: | { |
848: | if (!Auth_Lookup::extendedAvailable()) { |
849: | return false; |
850: | } |
851: | |
852: | if (str_starts_with($domain, 'www.')) { |
853: | $domain = substr($domain, 4); |
854: | } |
855: | |
856: | $servers = \Auth_Lookup::serverLocator($domain); |
857: | |
858: | |
859: | foreach ($servers as $s) { |
860: | if ($s['invoice'] !== $this->billing_get_invoice()) |
861: | { |
862: | return false; |
863: | } |
864: | } |
865: | |
866: | return (bool)$servers; |
867: | } |
868: | |
869: | |
870: | |
871: | |
872: | |
873: | |
874: | |
875: | |
876: | |
877: | |
878: | |
879: | |
880: | |
881: | |
882: | |
883: | |
884: | |
885: | public function get_pending_expirations(int $days = 30, bool $showExpired = true): array |
886: | { |
887: | return []; |
888: | } |
889: | |
890: | |
891: | |
892: | |
893: | |
894: | |
895: | |
896: | |
897: | public function check_zone(string $zone, array $recs = []): bool |
898: | { |
899: | if (!file_exists('/usr/sbin/named-checkzone')) { |
900: | return warn('bind package is not installed - cannot check zone'); |
901: | } |
902: | $tmpfile = tempnam('/tmp', 'f'); |
903: | if (null === ($axfr = $this->zoneAxfr($zone))) { |
904: | return error("Failed to transfer zone `%s' - cannot check", $zone); |
905: | } |
906: | |
907: | if ($recs) { |
908: | $axfr .= "\n" . implode("\n", array_filter(array_map(static function ($r) { |
909: | if (!$r instanceof \Opcenter\Dns\Record) { |
910: | return $r[0] . ' ' . $r[1] . ' ' . $r[2] . ' ' . $r[3]; |
911: | } |
912: | return (string)$r; |
913: | }, $recs))); |
914: | |
915: | } |
916: | file_put_contents($tmpfile, $axfr); |
917: | $status = Util_Process_Safe::exec('/usr/sbin/named-checkzone %s %s', [$zone, $tmpfile]); |
918: | unlink($tmpfile); |
919: | |
920: | return $status['success']; |
921: | } |
922: | |
923: | |
924: | |
925: | |
926: | |
927: | |
928: | |
929: | |
930: | public function update(string $hostname, string $ip = null) |
931: | { |
932: | $chunk = $this->web_split_host($hostname); |
933: | $domain = $chunk['domain']; |
934: | $subdomain = $chunk['subdomain']; |
935: | if (!$this->owned_zone($domain)) { |
936: | return error("restricted zone `%s' specified", $domain); |
937: | } |
938: | if (!$ip) { |
939: | $ip = Auth::client_ip(); |
940: | } |
941: | if (false === ip2long($ip)) { |
942: | return error('cannot detect ip!'); |
943: | } |
944: | $record = $this->get_records($subdomain, 'A', $domain); |
945: | if (count($record) > 1) { |
946: | warn("%d records found for `%s'", count($record), $hostname); |
947: | } |
948: | if (!$record) { |
949: | |
950: | warn("no DNS record exists, setting new record for `%s'", $hostname); |
951: | $add = $this->add_record($domain, $subdomain, 'A', $ip, static::DYNDNS_TTL); |
952: | if (!$add) { |
953: | return $add; |
954: | } |
955: | |
956: | return $ip; |
957: | } |
958: | |
959: | $newparams = array('ttl' => static::DYNDNS_TTL, 'parameter' => $ip); |
960: | $ret = true; |
961: | foreach ($record as $r) { |
962: | if (!$this->modify_record($domain, $subdomain, $r['rr'], $r['parameter'], $newparams)) { |
963: | $ret = false; |
964: | error("record modification failed for `%s'", $hostname); |
965: | } |
966: | } |
967: | |
968: | return $ret ? $ip : $ret; |
969: | } |
970: | |
971: | |
972: | |
973: | |
974: | |
975: | |
976: | |
977: | |
978: | |
979: | public function get_records(?string $subdomain = '', string $rr = 'any', string $domain = null) |
980: | { |
981: | if (!$domain) { |
982: | $domain = $this->domain; |
983: | } |
984: | if (!$this->owned_zone($domain)) { |
985: | return error('cannot view DNS information for unaffiliated domain `' . $domain . "'"); |
986: | } |
987: | if (null === $subdomain) { |
988: | $records = $this->get_zone_information($domain); |
989: | $rr = strtoupper($rr); |
990: | if ($rr === 'ANY' || !$records) { |
991: | return is_array($records) ? $records : false; |
992: | } |
993: | |
994: | return $records[$rr] ?? []; |
995: | } |
996: | if (false === ($recs = $this->get_records_raw($subdomain, $rr, $domain))) { |
997: | |
998: | return $recs; |
999: | } |
1000: | |
1001: | return (array)$recs; |
1002: | } |
1003: | |
1004: | |
1005: | |
1006: | |
1007: | |
1008: | |
1009: | |
1010: | |
1011: | |
1012: | protected function get_records_raw(string $subdomain = '', string $rr = 'ANY', string $domain = null) |
1013: | { |
1014: | if ($subdomain == '@') { |
1015: | $subdomain = ''; |
1016: | warn("record `@' alias for domain - record stripped"); |
1017: | } |
1018: | $rr = strtoupper($rr); |
1019: | if ($rr !== 'ANY' && !in_array($rr, static::$permitted_records, true)) { |
1020: | return error('%s: invalid resource record type', $rr); |
1021: | } |
1022: | $rr = strtoupper($rr); |
1023: | $recs = $this->get_zone_data($domain); |
1024: | |
1025: | if (null === $recs) { |
1026: | return false; |
1027: | } |
1028: | $domain .= '.'; |
1029: | if ($subdomain !== '') { |
1030: | $domain = $subdomain . '.' . $domain; |
1031: | } |
1032: | |
1033: | $newrecs = []; |
1034: | $keys = [$rr]; |
1035: | if ($rr === 'ANY') { |
1036: | $keys = array_keys($recs); |
1037: | } else if (!isset($recs[$rr])) { |
1038: | return $newrecs; |
1039: | } |
1040: | foreach ($keys as $tmp) { |
1041: | foreach ($recs[$tmp] as $rec) { |
1042: | $rec['rr'] = $tmp; |
1043: | if ($rec['name'] === $domain) { |
1044: | $newrecs[] = $rec; |
1045: | } |
1046: | } |
1047: | } |
1048: | |
1049: | return $newrecs; |
1050: | } |
1051: | |
1052: | |
1053: | |
1054: | |
1055: | |
1056: | |
1057: | |
1058: | |
1059: | |
1060: | |
1061: | |
1062: | |
1063: | public function add_record( |
1064: | string $zone, |
1065: | string $subdomain, |
1066: | string $rr, |
1067: | string $param, |
1068: | int $ttl = self::DNS_TTL |
1069: | ): bool { |
1070: | if (!$this->owned_zone($zone)) { |
1071: | return error('%s not owned by account', $zone); |
1072: | } |
1073: | if (!$this->canonicalizeRecord($zone, $subdomain, $rr, $param, $ttl)) { |
1074: | return false; |
1075: | } |
1076: | |
1077: | |
1078: | |
1079: | |
1080: | return true; |
1081: | } |
1082: | |
1083: | |
1084: | |
1085: | |
1086: | |
1087: | |
1088: | |
1089: | |
1090: | |
1091: | |
1092: | |
1093: | |
1094: | |
1095: | |
1096: | public function add_record_conditionally( |
1097: | string $zone, |
1098: | string $subdomain, |
1099: | string $rr, |
1100: | string $param, |
1101: | int $ttl = self::DNS_TTL |
1102: | ): bool |
1103: | { |
1104: | if (!$this->owned_zone($zone)) { |
1105: | return error('%s not owned by account', $zone); |
1106: | } |
1107: | if (!$this->configured()) { |
1108: | return info('DNS not configured for account - cannot add record'); |
1109: | } |
1110: | if (!$this->zone_exists($zone)) { |
1111: | return warn("DNS zone `%s' does not exist, skipping", $zone); |
1112: | } |
1113: | if (!$this->canonicalizeRecord($zone, $subdomain, $rr, $param, $ttl)) { |
1114: | return false; |
1115: | } |
1116: | if ($this->record_exists($zone, $subdomain, $rr)) { |
1117: | return info('Record %s%s already exists - not overwriting', ltrim($subdomain . '.', '.'), $zone); |
1118: | } |
1119: | if ($rr === 'CNAME' && $this->record_exists($zone, $subdomain, 'ANY')) { |
1120: | return info('Record %s%s already has existing record - not adding CNAME', ltrim($subdomain . '.', '.'), $zone); |
1121: | } |
1122: | if (($rr === 'A' || $rr === 'AAAA') && $this->record_exists($zone, $subdomain, 'CNAME')) { |
1123: | return info('Record %(subdomain)s%(domain)s already exists as CNAME - not adding %(rr)s', |
1124: | [ |
1125: | 'subdomain' => ltrim($subdomain . '.', '.'), |
1126: | 'domain' => $zone, |
1127: | 'rr' => $rr |
1128: | ] |
1129: | ); |
1130: | } |
1131: | if (!$this->add_record($zone, $subdomain, $rr, $param)) { |
1132: | return error('%s%s: DNS master returned bad value', ltrim($subdomain . '.', '.'), $zone); |
1133: | } |
1134: | return true; |
1135: | } |
1136: | |
1137: | |
1138: | |
1139: | |
1140: | |
1141: | |
1142: | |
1143: | |
1144: | |
1145: | |
1146: | |
1147: | protected function canonicalizeRecord( |
1148: | string &$zone, |
1149: | string &$subdomain, |
1150: | string &$rr, |
1151: | string &$param, |
1152: | int &$ttl = null |
1153: | ): bool { |
1154: | |
1155: | $rr = strtoupper($rr); |
1156: | $subdomain = rtrim($subdomain, '.'); |
1157: | if ($rr == 'CNAME') { |
1158: | if (!$subdomain && $this->hasCnameApexRestriction()) { |
1159: | return error('CNAME record cannot coexist with zone root, see RFC 1034 section 3.6.2'); |
1160: | } |
1161: | if (0 === strncmp($subdomain, 'http:', 5) || 0 === strncmp($subdomain, 'https:', 6)) { |
1162: | return error('CNAME must be a hostname. A protocol was specified (http://, https://)'); |
1163: | } |
1164: | } |
1165: | |
1166: | if ($rr !== 'ANY' && !\in_array($rr, static::$permitted_records, true)) { |
1167: | return error('%s: invalid resource record type', $rr); |
1168: | } |
1169: | |
1170: | if (false !== strpos($subdomain, ' ')) { |
1171: | return error("DNS record `%s' must not contain any spaces", $subdomain); |
1172: | } |
1173: | if (!static::HAS_ORIGIN_MARKER && substr($subdomain, -\strlen($zone)) === $zone) { |
1174: | $subdomain = substr($subdomain, 0, -\strlen($zone)); |
1175: | } |
1176: | |
1177: | if (!static::HAS_ORIGIN_MARKER && $subdomain === '@') { |
1178: | $subdomain = ''; |
1179: | warn("record `@' alias for domain - record stripped"); |
1180: | } |
1181: | |
1182: | |
1183: | |
1184: | if (null !== ($parent = $this->getParent($zone))) { |
1185: | $subdomain = ltrim($subdomain . '.' . substr($zone, 0, -strlen($parent) - 1 ), '.'); |
1186: | $zone = $parent; |
1187: | } |
1188: | |
1189: | if (static::HAS_ORIGIN_MARKER && $subdomain === '') { |
1190: | $subdomain = '@'; |
1191: | } |
1192: | |
1193: | if (!$param) { |
1194: | return true; |
1195: | } |
1196: | |
1197: | if ($rr == 'MX' && preg_match('/(\S+) (\d+)$/', $param, $mx_flip)) { |
1198: | |
1199: | $param = $mx_flip[2] . ' ' . $mx_flip[1]; |
1200: | } |
1201: | |
1202: | |
1203: | |
1204: | |
1205: | if ($rr === 'TXT') { |
1206: | if ($param[0] !== '"' && $param[strlen($param) - 1] !== '"') { |
1207: | $param = '"' . str_replace('"', '\\"', $param) . '"'; |
1208: | } |
1209: | if (static::HAS_CONTIGUOUS_LIMIT) { |
1210: | $param = '"' . implode('" "', str_split(trim($param, '"'), 253)) . '"'; |
1211: | } |
1212: | } |
1213: | |
1214: | return true; |
1215: | } |
1216: | |
1217: | |
1218: | |
1219: | |
1220: | |
1221: | |
1222: | |
1223: | |
1224: | protected function hasCnameApexRestriction(): bool |
1225: | { |
1226: | return true; |
1227: | } |
1228: | |
1229: | |
1230: | |
1231: | |
1232: | |
1233: | |
1234: | |
1235: | |
1236: | |
1237: | |
1238: | |
1239: | public function modify_record( |
1240: | string $zone, |
1241: | string $subdomain, |
1242: | string $rr, |
1243: | string $parameter, |
1244: | array $newdata |
1245: | ): bool { |
1246: | if (!$this->owned_zone($zone)) { |
1247: | return error("Domain `%s' not owned by account", $zone); |
1248: | } |
1249: | |
1250: | $ttl = (int)$this->get_default('ttl'); |
1251: | if (!$this->canonicalizeRecord($zone, $subdomain, $rr, $parameter, $ttl)) { |
1252: | return false; |
1253: | } |
1254: | |
1255: | $newdata = static::createRecord($zone, array_merge([ |
1256: | 'name' => $subdomain, |
1257: | 'rr' => $rr, |
1258: | 'ttl' => null, |
1259: | 'parameter' => $parameter |
1260: | ], $newdata)); |
1261: | |
1262: | if (!$this->canonicalizeRecord($zone, $newdata['name'], $newdata['rr'], $newdata['parameter'], |
1263: | $newdata['ttl'])) { |
1264: | return false; |
1265: | } |
1266: | |
1267: | $rectmp = preg_replace('/\.?' . $zone . '\.?$/', '', $newdata['name']); |
1268: | |
1269: | if ($newdata['name'] !== $subdomain && $newdata['rr'] !== $rr && |
1270: | $this->record_exists($zone, $rectmp, $newdata['rr'], $parameter) |
1271: | ) { |
1272: | return error('Target record `' . $newdata['name'] . "' exists"); |
1273: | } |
1274: | |
1275: | $old = static::createRecord($zone, [ |
1276: | 'name' => $subdomain, |
1277: | 'rr' => $rr, |
1278: | 'parameter' => $parameter, |
1279: | 'ttl' => null |
1280: | ]); |
1281: | |
1282: | if (false === ($ret = $this->atomicUpdate($zone, $old, $newdata))) { |
1283: | |
1284: | warn('record update failed'); |
1285: | |
1286: | return (($subdomain === $newdata['name'] && $rr === $newdata['rr']) || |
1287: | !$this->record_exists($zone, $subdomain, $rr, $parameter)) && |
1288: | $this->record_exists($zone, $newdata['name'], $newdata['rr'], $newdata['parameter']); |
1289: | } |
1290: | |
1291: | return (bool)$ret; |
1292: | } |
1293: | |
1294: | |
1295: | |
1296: | |
1297: | |
1298: | |
1299: | |
1300: | |
1301: | |
1302: | |
1303: | public function record_exists( |
1304: | string $zone, |
1305: | string $subdomain, |
1306: | string $rr = 'ANY', |
1307: | string $parameter = '' |
1308: | ): bool { |
1309: | static $failed = []; |
1310: | if ($subdomain == '@') { |
1311: | $subdomain = ''; |
1312: | if (!static::HAS_ORIGIN_MARKER) { |
1313: | warn("record `@' alias for domain - record stripped"); |
1314: | } |
1315: | } |
1316: | |
1317: | if (null !== ($r = $this->getRecordFromCache(static::createRecord($zone, |
1318: | ['name' => $subdomain, 'rr' => $rr, 'parameter' => $parameter !== '' ? $parameter : null])))) { |
1319: | return !data_get($r, 'deleted', false); |
1320: | } |
1321: | |
1322: | |
1323: | if ($subdomain && $subdomain[-1] === '.' && substr($subdomain, -\strlen($zone) - 1, -1) === $zone) { |
1324: | $subdomain = rtrim(substr($subdomain, 0, -\strlen($zone)-1), '.'); |
1325: | } |
1326: | $record = trim($subdomain . '.' . $zone, '.'); |
1327: | $rr = strtoupper($rr); |
1328: | if (null === static::record2const($rr)) { |
1329: | return error("unknown RR class `%s'", $rr); |
1330: | } |
1331: | $hostingns = array_diff($this->get_hosting_nameservers($zone), $failed); |
1332: | if (!$hostingns) { |
1333: | return warn("No hosting nameservers configured for `%s', cannot determine if record exists", $zone); |
1334: | } |
1335: | $status = Util_Process::exec(static::DIG_SHLOOKUP, [ |
1336: | 'nameserver' => $ns = $hostingns[array_rand($hostingns)], |
1337: | 'hostname' => $record, |
1338: | 'rr' => array_key_exists($rr, static::$rec_2_const) ? $rr : 'ANY' |
1339: | ] |
1340: | ); |
1341: | if ($status['return'] === 9) { |
1342: | |
1343: | $failed[] = $ns; |
1344: | return warn("Query to `%s' failed - disabling from future queries", $ns); |
1345: | } |
1346: | |
1347: | if (!$parameter) { |
1348: | $parameter = '.'; |
1349: | } else { |
1350: | $parameter = str_replace("'", "\\'", preg_quote($parameter, '!')); |
1351: | } |
1352: | |
1353: | return (bool)preg_match('!' . $parameter . '!i', $status['output']); |
1354: | } |
1355: | |
1356: | |
1357: | |
1358: | |
1359: | |
1360: | |
1361: | |
1362: | |
1363: | |
1364: | protected function atomicUpdate(string $zone, \Opcenter\Dns\Record $old, \Opcenter\Dns\Record $newdata): bool |
1365: | { |
1366: | |
1367: | return false; |
1368: | } |
1369: | |
1370: | |
1371: | |
1372: | |
1373: | |
1374: | |
1375: | |
1376: | |
1377: | public function add_zone_backend(string $domain, string $ip): bool |
1378: | { |
1379: | if (!static::MASTER_NAMESERVER) { |
1380: | return error("rndc not configured in config.ini. Cannot add zone `%s'", $domain); |
1381: | } |
1382: | $buffer = Error_Reporter::flush_buffer(); |
1383: | $res = $this->get_zone_data($domain); |
1384: | |
1385: | if (null !== $res) { |
1386: | Error_Reporter::set_buffer($buffer); |
1387: | warn("DNS for zone `%s' already exists, not overwriting", $domain); |
1388: | |
1389: | return true; |
1390: | } |
1391: | |
1392: | [$a, $b] = explode('.', $domain, 2); |
1393: | $res = $this->get_zone_data($b); |
1394: | Error_Reporter::set_buffer($buffer); |
1395: | if (null !== $res) { |
1396: | warn("DNS for zone `%s' already exists, not overwriting", $b); |
1397: | return true; |
1398: | } |
1399: | |
1400: | if (is_array($ip)) { |
1401: | $ip = array_pop($ip); |
1402: | } |
1403: | |
1404: | if (inet_pton($ip) === false) { |
1405: | return error("`%s': invalid address", $ip); |
1406: | } |
1407: | |
1408: | info("Added domain `%s'", $domain); |
1409: | |
1410: | return true; |
1411: | } |
1412: | |
1413: | |
1414: | |
1415: | |
1416: | |
1417: | |
1418: | |
1419: | |
1420: | |
1421: | public function ip_allocated(string $ip): bool |
1422: | { |
1423: | return \Opcenter\Net\IpCommon::ip_allocated($ip); |
1424: | } |
1425: | |
1426: | |
1427: | |
1428: | |
1429: | |
1430: | |
1431: | |
1432: | |
1433: | public function reset(string $domain): bool |
1434: | { |
1435: | $wrapper = $this; |
1436: | |
1437: | if ($this->permission_level & PRIVILEGE_ADMIN) { |
1438: | if (null === ($site_id = \Auth::get_site_id_from_domain($domain))) { |
1439: | return error("Domain `%s' not located on server", $domain); |
1440: | } |
1441: | $wrapper = \apnscpFunctionInterceptor::instantiateContexted(\Auth::context(null, "site{$site_id}")); |
1442: | } |
1443: | if ($wrapper->email_enabled() && !$wrapper->email_transport_exists($domain)) { |
1444: | $wrapper->email_add_virtual_transport($domain); |
1445: | } |
1446: | |
1447: | $newrecs = $wrapper->dns_provisioning_records($domain) + |
1448: | append_config($wrapper->email_provisioning_records($domain)); |
1449: | |
1450: | $oldrecs = (array)$wrapper->dns_get_zone_information($domain); |
1451: | $ttl = $wrapper->dns_get_default('ttl'); |
1452: | $ips = []; |
1453: | foreach (['A' => 'ip', 'AAAA' => 'ip6'] as $rr => $fn) { |
1454: | if (!($ip = $wrapper->{'dns_get_public_' . $fn}())) { |
1455: | continue; |
1456: | } |
1457: | $ips[$rr] = $ip; |
1458: | } |
1459: | |
1460: | |
1461: | $ignore = ['SOA']; |
1462: | if ((empty($oldrecs['NS']) || !$wrapper->dns_get_default('apex-ns')) && |
1463: | !in_array('NS', $this->permitted_records(), true)) |
1464: | { |
1465: | $ignore[] = 'NS'; |
1466: | } else if ($wrapper->dns_get_default('apex-ns')) { |
1467: | |
1468: | $newrecs = array_merge($newrecs, array_map(function ($ns) use ($domain) { |
1469: | return new Record($domain, [ |
1470: | 'rr' => 'NS', |
1471: | 'ttl' => $this->dns_get_default('ttl'), |
1472: | 'parameter' => $ns |
1473: | ]); |
1474: | }, $wrapper->dns_get_hosting_nameservers($domain))); |
1475: | } |
1476: | |
1477: | array_forget($oldrecs, $ignore); |
1478: | |
1479: | foreach (array_keys($wrapper->web_list_subdomains()) as $subdomain) { |
1480: | if (false !== strpos($subdomain, '.')) { |
1481: | $split = $wrapper->web_split_host($subdomain); |
1482: | |
1483: | if (($split['subdomain'] && $split['domain'] !== $domain) || (!$split['subdomain'] && $split['domain'] !== $domain)) { |
1484: | continue; |
1485: | } |
1486: | |
1487: | $subdomain = !$split['subdomain'] && $split['domain'] === $domain ? '*' : $split['subdomain']; |
1488: | } |
1489: | |
1490: | foreach ($ips as $rr => $ip) { |
1491: | $newrecs[] = new Record($domain, [ |
1492: | 'name' => $subdomain, |
1493: | 'ttl' => $ttl, |
1494: | 'rr' => $rr, |
1495: | 'parameter' => $ip |
1496: | ]); |
1497: | } |
1498: | } |
1499: | $keys = array_keys($oldrecs); |
1500: | foreach (array('A', 'AAAA') as $needle) { |
1501: | $pos = array_search($needle, $keys, true); |
1502: | if ($pos !== false) { |
1503: | unset($keys[$pos]); |
1504: | $keys[] = $needle; |
1505: | } |
1506: | } |
1507: | |
1508: | if (!$wrapper->dns_empty_zone($domain)) { |
1509: | return false; |
1510: | } |
1511: | |
1512: | foreach ($newrecs as $r) { |
1513: | $wrapper->dns_add_record($r->getZone(), (string)$r['name'], $r['rr'], $r['parameter'], $r['ttl']); |
1514: | } |
1515: | |
1516: | return \count($newrecs) > 0 ? info("Added %d records", count($newrecs)) : true; |
1517: | } |
1518: | |
1519: | |
1520: | |
1521: | |
1522: | |
1523: | |
1524: | |
1525: | public function flush(string $domain): bool |
1526: | { |
1527: | return debug("flush not implemented"); |
1528: | } |
1529: | |
1530: | |
1531: | |
1532: | |
1533: | |
1534: | |
1535: | |
1536: | |
1537: | |
1538: | public function import_from_ns(string $domain, string $nameserver, $key = null): bool |
1539: | { |
1540: | $myip = Util_Conf::server_ip(); |
1541: | $domain = strtolower($domain); |
1542: | if (!preg_match(Regex::DOMAIN, $domain)) { |
1543: | return error("invalid zone `%s' - not a domain name", $domain); |
1544: | } |
1545: | |
1546: | if (!preg_match(Regex::DOMAIN, $nameserver)) { |
1547: | return error("invalid nameserver to query `%s'", $nameserver); |
1548: | } |
1549: | |
1550: | if ($key && false === strpos($key, ':')) { |
1551: | return error("invalid dns key `%s', must be in format name:key", $key); |
1552: | } |
1553: | if ($key) { |
1554: | $key = '-y' . $key; |
1555: | } |
1556: | |
1557: | $cmd = 'dig %(key)s -b%(ip)s @%(nameserver)s %(zone)s +norecurse +nocmd +nonssearch +noadditional +nocomments +nostats AXFR '; |
1558: | $proc = Util_Process_Safe::exec($cmd, array( |
1559: | 'key' => $key, |
1560: | 'ip' => $myip, |
1561: | 'zone' => $domain, |
1562: | 'nameserver' => $nameserver |
1563: | )); |
1564: | $output = $proc['output']; |
1565: | if (!$proc['success'] || false !== strpos($output, '; Transfer failed')) { |
1566: | $output = $proc['stderr'] ?: $proc['output']; |
1567: | |
1568: | return error('axfr failed: %s', $output); |
1569: | } |
1570: | |
1571: | return $this->import($domain, $output); |
1572: | } |
1573: | |
1574: | |
1575: | |
1576: | |
1577: | |
1578: | |
1579: | |
1580: | |
1581: | public function import_from_domain(string $domain, string $src): bool |
1582: | { |
1583: | if ($domain === $src) { |
1584: | return error('Cannot import - target is same as source'); |
1585: | } |
1586: | if (false === ($recs = $this->export($src))) { |
1587: | return false; |
1588: | } |
1589: | return $this->import( |
1590: | $domain, |
1591: | preg_replace('!(\b|^)' . preg_quote($src, '!') . '(\b|$)!m', $domain, $recs) |
1592: | ); |
1593: | } |
1594: | |
1595: | |
1596: | |
1597: | |
1598: | |
1599: | |
1600: | |
1601: | |
1602: | public function import(string $domain, string $axfr): bool |
1603: | { |
1604: | |
1605: | |
1606: | if (!$this->empty_zone($domain)) { |
1607: | return false; |
1608: | } |
1609: | |
1610: | $nrecs = 0; |
1611: | $regex = \Regex::compile(\Regex::DNS_AXFR_REC_DOMAIN, |
1612: | [ |
1613: | 'rr' => implode('|', static::$permitted_records + [99999 => 'SOA']), |
1614: | 'domain' => str_replace('.', '\\.', $domain) |
1615: | ]); |
1616: | foreach (preg_split("/[\r\n]{1,2}/", $axfr) as $line) { |
1617: | |
1618: | if ('' === $line || $line[0] == ';') { |
1619: | continue; |
1620: | } |
1621: | if (!preg_match($regex, $line, $rec)) { |
1622: | continue; |
1623: | } |
1624: | $tmp = strtoupper($rec['rr']); |
1625: | |
1626: | if ($tmp === 'SOA' || ($tmp === 'NS' && !$rec['subdomain']) || ($rec['class'] ?? 'IN') !== 'IN') { |
1627: | continue; |
1628: | } |
1629: | $subdomain = trim($rec['subdomain'], '.'); |
1630: | $rec['parameter'] = preg_replace('/\s+/', ' ', $rec['parameter']); |
1631: | if (!$this->add_record($domain, $subdomain, $rec['rr'], $rec['parameter'], (int)$rec['ttl'])) { |
1632: | warn('failed to add record `%s` -> `%s` (RR: %s, TTL: %s)', |
1633: | $subdomain, |
1634: | $rec['parameter'], |
1635: | $rec['rr'], |
1636: | $rec['ttl'] |
1637: | ); |
1638: | continue; |
1639: | } |
1640: | $nrecs++; |
1641: | } |
1642: | |
1643: | return info('imported %d records', $nrecs); |
1644: | } |
1645: | |
1646: | |
1647: | |
1648: | |
1649: | |
1650: | |
1651: | |
1652: | public function empty_zone(string $domain): bool |
1653: | { |
1654: | $zoneinfo = $this->get_zone_information($domain); |
1655: | if (null === $zoneinfo) { |
1656: | return error('unable to get old zone information - is this domain added to your account?'); |
1657: | } |
1658: | |
1659: | if ($this->parented($domain)) { |
1660: | return warn("Domain is parented - cannot empty"); |
1661: | } |
1662: | |
1663: | $nrecs = 0; |
1664: | $permittedRecords = array_flip($this->permitted_records()); |
1665: | $nameservers = $this->get_hosting_nameservers($domain); |
1666: | foreach ($zoneinfo as $rr => $recs) { |
1667: | foreach ($recs as $rec) { |
1668: | $tmp = strtoupper($rr); |
1669: | |
1670: | if ($tmp === 'SOA') { |
1671: | continue; |
1672: | } |
1673: | if ($tmp === 'NS' && (!$rec['subdomain'] && (!isset($permittedRecords['NS']) || |
1674: | in_array(rtrim($rec['parameter'], '.'), $nameservers, true)))) |
1675: | { |
1676: | continue; |
1677: | } |
1678: | if (!$this->remove_record($domain, $rec['subdomain'], $rr, $rec['parameter'])) { |
1679: | warn('failed to purge record `%s` %s %s %s', |
1680: | $rec['name'], |
1681: | $rr, |
1682: | $rec['ttl'], |
1683: | $rec['parameter'] |
1684: | ); |
1685: | continue; |
1686: | } |
1687: | $nrecs++; |
1688: | } |
1689: | } |
1690: | |
1691: | return $nrecs > 0 ? info('Purged %d old records', $nrecs) : true; |
1692: | } |
1693: | |
1694: | |
1695: | |
1696: | |
1697: | |
1698: | |
1699: | |
1700: | |
1701: | public function validate_template(string $file, array $overrideParams = []): bool |
1702: | { |
1703: | $blade = BladeLite::factory('templates/dns'); |
1704: | if (!$blade->exists($file)) { |
1705: | return error("Requested DNS template `%s' does not exist", $file); |
1706: | } |
1707: | $acct = \Error_Reporter::silence(static function() use ($overrideParams) { |
1708: | $site = Ephemeral::create($overrideParams); |
1709: | |
1710: | return $site ?? null; |
1711: | }); |
1712: | |
1713: | if (null === $acct) { |
1714: | return error('Failed to create test account to evaluate DNS template'); |
1715: | } |
1716: | |
1717: | $zoneTxt = $blade->render($file, [ |
1718: | 'svc' => SiteConfiguration::shallow($acct->getContext()), |
1719: | 'ttl' => 1800, |
1720: | 'zone' => $acct->getContext()->domain, |
1721: | 'subdomain' => '', |
1722: | 'hostname' => $acct->getContext()->domain, |
1723: | 'ips' => array_filter([\Opcenter\Net\Ip4::my_ip(), \Opcenter\Net\Ip6::my_ip()]) |
1724: | ]); |
1725: | |
1726: | defer($_, static fn() => \Error_Reporter::silence(static fn() => $acct->destroy())); |
1727: | |
1728: | $regex = \Regex::compile(\Regex::DNS_AXFR_REC_DOMAIN, |
1729: | [ |
1730: | 'rr' => implode('|', static::$permitted_records + [99999 => 'SOA']), |
1731: | 'domain' => str_replace('.', '\\.', $acct->getContext()->domain), |
1732: | ]); |
1733: | |
1734: | foreach (explode("\n", $zoneTxt) as $line) { |
1735: | if (empty(trim($line))) { |
1736: | continue; |
1737: | } |
1738: | if (!preg_match($regex, $line)) { |
1739: | return error("Zone template `%s' failed on line: %s", $file, $line); |
1740: | } |
1741: | } |
1742: | return true; |
1743: | } |
1744: | |
1745: | |
1746: | |
1747: | |
1748: | |
1749: | |
1750: | |
1751: | |
1752: | |
1753: | public function get_zone_information(string $domain = null): ?array |
1754: | { |
1755: | $domain = $domain ?? $this->domain; |
1756: | |
1757: | if (!$this->permission_level & PRIVILEGE_ADMIN && !$this->owned_zone($domain)) { |
1758: | error('access denied - cannot view zone `' . $domain . "'"); |
1759: | |
1760: | return null; |
1761: | } |
1762: | $rec = $this->get_zone_data($domain); |
1763: | |
1764: | return $rec ?? null; |
1765: | } |
1766: | |
1767: | |
1768: | |
1769: | |
1770: | |
1771: | |
1772: | |
1773: | |
1774: | |
1775: | |
1776: | |
1777: | |
1778: | |
1779: | public function remove_record(string $zone, string $subdomain, string $rr, string $param = ''): bool |
1780: | { |
1781: | $subdomain = rtrim($subdomain, '.'); |
1782: | if (!$zone) { |
1783: | $zone = $this->domain; |
1784: | } |
1785: | if (!$this->owned_zone($zone)) { |
1786: | return error($zone . ': not owned by account'); |
1787: | } |
1788: | |
1789: | if (!$this->canonicalizeRecord($zone, $subdomain, $rr, $param)) { |
1790: | return false; |
1791: | } |
1792: | |
1793: | |
1794: | |
1795: | |
1796: | |
1797: | |
1798: | |
1799: | return true; |
1800: | } |
1801: | |
1802: | public function release_ip(string $ip): bool |
1803: | { |
1804: | deprecated_func('use ipinfo_release_ip'); |
1805: | |
1806: | return $this->ipinfo_release_ip($ip); |
1807: | } |
1808: | |
1809: | |
1810: | |
1811: | |
1812: | |
1813: | |
1814: | |
1815: | public function get_default(string $key) |
1816: | { |
1817: | switch (strtolower($key)) { |
1818: | case 'ttl': |
1819: | return static::DNS_TTL; |
1820: | case 'apex-ns': |
1821: | return static::SHOW_NS_APEX; |
1822: | default: |
1823: | return null; |
1824: | } |
1825: | } |
1826: | |
1827: | |
1828: | |
1829: | |
1830: | |
1831: | |
1832: | |
1833: | |
1834: | |
1835: | public function min_ttl(): int |
1836: | { |
1837: | return static::DNS_TTL_MIN; |
1838: | } |
1839: | |
1840: | public function _delete() |
1841: | { |
1842: | if (!$this->configured()) { |
1843: | return info("DNS not configured for `%s', bypassing DNS hooks", $this->domain); |
1844: | } |
1845: | if (!$this->getServiceValue('ipinfo', 'namebased')) { |
1846: | $ips = (array)$this->getServiceValue('ipinfo', 'ipaddrs'); |
1847: | |
1848: | |
1849: | $domain = $this->getServiceValue('siteinfo', 'domain'); |
1850: | foreach ($ips as $ip) { |
1851: | $this->__deleteIP($ip, $domain); |
1852: | } |
1853: | } |
1854: | |
1855: | return true; |
1856: | } |
1857: | |
1858: | |
1859: | |
1860: | |
1861: | |
1862: | |
1863: | |
1864: | |
1865: | protected function __deleteIP(string $ip, string $domain = null): bool |
1866: | { |
1867: | |
1868: | return true; |
1869: | } |
1870: | |
1871: | |
1872: | |
1873: | |
1874: | |
1875: | |
1876: | |
1877: | public function remove_zone_backend(string $domain): bool |
1878: | { |
1879: | return warn("cannot remove zone - DNS provider `%s' not configured fully", |
1880: | $this->getServiceValue('dns', 'provider', 'builtin')); |
1881: | } |
1882: | |
1883: | public function _edit() |
1884: | { |
1885: | if (!$this->configured()) { |
1886: | return info("DNS not configured for `%s', skipping edit hook", $this->domain); |
1887: | } |
1888: | $ipconf_old = $this->getAuthContext()->conf('ipinfo', 'old'); |
1889: | $ipconf_new = $this->getAuthContext()->conf('ipinfo', 'new'); |
1890: | $domainold = \array_get($this->getAuthContext()->conf('siteinfo', 'old'), 'domain'); |
1891: | $domainnew = \array_get($this->getAuthContext()->conf('siteinfo', 'new'), 'domain'); |
1892: | $dnsconf_old = $this->getAuthContext()->conf('dns', 'old'); |
1893: | $dnsconf_new = $this->getAuthContext()->conf('dns', 'new'); |
1894: | if (\array_get($dnsconf_old, 'provider') !== array_get($dnsconf_new, 'provider') || array_get($dnsconf_new, 'enabled') && !array_get($dnsconf_old, 'enabled')) |
1895: | { |
1896: | $this->provisionProviderChange(); |
1897: | } |
1898: | |
1899: | $ip = (array)$this->publicIpWrapper('new', 4); |
1900: | |
1901: | |
1902: | $aliasesnew = array_merge( |
1903: | array_get($this->getAuthContext()->conf('aliases', 'new'), 'aliases', []), |
1904: | [$domainnew] |
1905: | ); |
1906: | $aliasesold = array_merge( |
1907: | array_get($this->getAuthContext()->conf('aliases', 'old'), 'aliases', []), |
1908: | [$domainold] |
1909: | ); |
1910: | |
1911: | $ip = $this->get_public_ip(); |
1912: | |
1913: | $add = array_diff($aliasesnew, $aliasesold); |
1914: | $rem = array_diff($aliasesold, $aliasesnew); |
1915: | foreach ($add as $a) { |
1916: | $this->add_zone($a, $ip); |
1917: | } |
1918: | |
1919: | foreach ($rem as $r) { |
1920: | $this->remove_zone($r); |
1921: | } |
1922: | |
1923: | if ($domainold !== $domainnew && !$ipconf_new['namebased']) { |
1924: | $this->__changePTR($ip[0], $domainnew, $domainold); |
1925: | } |
1926: | |
1927: | if ($ipconf_new === $ipconf_old && $this->getAuthContext()->conf('dns', 'old') === $this->getAuthContext('dns', 'new')) { |
1928: | return; |
1929: | } |
1930: | |
1931: | $ipadd = $ipdel = []; |
1932: | $ipnew = $this->publicIpWrapper('new', 4, 'ipaddrs'); |
1933: | $ipold = $this->publicIpWrapper('old', 4, 'ipaddrs'); |
1934: | if ($ipconf_old['namebased'] && !$ipconf_new['namebased']) { |
1935: | |
1936: | $ipadd = $ipnew; |
1937: | } else if (!$ipconf_old['namebased'] && $ipconf_new['namebased']) { |
1938: | |
1939: | $ipdel = $ipold; |
1940: | } else { |
1941: | |
1942: | $ipdel = array_diff((array)$ipold, (array)$ipnew); |
1943: | $ipadd = array_diff((array)$ipnew, (array)$ipold); |
1944: | } |
1945: | |
1946: | foreach ($ipdel as $ip) { |
1947: | |
1948: | $this->__deleteIP($ip, $domainnew); |
1949: | } |
1950: | |
1951: | foreach ($ipadd as $ip) { |
1952: | $this->__addIP($ip, $domainnew); |
1953: | } |
1954: | |
1955: | |
1956: | $ipnew = $this->publicIpWrapper('new', 4, 'nbaddrs'); |
1957: | $ipold = $this->publicIpWrapper('old', 4, 'nbaddrs'); |
1958: | if ($ipconf_old['namebased'] && !$ipconf_new['namebased']) { |
1959: | |
1960: | $ipadd = $this->publicIpWrapper('new', 4, 'ipaddrs'); |
1961: | $ipdel = $ipold; |
1962: | } else if (!$ipconf_old['namebased'] && $ipconf_new['namebased']) { |
1963: | |
1964: | $ipdel = $this->publicIpWrapper('old', 4, 'ipaddrs'); |
1965: | $ipadd = $ipnew; |
1966: | } else if ($ipconf_old['namebased'] === $ipconf_new['namebased'] && $ipconf_new['namebased']) { |
1967: | |
1968: | $ipdel = array_diff( |
1969: | (array)$this->publicIpWrapper('old', 4, 'nbaddrs'), |
1970: | (array)$this->publicIpWrapper('new', 4, 'nbaddrs') |
1971: | ); |
1972: | $ipadd = array_diff( |
1973: | (array)$this->publicIpWrapper('new', 4, 'nbaddrs'), |
1974: | (array)$this->publicIpWrapper('old', 4, 'nbaddrs') |
1975: | ); |
1976: | } |
1977: | |
1978: | |
1979: | |
1980: | $domains = array_keys($this->web_list_domains()); |
1981: | foreach ($ipadd as $newip) { |
1982: | $oldip = array_pop($ipdel); |
1983: | $newparams = array('ttl' => static::DNS_TTL, 'parameter' => $newip); |
1984: | foreach ($domains as $domain) { |
1985: | $records = $this->get_records_by_rr('A', $domain); |
1986: | foreach ($records as $r) { |
1987: | if ($r['parameter'] !== $oldip) { |
1988: | continue; |
1989: | } |
1990: | if (!$this->modify_record($r['domain'], $r['subdomain'], 'A', $oldip, $newparams)) { |
1991: | $frag = ltrim($r['subdomain'] . '.' . $r['domain'], '.'); |
1992: | error('failed to modify record for `' . $frag . "'"); |
1993: | } else { |
1994: | $pieces = array($r['subdomain'], $r['domain']); |
1995: | $host = trim(implode('.', $pieces), '.'); |
1996: | info("modified `%s'", $host); |
1997: | } |
1998: | } |
1999: | } |
2000: | } |
2001: | |
2002: | return; |
2003: | } |
2004: | |
2005: | public function _create() |
2006: | { |
2007: | return true; |
2008: | } |
2009: | |
2010: | |
2011: | |
2012: | |
2013: | |
2014: | |
2015: | private function provisionProviderChange() |
2016: | { |
2017: | if (!$this->configured()) { |
2018: | return info("DNS not configured for `%s', bypassing DNS hooks", $this->domain); |
2019: | } |
2020: | $ipinfo = $this->getAuthContext()->conf('ipinfo'); |
2021: | $siteinfo = $this->getAuthContext()->conf('siteinfo'); |
2022: | $domain = $siteinfo['domain']; |
2023: | $ip = (array)$this->publicIpWrapper('cur'); |
2024: | $this->add_zone($domain, $ip[0]); |
2025: | |
2026: | if (!$ipinfo['namebased']) { |
2027: | $ips = array_merge($ip, (array)$ipinfo['ipaddrs']); |
2028: | foreach(array_unique($ips) as $ip) { |
2029: | $this->__addIP($ip, $siteinfo['domain']); |
2030: | } |
2031: | } |
2032: | if (!$this->domain_uses_nameservers($domain)) { |
2033: | warn("Domain `%s' doesn't use assigned nameservers. Change nameservers to %s", |
2034: | $domain, implode(',', $this->get_hosting_nameservers($domain)) |
2035: | ); |
2036: | } |
2037: | |
2038: | return true; |
2039: | } |
2040: | |
2041: | |
2042: | |
2043: | |
2044: | |
2045: | |
2046: | |
2047: | |
2048: | |
2049: | protected function publicIpWrapper(string $which = 'cur', int $class = 4, string $svcvar = null): array |
2050: | { |
2051: | if ($class !== 4 && $class !== 6) { |
2052: | fatal("Unknown IP class `%s'", $class); |
2053: | } |
2054: | if ($which === 'current') { |
2055: | $which = 'cur'; |
2056: | } |
2057: | $confctx = $this->getAuthContext()->conf('dns', $which); |
2058: | $proxyvar = 'proxy' . ($class === 4 ? '' : '6') . 'addr'; |
2059: | if ($info = ($confctx[$proxyvar] ?? null)) { |
2060: | return $info; |
2061: | } |
2062: | $svccls = 'ipinfo' . ($class === 6 ? '6' : ''); |
2063: | $confctx = $this->getAuthContext()->conf($svccls, $which); |
2064: | if (null === $svcvar) { |
2065: | $svcvar = $confctx['namebased'] ? 'nbaddrs' : 'ipaddrs'; |
2066: | } |
2067: | return $confctx[$svcvar]; |
2068: | } |
2069: | |
2070: | |
2071: | |
2072: | |
2073: | |
2074: | |
2075: | |
2076: | |
2077: | public function add_zone(string $domain, string $ip): bool |
2078: | { |
2079: | $domain = rtrim($domain, '\.'); |
2080: | if (!$this->configured()) { |
2081: | return warn("cannot create DNS zone for `%s' - DNS is not configured for account", $domain); |
2082: | } |
2083: | |
2084: | $buffer = Error_Reporter::flush_buffer(); |
2085: | if (($this->permission_level & PRIVILEGE_SITE) && $this->getOldServices('dns') !== $this->getNewServices('dns')) { |
2086: | |
2087: | $this->zoneExistsCache[$domain] = null; |
2088: | } |
2089: | |
2090: | if (($parent = $this->getParent($domain)) || $this->zone_exists($domain)) { |
2091: | Error_Reporter::set_buffer($buffer); |
2092: | if (!$parent) { |
2093: | return warn("DNS for zone `%s' already exists, not overwriting", $domain); |
2094: | } |
2095: | warn("DNS for zone `%(domain)s' parented under `%(parent)s', not extending as separate zone", |
2096: | ['domain' => $domain, 'parent' => $parent]); |
2097: | return $this->provision_domain( |
2098: | $parent, |
2099: | substr($domain, 0, \strlen($domain) - \strlen($parent) - 1), |
2100: | false |
2101: | ); |
2102: | } |
2103: | |
2104: | |
2105: | if ((posix_getuid() && !$this->query('dns_add_zone_backend', $domain, $ip)) || |
2106: | (!posix_getuid() && !$this->add_zone_backend($domain, $ip))) { |
2107: | return false; |
2108: | } |
2109: | |
2110: | if (!$this->verified($domain) && !$this->verify($domain)) { |
2111: | warn("Domain `%s' must be verified before DNS activates", $domain); |
2112: | } |
2113: | |
2114: | |
2115: | |
2116: | $data = null; |
2117: | $totalWait = 0; |
2118: | for ($i = 0; $i < 100; $i++) { |
2119: | if (null !== ($data = $this->get_zone_data($domain))) { |
2120: | break; |
2121: | } |
2122: | $wait = 250000 * $i; |
2123: | $totalWait += ($wait/1000000); |
2124: | if ($totalWait >= DNS_VALIDATION_WAIT) { |
2125: | break; |
2126: | } |
2127: | usleep($wait); |
2128: | } |
2129: | $this->zoneExistsCache[$domain] = $data !== null; |
2130: | if (!$this->zoneExistsCache[$domain]) { |
2131: | warn("%s master not reporting authoritative for zone `%s' - continuing to add DNS records", |
2132: | ucwords($this->get_provider()), |
2133: | $domain |
2134: | ); |
2135: | } |
2136: | if ($this->permission_level & PRIVILEGE_ADMIN) { |
2137: | return warn('Zone added as administrator - unable to provision records automatically'); |
2138: | } |
2139: | |
2140: | $nameservers = $this->get_hosting_nameservers($domain); |
2141: | |
2142: | unset($data['SOA']); |
2143: | |
2144: | $cb = static function ($rec) use ($nameservers) { |
2145: | return $rec['subdomain'] || !in_array(rtrim($rec['parameter'], '.'), $nameservers, true); |
2146: | }; |
2147: | |
2148: | if (array_first($data['NS'] ?? [], $cb) || count(array_diff_key($data, ['NS' => null])) > 0) { |
2149: | return $this->reset($domain); |
2150: | } |
2151: | |
2152: | return $this->provision_domain($domain, '', false); |
2153: | } |
2154: | |
2155: | |
2156: | |
2157: | |
2158: | |
2159: | |
2160: | |
2161: | |
2162: | |
2163: | private function provision_domain(string $domain, string $subdomain = '', bool $recordCheck = true): bool |
2164: | { |
2165: | dlog("Provisioning zone: %(zone)s, subdomain: %(sub)s using %(provider)s", |
2166: | [ |
2167: | 'zone' => $domain, |
2168: | 'sub' => $subdomain, |
2169: | 'provider' => $this->get_provider() |
2170: | ]); |
2171: | $records = $this->provisioning_records($domain, $subdomain) + |
2172: | append_config($this->email_provisioning_records($domain, $subdomain)); |
2173: | foreach ($records as $record) { |
2174: | if ($recordCheck && $this->record_exists($domain, $record['name'], $record['rr'], $record['parameter'])) { |
2175: | continue; |
2176: | } |
2177: | |
2178: | if (!$this->add_record($domain, $record['name'], $record['rr'], $record['parameter'], |
2179: | $record['ttl'])) { |
2180: | warn("Failed to add DNS record `%(hostname)s' on `%(name)s' (rr: %(rr)s, parameter: %(parameter)s)", [ |
2181: | 'hostname' => ltrim('.', $subdomain . '.' . $domain), |
2182: | 'name' => $record['name'], |
2183: | 'rr' => $record['rr'], |
2184: | 'parameter' => $record['parameter'] |
2185: | ]); |
2186: | } |
2187: | } |
2188: | |
2189: | return true; |
2190: | } |
2191: | |
2192: | |
2193: | |
2194: | |
2195: | |
2196: | |
2197: | |
2198: | public function parented(string $hostname): bool |
2199: | { |
2200: | return $this->getParent($hostname) !== null; |
2201: | } |
2202: | |
2203: | |
2204: | |
2205: | |
2206: | |
2207: | |
2208: | |
2209: | protected function getParent(string $hostname): ?string |
2210: | { |
2211: | |
2212: | if ($this->permission_level & PRIVILEGE_ADMIN) { |
2213: | return null; |
2214: | } |
2215: | $count = substr_count($hostname, '.'); |
2216: | if ($count < 2) { |
2217: | return null; |
2218: | } |
2219: | $pieces = explode('.', $hostname, $count); |
2220: | |
2221: | |
2222: | |
2223: | $domains = [$this->getConfig('siteinfo', 'domain')] + append_config($this->aliases_list_aliases()); |
2224: | |
2225: | $tmp = array_pop($pieces); |
2226: | do { |
2227: | if (\in_array($tmp, $domains, true)) { |
2228: | return $tmp; |
2229: | } |
2230: | $chk = array_pop($pieces); |
2231: | $tmp = "$chk.$tmp"; |
2232: | } while ($tmp !== $hostname); |
2233: | |
2234: | return null; |
2235: | } |
2236: | |
2237: | |
2238: | |
2239: | |
2240: | |
2241: | |
2242: | public function get_public_ip() |
2243: | { |
2244: | $addr = $this->getServiceValue('dns','proxyaddr') ?: $this->common_get_ip_address(); |
2245: | return \count($addr) > 1 ? $addr : ($addr[0] ?? null); |
2246: | } |
2247: | |
2248: | |
2249: | |
2250: | |
2251: | |
2252: | |
2253: | public function get_public_ip6() |
2254: | { |
2255: | $addr = $this->getServiceValue('dns', 'proxy6addr') ?: $this->common_get_ip6_address(); |
2256: | |
2257: | return \count($addr) > 1 ? $addr : ($addr[0] ?? null); |
2258: | } |
2259: | |
2260: | |
2261: | |
2262: | |
2263: | |
2264: | |
2265: | |
2266: | |
2267: | public function provisioning_records(string $zone, string $subdomain = ''): array |
2268: | { |
2269: | if (!IS_CLI) { |
2270: | return $this->query('dns_provisioning_records', $zone); |
2271: | } |
2272: | |
2273: | if (!$this->getConfig('dns','enabled')) { |
2274: | return []; |
2275: | } |
2276: | |
2277: | $ttl = $this->dns_get_default('ttl'); |
2278: | $ips = []; |
2279: | if ($this->getServiceValue('ipinfo', 'enabled')) { |
2280: | $ips += (array)$this->get_public_ip(); |
2281: | } |
2282: | if ($this->getServiceValue('ipinfo6', 'enabled')) { |
2283: | $ips += append_config((array)$this->get_public_ip6()); |
2284: | } |
2285: | |
2286: | $template = BladeLite::factory('templates/dns')->render('dns', [ |
2287: | 'svc' => \Opcenter\SiteConfiguration::shallow($this->getAuthContext()), |
2288: | 'ttl' => $ttl, |
2289: | 'zone' => $zone, |
2290: | 'subdomain' => $subdomain, |
2291: | 'hostname' => ltrim(implode('.', [$subdomain, $zone]), '.'), |
2292: | 'ips' => (array)$ips |
2293: | ]); |
2294: | $regex = Regex::compile(Regex::DNS_AXFR_REC_DOMAIN, [ |
2295: | 'rr' => implode('|', $this->dns_permitted_records() + [99999 => 'SOA']), |
2296: | 'domain' => $zone |
2297: | ]); |
2298: | if (!preg_match_all($regex, $template, $matches, PREG_SET_ORDER)) { |
2299: | debug('No provisioning records discovered from template'); |
2300: | |
2301: | return []; |
2302: | } |
2303: | $records = []; |
2304: | foreach ($matches as $record) { |
2305: | $records[] = static::createRecord($zone, [ |
2306: | 'ttl' => $record['ttl'], |
2307: | 'parameter' => $record['parameter'], |
2308: | 'rr' => $record['rr'], |
2309: | 'name' => rtrim($record['subdomain'], '.') |
2310: | ]); |
2311: | } |
2312: | |
2313: | return $records; |
2314: | } |
2315: | |
2316: | |
2317: | |
2318: | |
2319: | |
2320: | |
2321: | public function uuid(): ?string |
2322: | { |
2323: | return DNS_UUID ?: null; |
2324: | } |
2325: | |
2326: | |
2327: | |
2328: | |
2329: | |
2330: | |
2331: | |
2332: | |
2333: | protected function __addIP(string $ip, string $hostname = ''): bool |
2334: | { |
2335: | return true; |
2336: | } |
2337: | |
2338: | |
2339: | |
2340: | |
2341: | |
2342: | |
2343: | |
2344: | public function domain_uses_nameservers(string $domain): bool |
2345: | { |
2346: | if (!preg_match(Regex::DOMAIN, $domain)) { |
2347: | return error("malformed domain `%s'", $domain); |
2348: | } |
2349: | $hostingns = $this->get_hosting_nameservers($domain); |
2350: | if (!$hostingns) { |
2351: | |
2352: | return true; |
2353: | } |
2354: | $dns = mute(function () use ($domain) { |
2355: | return $this->get_authns_from_host($domain); |
2356: | }); |
2357: | $found = false; |
2358: | if (!$dns) { |
2359: | return $found; |
2360: | } |
2361: | if (DNS_VANITY_NS) { |
2362: | $hostingns += append_config(DNS_VANITY_NS); |
2363: | } |
2364: | foreach ($dns as $ns) { |
2365: | if (in_array($ns, $hostingns, true)) { |
2366: | return true; |
2367: | } |
2368: | } |
2369: | |
2370: | return false; |
2371: | } |
2372: | |
2373: | |
2374: | |
2375: | |
2376: | |
2377: | |
2378: | |
2379: | |
2380: | public function get_hosting_nameservers(string $domain = null): array |
2381: | { |
2382: | return DNS_HOSTING_NS; |
2383: | } |
2384: | |
2385: | |
2386: | |
2387: | |
2388: | |
2389: | |
2390: | |
2391: | |
2392: | |
2393: | |
2394: | |
2395: | |
2396: | |
2397: | |
2398: | |
2399: | |
2400: | |
2401: | |
2402: | |
2403: | |
2404: | public function get_authns_from_host($host): ?array |
2405: | { |
2406: | $nameservers = static::RECURSIVE_NAMESERVERS; |
2407: | $authns = silence(static function () use ($host, $nameservers) { |
2408: | return dns_get_record($host, static::record2const('ns'), $nameservers); |
2409: | }); |
2410: | if ($authns) { |
2411: | |
2412: | $tmp = array(); |
2413: | foreach ($authns as $a) { |
2414: | if ($a['type'] == 'NS') { |
2415: | $tmp[] = $a['target']; |
2416: | } |
2417: | } |
2418: | |
2419: | return $tmp; |
2420: | } |
2421: | |
2422: | |
2423: | |
2424: | |
2425: | |
2426: | $resolver = new Net_DNS2_Resolver([ |
2427: | 'nameservers' => $nameservers, |
2428: | 'recurse' => true |
2429: | ]); |
2430: | try { |
2431: | $nameservers = $this->get_authns_from_host_recursive($host, $resolver); |
2432: | } catch (Net_DNS2_Exception $e) { |
2433: | warn("NS lookup failed for `%s': %s", $host, $e->getMessage()); |
2434: | |
2435: | return array(); |
2436: | } |
2437: | |
2438: | return $nameservers; |
2439: | } |
2440: | |
2441: | |
2442: | |
2443: | |
2444: | |
2445: | |
2446: | |
2447: | |
2448: | |
2449: | |
2450: | |
2451: | protected function get_authns_from_host_recursive($host, Net_DNS2_Resolver $resolver, $seen = ''): ?array |
2452: | { |
2453: | $components = explode('.', $host); |
2454: | $nameservers = null; |
2455: | try { |
2456: | $lookup = array_pop($components) . '.' . $seen; |
2457: | $res = silence(static function () use ($resolver, $lookup) { |
2458: | return $resolver->query($lookup, 'NS'); |
2459: | }); |
2460: | if ($res->answer) { |
2461: | $nameservers = array_filter(array_map(static function ($arr) { |
2462: | return gethostbyname($arr->nsdname); |
2463: | }, $res->answer)); |
2464: | $resolver->setServers($nameservers); |
2465: | } |
2466: | } catch (Net_DNS2_Exception | \Error $e) { |
2467: | if ($components) { |
2468: | if (false !== strpos($e->getMessage(), 'member function open() on null')) { |
2469: | |
2470: | return null; |
2471: | } |
2472: | |
2473: | warn("failed to recurse on `%s': %s", $lookup, $e->getMessage()); |
2474: | } |
2475: | |
2476: | return null; |
2477: | } |
2478: | if (!$components) { |
2479: | return array_map(static function ($a) { |
2480: | return $a->nsdname; |
2481: | }, $res->authority); |
2482: | } |
2483: | $resolver->recurse = 0; |
2484: | |
2485: | return $this->get_authns_from_host_recursive(implode('.', $components), $resolver, $lookup); |
2486: | |
2487: | } |
2488: | |
2489: | |
2490: | |
2491: | |
2492: | |
2493: | |
2494: | |
2495: | |
2496: | |
2497: | |
2498: | |
2499: | |
2500: | |
2501: | public function remove_zone(string $domain, bool $force = false): bool |
2502: | { |
2503: | if ($this->permission_level & PRIVILEGE_SITE && !$this->owned_zone($domain)) { |
2504: | return error("Unusual call to remove_zone() with specified unowned zone `%s' blocked", $domain); |
2505: | } |
2506: | |
2507: | if (!$this->configured()) { |
2508: | return warn("cannot remove DNS zone for `%s' - DNS is not configured for account", $domain); |
2509: | } |
2510: | |
2511: | if ($force) { |
2512: | return $this->remove_zone_backend($domain); |
2513: | } |
2514: | |
2515: | if (null !== ($parent = $this->getParent($domain))) { |
2516: | |
2517: | return true; |
2518: | } |
2519: | |
2520: | |
2521: | if (!$this->zone_exists($domain)) { |
2522: | return true; |
2523: | } |
2524: | if (false === ($record = $this->get_records(static::UUID_RECORD, 'TXT', $domain))) { |
2525: | |
2526: | return warn("Zone transfer failed - ignoring removal of `%s'", $domain); |
2527: | } |
2528: | if (null !== ($uuid = $this->uuid()) && $uuid !== ($record = array_get($record, '0.parameter', null))) { |
2529: | return warn("Bypassing DNS removal. DNS UUID for `%s' is `%s'. Server UUID is `%s'", $domain, $record, |
2530: | $uuid); |
2531: | } |
2532: | if ($ret = $this->query('dns_remove_zone_backend', $domain)) { |
2533: | unset($this->zoneExistsCache[$domain], $this->zoneCache[$domain]); |
2534: | } |
2535: | |
2536: | return $ret; |
2537: | } |
2538: | |
2539: | |
2540: | |
2541: | |
2542: | |
2543: | |
2544: | |
2545: | |
2546: | public function auth_test(string $provider = DNS_PROVIDER_DEFAULT, $key = ''): bool { |
2547: | if (!is_debug()) { |
2548: | return error('Only available in debug mode'); |
2549: | } |
2550: | |
2551: | if (!\Opcenter\Dns::providerValid($provider)) { |
2552: | return error("DNS provider `%s' invalid", $provider); |
2553: | } |
2554: | |
2555: | if (!\Opcenter\Dns::providerHasHelper($provider)) { |
2556: | return true; |
2557: | } |
2558: | $helper = \Opcenter\Dns::getProviderHelper($provider); |
2559: | $ctx = new \Opcenter\Service\ConfigurationContext('dns', new SiteConfiguration($this->site)); |
2560: | return $helper->valid($ctx, $key); |
2561: | } |
2562: | |
2563: | |
2564: | |
2565: | |
2566: | |
2567: | |
2568: | |
2569: | |
2570: | |
2571: | protected function __changePTR(string $ip, string $hostname, string $chk = ''): bool |
2572: | { |
2573: | return true; |
2574: | } |
2575: | |
2576: | |
2577: | |
2578: | |
2579: | |
2580: | |
2581: | |
2582: | |
2583: | |
2584: | |
2585: | |
2586: | |
2587: | |
2588: | |
2589: | |
2590: | |
2591: | |
2592: | |
2593: | |
2594: | |
2595: | |
2596: | |
2597: | |
2598: | |
2599: | |
2600: | |
2601: | |
2602: | |
2603: | |
2604: | |
2605: | |
2606: | |
2607: | |
2608: | |
2609: | |
2610: | |
2611: | |
2612: | |
2613: | |
2614: | |
2615: | |
2616: | |
2617: | |
2618: | |
2619: | |
2620: | |
2621: | public function get_records_by_rr(string $rr, string $zone = null): ?array |
2622: | { |
2623: | if (null === $zone) { |
2624: | $zone = $this->domain; |
2625: | } |
2626: | |
2627: | if (!$this->owned_zone($zone)) { |
2628: | if (!$this->owned_zone($rr)) { |
2629: | error('access denied - cannot view zone `' . $zone . "'"); |
2630: | |
2631: | return null; |
2632: | } |
2633: | |
2634: | |
2635: | $t = $rr; |
2636: | $rr = $zone; |
2637: | $zone = $t; |
2638: | } |
2639: | |
2640: | $rr = strtoupper($rr); |
2641: | if ($rr !== 'ANY' && !in_array($rr, static::$permitted_records, true)) { |
2642: | error('%s: invalid resource record type', $rr); |
2643: | |
2644: | return null; |
2645: | } |
2646: | |
2647: | $recs = $this->get_zone_information($zone); |
2648: | if (!$recs) { |
2649: | return array(); |
2650: | } |
2651: | if ($rr == 'ANY') { |
2652: | return $recs; |
2653: | } |
2654: | if (!isset($recs[strtoupper($rr)])) { |
2655: | return array(); |
2656: | } |
2657: | |
2658: | return $recs[strtoupper($rr)]; |
2659: | } |
2660: | |
2661: | |
2662: | |
2663: | |
2664: | |
2665: | |
2666: | |
2667: | public function verified(string $domain): bool |
2668: | { |
2669: | return true; |
2670: | } |
2671: | |
2672: | |
2673: | |
2674: | |
2675: | |
2676: | |
2677: | |
2678: | public function verify(string $domain): bool |
2679: | { |
2680: | return true; |
2681: | } |
2682: | |
2683: | |
2684: | |
2685: | |
2686: | |
2687: | |
2688: | |
2689: | public function challenges(string $domain): array |
2690: | { |
2691: | return []; |
2692: | } |
2693: | |
2694: | |
2695: | |
2696: | |
2697: | |
2698: | |
2699: | |
2700: | |
2701: | public function raw(string $param, $val) |
2702: | { |
2703: | return error("Command `%s' not understood", $param); |
2704: | } |
2705: | |
2706: | public function _verify_conf(\Opcenter\Service\ConfigurationContext $ctx): bool |
2707: | { |
2708: | return true; |
2709: | } |
2710: | |
2711: | public function _create_user(string $user) |
2712: | { |
2713: | return; |
2714: | } |
2715: | |
2716: | public function _delete_user(string $user) |
2717: | { |
2718: | return; |
2719: | } |
2720: | |
2721: | public function _edit_user(string $userold, string $usernew, array $oldpwd) |
2722: | { |
2723: | return; |
2724: | } |
2725: | } |