It's possible for cert-manager to get in a bad state where it thinks there's something to cleanup, but repeatedly fails to clean it up. Not finding the record should not be an error when we're trying to delete the record anyway. Signed-off-by: Frank Hamand <frankhamand@gmail.com>
268 lines
6.6 KiB
Go
268 lines
6.6 KiB
Go
// +skip_license_check
|
|
|
|
/*
|
|
This file contains portions of code directly taken from the 'xenolf/lego' project.
|
|
A copy of the license for this code can be found in the file named LICENSE in
|
|
this directory.
|
|
*/
|
|
|
|
// Package cloudflare implements a DNS provider for solving the DNS-01
|
|
// challenge using cloudflare DNS.
|
|
package cloudflare
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"os"
|
|
"time"
|
|
|
|
"github.com/jetstack/cert-manager/pkg/issuer/acme/dns/util"
|
|
pkgutil "github.com/jetstack/cert-manager/pkg/util"
|
|
)
|
|
|
|
// CloudFlareAPIURL represents the API endpoint to call.
|
|
// TODO: Unexport?
|
|
const CloudFlareAPIURL = "https://api.cloudflare.com/client/v4"
|
|
|
|
// DNSProvider is an implementation of the acme.ChallengeProvider interface
|
|
type DNSProvider struct {
|
|
dns01Nameservers []string
|
|
authEmail string
|
|
authKey string
|
|
}
|
|
|
|
// NewDNSProvider returns a DNSProvider instance configured for cloudflare.
|
|
// Credentials must be passed in the environment variables: CLOUDFLARE_EMAIL
|
|
// and CLOUDFLARE_API_KEY.
|
|
func NewDNSProvider(dns01Nameservers []string) (*DNSProvider, error) {
|
|
email := os.Getenv("CLOUDFLARE_EMAIL")
|
|
key := os.Getenv("CLOUDFLARE_API_KEY")
|
|
return NewDNSProviderCredentials(email, key, dns01Nameservers)
|
|
}
|
|
|
|
// NewDNSProviderCredentials uses the supplied credentials to return a
|
|
// DNSProvider instance configured for cloudflare.
|
|
func NewDNSProviderCredentials(email, key string, dns01Nameservers []string) (*DNSProvider, error) {
|
|
if email == "" || key == "" {
|
|
return nil, fmt.Errorf("CloudFlare credentials missing")
|
|
}
|
|
|
|
return &DNSProvider{
|
|
authEmail: email,
|
|
authKey: key,
|
|
dns01Nameservers: dns01Nameservers,
|
|
}, nil
|
|
}
|
|
|
|
// Timeout returns the timeout and interval to use when checking for DNS
|
|
// propagation. Adjusting here to cope with spikes in propagation times.
|
|
func (c *DNSProvider) Timeout() (timeout, interval time.Duration) {
|
|
return 120 * time.Second, 2 * time.Second
|
|
}
|
|
|
|
// Present creates a TXT record to fulfil the dns-01 challenge
|
|
func (c *DNSProvider) Present(domain, token, keyAuth string) error {
|
|
fqdn, value, _, err := util.DNS01Record(domain, keyAuth, c.dns01Nameservers)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
zoneID, err := c.getHostedZoneID(fqdn)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
record, err := c.findTxtRecord(fqdn)
|
|
if err != nil && err != errNoExistingRecord {
|
|
// this is a real error
|
|
return err
|
|
}
|
|
if record != nil {
|
|
if record.Content == value {
|
|
// the record is already set to the desired value
|
|
return nil
|
|
}
|
|
|
|
_, err = c.makeRequest("DELETE", fmt.Sprintf("/zones/%s/dns_records/%s", record.ZoneID, record.ID), nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
rec := cloudFlareRecord{
|
|
Type: "TXT",
|
|
Name: util.UnFqdn(fqdn),
|
|
Content: value,
|
|
TTL: 120,
|
|
}
|
|
|
|
body, err := json.Marshal(rec)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
_, err = c.makeRequest("POST", fmt.Sprintf("/zones/%s/dns_records", zoneID), bytes.NewReader(body))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// CleanUp removes the TXT record matching the specified parameters
|
|
func (c *DNSProvider) CleanUp(domain, token, keyAuth string) error {
|
|
fqdn, _, _, err := util.DNS01Record(domain, keyAuth, c.dns01Nameservers)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
record, err := c.findTxtRecord(fqdn)
|
|
// Nothing to cleanup
|
|
if err == errNoExistingRecord {
|
|
return nil
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
_, err = c.makeRequest("DELETE", fmt.Sprintf("/zones/%s/dns_records/%s", record.ZoneID, record.ID), nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *DNSProvider) getHostedZoneID(fqdn string) (string, error) {
|
|
// HostedZone represents a CloudFlare DNS zone
|
|
type HostedZone struct {
|
|
ID string `json:"id"`
|
|
Name string `json:"name"`
|
|
}
|
|
|
|
authZone, err := util.FindZoneByFqdn(fqdn, util.RecursiveNameservers)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
result, err := c.makeRequest("GET", "/zones?name="+util.UnFqdn(authZone), nil)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var hostedZone []HostedZone
|
|
err = json.Unmarshal(result, &hostedZone)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
if len(hostedZone) != 1 {
|
|
return "", fmt.Errorf("Zone %s not found in CloudFlare for domain %s", authZone, fqdn)
|
|
}
|
|
|
|
return hostedZone[0].ID, nil
|
|
}
|
|
|
|
var errNoExistingRecord = errors.New("No existing record found")
|
|
|
|
func (c *DNSProvider) findTxtRecord(fqdn string) (*cloudFlareRecord, error) {
|
|
zoneID, err := c.getHostedZoneID(fqdn)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
result, err := c.makeRequest(
|
|
"GET",
|
|
fmt.Sprintf("/zones/%s/dns_records?per_page=1000&type=TXT&name=%s", zoneID, util.UnFqdn(fqdn)),
|
|
nil,
|
|
)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var records []cloudFlareRecord
|
|
err = json.Unmarshal(result, &records)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
for _, rec := range records {
|
|
if rec.Name == util.UnFqdn(fqdn) {
|
|
return &rec, nil
|
|
}
|
|
}
|
|
|
|
return nil, errNoExistingRecord
|
|
}
|
|
|
|
func (c *DNSProvider) makeRequest(method, uri string, body io.Reader) (json.RawMessage, error) {
|
|
// APIError contains error details for failed requests
|
|
type APIError struct {
|
|
Code int `json:"code,omitempty"`
|
|
Message string `json:"message,omitempty"`
|
|
ErrorChain []APIError `json:"error_chain,omitempty"`
|
|
}
|
|
|
|
// APIResponse represents a response from CloudFlare API
|
|
type APIResponse struct {
|
|
Success bool `json:"success"`
|
|
Errors []*APIError `json:"errors"`
|
|
Result json.RawMessage `json:"result"`
|
|
}
|
|
|
|
req, err := http.NewRequest(method, fmt.Sprintf("%s%s", CloudFlareAPIURL, uri), body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
req.Header.Set("X-Auth-Email", c.authEmail)
|
|
req.Header.Set("X-Auth-Key", c.authKey)
|
|
req.Header.Set("User-Agent", pkgutil.CertManagerUserAgent)
|
|
|
|
client := http.Client{
|
|
Timeout: 30 * time.Second,
|
|
}
|
|
resp, err := client.Do(req)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Error querying Cloudflare API -> %v", err)
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
var r APIResponse
|
|
err = json.NewDecoder(resp.Body).Decode(&r)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if !r.Success {
|
|
if len(r.Errors) > 0 {
|
|
errStr := ""
|
|
for _, apiErr := range r.Errors {
|
|
errStr += fmt.Sprintf("\t Error: %d: %s", apiErr.Code, apiErr.Message)
|
|
for _, chainErr := range apiErr.ErrorChain {
|
|
errStr += fmt.Sprintf("<- %d: %s", chainErr.Code, chainErr.Message)
|
|
}
|
|
}
|
|
return nil, fmt.Errorf("Cloudflare API Error \n%s", errStr)
|
|
}
|
|
return nil, fmt.Errorf("Cloudflare API error")
|
|
}
|
|
|
|
return r.Result, nil
|
|
}
|
|
|
|
// cloudFlareRecord represents a CloudFlare DNS record
|
|
type cloudFlareRecord struct {
|
|
Name string `json:"name"`
|
|
Type string `json:"type"`
|
|
Content string `json:"content"`
|
|
ID string `json:"id,omitempty"`
|
|
TTL int `json:"ttl,omitempty"`
|
|
ZoneID string `json:"zone_id,omitempty"`
|
|
}
|