cert-manager/pkg/issuer/acme/dns/cloudflare/cloudflare.go
Adam Talbot d0ec66237c feat: limit the size of the body read back from http requests
Signed-off-by: Adam Talbot <adam.talbot@venafi.com>
2024-01-08 20:28:01 +00:00

332 lines
9.6 KiB
Go

// +skip_license_check
/*
This file contains portions of code directly taken from the 'xenolf/lego' project.
A copy of the license for this code can be found in the file named LICENSE in
this directory.
*/
// Package cloudflare implements a DNS provider for solving the DNS-01
// challenge using cloudflare DNS.
package cloudflare
import (
"bytes"
"encoding/json"
"errors"
"fmt"
"io"
"net/http"
"os"
"strings"
"time"
"github.com/cert-manager/cert-manager/pkg/issuer/acme/dns/util"
)
// CloudFlareAPIURL represents the API endpoint to call.
// TODO: Unexport?
const CloudFlareAPIURL = "https://api.cloudflare.com/client/v4"
// cloudFlareMaxBodySize is the max size of a received response body. The value is arbitrary
// and is chosen to be large enough that any reasonable response would fit.
const cloudFlareMaxBodySize = 1024 * 1024 // 1mb
// DNSProviderType is the Mockable Interface
type DNSProviderType interface {
makeRequest(method, uri string, body io.Reader) (json.RawMessage, error)
}
// DNSProvider is an implementation of the acme.ChallengeProvider interface
type DNSProvider struct {
dns01Nameservers []string
authEmail string
authKey string
authToken string
userAgent string
}
// DNSZone is the Zone-Record returned from Cloudflare (we`ll ignore everything we don't need)
// See https://api.cloudflare.com/#zone-properties
type DNSZone struct {
ID string `json:"id"`
Name string `json:"name"`
}
// NewDNSProvider returns a DNSProvider instance configured for cloudflare.
// Credentials must be passed in the environment variables: CLOUDFLARE_EMAIL
// and CLOUDFLARE_API_KEY.
func NewDNSProvider(dns01Nameservers []string, userAgent string) (*DNSProvider, error) {
email := os.Getenv("CLOUDFLARE_EMAIL")
key := os.Getenv("CLOUDFLARE_API_KEY")
return NewDNSProviderCredentials(email, key, "", dns01Nameservers, userAgent)
}
// NewDNSProviderCredentials uses the supplied credentials to return a
// DNSProvider instance configured for cloudflare.
func NewDNSProviderCredentials(email, key, token string, dns01Nameservers []string, userAgent string) (*DNSProvider, error) {
if (email == "" && key != "") || (key == "" && token == "") {
return nil, fmt.Errorf("no Cloudflare credential has been given (can be either an API key or an API token)")
}
if key != "" && token != "" {
return nil, fmt.Errorf("the Cloudflare API key and API token cannot be both present simultaneously")
}
// Cloudflare uses the X-Auth-Key header for its authentication.
// However, if the value of the X-Auth-Key header is invalid, the go
// http library will "helpfully" print out the value to help with
// debugging. To prevent leaking the X-Auth-Key value into the logs, we
// first check that the X-Auth-Key header contains a valid value to
// prevent the Go HTTP library from displaying it.
if !validHeaderFieldValue(key) {
return nil, fmt.Errorf("the Cloudflare API key is invalid (does the API key contain a newline?)")
}
if !validHeaderFieldValue(token) {
return nil, fmt.Errorf("the Cloudflare API token is invalid (does the API token contain a newline?)")
}
return &DNSProvider{
authEmail: email,
authKey: key,
authToken: token,
dns01Nameservers: dns01Nameservers,
userAgent: userAgent,
}, nil
}
// FindNearestZoneForFQDN will try to traverse the official Cloudflare API to find the nearest valid Zone.
// It's a replacement for /pkg/issuer/acme/dns/util/wait.go#FindZoneByFqdn
//
// example.com. ← Zone-Record found for the SLD (in most cases)
// └── foo.example.com. ← Zone-Record could be possibly here, but in this case not.
// └── _acme-challenge.foo.example.com. ← Starting point, the FQDN.
//
// It will try to call the API for each branch (from bottom to top) and see if there's a Zone-Record returned.
// Calling See https://api.cloudflare.com/#zone-list-zones
func FindNearestZoneForFQDN(c DNSProviderType, fqdn string) (DNSZone, error) {
if fqdn == "" {
return DNSZone{}, fmt.Errorf("FindNearestZoneForFQDN: FQDN-Parameter can't be empty, please specify a domain!")
}
mappedFQDN := strings.Split(fqdn, ".")
nextName := util.UnFqdn(fqdn) //remove the trailing dot
var lastErr error
for i := 0; i < len(mappedFQDN)-1; i++ {
var from, to = len(mappedFQDN[i]) + 1, len(nextName)
if from > to {
continue
}
if mappedFQDN[i] == "*" { //skip wildcard sub-domain-entries
nextName = string([]rune(nextName)[from:to])
continue
}
lastErr = nil
result, err := c.makeRequest("GET", "/zones?name="+nextName, nil)
if err != nil {
lastErr = err
continue
}
var zones []DNSZone
err = json.Unmarshal(result, &zones)
if err != nil {
return DNSZone{}, err
}
if len(zones) > 0 {
return zones[0], nil //we're returning the first zone found, might need to test that further
}
nextName = string([]rune(nextName)[from:to])
}
if lastErr != nil {
return DNSZone{}, fmt.Errorf("while attempting to find Zones for domain %s\n%s", fqdn, lastErr)
}
return DNSZone{}, fmt.Errorf("Found no Zones for domain %s (neither in the sub-domain nor in the SLD) please make sure your domain-entries in the config are correct and the API key is correctly setup with Zone.read rights.", fqdn)
}
// Present creates a TXT record to fulfil the dns-01 challenge
func (c *DNSProvider) Present(domain, fqdn, value string) error {
_, err := c.findTxtRecord(fqdn, value)
if err == errNoExistingRecord {
rec := cloudFlareRecord{
Type: "TXT",
Name: util.UnFqdn(fqdn),
Content: value,
TTL: 120,
}
body, err := json.Marshal(rec)
if err != nil {
return err
}
zoneID, err := c.getHostedZoneID(fqdn)
if err != nil {
return err
}
_, err = c.makeRequest("POST", fmt.Sprintf("/zones/%s/dns_records", zoneID), bytes.NewReader(body))
if err != nil {
return err
}
return nil
}
if err != nil {
return err
}
return nil
}
// CleanUp removes the TXT record matching the specified parameters
func (c *DNSProvider) CleanUp(domain, fqdn, value string) error {
record, err := c.findTxtRecord(fqdn, value)
// Nothing to cleanup
if err == errNoExistingRecord {
return nil
}
if err != nil {
return err
}
_, err = c.makeRequest("DELETE", fmt.Sprintf("/zones/%s/dns_records/%s", record.ZoneID, record.ID), nil)
if err != nil {
return err
}
return nil
}
func (c *DNSProvider) getHostedZoneID(fqdn string) (string, error) {
hostedZone, err := FindNearestZoneForFQDN(c, fqdn)
if err != nil {
return "", err
}
return hostedZone.ID, nil
}
var errNoExistingRecord = errors.New("No existing record found")
func (c *DNSProvider) findTxtRecord(fqdn, content string) (*cloudFlareRecord, error) {
zoneID, err := c.getHostedZoneID(fqdn)
if err != nil {
return nil, err
}
result, err := c.makeRequest(
"GET",
fmt.Sprintf("/zones/%s/dns_records?per_page=100&type=TXT&name=%s", zoneID, util.UnFqdn(fqdn)),
nil,
)
if err != nil {
return nil, err
}
var records []cloudFlareRecord
err = json.Unmarshal(result, &records)
if err != nil {
return nil, err
}
for _, rec := range records {
if rec.Name == util.UnFqdn(fqdn) && rec.Content == content {
return &rec, nil
}
}
return nil, errNoExistingRecord
}
func (c *DNSProvider) makeRequest(method, uri string, body io.Reader) (json.RawMessage, error) {
// APIError contains error details for failed requests
type APIError struct {
Code int `json:"code,omitempty"`
Message string `json:"message,omitempty"`
ErrorChain []APIError `json:"error_chain,omitempty"`
}
// APIResponse represents a response from CloudFlare API
type APIResponse struct {
Success bool `json:"success"`
Errors []*APIError `json:"errors"`
Result json.RawMessage `json:"result"`
}
req, err := http.NewRequest(method, fmt.Sprintf("%s%s", CloudFlareAPIURL, uri), body)
if err != nil {
return nil, err
}
if c.authEmail != "" {
req.Header.Set("X-Auth-Email", c.authEmail)
}
if c.authToken != "" {
req.Header.Set("Authorization", "Bearer "+c.authToken)
} else {
req.Header.Set("X-Auth-Key", c.authKey)
}
req.Header.Set("User-Agent", c.userAgent)
client := http.Client{
Timeout: 30 * time.Second,
}
resp, err := client.Do(req)
if err != nil {
return nil, fmt.Errorf("while querying the Cloudflare API for %s %q: %v", method, uri, err)
}
defer resp.Body.Close()
var r APIResponse
err = json.NewDecoder(io.LimitReader(resp.Body, cloudFlareMaxBodySize)).Decode(&r)
if err != nil {
return nil, err
}
if !r.Success {
if len(r.Errors) > 0 {
errStr := ""
for _, apiErr := range r.Errors {
errStr += fmt.Sprintf("\t Error: %d: %s", apiErr.Code, apiErr.Message)
for _, chainErr := range apiErr.ErrorChain {
errStr += fmt.Sprintf("<- %d: %s", chainErr.Code, chainErr.Message)
}
}
return nil, fmt.Errorf("while querying the Cloudflare API for %s %q \n%s", method, uri, errStr)
}
return nil, fmt.Errorf("while querying the Cloudflare API for %s %q", method, uri)
}
return r.Result, nil
}
// cloudFlareRecord represents a CloudFlare DNS record
type cloudFlareRecord struct {
Name string `json:"name"`
Type string `json:"type"`
Content string `json:"content"`
ID string `json:"id,omitempty"`
TTL int `json:"ttl,omitempty"`
ZoneID string `json:"zone_id,omitempty"`
}
// following functions are copy-pasted from go's internal
// http server
func validHeaderFieldValue(v string) bool {
for i := 0; i < len(v); i++ {
b := v[i]
if isCTL(b) && !isLWS(b) {
return false
}
}
return true
}
func isCTL(b byte) bool {
const del = 0x7f // a CTL
return b < ' ' || b == del
}
func isLWS(b byte) bool { return b == ' ' || b == '\t' }