]>
Commit | Line | Data |
---|---|---|
f22ab085 | 1 | #!/usr/bin/python |
3fdcb9d1 MT |
2 | ############################################################################### |
3 | # # | |
4 | # ddns - A dynamic DNS client for IPFire # | |
5 | # Copyright (C) 2012 IPFire development team # | |
6 | # # | |
7 | # This program is free software: you can redistribute it and/or modify # | |
8 | # it under the terms of the GNU General Public License as published by # | |
9 | # the Free Software Foundation, either version 3 of the License, or # | |
10 | # (at your option) any later version. # | |
11 | # # | |
12 | # This program is distributed in the hope that it will be useful, # | |
13 | # but WITHOUT ANY WARRANTY; without even the implied warranty of # | |
14 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # | |
15 | # GNU General Public License for more details. # | |
16 | # # | |
17 | # You should have received a copy of the GNU General Public License # | |
18 | # along with this program. If not, see <http://www.gnu.org/licenses/>. # | |
19 | # # | |
20 | ############################################################################### | |
f22ab085 | 21 | |
37e24fbf | 22 | import datetime |
7399fc5b | 23 | import logging |
64d3fad4 | 24 | import os |
a892c594 | 25 | import subprocess |
3b16fdb1 | 26 | import urllib2 |
d1cd57eb | 27 | import xml.dom.minidom |
7399fc5b MT |
28 | |
29 | from i18n import _ | |
30 | ||
f22ab085 MT |
31 | # Import all possible exception types. |
32 | from .errors import * | |
33 | ||
7399fc5b MT |
34 | logger = logging.getLogger("ddns.providers") |
35 | logger.propagate = 1 | |
36 | ||
adfe6272 MT |
37 | _providers = {} |
38 | ||
39 | def get(): | |
40 | """ | |
41 | Returns a dict with all automatically registered providers. | |
42 | """ | |
43 | return _providers.copy() | |
44 | ||
f22ab085 | 45 | class DDNSProvider(object): |
6a11646e MT |
46 | # A short string that uniquely identifies |
47 | # this provider. | |
48 | handle = None | |
f22ab085 | 49 | |
6a11646e MT |
50 | # The full name of the provider. |
51 | name = None | |
f22ab085 | 52 | |
6a11646e MT |
53 | # A weburl to the homepage of the provider. |
54 | # (Where to register a new account?) | |
55 | website = None | |
f22ab085 | 56 | |
6a11646e MT |
57 | # A list of supported protocols. |
58 | protocols = ("ipv6", "ipv4") | |
f22ab085 MT |
59 | |
60 | DEFAULT_SETTINGS = {} | |
61 | ||
37e24fbf MT |
62 | # holdoff time - Number of days no update is performed unless |
63 | # the IP address has changed. | |
64 | holdoff_days = 30 | |
65 | ||
112d3fb8 MT |
66 | # holdoff time for update failures - Number of days no update |
67 | # is tried after the last one has failed. | |
68 | holdoff_failure_days = 0.5 | |
69 | ||
29c8c9c6 MT |
70 | # True if the provider is able to remove records, too. |
71 | # Required to remove AAAA records if IPv6 is absent again. | |
72 | can_remove_records = True | |
73 | ||
adfe6272 MT |
74 | # Automatically register all providers. |
75 | class __metaclass__(type): | |
76 | def __init__(provider, name, bases, dict): | |
77 | type.__init__(provider, name, bases, dict) | |
78 | ||
79 | # The main class from which is inherited is not registered | |
80 | # as a provider. | |
81 | if name == "DDNSProvider": | |
82 | return | |
83 | ||
84 | if not all((provider.handle, provider.name, provider.website)): | |
85 | raise DDNSError(_("Provider is not properly configured")) | |
86 | ||
87 | assert not _providers.has_key(provider.handle), \ | |
88 | "Provider '%s' has already been registered" % provider.handle | |
89 | ||
90 | _providers[provider.handle] = provider | |
91 | ||
64d3fad4 MT |
92 | @staticmethod |
93 | def supported(): | |
94 | """ | |
95 | Should be overwritten to check if the system the code is running | |
96 | on has all the required tools to support this provider. | |
97 | """ | |
98 | return True | |
99 | ||
f22ab085 MT |
100 | def __init__(self, core, **settings): |
101 | self.core = core | |
102 | ||
103 | # Copy a set of default settings and | |
104 | # update them by those from the configuration file. | |
105 | self.settings = self.DEFAULT_SETTINGS.copy() | |
106 | self.settings.update(settings) | |
107 | ||
108 | def __repr__(self): | |
109 | return "<DDNS Provider %s (%s)>" % (self.name, self.handle) | |
110 | ||
111 | def __cmp__(self, other): | |
112 | return cmp(self.hostname, other.hostname) | |
113 | ||
37e24fbf MT |
114 | @property |
115 | def db(self): | |
116 | return self.core.db | |
117 | ||
f22ab085 MT |
118 | def get(self, key, default=None): |
119 | """ | |
120 | Get a setting from the settings dictionary. | |
121 | """ | |
122 | return self.settings.get(key, default) | |
123 | ||
124 | @property | |
125 | def hostname(self): | |
126 | """ | |
127 | Fast access to the hostname. | |
128 | """ | |
129 | return self.get("hostname") | |
130 | ||
131 | @property | |
132 | def username(self): | |
133 | """ | |
134 | Fast access to the username. | |
135 | """ | |
136 | return self.get("username") | |
137 | ||
138 | @property | |
139 | def password(self): | |
140 | """ | |
141 | Fast access to the password. | |
142 | """ | |
143 | return self.get("password") | |
144 | ||
46687828 SS |
145 | @property |
146 | def token(self): | |
147 | """ | |
148 | Fast access to the token. | |
149 | """ | |
150 | return self.get("token") | |
151 | ||
9da3e685 MT |
152 | def __call__(self, force=False): |
153 | if force: | |
c3888f15 | 154 | logger.debug(_("Updating %s forced") % self.hostname) |
9da3e685 | 155 | |
112d3fb8 MT |
156 | # Do nothing if the last update has failed or no update is required |
157 | elif self.has_failure or not self.requires_update: | |
7399fc5b MT |
158 | return |
159 | ||
160 | # Execute the update. | |
37e24fbf MT |
161 | try: |
162 | self.update() | |
163 | ||
164 | # In case of any errors, log the failed request and | |
165 | # raise the exception. | |
166 | except DDNSError as e: | |
167 | self.core.db.log_failure(self.hostname, e) | |
168 | raise | |
5f402f36 | 169 | |
12b3818b MT |
170 | logger.info(_("Dynamic DNS update for %(hostname)s (%(provider)s) successful") % \ |
171 | { "hostname" : self.hostname, "provider" : self.name }) | |
37e24fbf | 172 | self.core.db.log_success(self.hostname) |
12b3818b | 173 | |
5f402f36 | 174 | def update(self): |
d45139f6 MT |
175 | for protocol in self.protocols: |
176 | if self.have_address(protocol): | |
177 | self.update_protocol(protocol) | |
29c8c9c6 | 178 | elif self.can_remove_records: |
d45139f6 MT |
179 | self.remove_protocol(protocol) |
180 | ||
181 | def update_protocol(self, proto): | |
f22ab085 MT |
182 | raise NotImplementedError |
183 | ||
d45139f6 | 184 | def remove_protocol(self, proto): |
29c8c9c6 MT |
185 | if not self.can_remove_records: |
186 | raise RuntimeError, "can_remove_records is enabled, but remove_protocol() not implemented" | |
d45139f6 | 187 | |
29c8c9c6 | 188 | raise NotImplementedError |
d45139f6 | 189 | |
37e24fbf MT |
190 | @property |
191 | def requires_update(self): | |
192 | # If the IP addresses have changed, an update is required | |
193 | if self.ip_address_changed(self.protocols): | |
194 | logger.debug(_("An update for %(hostname)s (%(provider)s)" | |
195 | " is performed because of an IP address change") % \ | |
196 | { "hostname" : self.hostname, "provider" : self.name }) | |
197 | ||
198 | return True | |
199 | ||
200 | # If the holdoff time has expired, an update is required, too | |
201 | if self.holdoff_time_expired(): | |
202 | logger.debug(_("An update for %(hostname)s (%(provider)s)" | |
203 | " is performed because the holdoff time has expired") % \ | |
204 | { "hostname" : self.hostname, "provider" : self.name }) | |
205 | ||
206 | return True | |
207 | ||
208 | # Otherwise, we don't need to perform an update | |
209 | logger.debug(_("No update required for %(hostname)s (%(provider)s)") % \ | |
210 | { "hostname" : self.hostname, "provider" : self.name }) | |
211 | ||
212 | return False | |
213 | ||
112d3fb8 MT |
214 | @property |
215 | def has_failure(self): | |
216 | """ | |
217 | Returns True when the last update has failed and no retry | |
218 | should be performed, yet. | |
219 | """ | |
220 | last_status = self.db.last_update_status(self.hostname) | |
221 | ||
222 | # Return False if the last update has not failed. | |
223 | if not last_status == "failure": | |
224 | return False | |
225 | ||
64018439 MT |
226 | # If there is no holdoff time, we won't update ever again. |
227 | if self.holdoff_failure_days is None: | |
228 | logger.warning(_("An update has not been performed because earlier updates failed for %s") \ | |
229 | % self.hostname) | |
230 | logger.warning(_("There will be no retries")) | |
231 | ||
232 | return True | |
233 | ||
112d3fb8 MT |
234 | # Determine when the holdoff time ends |
235 | last_update = self.db.last_update(self.hostname, status=last_status) | |
236 | holdoff_end = last_update + datetime.timedelta(days=self.holdoff_failure_days) | |
237 | ||
238 | now = datetime.datetime.utcnow() | |
239 | if now < holdoff_end: | |
240 | failure_message = self.db.last_update_failure_message(self.hostname) | |
241 | ||
242 | logger.warning(_("An update has not been performed because earlier updates failed for %s") \ | |
243 | % self.hostname) | |
244 | ||
245 | if failure_message: | |
246 | logger.warning(_("Last failure message:")) | |
247 | ||
248 | for line in failure_message.splitlines(): | |
249 | logger.warning(" %s" % line) | |
250 | ||
251 | logger.warning(_("Further updates will be withheld until %s") % holdoff_end) | |
252 | ||
253 | return True | |
254 | ||
255 | return False | |
256 | ||
37e24fbf | 257 | def ip_address_changed(self, protos): |
7399fc5b MT |
258 | """ |
259 | Returns True if this host is already up to date | |
260 | and does not need to change the IP address on the | |
261 | name server. | |
262 | """ | |
263 | for proto in protos: | |
264 | addresses = self.core.system.resolve(self.hostname, proto) | |
7399fc5b MT |
265 | current_address = self.get_address(proto) |
266 | ||
29c8c9c6 MT |
267 | # Handle if the system has not got any IP address from a protocol |
268 | # (i.e. had full dual-stack connectivity which it has not any more) | |
269 | if current_address is None: | |
270 | # If addresses still exists in the DNS system and if this provider | |
271 | # is able to remove records, we will do that. | |
272 | if addresses and self.can_remove_records: | |
273 | return True | |
274 | ||
275 | # Otherwise, we cannot go on... | |
38d81db4 MT |
276 | continue |
277 | ||
7399fc5b | 278 | if not current_address in addresses: |
37e24fbf MT |
279 | return True |
280 | ||
281 | return False | |
7399fc5b | 282 | |
37e24fbf MT |
283 | def holdoff_time_expired(self): |
284 | """ | |
285 | Returns true if the holdoff time has expired | |
286 | and the host requires an update | |
287 | """ | |
288 | # If no holdoff days is defined, we cannot go on | |
289 | if not self.holdoff_days: | |
290 | return False | |
291 | ||
292 | # Get the timestamp of the last successfull update | |
112d3fb8 | 293 | last_update = self.db.last_update(self.hostname, status="success") |
37e24fbf MT |
294 | |
295 | # If no timestamp has been recorded, no update has been | |
296 | # performed. An update should be performed now. | |
297 | if not last_update: | |
298 | return True | |
7399fc5b | 299 | |
37e24fbf MT |
300 | # Determine when the holdoff time ends |
301 | holdoff_end = last_update + datetime.timedelta(days=self.holdoff_days) | |
302 | ||
303 | now = datetime.datetime.utcnow() | |
304 | ||
305 | if now >= holdoff_end: | |
306 | logger.debug("The holdoff time has expired for %s" % self.hostname) | |
307 | return True | |
308 | else: | |
309 | logger.debug("Updates for %s are held off until %s" % \ | |
310 | (self.hostname, holdoff_end)) | |
311 | return False | |
7399fc5b | 312 | |
f22ab085 MT |
313 | def send_request(self, *args, **kwargs): |
314 | """ | |
315 | Proxy connection to the send request | |
316 | method. | |
317 | """ | |
318 | return self.core.system.send_request(*args, **kwargs) | |
319 | ||
e3c70807 | 320 | def get_address(self, proto, default=None): |
f22ab085 MT |
321 | """ |
322 | Proxy method to get the current IP address. | |
323 | """ | |
e3c70807 | 324 | return self.core.system.get_address(proto) or default |
f22ab085 | 325 | |
d45139f6 MT |
326 | def have_address(self, proto): |
327 | """ | |
328 | Returns True if an IP address for the given protocol | |
329 | is known and usable. | |
330 | """ | |
331 | address = self.get_address(proto) | |
332 | ||
333 | if address: | |
334 | return True | |
335 | ||
336 | return False | |
337 | ||
f22ab085 | 338 | |
5d4bec40 MT |
339 | class DDNSProtocolDynDNS2(object): |
340 | """ | |
341 | This is an abstract class that implements the DynDNS updater | |
342 | protocol version 2. As this is a popular way to update dynamic | |
343 | DNS records, this class is supposed make the provider classes | |
344 | shorter and simpler. | |
345 | """ | |
346 | ||
347 | # Information about the format of the request is to be found | |
486c1b9d | 348 | # http://dyn.com/support/developers/api/perform-update/ |
5d4bec40 MT |
349 | # http://dyn.com/support/developers/api/return-codes/ |
350 | ||
29c8c9c6 MT |
351 | # The DynDNS protocol version 2 does not allow to remove records |
352 | can_remove_records = False | |
353 | ||
d45139f6 | 354 | def prepare_request_data(self, proto): |
5d4bec40 MT |
355 | data = { |
356 | "hostname" : self.hostname, | |
d45139f6 | 357 | "myip" : self.get_address(proto), |
5d4bec40 MT |
358 | } |
359 | ||
360 | return data | |
361 | ||
d45139f6 MT |
362 | def update_protocol(self, proto): |
363 | data = self.prepare_request_data(proto) | |
364 | ||
365 | return self.send_request(data) | |
5d4bec40 | 366 | |
d45139f6 | 367 | def send_request(self, data): |
5d4bec40 | 368 | # Send update to the server. |
d45139f6 | 369 | response = DDNSProvider.send_request(self, self.url, data=data, |
5d4bec40 MT |
370 | username=self.username, password=self.password) |
371 | ||
372 | # Get the full response message. | |
373 | output = response.read() | |
374 | ||
375 | # Handle success messages. | |
376 | if output.startswith("good") or output.startswith("nochg"): | |
377 | return | |
378 | ||
379 | # Handle error codes. | |
380 | if output == "badauth": | |
381 | raise DDNSAuthenticationError | |
af97e369 | 382 | elif output == "abuse": |
5d4bec40 MT |
383 | raise DDNSAbuseError |
384 | elif output == "notfqdn": | |
385 | raise DDNSRequestError(_("No valid FQDN was given.")) | |
386 | elif output == "nohost": | |
387 | raise DDNSRequestError(_("Specified host does not exist.")) | |
388 | elif output == "911": | |
389 | raise DDNSInternalServerError | |
390 | elif output == "dnserr": | |
391 | raise DDNSInternalServerError(_("DNS error encountered.")) | |
6ddfd5c7 SS |
392 | elif output == "badagent": |
393 | raise DDNSBlockedError | |
5d4bec40 MT |
394 | |
395 | # If we got here, some other update error happened. | |
396 | raise DDNSUpdateError(_("Server response: %s") % output) | |
397 | ||
398 | ||
78c9780b SS |
399 | class DDNSResponseParserXML(object): |
400 | """ | |
401 | This class provides a parser for XML responses which | |
402 | will be sent by various providers. This class uses the python | |
403 | shipped XML minidom module to walk through the XML tree and return | |
404 | a requested element. | |
405 | """ | |
406 | ||
407 | def get_xml_tag_value(self, document, content): | |
408 | # Send input to the parser. | |
409 | xmldoc = xml.dom.minidom.parseString(document) | |
410 | ||
411 | # Get XML elements by the given content. | |
412 | element = xmldoc.getElementsByTagName(content) | |
413 | ||
414 | # If no element has been found, we directly can return None. | |
415 | if not element: | |
416 | return None | |
417 | ||
418 | # Only get the first child from an element, even there are more than one. | |
419 | firstchild = element[0].firstChild | |
420 | ||
421 | # Get the value of the child. | |
422 | value = firstchild.nodeValue | |
423 | ||
424 | # Return the value. | |
425 | return value | |
426 | ||
427 | ||
3b16fdb1 | 428 | class DDNSProviderAllInkl(DDNSProvider): |
6a11646e MT |
429 | handle = "all-inkl.com" |
430 | name = "All-inkl.com" | |
431 | website = "http://all-inkl.com/" | |
432 | protocols = ("ipv4",) | |
3b16fdb1 SS |
433 | |
434 | # There are only information provided by the vendor how to | |
435 | # perform an update on a FRITZ Box. Grab requried informations | |
436 | # from the net. | |
437 | # http://all-inkl.goetze.it/v01/ddns-mit-einfachen-mitteln/ | |
438 | ||
439 | url = "http://dyndns.kasserver.com" | |
29c8c9c6 | 440 | can_remove_records = False |
3b16fdb1 SS |
441 | |
442 | def update(self): | |
3b16fdb1 SS |
443 | # There is no additional data required so we directly can |
444 | # send our request. | |
536e87d1 | 445 | response = self.send_request(self.url, username=self.username, password=self.password) |
3b16fdb1 SS |
446 | |
447 | # Get the full response message. | |
448 | output = response.read() | |
449 | ||
450 | # Handle success messages. | |
451 | if output.startswith("good") or output.startswith("nochg"): | |
452 | return | |
453 | ||
454 | # If we got here, some other update error happened. | |
455 | raise DDNSUpdateError | |
456 | ||
457 | ||
a892c594 MT |
458 | class DDNSProviderBindNsupdate(DDNSProvider): |
459 | handle = "nsupdate" | |
460 | name = "BIND nsupdate utility" | |
461 | website = "http://en.wikipedia.org/wiki/Nsupdate" | |
462 | ||
463 | DEFAULT_TTL = 60 | |
464 | ||
64d3fad4 MT |
465 | @staticmethod |
466 | def supported(): | |
467 | # Search if the nsupdate utility is available | |
468 | paths = os.environ.get("PATH") | |
469 | ||
470 | for path in paths.split(":"): | |
471 | executable = os.path.join(path, "nsupdate") | |
472 | ||
473 | if os.path.exists(executable): | |
474 | return True | |
475 | ||
476 | return False | |
477 | ||
a892c594 MT |
478 | def update(self): |
479 | scriptlet = self.__make_scriptlet() | |
480 | ||
481 | # -v enables TCP hence we transfer keys and other data that may | |
482 | # exceed the size of one packet. | |
483 | # -t sets the timeout | |
484 | command = ["nsupdate", "-v", "-t", "60"] | |
485 | ||
486 | p = subprocess.Popen(command, shell=True, | |
487 | stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE, | |
488 | ) | |
489 | stdout, stderr = p.communicate(scriptlet) | |
490 | ||
491 | if p.returncode == 0: | |
492 | return | |
493 | ||
494 | raise DDNSError("nsupdate terminated with error code: %s\n %s" % (p.returncode, stderr)) | |
495 | ||
496 | def __make_scriptlet(self): | |
497 | scriptlet = [] | |
498 | ||
499 | # Set a different server the update is sent to. | |
500 | server = self.get("server", None) | |
501 | if server: | |
502 | scriptlet.append("server %s" % server) | |
503 | ||
97998aac MW |
504 | # Set the DNS zone the host should be added to. |
505 | zone = self.get("zone", None) | |
506 | if zone: | |
507 | scriptlet.append("zone %s" % zone) | |
508 | ||
a892c594 MT |
509 | key = self.get("key", None) |
510 | if key: | |
511 | secret = self.get("secret") | |
512 | ||
513 | scriptlet.append("key %s %s" % (key, secret)) | |
514 | ||
515 | ttl = self.get("ttl", self.DEFAULT_TTL) | |
516 | ||
517 | # Perform an update for each supported protocol. | |
518 | for rrtype, proto in (("AAAA", "ipv6"), ("A", "ipv4")): | |
519 | address = self.get_address(proto) | |
520 | if not address: | |
521 | continue | |
522 | ||
523 | scriptlet.append("update delete %s. %s" % (self.hostname, rrtype)) | |
524 | scriptlet.append("update add %s. %s %s %s" % \ | |
525 | (self.hostname, ttl, rrtype, address)) | |
526 | ||
527 | # Send the actions to the server. | |
528 | scriptlet.append("send") | |
529 | scriptlet.append("quit") | |
530 | ||
531 | logger.debug(_("Scriptlet:")) | |
532 | for line in scriptlet: | |
533 | # Masquerade the line with the secret key. | |
534 | if line.startswith("key"): | |
535 | line = "key **** ****" | |
536 | ||
537 | logger.debug(" %s" % line) | |
538 | ||
539 | return "\n".join(scriptlet) | |
540 | ||
541 | ||
f3cf1f70 | 542 | class DDNSProviderDHS(DDNSProvider): |
6a11646e MT |
543 | handle = "dhs.org" |
544 | name = "DHS International" | |
545 | website = "http://dhs.org/" | |
546 | protocols = ("ipv4",) | |
f3cf1f70 SS |
547 | |
548 | # No information about the used update api provided on webpage, | |
549 | # grabed from source code of ez-ipudate. | |
b2b05ef3 | 550 | |
f3cf1f70 | 551 | url = "http://members.dhs.org/nic/hosts" |
29c8c9c6 | 552 | can_remove_records = False |
f3cf1f70 | 553 | |
d45139f6 | 554 | def update_protocol(self, proto): |
f3cf1f70 SS |
555 | data = { |
556 | "domain" : self.hostname, | |
d45139f6 | 557 | "ip" : self.get_address(proto), |
f3cf1f70 SS |
558 | "hostcmd" : "edit", |
559 | "hostcmdstage" : "2", | |
560 | "type" : "4", | |
561 | } | |
562 | ||
563 | # Send update to the server. | |
175c9b80 | 564 | response = self.send_request(self.url, username=self.username, password=self.password, |
f3cf1f70 SS |
565 | data=data) |
566 | ||
567 | # Handle success messages. | |
568 | if response.code == 200: | |
569 | return | |
570 | ||
f3cf1f70 SS |
571 | # If we got here, some other update error happened. |
572 | raise DDNSUpdateError | |
573 | ||
574 | ||
39301272 | 575 | class DDNSProviderDNSpark(DDNSProvider): |
6a11646e MT |
576 | handle = "dnspark.com" |
577 | name = "DNS Park" | |
578 | website = "http://dnspark.com/" | |
579 | protocols = ("ipv4",) | |
39301272 SS |
580 | |
581 | # Informations to the used api can be found here: | |
582 | # https://dnspark.zendesk.com/entries/31229348-Dynamic-DNS-API-Documentation | |
b2b05ef3 | 583 | |
39301272 | 584 | url = "https://control.dnspark.com/api/dynamic/update.php" |
29c8c9c6 | 585 | can_remove_records = False |
39301272 | 586 | |
d45139f6 | 587 | def update_protocol(self, proto): |
39301272 SS |
588 | data = { |
589 | "domain" : self.hostname, | |
d45139f6 | 590 | "ip" : self.get_address(proto), |
39301272 SS |
591 | } |
592 | ||
593 | # Send update to the server. | |
175c9b80 | 594 | response = self.send_request(self.url, username=self.username, password=self.password, |
39301272 SS |
595 | data=data) |
596 | ||
597 | # Get the full response message. | |
598 | output = response.read() | |
599 | ||
600 | # Handle success messages. | |
601 | if output.startswith("ok") or output.startswith("nochange"): | |
602 | return | |
603 | ||
604 | # Handle error codes. | |
605 | if output == "unauth": | |
606 | raise DDNSAuthenticationError | |
607 | elif output == "abuse": | |
608 | raise DDNSAbuseError | |
609 | elif output == "blocked": | |
610 | raise DDNSBlockedError | |
611 | elif output == "nofqdn": | |
612 | raise DDNSRequestError(_("No valid FQDN was given.")) | |
613 | elif output == "nohost": | |
614 | raise DDNSRequestError(_("Invalid hostname specified.")) | |
615 | elif output == "notdyn": | |
616 | raise DDNSRequestError(_("Hostname not marked as a dynamic host.")) | |
617 | elif output == "invalid": | |
618 | raise DDNSRequestError(_("Invalid IP address has been sent.")) | |
619 | ||
620 | # If we got here, some other update error happened. | |
621 | raise DDNSUpdateError | |
622 | ||
43b2cd59 SS |
623 | |
624 | class DDNSProviderDtDNS(DDNSProvider): | |
6a11646e MT |
625 | handle = "dtdns.com" |
626 | name = "DtDNS" | |
627 | website = "http://dtdns.com/" | |
628 | protocols = ("ipv4",) | |
43b2cd59 SS |
629 | |
630 | # Information about the format of the HTTPS request is to be found | |
631 | # http://www.dtdns.com/dtsite/updatespec | |
b2b05ef3 | 632 | |
43b2cd59 | 633 | url = "https://www.dtdns.com/api/autodns.cfm" |
29c8c9c6 | 634 | can_remove_records = False |
43b2cd59 | 635 | |
d45139f6 | 636 | def update_protocol(self, proto): |
43b2cd59 | 637 | data = { |
d45139f6 | 638 | "ip" : self.get_address(proto), |
43b2cd59 SS |
639 | "id" : self.hostname, |
640 | "pw" : self.password | |
641 | } | |
642 | ||
643 | # Send update to the server. | |
644 | response = self.send_request(self.url, data=data) | |
645 | ||
646 | # Get the full response message. | |
647 | output = response.read() | |
648 | ||
649 | # Remove all leading and trailing whitespace. | |
650 | output = output.strip() | |
651 | ||
652 | # Handle success messages. | |
653 | if "now points to" in output: | |
654 | return | |
655 | ||
656 | # Handle error codes. | |
657 | if output == "No hostname to update was supplied.": | |
658 | raise DDNSRequestError(_("No hostname specified.")) | |
659 | ||
660 | elif output == "The hostname you supplied is not valid.": | |
661 | raise DDNSRequestError(_("Invalid hostname specified.")) | |
662 | ||
663 | elif output == "The password you supplied is not valid.": | |
664 | raise DDNSAuthenticationError | |
665 | ||
666 | elif output == "Administration has disabled this account.": | |
667 | raise DDNSRequestError(_("Account has been disabled.")) | |
668 | ||
669 | elif output == "Illegal character in IP.": | |
670 | raise DDNSRequestError(_("Invalid IP address has been sent.")) | |
671 | ||
672 | elif output == "Too many failed requests.": | |
673 | raise DDNSRequestError(_("Too many failed requests.")) | |
674 | ||
675 | # If we got here, some other update error happened. | |
676 | raise DDNSUpdateError | |
677 | ||
678 | ||
5d4bec40 | 679 | class DDNSProviderDynDNS(DDNSProtocolDynDNS2, DDNSProvider): |
6a11646e MT |
680 | handle = "dyndns.org" |
681 | name = "Dyn" | |
682 | website = "http://dyn.com/dns/" | |
683 | protocols = ("ipv4",) | |
bfed6701 SS |
684 | |
685 | # Information about the format of the request is to be found | |
686 | # http://http://dyn.com/support/developers/api/perform-update/ | |
687 | # http://dyn.com/support/developers/api/return-codes/ | |
b2b05ef3 | 688 | |
bfed6701 SS |
689 | url = "https://members.dyndns.org/nic/update" |
690 | ||
bfed6701 | 691 | |
5d4bec40 | 692 | class DDNSProviderDynU(DDNSProtocolDynDNS2, DDNSProvider): |
6a11646e MT |
693 | handle = "dynu.com" |
694 | name = "Dynu" | |
695 | website = "http://dynu.com/" | |
696 | protocols = ("ipv6", "ipv4",) | |
3a8407fa SS |
697 | |
698 | # Detailed information about the request and response codes | |
699 | # are available on the providers webpage. | |
700 | # http://dynu.com/Default.aspx?page=dnsapi | |
701 | ||
702 | url = "https://api.dynu.com/nic/update" | |
703 | ||
d45139f6 MT |
704 | # DynU sends the IPv6 and IPv4 address in one request |
705 | ||
706 | def update(self): | |
707 | data = DDNSProtocolDynDNS2.prepare_request_data(self, "ipv4") | |
54d3efc8 MT |
708 | |
709 | # This one supports IPv6 | |
cdc078dc SS |
710 | myipv6 = self.get_address("ipv6") |
711 | ||
712 | # Add update information if we have an IPv6 address. | |
713 | if myipv6: | |
714 | data["myipv6"] = myipv6 | |
54d3efc8 | 715 | |
304026a3 | 716 | self.send_request(data) |
3a8407fa SS |
717 | |
718 | ||
5d4bec40 MT |
719 | class DDNSProviderEasyDNS(DDNSProtocolDynDNS2, DDNSProvider): |
720 | handle = "easydns.com" | |
721 | name = "EasyDNS" | |
722 | website = "http://www.easydns.com/" | |
723 | protocols = ("ipv4",) | |
ee071271 SS |
724 | |
725 | # There is only some basic documentation provided by the vendor, | |
726 | # also searching the web gain very poor results. | |
727 | # http://mediawiki.easydns.com/index.php/Dynamic_DNS | |
728 | ||
729 | url = "http://api.cp.easydns.com/dyn/tomato.php" | |
730 | ||
731 | ||
90fe8843 CE |
732 | class DDNSProviderDomopoli(DDNSProtocolDynDNS2, DDNSProvider): |
733 | handle = "domopoli.de" | |
734 | name = "domopoli.de" | |
735 | website = "http://domopoli.de/" | |
736 | protocols = ("ipv4",) | |
737 | ||
738 | # https://www.domopoli.de/?page=howto#DynDns_start | |
739 | ||
740 | url = "http://dyndns.domopoli.de/nic/update" | |
741 | ||
742 | ||
a197d1a6 SS |
743 | class DDNSProviderDynsNet(DDNSProvider): |
744 | handle = "dyns.net" | |
745 | name = "DyNS" | |
746 | website = "http://www.dyns.net/" | |
747 | protocols = ("ipv4",) | |
29c8c9c6 | 748 | can_remove_records = False |
a197d1a6 SS |
749 | |
750 | # There is very detailed informatio about how to send the update request and | |
751 | # the possible response codes. (Currently we are using the v1.1 proto) | |
752 | # http://www.dyns.net/documentation/technical/protocol/ | |
753 | ||
754 | url = "http://www.dyns.net/postscript011.php" | |
755 | ||
d45139f6 | 756 | def update_protocol(self, proto): |
a197d1a6 | 757 | data = { |
d45139f6 | 758 | "ip" : self.get_address(proto), |
a197d1a6 SS |
759 | "host" : self.hostname, |
760 | "username" : self.username, | |
761 | "password" : self.password, | |
762 | } | |
763 | ||
764 | # Send update to the server. | |
765 | response = self.send_request(self.url, data=data) | |
766 | ||
767 | # Get the full response message. | |
768 | output = response.read() | |
769 | ||
770 | # Handle success messages. | |
771 | if output.startswith("200"): | |
772 | return | |
773 | ||
774 | # Handle error codes. | |
775 | if output.startswith("400"): | |
776 | raise DDNSRequestError(_("Malformed request has been sent.")) | |
777 | elif output.startswith("401"): | |
778 | raise DDNSAuthenticationError | |
779 | elif output.startswith("402"): | |
780 | raise DDNSRequestError(_("Too frequent update requests have been sent.")) | |
781 | elif output.startswith("403"): | |
782 | raise DDNSInternalServerError | |
783 | ||
784 | # If we got here, some other update error happened. | |
785 | raise DDNSUpdateError(_("Server response: %s") % output) | |
786 | ||
787 | ||
35216523 SS |
788 | class DDNSProviderEnomCom(DDNSResponseParserXML, DDNSProvider): |
789 | handle = "enom.com" | |
790 | name = "eNom Inc." | |
791 | website = "http://www.enom.com/" | |
d45139f6 | 792 | protocols = ("ipv4",) |
35216523 SS |
793 | |
794 | # There are very detailed information about how to send an update request and | |
795 | # the respone codes. | |
796 | # http://www.enom.com/APICommandCatalog/ | |
797 | ||
798 | url = "https://dynamic.name-services.com/interface.asp" | |
29c8c9c6 | 799 | can_remove_records = False |
35216523 | 800 | |
d45139f6 | 801 | def update_protocol(self, proto): |
35216523 SS |
802 | data = { |
803 | "command" : "setdnshost", | |
804 | "responsetype" : "xml", | |
d45139f6 | 805 | "address" : self.get_address(proto), |
35216523 SS |
806 | "domainpassword" : self.password, |
807 | "zone" : self.hostname | |
808 | } | |
809 | ||
810 | # Send update to the server. | |
811 | response = self.send_request(self.url, data=data) | |
812 | ||
813 | # Get the full response message. | |
814 | output = response.read() | |
815 | ||
816 | # Handle success messages. | |
817 | if self.get_xml_tag_value(output, "ErrCount") == "0": | |
818 | return | |
819 | ||
820 | # Handle error codes. | |
821 | errorcode = self.get_xml_tag_value(output, "ResponseNumber") | |
822 | ||
823 | if errorcode == "304155": | |
824 | raise DDNSAuthenticationError | |
825 | elif errorcode == "304153": | |
826 | raise DDNSRequestError(_("Domain not found.")) | |
827 | ||
828 | # If we got here, some other update error happened. | |
829 | raise DDNSUpdateError | |
830 | ||
831 | ||
ab4e352e SS |
832 | class DDNSProviderEntryDNS(DDNSProvider): |
833 | handle = "entrydns.net" | |
834 | name = "EntryDNS" | |
835 | website = "http://entrydns.net/" | |
836 | protocols = ("ipv4",) | |
837 | ||
838 | # Some very tiny details about their so called "Simple API" can be found | |
839 | # here: https://entrydns.net/help | |
840 | url = "https://entrydns.net/records/modify" | |
29c8c9c6 | 841 | can_remove_records = False |
ab4e352e | 842 | |
d45139f6 | 843 | def update_protocol(self, proto): |
ab4e352e | 844 | data = { |
d45139f6 | 845 | "ip" : self.get_address(proto), |
ab4e352e SS |
846 | } |
847 | ||
848 | # Add auth token to the update url. | |
849 | url = "%s/%s" % (self.url, self.token) | |
850 | ||
851 | # Send update to the server. | |
852 | try: | |
babc5e6d | 853 | response = self.send_request(url, data=data) |
ab4e352e SS |
854 | |
855 | # Handle error codes | |
856 | except urllib2.HTTPError, e: | |
857 | if e.code == 404: | |
858 | raise DDNSAuthenticationError | |
859 | ||
860 | elif e.code == 422: | |
861 | raise DDNSRequestError(_("An invalid IP address was submitted")) | |
862 | ||
863 | raise | |
864 | ||
865 | # Handle success messages. | |
866 | if response.code == 200: | |
867 | return | |
868 | ||
869 | # If we got here, some other update error happened. | |
870 | raise DDNSUpdateError | |
871 | ||
872 | ||
aa21a4c6 | 873 | class DDNSProviderFreeDNSAfraidOrg(DDNSProvider): |
6a11646e MT |
874 | handle = "freedns.afraid.org" |
875 | name = "freedns.afraid.org" | |
876 | website = "http://freedns.afraid.org/" | |
aa21a4c6 SS |
877 | |
878 | # No information about the request or response could be found on the vendor | |
879 | # page. All used values have been collected by testing. | |
880 | url = "https://freedns.afraid.org/dynamic/update.php" | |
29c8c9c6 | 881 | can_remove_records = False |
aa21a4c6 | 882 | |
d45139f6 | 883 | def update_protocol(self, proto): |
aa21a4c6 | 884 | data = { |
d45139f6 | 885 | "address" : self.get_address(proto), |
aa21a4c6 SS |
886 | } |
887 | ||
888 | # Add auth token to the update url. | |
889 | url = "%s?%s" % (self.url, self.token) | |
890 | ||
891 | # Send update to the server. | |
892 | response = self.send_request(url, data=data) | |
893 | ||
a204b107 SS |
894 | # Get the full response message. |
895 | output = response.read() | |
896 | ||
897 | # Handle success messages. | |
aa21a4c6 SS |
898 | if output.startswith("Updated") or "has not changed" in output: |
899 | return | |
900 | ||
901 | # Handle error codes. | |
902 | if output == "ERROR: Unable to locate this record": | |
903 | raise DDNSAuthenticationError | |
904 | elif "is an invalid IP address" in output: | |
905 | raise DDNSRequestError(_("Invalid IP address has been sent.")) | |
906 | ||
3b524cf2 SS |
907 | # If we got here, some other update error happened. |
908 | raise DDNSUpdateError | |
909 | ||
aa21a4c6 | 910 | |
a08c1b72 | 911 | class DDNSProviderLightningWireLabs(DDNSProvider): |
6a11646e | 912 | handle = "dns.lightningwirelabs.com" |
fb115fdc | 913 | name = "Lightning Wire Labs DNS Service" |
6a11646e | 914 | website = "http://dns.lightningwirelabs.com/" |
a08c1b72 SS |
915 | |
916 | # Information about the format of the HTTPS request is to be found | |
917 | # https://dns.lightningwirelabs.com/knowledge-base/api/ddns | |
b2b05ef3 | 918 | |
a08c1b72 SS |
919 | url = "https://dns.lightningwirelabs.com/update" |
920 | ||
5f402f36 | 921 | def update(self): |
a08c1b72 SS |
922 | data = { |
923 | "hostname" : self.hostname, | |
e3c70807 MT |
924 | "address6" : self.get_address("ipv6", "-"), |
925 | "address4" : self.get_address("ipv4", "-"), | |
a08c1b72 SS |
926 | } |
927 | ||
a08c1b72 SS |
928 | # Check if a token has been set. |
929 | if self.token: | |
930 | data["token"] = self.token | |
931 | ||
932 | # Check for username and password. | |
933 | elif self.username and self.password: | |
934 | data.update({ | |
935 | "username" : self.username, | |
936 | "password" : self.password, | |
937 | }) | |
938 | ||
939 | # Raise an error if no auth details are given. | |
940 | else: | |
941 | raise DDNSConfigurationError | |
942 | ||
943 | # Send update to the server. | |
cb455540 | 944 | response = self.send_request(self.url, data=data) |
a08c1b72 SS |
945 | |
946 | # Handle success messages. | |
947 | if response.code == 200: | |
948 | return | |
949 | ||
a08c1b72 SS |
950 | # If we got here, some other update error happened. |
951 | raise DDNSUpdateError | |
952 | ||
953 | ||
446e42af GH |
954 | class DDNSProviderMyOnlinePortal(DDNSProtocolDynDNS2, DDNSProvider): |
955 | handle = "myonlineportal.net" | |
956 | name = "myonlineportal.net" | |
957 | website = "https:/myonlineportal.net/" | |
958 | ||
959 | # Information about the request and response can be obtained here: | |
960 | # https://myonlineportal.net/howto_dyndns | |
961 | ||
962 | url = "https://myonlineportal.net/updateddns" | |
963 | ||
964 | def prepare_request_data(self, proto): | |
965 | data = { | |
966 | "hostname" : self.hostname, | |
967 | "ip" : self.get_address(proto), | |
968 | } | |
969 | ||
970 | return data | |
971 | ||
972 | ||
78c9780b | 973 | class DDNSProviderNamecheap(DDNSResponseParserXML, DDNSProvider): |
6a11646e MT |
974 | handle = "namecheap.com" |
975 | name = "Namecheap" | |
976 | website = "http://namecheap.com" | |
977 | protocols = ("ipv4",) | |
d1cd57eb SS |
978 | |
979 | # Information about the format of the HTTP request is to be found | |
980 | # https://www.namecheap.com/support/knowledgebase/article.aspx/9249/0/nc-dynamic-dns-to-dyndns-adapter | |
981 | # https://community.namecheap.com/forums/viewtopic.php?f=6&t=6772 | |
982 | ||
983 | url = "https://dynamicdns.park-your-domain.com/update" | |
29c8c9c6 | 984 | can_remove_records = False |
d1cd57eb | 985 | |
d45139f6 | 986 | def update_protocol(self, proto): |
d1cd57eb SS |
987 | # Namecheap requires the hostname splitted into a host and domain part. |
988 | host, domain = self.hostname.split(".", 1) | |
989 | ||
990 | data = { | |
d45139f6 | 991 | "ip" : self.get_address(proto), |
d1cd57eb SS |
992 | "password" : self.password, |
993 | "host" : host, | |
994 | "domain" : domain | |
995 | } | |
996 | ||
997 | # Send update to the server. | |
998 | response = self.send_request(self.url, data=data) | |
999 | ||
1000 | # Get the full response message. | |
1001 | output = response.read() | |
1002 | ||
1003 | # Handle success messages. | |
d45139f6 | 1004 | if self.get_xml_tag_value(output, "IP") == address: |
d1cd57eb SS |
1005 | return |
1006 | ||
1007 | # Handle error codes. | |
78c9780b | 1008 | errorcode = self.get_xml_tag_value(output, "ResponseNumber") |
d1cd57eb SS |
1009 | |
1010 | if errorcode == "304156": | |
1011 | raise DDNSAuthenticationError | |
1012 | elif errorcode == "316153": | |
1013 | raise DDNSRequestError(_("Domain not found.")) | |
1014 | elif errorcode == "316154": | |
1015 | raise DDNSRequestError(_("Domain not active.")) | |
1016 | elif errorcode in ("380098", "380099"): | |
1017 | raise DDNSInternalServerError | |
1018 | ||
1019 | # If we got here, some other update error happened. | |
1020 | raise DDNSUpdateError | |
1021 | ||
1022 | ||
5d4bec40 MT |
1023 | class DDNSProviderNOIP(DDNSProtocolDynDNS2, DDNSProvider): |
1024 | handle = "no-ip.com" | |
1025 | name = "No-IP" | |
1026 | website = "http://www.no-ip.com/" | |
1027 | protocols = ("ipv4",) | |
f22ab085 MT |
1028 | |
1029 | # Information about the format of the HTTP request is to be found | |
1030 | # here: http://www.no-ip.com/integrate/request and | |
1031 | # here: http://www.no-ip.com/integrate/response | |
1032 | ||
88f39629 | 1033 | url = "http://dynupdate.no-ip.com/nic/update" |
2de06f59 | 1034 | |
d45139f6 MT |
1035 | def prepare_request_data(self, proto): |
1036 | assert proto == "ipv4" | |
1037 | ||
2de06f59 MT |
1038 | data = { |
1039 | "hostname" : self.hostname, | |
d45139f6 | 1040 | "address" : self.get_address(proto), |
f22ab085 MT |
1041 | } |
1042 | ||
88f39629 | 1043 | return data |
f22ab085 MT |
1044 | |
1045 | ||
31c95e4b SS |
1046 | class DDNSProviderNsupdateINFO(DDNSProtocolDynDNS2, DDNSProvider): |
1047 | handle = "nsupdate.info" | |
1048 | name = "nsupdate.info" | |
b9221322 | 1049 | website = "http://nsupdate.info/" |
31c95e4b SS |
1050 | protocols = ("ipv6", "ipv4",) |
1051 | ||
1052 | # Information about the format of the HTTP request can be found | |
b9221322 | 1053 | # after login on the provider user interface and here: |
31c95e4b SS |
1054 | # http://nsupdateinfo.readthedocs.org/en/latest/user.html |
1055 | ||
7b5d382e SS |
1056 | url = "https://nsupdate.info/nic/update" |
1057 | ||
29c8c9c6 MT |
1058 | # TODO nsupdate.info can actually do this, but the functionality |
1059 | # has not been implemented here, yet. | |
1060 | can_remove_records = False | |
1061 | ||
64018439 MT |
1062 | # After a failed update, there will be no retries |
1063 | # https://bugzilla.ipfire.org/show_bug.cgi?id=10603 | |
1064 | holdoff_failure_days = None | |
1065 | ||
31c95e4b SS |
1066 | # Nsupdate.info uses the hostname as user part for the HTTP basic auth, |
1067 | # and for the password a so called secret. | |
1068 | @property | |
1069 | def username(self): | |
1070 | return self.get("hostname") | |
1071 | ||
1072 | @property | |
1073 | def password(self): | |
9c777232 | 1074 | return self.token or self.get("secret") |
31c95e4b | 1075 | |
d45139f6 | 1076 | def prepare_request_data(self, proto): |
31c95e4b | 1077 | data = { |
d45139f6 | 1078 | "myip" : self.get_address(proto), |
31c95e4b SS |
1079 | } |
1080 | ||
1081 | return data | |
1082 | ||
1083 | ||
90663439 SS |
1084 | class DDNSProviderOpenDNS(DDNSProtocolDynDNS2, DDNSProvider): |
1085 | handle = "opendns.com" | |
1086 | name = "OpenDNS" | |
1087 | website = "http://www.opendns.com" | |
1088 | ||
1089 | # Detailed information about the update request and possible | |
1090 | # response codes can be obtained from here: | |
1091 | # https://support.opendns.com/entries/23891440 | |
1092 | ||
1093 | url = "https://updates.opendns.com/nic/update" | |
1094 | ||
d45139f6 | 1095 | def prepare_request_data(self, proto): |
90663439 SS |
1096 | data = { |
1097 | "hostname" : self.hostname, | |
d45139f6 | 1098 | "myip" : self.get_address(proto), |
90663439 SS |
1099 | } |
1100 | ||
1101 | return data | |
1102 | ||
1103 | ||
5d4bec40 MT |
1104 | class DDNSProviderOVH(DDNSProtocolDynDNS2, DDNSProvider): |
1105 | handle = "ovh.com" | |
1106 | name = "OVH" | |
1107 | website = "http://www.ovh.com/" | |
1108 | protocols = ("ipv4",) | |
a508bda6 SS |
1109 | |
1110 | # OVH only provides very limited information about how to | |
1111 | # update a DynDNS host. They only provide the update url | |
1112 | # on the their german subpage. | |
1113 | # | |
1114 | # http://hilfe.ovh.de/DomainDynHost | |
1115 | ||
1116 | url = "https://www.ovh.com/nic/update" | |
1117 | ||
d45139f6 MT |
1118 | def prepare_request_data(self, proto): |
1119 | data = DDNSProtocolDynDNS2.prepare_request_data(self, proto) | |
54d3efc8 MT |
1120 | data.update({ |
1121 | "system" : "dyndns", | |
1122 | }) | |
1123 | ||
1124 | return data | |
a508bda6 SS |
1125 | |
1126 | ||
ef33455e | 1127 | class DDNSProviderRegfish(DDNSProvider): |
6a11646e MT |
1128 | handle = "regfish.com" |
1129 | name = "Regfish GmbH" | |
1130 | website = "http://www.regfish.com/" | |
ef33455e SS |
1131 | |
1132 | # A full documentation to the providers api can be found here | |
1133 | # but is only available in german. | |
1134 | # https://www.regfish.de/domains/dyndns/dokumentation | |
1135 | ||
1136 | url = "https://dyndns.regfish.de/" | |
29c8c9c6 | 1137 | can_remove_records = False |
ef33455e SS |
1138 | |
1139 | def update(self): | |
1140 | data = { | |
1141 | "fqdn" : self.hostname, | |
1142 | } | |
1143 | ||
1144 | # Check if we update an IPv6 address. | |
1145 | address6 = self.get_address("ipv6") | |
1146 | if address6: | |
1147 | data["ipv6"] = address6 | |
1148 | ||
1149 | # Check if we update an IPv4 address. | |
1150 | address4 = self.get_address("ipv4") | |
1151 | if address4: | |
1152 | data["ipv4"] = address4 | |
1153 | ||
1154 | # Raise an error if none address is given. | |
1155 | if not data.has_key("ipv6") and not data.has_key("ipv4"): | |
1156 | raise DDNSConfigurationError | |
1157 | ||
1158 | # Check if a token has been set. | |
1159 | if self.token: | |
1160 | data["token"] = self.token | |
1161 | ||
1162 | # Raise an error if no token and no useranem and password | |
1163 | # are given. | |
1164 | elif not self.username and not self.password: | |
1165 | raise DDNSConfigurationError(_("No Auth details specified.")) | |
1166 | ||
1167 | # HTTP Basic Auth is only allowed if no token is used. | |
1168 | if self.token: | |
1169 | # Send update to the server. | |
1170 | response = self.send_request(self.url, data=data) | |
1171 | else: | |
1172 | # Send update to the server. | |
1173 | response = self.send_request(self.url, username=self.username, password=self.password, | |
1174 | data=data) | |
1175 | ||
1176 | # Get the full response message. | |
1177 | output = response.read() | |
1178 | ||
1179 | # Handle success messages. | |
1180 | if "100" in output or "101" in output: | |
1181 | return | |
1182 | ||
1183 | # Handle error codes. | |
1184 | if "401" or "402" in output: | |
1185 | raise DDNSAuthenticationError | |
1186 | elif "408" in output: | |
1187 | raise DDNSRequestError(_("Invalid IPv4 address has been sent.")) | |
1188 | elif "409" in output: | |
1189 | raise DDNSRequestError(_("Invalid IPv6 address has been sent.")) | |
1190 | elif "412" in output: | |
1191 | raise DDNSRequestError(_("No valid FQDN was given.")) | |
1192 | elif "414" in output: | |
1193 | raise DDNSInternalServerError | |
1194 | ||
1195 | # If we got here, some other update error happened. | |
1196 | raise DDNSUpdateError | |
1197 | ||
1198 | ||
5d4bec40 | 1199 | class DDNSProviderSelfhost(DDNSProtocolDynDNS2, DDNSProvider): |
6a11646e MT |
1200 | handle = "selfhost.de" |
1201 | name = "Selfhost.de" | |
1202 | website = "http://www.selfhost.de/" | |
5d4bec40 | 1203 | protocols = ("ipv4",) |
f22ab085 | 1204 | |
04db1862 | 1205 | url = "https://carol.selfhost.de/nic/update" |
f22ab085 | 1206 | |
d45139f6 MT |
1207 | def prepare_request_data(self, proto): |
1208 | data = DDNSProtocolDynDNS2.prepare_request_data(self, proto) | |
04db1862 MT |
1209 | data.update({ |
1210 | "hostname" : "1", | |
1211 | }) | |
f22ab085 | 1212 | |
04db1862 | 1213 | return data |
b09b1545 SS |
1214 | |
1215 | ||
5d4bec40 MT |
1216 | class DDNSProviderSPDNS(DDNSProtocolDynDNS2, DDNSProvider): |
1217 | handle = "spdns.org" | |
1218 | name = "SPDNS" | |
1219 | website = "http://spdns.org/" | |
b09b1545 SS |
1220 | |
1221 | # Detailed information about request and response codes are provided | |
1222 | # by the vendor. They are using almost the same mechanism and status | |
1223 | # codes as dyndns.org so we can inherit all those stuff. | |
1224 | # | |
1225 | # http://wiki.securepoint.de/index.php/SPDNS_FAQ | |
1226 | # http://wiki.securepoint.de/index.php/SPDNS_Update-Tokens | |
1227 | ||
1228 | url = "https://update.spdns.de/nic/update" | |
4ec90b93 | 1229 | |
94ab4379 SS |
1230 | @property |
1231 | def username(self): | |
1232 | return self.get("username") or self.hostname | |
1233 | ||
1234 | @property | |
1235 | def password(self): | |
1236 | return self.get("username") or self.token | |
1237 | ||
4ec90b93 | 1238 | |
5d4bec40 MT |
1239 | class DDNSProviderStrato(DDNSProtocolDynDNS2, DDNSProvider): |
1240 | handle = "strato.com" | |
1241 | name = "Strato AG" | |
1242 | website = "http:/www.strato.com/" | |
1243 | protocols = ("ipv4",) | |
7488825c SS |
1244 | |
1245 | # Information about the request and response can be obtained here: | |
1246 | # http://www.strato-faq.de/article/671/So-einfach-richten-Sie-DynDNS-f%C3%BCr-Ihre-Domains-ein.html | |
1247 | ||
1248 | url = "https://dyndns.strato.com/nic/update" | |
1249 | ||
1250 | ||
5d4bec40 MT |
1251 | class DDNSProviderTwoDNS(DDNSProtocolDynDNS2, DDNSProvider): |
1252 | handle = "twodns.de" | |
1253 | name = "TwoDNS" | |
1254 | website = "http://www.twodns.de" | |
1255 | protocols = ("ipv4",) | |
a6183090 SS |
1256 | |
1257 | # Detailed information about the request can be found here | |
1258 | # http://twodns.de/en/faqs | |
1259 | # http://twodns.de/en/api | |
1260 | ||
1261 | url = "https://update.twodns.de/update" | |
1262 | ||
d45139f6 MT |
1263 | def prepare_request_data(self, proto): |
1264 | assert proto == "ipv4" | |
1265 | ||
a6183090 | 1266 | data = { |
d45139f6 | 1267 | "ip" : self.get_address(proto), |
a6183090 SS |
1268 | "hostname" : self.hostname |
1269 | } | |
1270 | ||
1271 | return data | |
1272 | ||
1273 | ||
5d4bec40 MT |
1274 | class DDNSProviderUdmedia(DDNSProtocolDynDNS2, DDNSProvider): |
1275 | handle = "udmedia.de" | |
1276 | name = "Udmedia GmbH" | |
1277 | website = "http://www.udmedia.de" | |
1278 | protocols = ("ipv4",) | |
03bdd188 SS |
1279 | |
1280 | # Information about the request can be found here | |
1281 | # http://www.udmedia.de/faq/content/47/288/de/wie-lege-ich-einen-dyndns_eintrag-an.html | |
1282 | ||
1283 | url = "https://www.udmedia.de/nic/update" | |
1284 | ||
1285 | ||
5d4bec40 | 1286 | class DDNSProviderVariomedia(DDNSProtocolDynDNS2, DDNSProvider): |
6a11646e MT |
1287 | handle = "variomedia.de" |
1288 | name = "Variomedia" | |
1289 | website = "http://www.variomedia.de/" | |
1290 | protocols = ("ipv6", "ipv4",) | |
c8c7ca8f SS |
1291 | |
1292 | # Detailed information about the request can be found here | |
1293 | # https://dyndns.variomedia.de/ | |
1294 | ||
1295 | url = "https://dyndns.variomedia.de/nic/update" | |
1296 | ||
d45139f6 | 1297 | def prepare_request_data(self, proto): |
c8c7ca8f SS |
1298 | data = { |
1299 | "hostname" : self.hostname, | |
d45139f6 | 1300 | "myip" : self.get_address(proto), |
c8c7ca8f | 1301 | } |
54d3efc8 MT |
1302 | |
1303 | return data | |
98fbe467 SS |
1304 | |
1305 | ||
f0554226 | 1306 | class DDNSProviderZoneedit(DDNSProvider): |
5d4bec40 MT |
1307 | handle = "zoneedit.com" |
1308 | name = "Zoneedit" | |
1309 | website = "http://www.zoneedit.com" | |
1310 | protocols = ("ipv4",) | |
98fbe467 SS |
1311 | |
1312 | # Detailed information about the request and the response codes can be | |
1313 | # obtained here: | |
1314 | # http://www.zoneedit.com/doc/api/other.html | |
1315 | # http://www.zoneedit.com/faq.html | |
1316 | ||
1317 | url = "https://dynamic.zoneedit.com/auth/dynamic.html" | |
1318 | ||
d45139f6 | 1319 | def update_protocol(self, proto): |
98fbe467 | 1320 | data = { |
d45139f6 | 1321 | "dnsto" : self.get_address(proto), |
98fbe467 SS |
1322 | "host" : self.hostname |
1323 | } | |
1324 | ||
1325 | # Send update to the server. | |
1326 | response = self.send_request(self.url, username=self.username, password=self.password, | |
1327 | data=data) | |
1328 | ||
1329 | # Get the full response message. | |
1330 | output = response.read() | |
1331 | ||
1332 | # Handle success messages. | |
1333 | if output.startswith("<SUCCESS"): | |
1334 | return | |
1335 | ||
1336 | # Handle error codes. | |
1337 | if output.startswith("invalid login"): | |
1338 | raise DDNSAuthenticationError | |
1339 | elif output.startswith("<ERROR CODE=\"704\""): | |
1340 | raise DDNSRequestError(_("No valid FQDN was given.")) | |
1341 | elif output.startswith("<ERROR CODE=\"702\""): | |
1342 | raise DDNSInternalServerError | |
1343 | ||
1344 | # If we got here, some other update error happened. | |
1345 | raise DDNSUpdateError | |
e53d3225 SS |
1346 | |
1347 | ||
1348 | class DDNSProviderZZZZ(DDNSProvider): | |
1349 | handle = "zzzz.io" | |
1350 | name = "zzzz" | |
1351 | website = "https://zzzz.io" | |
fbdff678 | 1352 | protocols = ("ipv6", "ipv4",) |
e53d3225 SS |
1353 | |
1354 | # Detailed information about the update request can be found here: | |
1355 | # https://zzzz.io/faq/ | |
1356 | ||
1357 | # Details about the possible response codes have been provided in the bugtracker: | |
1358 | # https://bugzilla.ipfire.org/show_bug.cgi?id=10584#c2 | |
1359 | ||
1360 | url = "https://zzzz.io/api/v1/update" | |
29c8c9c6 | 1361 | can_remove_records = False |
e53d3225 | 1362 | |
d45139f6 | 1363 | def update_protocol(self, proto): |
e53d3225 | 1364 | data = { |
d45139f6 | 1365 | "ip" : self.get_address(proto), |
e53d3225 SS |
1366 | "token" : self.token, |
1367 | } | |
1368 | ||
fbdff678 MT |
1369 | if proto == "ipv6": |
1370 | data["type"] = "aaaa" | |
1371 | ||
e53d3225 SS |
1372 | # zzzz uses the host from the full hostname as part |
1373 | # of the update url. | |
1374 | host, domain = self.hostname.split(".", 1) | |
1375 | ||
1376 | # Add host value to the update url. | |
1377 | url = "%s/%s" % (self.url, host) | |
1378 | ||
1379 | # Send update to the server. | |
1380 | try: | |
1381 | response = self.send_request(url, data=data) | |
1382 | ||
1383 | # Handle error codes. | |
ff43fa70 MT |
1384 | except DDNSNotFound: |
1385 | raise DDNSRequestError(_("Invalid hostname specified")) | |
e53d3225 SS |
1386 | |
1387 | # Handle success messages. | |
1388 | if response.code == 200: | |
1389 | return | |
1390 | ||
1391 | # If we got here, some other update error happened. | |
1392 | raise DDNSUpdateError |