1 # Copyright (c) 2014, Ralf Jung <post@ralfj.de>
4 # Redistribution and use in source and binary forms, with or without
5 # modification, are permitted provided that the following conditions are met:
7 # 1. Redistributions of source code must retain the above copyright notice, this
8 # list of conditions and the following disclaimer.
9 # 2. Redistributions in binary form must reproduce the above copyright notice,
10 # this list of conditions and the following disclaimer in the documentation
11 # and/or other materials provided with the distribution.
13 # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
14 # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
15 # WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
16 # DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
17 # ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
18 # (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
19 # LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
20 # ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
22 # SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 REGEX_label = r'[a-zA-Z90-9]([a-zA-Z90-9-]{0,61}[a-zA-Z90-9])?' # max. 63 characters; must not start or end with hyphen
35 REGEX_ipv4 = r'^\d{1,3}(\.\d{1,3}){3}$'
36 REGEX_ipv6 = r'^[a-fA-F0-9]{1,4}(::?[a-fA-F0-9]{1,4}){1,7}$'
38 def check_label(label: str) -> str:
40 pattern = r'^{0}$'.format(REGEX_label)
41 if re.match(pattern, label):
43 raise Exception(label+" is not a valid label")
45 def check_hostname(name: str) -> str:
47 # check hostname for validity
48 pattern = r'^{0}(\.{0})*\.?$'.format(REGEX_label)
49 if re.match(pattern, name):
51 raise Exception(name+" is not a valid hostname")
53 def check_hex(data: str) -> str:
55 if re.match('^[a-fA-F0-9]+$', data):
57 raise Exception(data+" is not valid hex data")
59 def check_base64(data: str) -> str:
61 if re.match('^[a-zA-Z0-9+/=]+$', data):
63 raise Exception(data+" is not valid hex data")
66 def check_ipv4(address: str) -> str:
67 address = str(address)
68 if re.match(REGEX_ipv4, address):
70 raise Exception(address+" is not a valid IPv4 address")
72 def check_ipv6(address: str) -> str:
73 address = str(address)
74 if re.match(REGEX_ipv6, address):
76 raise Exception(address+" is not a valid IPv6 address")
78 def time(time: int) -> str:
81 elif time % week == 0:
82 return str(time//week)+"w"
84 return str(time//day)+"d"
85 elif time % hour == 0:
86 return str(time//hour)+"h"
87 elif time % minute == 0:
88 return str(time//minute)+"m"
92 def column_widths(datas: 'Sequence', widths: 'Sequence[int]'):
93 assert len(datas) == len(widths)+1, "There must be one more data points as there are widths"
96 for data, width in zip(datas, widths): # will *not* cover the last point
97 result += str(data)+" " # add data point, and a minimal space
99 if len(result) < width_sum: # add padding
100 result += (width_sum - len(result))*" "
102 return result+str(datas[-1])
104 def concatenate(root, path):
105 if path == '' or root == '':
106 raise Exception("Empty domain name is not valid")
109 if root == '@' or path.endswith('.'):
113 def escape_TXT(text):
114 for c in ('\\', '\"'):
115 text = text.replace(c, '\\'+c)
134 def __init__(self, path, recordType, data):
135 '''<path> can be relative or absolute.'''
136 assert re.match(r'^[A-Z]+$', recordType), "got invalid record type"
138 self.recordType = recordType
142 def mapPath(self, f):
143 '''Run the path through f. Returns self, for nicer chaining.'''
144 self.path = f(self.path)
147 def relativize(self, root):
148 return self.mapPath(lambda path: concatenate(root, path))
151 '''Run the current TTL and the recordType through f.'''
152 self.TTL = f(self.TTL, self.recordType)
156 return column_widths((self.path, time(self.TTL), self.recordType, self.data), (8*3, 8, 8))
160 def __init__(self, address: str) -> None:
161 self._address = check_ipv4(address)
163 def generate_rr(self):
164 return RR('@', 'A', self._address)
168 def __init__(self, address: str) -> None:
169 self._address = check_ipv6(address)
171 def generate_rr(self):
172 return RR('@', 'AAAA', self._address)
176 def __init__(self, name: str, prio: int = 10) -> None:
177 self._priority = int(prio)
178 self._name = check_hostname(name)
180 def generate_rr(self):
181 return RR('@', 'MX', '{0} {1}'.format(self._priority, self._name))
185 def __init__(self, text: str) -> None:
186 # test for bad characters
187 for c in ('\n', '\r', '\t'):
189 raise Exception("TXT record {0} contains invalid character")
192 def generate_rr(self):
193 text = escape_TXT(self._text)
194 # split into chunks of max. 255 characters; be careful not to split right after a backslash
195 chunks = re.findall(r'.{0,254}[^\\]', text)
196 assert sum(len(c) for c in chunks) == len (text)
197 chunksep = '"\n' + ' '*20 + '"'
198 chunked = '( "' + chunksep.join(chunks) + '" )'
199 # generate the chunks
200 return RR('@', 'TXT', chunked)
203 class DKIM(TXT): # helper class to treat DKIM more antively
210 def __init__(self, selector, version, alg, key):
211 self._selector = check_label(selector)
212 version = check_label(version)
213 alg = check_label(alg)
214 key = check_base64(key)
215 super().__init__("v={0}; k={1}; p={2}".format(version, alg, key))
217 def generate_rr(self):
218 return super().generate_rr().relativize('{}._domainkey'.format(self._selector))
222 def __init__(self, protocol: str, service: str, name: str, port: int, prio: int, weight: int) -> None:
223 self._service = check_label(service)
224 self._protocol = check_label(protocol)
225 self._priority = int(prio)
226 self._weight = int(weight)
227 self._port = int(port)
228 self._name = check_hostname(name)
230 def generate_rr(self):
231 return RR('_{}._{}'.format(self._service, self._protocol), 'SRV',
232 '{} {} {} {}'.format(self._priority, self._weight, self._port, self._name))
237 CA = 0 # certificate must pass the usual CA check, with the CA specified by the TLSA record
238 EndEntity_PlusCAs = 1 # the certificate must match the TLSA record *and* pass the usual CA check
239 TrustAnchor = 2 # the certificate must pass a check with the TLSA record giving the (only) trust anchor
240 EndEntity = 3 # the certificate must match the TLSA record
244 SubjectPublicKeyInfo = 1
251 def __init__(self, protocol: str, port: int, usage: int, selector: int, matching_type: int, data: str) -> None:
252 self._port = int(port)
253 self._protocol = str(protocol)
254 self._usage = int(usage)
255 self._selector = int(selector)
256 self._matching_type = int(matching_type)
257 self._data = check_hex(data)
259 def generate_rr(self):
260 return RR('_{}._{}'.format(self._port, self._protocol), 'TLSA', '{} {} {} {}'.format(self._usage, self._selector, self._matching_type, self._data))
265 IssueWild = "issuewild"
267 def __init__(self, flag: int, tag: str, value: str) -> None:
268 self._flag = int(flag)
270 self._value = str(value)
272 def generate_rr(self):
273 return RR('@', 'CAA', '{} {} {}'.format(self._flag, self._tag, self._value))
277 def __init__(self, name: str) -> None:
278 self._name = check_hostname(name)
280 def generate_rr(self):
281 return RR('@', 'CNAME', self._name)
285 def __init__(self, name: str) -> None:
286 self._name = check_hostname(name)
288 def generate_rr(self):
289 return RR('@', 'NS', self._name)
293 def __init__(self, tag: int, alg: int, digest: int, key: str) -> None:
295 self._key = check_hex(key)
297 self._digest = int(digest)
299 def generate_rr(self):
300 return RR('@', 'DS', '{} {} {} {}'.format(self._tag, self._alg, self._digest, self._key))
302 ## Higher-level classes
304 def __init__(self, *records: 'List[Any]') -> None:
305 self._records = records
307 def generate_rrs(self):
308 for record in self._records:
309 # this could still be a list
310 if isinstance(record, list):
311 for subrecord in record:
312 yield subrecord.generate_rr()
314 yield record.generate_rr()
317 def CName(name: str) -> Name:
318 return Name(CNAME(name))
321 def Delegation(*names) -> Name:
322 return Name(list(map(NS, names)))
325 def SecureDelegation(tag: int, alg: int, digest: int, key: str, *names) -> Name:
326 return Name(DS(tag, alg, digest, key), list(map(NS, names)))
330 def __init__(self, name: str, serialfile: str, mail: str, NS: 'List[str]', TTLs: 'Dict[str, int]',
331 secondary_refresh: int, secondary_retry: int, secondary_expire: int,
332 domains: 'Dict[str, Any]') -> None:
333 if not name.endswith('.'): raise Exception("Expected an absolute hostname")
334 self._name = check_hostname(name)
335 self._serialfile = serialfile
337 if not mail.endswith('.'): raise Exception("Mail must be absolute, end with a dot")
338 atpos = mail.find('@')
339 if atpos < 0 or atpos > mail.find('.'): raise Exception("Mail must contain an @ before the first dot")
340 self._mail = check_hostname(mail.replace('@', '.', 1))
341 self._NS = list(map(check_hostname, NS))
342 if '' not in TTLs: raise Exception("Must give a default TTL with empty key")
345 self._refresh = secondary_refresh
346 self._retry = secondary_retry
347 self._expire = secondary_expire
349 self._domains = domains
351 def getTTL(self, TTL: int, recordType: str) -> int:
352 if TTL is not None: return TTL
353 # TTL is None, so get a global default
354 return int(self._TTLs.get(recordType, self._TTLs['']))
356 def inc_serial(self) -> int:
360 with open(self._serialfile) as f:
361 cur_serial = int(f.read())
362 except (OSError, IOError): # FileNotFoundError has been added in Python 3.3
367 with open(self._serialfile, 'w') as f:
368 f.write(str(cur_serial))
373 def generate_rrs_from_dict(root, domains):
374 for name in sorted(domains.keys(), key=lambda s: s.split('.')):
375 if name.endswith('.'):
376 raise Exception("You are trying to add a record outside of your zone. This is not supported. Use '@' for the zone root.")
377 domain = domains[name]
378 name = concatenate(root, name)
379 if isinstance(domain, dict):
380 for rr in Zone.generate_rrs_from_dict(name, domain):
383 for rr in domain.generate_rrs():
384 yield rr.relativize(name)
386 def generate_rrs(self) -> 'Iterator':
388 serial = self.inc_serial()
390 ('{NS} {mail} {serial} {refresh} {retry} {expire} {NX_TTL}'+
391 ' ; primns mail serial refresh retry expire NX_TTL').format(
392 NS=self._NS[0], mail=self._mail, serial=serial,
393 refresh=time(self._refresh), retry=time(self._retry), expire=time(self._expire),
394 NX_TTL=time(self.getTTL(None, 'NX')))
397 for name in self._NS:
398 yield NS(name).generate_rr()
400 for rr in Zone.generate_rrs_from_dict('@', self._domains):
403 def write(self) -> None:
404 print(";; {} zone file, generated by zonemaker <https://www.ralfj.de/projects/zonemaker> on {}".format(self._name, datetime.datetime.now()))
405 print("$ORIGIN {}".format(self._name))
406 for rr in map(lambda rr: rr.mapTTL(self.getTTL), self.generate_rrs()):