mirror of
https://github.com/cmur2/dyndnsd.git
synced 2024-11-18 20:56:16 +01:00
241 lines
6.9 KiB
Ruby
241 lines
6.9 KiB
Ruby
#!/usr/bin/env ruby
|
|
|
|
require 'etc'
|
|
require 'logger'
|
|
require 'ipaddr'
|
|
require 'json'
|
|
require 'yaml'
|
|
require 'rack'
|
|
require 'metriks'
|
|
require 'metriks/reporter/graphite'
|
|
|
|
require 'dyndnsd/generator/bind'
|
|
require 'dyndnsd/updater/command_with_bind_zone'
|
|
require 'dyndnsd/responder/dyndns_style'
|
|
require 'dyndnsd/responder/rest_style'
|
|
require 'dyndnsd/database'
|
|
require 'dyndnsd/version'
|
|
|
|
module Dyndnsd
|
|
def self.logger
|
|
@logger
|
|
end
|
|
|
|
def self.logger=(logger)
|
|
@logger = logger
|
|
end
|
|
|
|
class LogFormatter
|
|
def call(lvl, time, progname, msg)
|
|
"[%s] %-5s %s\n" % [Time.now.strftime('%Y-%m-%d %H:%M:%S'), lvl, msg.to_s]
|
|
end
|
|
end
|
|
|
|
class Daemon
|
|
def initialize(config, db, updater)
|
|
@users = config['users']
|
|
@domain = config['domain']
|
|
@db = db
|
|
@updater = updater
|
|
|
|
@db.load
|
|
@db['serial'] ||= 1
|
|
@db['hosts'] ||= {}
|
|
(@db.save; @updater.update(@db)) if @db.changed?
|
|
end
|
|
|
|
def call(env)
|
|
return [422, {'X-DynDNS-Response' => 'method_forbidden'}, []] if env["REQUEST_METHOD"] != "GET"
|
|
return [422, {'X-DynDNS-Response' => 'not_found'}, []] if env["PATH_INFO"] != "/nic/update"
|
|
|
|
handle_dyndns_request(env)
|
|
end
|
|
|
|
def self.run!
|
|
if ARGV.length != 1
|
|
puts "Usage: dyndnsd config_file"
|
|
exit 1
|
|
end
|
|
|
|
config_file = ARGV[0]
|
|
|
|
if not File.file?(config_file)
|
|
puts "Config file not found!"
|
|
exit 1
|
|
end
|
|
|
|
puts "DynDNSd version #{Dyndnsd::VERSION}"
|
|
puts "Using config file #{config_file}"
|
|
|
|
config = YAML::load(File.open(config_file, 'r') { |f| f.read })
|
|
|
|
if config['logfile']
|
|
Dyndnsd.logger = Logger.new(config['logfile'])
|
|
else
|
|
Dyndnsd.logger = Logger.new(STDOUT)
|
|
end
|
|
|
|
Dyndnsd.logger.progname = "dyndnsd"
|
|
Dyndnsd.logger.formatter = LogFormatter.new
|
|
|
|
Dyndnsd.logger.info "Starting..."
|
|
|
|
# drop privs (first change group than user)
|
|
Process::Sys.setgid(Etc.getgrnam(config['group']).gid) if config['group']
|
|
Process::Sys.setuid(Etc.getpwnam(config['user']).uid) if config['user']
|
|
|
|
# configure metriks
|
|
if config['graphite']
|
|
host = config['graphite']['host'] || 'localhost'
|
|
port = config['graphite']['port'] || 2003
|
|
options = {}
|
|
options[:prefix] = config['graphite']['prefix'] if config['graphite']['prefix']
|
|
reporter = Metriks::Reporter::Graphite.new(host, port, options)
|
|
reporter.start
|
|
else
|
|
reporter = Metriks::Reporter::ProcTitle.new
|
|
reporter.add 'good', 'sec' do
|
|
Metriks.meter('requests.good').mean_rate
|
|
end
|
|
reporter.add 'nochg', 'sec' do
|
|
Metriks.meter('requests.nochg').mean_rate
|
|
end
|
|
reporter.start
|
|
end
|
|
|
|
# configure daemon
|
|
db = Database.new(config['db'])
|
|
updater = Updater::CommandWithBindZone.new(config['domain'], config['updater']['params']) if config['updater']['name'] == 'command_with_bind_zone'
|
|
|
|
# configure rack
|
|
app = Daemon.new(config, db, updater)
|
|
app = Rack::Auth::Basic.new(app, "DynDNS") do |user,pass|
|
|
allow = ((config['users'].has_key? user) and (config['users'][user]['password'] == pass))
|
|
if not allow
|
|
Dyndnsd.logger.warn "Login failed for #{user}"
|
|
Metriks.meter('requests.auth_failed').mark
|
|
end
|
|
allow
|
|
end
|
|
|
|
if config['responder'] == 'RestStyle'
|
|
app = Responder::RestStyle.new(app)
|
|
else
|
|
app = Responder::DynDNSStyle.new(app)
|
|
end
|
|
|
|
Signal.trap('INT') do
|
|
Dyndnsd.logger.info "Quitting..."
|
|
Rack::Handler::WEBrick.shutdown
|
|
end
|
|
Signal.trap('TERM') do
|
|
Dyndnsd.logger.info "Quitting..."
|
|
Rack::Handler::WEBrick.shutdown
|
|
end
|
|
|
|
Rack::Handler::WEBrick.run app, :Host => config['host'], :Port => config['port']
|
|
end
|
|
|
|
private
|
|
|
|
def is_fqdn_valid?(hostname)
|
|
return false if hostname.length < @domain.length + 2
|
|
return false if not hostname.end_with?(@domain)
|
|
name = hostname.chomp(@domain)
|
|
return false if not name.match(/^[a-zA-Z0-9_-]+\.$/)
|
|
true
|
|
end
|
|
|
|
def is_ip_valid?(ip)
|
|
begin
|
|
IPAddr.new(ip)
|
|
return true
|
|
rescue ArgumentError
|
|
return false
|
|
end
|
|
end
|
|
|
|
def extract_v4_and_v6_address(env, params)
|
|
return [] if not params["myip"]
|
|
begin
|
|
IPAddr.new(params["myip"], Socket::AF_INET)
|
|
IPAddr.new(params["myip6"], Socket::AF_INET6)
|
|
[params["myip"], params["myip6"]]
|
|
rescue ArgumentError
|
|
[]
|
|
end
|
|
end
|
|
|
|
def extract_myips(env, params)
|
|
# require presence of myip parameter as valid IPAddr (v4) and valid myip6
|
|
return extract_v4_and_v6_address(env, params) if params.has_key?("myip6")
|
|
|
|
# check whether myip parameter has valid IPAddr
|
|
return [params["myip"]] if params.has_key?("myip") and is_ip_valid?(params["myip"])
|
|
|
|
# check whether X-Real-IP header has valid IPAddr
|
|
return [env["HTTP_X_REAL_IP"]] if env.has_key?("HTTP_X_REAL_IP") and is_ip_valid?(env["HTTP_X_REAL_IP"])
|
|
|
|
# fallback value, always present
|
|
[env["REMOTE_ADDR"]]
|
|
end
|
|
|
|
def process_changes(hostnames, myips)
|
|
changes = []
|
|
hostnames.each do |hostname|
|
|
# myips order is always deterministic
|
|
if (not @db['hosts'].include? hostname) or (@db['hosts'][hostname] != myips)
|
|
@db['hosts'][hostname] = myips
|
|
changes << :good
|
|
Metriks.meter('requests.good').mark
|
|
else
|
|
changes << :nochg
|
|
Metriks.meter('requests.nochg').mark
|
|
end
|
|
end
|
|
changes
|
|
end
|
|
|
|
def update_db()
|
|
@db['serial'] += 1
|
|
Dyndnsd.logger.info "Committing update ##{@db['serial']}"
|
|
@db.save
|
|
@updater.update(@db)
|
|
Metriks.meter('updates.committed').mark
|
|
end
|
|
|
|
def handle_dyndns_request(env)
|
|
params = Rack::Utils.parse_query(env["QUERY_STRING"])
|
|
|
|
# require hostname parameter
|
|
return [422, {'X-DynDNS-Response' => 'hostname_missing'}, []] if not params["hostname"]
|
|
|
|
hostnames = params["hostname"].split(',')
|
|
|
|
# check for invalid hostnames
|
|
invalid_hostnames = hostnames.select { |hostname| not is_fqdn_valid?(hostname) }
|
|
return [422, {'X-DynDNS-Response' => 'hostname_malformed'}, []] if invalid_hostnames.any?
|
|
|
|
user = env["REMOTE_USER"]
|
|
|
|
# check for hostnames that the user does not own
|
|
forbidden_hostnames = hostnames - @users[user]['hosts']
|
|
return [422, {'X-DynDNS-Response' => 'host_forbidden'}, []] if forbidden_hostnames.any?
|
|
|
|
myips = extract_myips(env, params)
|
|
|
|
# require at least one IP to update
|
|
return [422, {'X-DynDNS-Response' => 'host_forbidden'}, []] if myips.empty?
|
|
|
|
Metriks.meter('requests.valid').mark
|
|
Dyndnsd.logger.info "Request to update #{hostnames} to #{myips} for user #{user}"
|
|
|
|
changes = process_changes(hostnames, myips)
|
|
|
|
update_db if @db.changed?
|
|
|
|
[200, {'X-DynDNS-Response' => 'success'}, [changes, myips]]
|
|
end
|
|
end
|
|
end
|