]> git.ipfire.org Git - oddments/ddns.git/blob - src/ddns/system.py
9214cce6ab287068fdd72df1263e13e81880c081
[oddments/ddns.git] / src / ddns / system.py
1 #!/usr/bin/python
2 ###############################################################################
3 # #
4 # ddns - A dynamic DNS client for IPFire #
5 # Copyright (C) 2012 IPFire development team #
6 # #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
11 # #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
16 # #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
19 # #
20 ###############################################################################
21
22 import base64
23 import re
24 import socket
25 import urllib
26 import urllib2
27
28 from __version__ import CLIENT_VERSION
29 from .errors import *
30 from i18n import _
31
32 # Initialize the logger.
33 import logging
34 logger = logging.getLogger("ddns.system")
35 logger.propagate = 1
36
37 class DDNSSystem(object):
38 """
39 The DDNSSystem class adds a layer of abstraction
40 between the ddns software and the system.
41 """
42
43 # The default useragent.
44 USER_AGENT = "IPFireDDNSUpdater/%s" % CLIENT_VERSION
45
46 def __init__(self, core):
47 # Connection to the core of the program.
48 self.core = core
49
50 # Address cache.
51 self.__addresses = {}
52
53 # Find out on which distribution we are running.
54 self.distro = self._get_distro_identifier()
55 logger.debug(_("Running on distribution: %s") % self.distro)
56
57 @property
58 def proxy(self):
59 proxy = self.core.settings.get("proxy")
60
61 # Strip http:// at the beginning.
62 if proxy and proxy.startswith("http://"):
63 proxy = proxy[7:]
64
65 return proxy
66
67 def get_local_ip_address(self, proto):
68 # Legacy code for IPFire 2.
69 if self.distro == "ipfire-2" and proto == "ipv4":
70 try:
71 with open("/var/ipfire/red/local-ipaddress") as f:
72 return f.readline()
73
74 except IOError, e:
75 # File not found
76 if e.errno == 2:
77 return
78
79 raise
80
81 # XXX TODO
82 raise NotImplementedError
83
84 def _guess_external_ip_address(self, url, timeout=10):
85 """
86 Sends a request to an external web server
87 to determine the current default IP address.
88 """
89 try:
90 response = self.send_request(url, timeout=timeout)
91
92 # If the server could not be reached, we will return nothing.
93 except DDNSNetworkError:
94 return
95
96 if not response.code == 200:
97 return
98
99 match = re.search(r"^Your IP address is: (.*)$", response.read())
100 if match is None:
101 return
102
103 return match.group(1)
104
105 def guess_external_ip_address(self, family, **kwargs):
106 if family == "ipv6":
107 url = "http://checkip6.dns.lightningwirelabs.com"
108 elif family == "ipv4":
109 url = "http://checkip4.dns.lightningwirelabs.com"
110 else:
111 raise ValueError("unknown address family")
112
113 return self._guess_external_ip_address(url, **kwargs)
114
115 def send_request(self, url, method="GET", data=None, username=None, password=None, timeout=30):
116 assert method in ("GET", "POST")
117
118 # Add all arguments in the data dict to the URL and escape them properly.
119 if method == "GET" and data:
120 query_args = self._format_query_args(data)
121 data = None
122
123 if "?" in url:
124 url = "%s&%s" % (url, query_args)
125 else:
126 url = "%s?%s" % (url, query_args)
127
128 logger.debug("Sending request (%s): %s" % (method, url))
129 if data:
130 logger.debug(" data: %s" % data)
131
132 req = urllib2.Request(url, data=data)
133
134 if username and password:
135 basic_auth_header = self._make_basic_auth_header(username, password)
136 req.add_header("Authorization", "Basic %s" % basic_auth_header)
137
138 # Set the user agent.
139 req.add_header("User-Agent", self.USER_AGENT)
140
141 # All requests should not be cached anywhere.
142 req.add_header("Pragma", "no-cache")
143
144 # Set the upstream proxy if needed.
145 if self.proxy:
146 logger.debug("Using proxy: %s" % self.proxy)
147
148 # Configure the proxy for this request.
149 req.set_proxy(self.proxy, "http")
150
151 assert req.get_method() == method
152
153 logger.debug(_("Request header:"))
154 for k, v in req.headers.items():
155 logger.debug(" %s: %s" % (k, v))
156
157 try:
158 resp = urllib2.urlopen(req, timeout=timeout)
159
160 # Log response header.
161 logger.debug(_("Response header (Status Code %s):") % resp.code)
162 for k, v in resp.info().items():
163 logger.debug(" %s: %s" % (k, v))
164
165 # Return the entire response object.
166 return resp
167
168 except urllib2.HTTPError, e:
169 # 400 - Bad request
170 if e.code == 400:
171 raise DDNSRequestError(e.reason)
172
173 # 401 - Authorization Required
174 # 403 - Forbidden
175 elif e.code in (401, 403):
176 raise DDNSAuthenticationError(e.reason)
177
178 # 500 - Internal Server Error
179 elif e.code == 500:
180 raise DDNSInternalServerError(e.reason)
181
182 # 503 - Service Unavailable
183 elif e.code == 503:
184 raise DDNSServiceUnavailableError(e.reason)
185
186 # Raise all other unhandled exceptions.
187 raise
188
189 except urllib2.URLError, e:
190 if e.reason:
191 # Network Unreachable (e.g. no IPv6 access)
192 if e.reason.errno == 101:
193 raise DDNSNetworkUnreachableError
194 elif e.reason.errno == 111:
195 raise DDNSConnectionRefusedError
196
197 # Raise all other unhandled exceptions.
198 raise
199
200 except socket.timeout, e:
201 logger.debug(_("Connection timeout"))
202
203 raise DDNSConnectionTimeoutError
204
205 def _format_query_args(self, data):
206 args = []
207
208 for k, v in data.items():
209 arg = "%s=%s" % (k, urllib.quote(v))
210 args.append(arg)
211
212 return "&".join(args)
213
214 def _make_basic_auth_header(self, username, password):
215 authstring = "%s:%s" % (username, password)
216
217 # Encode authorization data in base64.
218 authstring = base64.encodestring(authstring)
219
220 # Remove any newline characters.
221 authstring = authstring.replace("\n", "")
222
223 return authstring
224
225 def get_address(self, proto):
226 """
227 Returns the current IP address for
228 the given IP protocol.
229 """
230 try:
231 return self.__addresses[proto]
232
233 # IP is currently unknown and needs to be retrieved.
234 except KeyError:
235 self.__addresses[proto] = address = \
236 self._get_address(proto)
237
238 return address
239
240 def _get_address(self, proto):
241 assert proto in ("ipv6", "ipv4")
242
243 # IPFire 2 does not support IPv6.
244 if self.distro == "ipfire-2" and proto == "ipv6":
245 return
246
247 # Check if the external IP address should be guessed from
248 # a remote server.
249 guess_ip = self.core.settings.get("guess_external_ip", "true")
250 guess_ip = guess_ip in ("true", "yes", "1")
251
252 # If the external IP address should be used, we just do that.
253 if guess_ip:
254 return self.guess_external_ip_address(proto)
255
256 # Get the local IP address.
257 local_ip_address = self.get_local_ip_address(proto)
258
259 # If the local IP address is not usable, we must guess
260 # the correct IP address...
261 if not self._is_usable_ip_address(proto, local_ip_address):
262 local_ip_address = self.guess_external_ip_address(proto)
263
264 return local_ip_address
265
266 def _is_usable_ip_address(self, proto, address):
267 """
268 Returns True is the local IP address is usable
269 for dynamic DNS (i.e. is not a RFC1918 address or similar).
270 """
271 if proto == "ipv4":
272 # This is not the most perfect solution to match
273 # these addresses, but instead of pulling in an entire
274 # library to handle the IP addresses better, we match
275 # with regular expressions instead.
276 matches = (
277 # RFC1918 address space
278 r"^10\.\d+\.\d+\.\d+$",
279 r"^192\.168\.\d+\.\d+$",
280 r"^172\.(1[6-9]|2[0-9]|31)\.\d+\.\d+$",
281
282 # Dual Stack Lite address space
283 r"^100\.(6[4-9]|[7-9][0-9]|1[01][0-9]|12[0-7])\.\d+\.\d+",
284 )
285
286 for match in matches:
287 m = re.match(match, address)
288 if m is None:
289 continue
290
291 # Found a match. IP address is not usable.
292 return False
293
294 # In all other cases, return OK.
295 return True
296
297 def resolve(self, hostname, proto=None):
298 addresses = []
299
300 if proto is None:
301 family = 0
302 elif proto == "ipv6":
303 family = socket.AF_INET6
304 elif proto == "ipv4":
305 family = socket.AF_INET
306 else:
307 raise ValueError("Protocol not supported: %s" % proto)
308
309 # Resolve the host address.
310 try:
311 response = socket.getaddrinfo(hostname, None, family)
312 except socket.gaierror, e:
313 # Name or service not known
314 if e.errno == -2:
315 return []
316
317 # No record for requested family available (e.g. no AAAA)
318 elif e.errno == -5:
319 return []
320
321 raise
322
323 # Handle responses.
324 for family, socktype, proto, canonname, sockaddr in response:
325 # IPv6
326 if family == socket.AF_INET6:
327 address, port, flow_info, scope_id = sockaddr
328
329 # Only use the global scope.
330 if not scope_id == 0:
331 continue
332
333 # IPv4
334 elif family == socket.AF_INET:
335 address, port = sockaddr
336
337 # Ignore everything else...
338 else:
339 continue
340
341 # Add to repsonse list if not already in there.
342 if not address in addresses:
343 addresses.append(address)
344
345 return addresses
346
347 def _get_distro_identifier(self):
348 """
349 Returns a unique identifier for the distribution
350 we are running on.
351 """
352 os_release = self.__parse_os_release()
353 if os_release:
354 return os_release
355
356 system_release = self.__parse_system_release()
357 if system_release:
358 return system_release
359
360 # If nothing else could be found, we return
361 # just "unknown".
362 return "unknown"
363
364 def __parse_os_release(self):
365 """
366 Tries to parse /etc/os-release and
367 returns a unique distribution identifier
368 if the file exists.
369 """
370 try:
371 f = open("/etc/os-release", "r")
372 except IOError, e:
373 # File not found
374 if e.errno == 2:
375 return
376
377 raise
378
379 os_release = {}
380 with f:
381 for line in f.readlines():
382 m = re.match(r"^([A-Z\_]+)=(.*)$", line)
383 if m is None:
384 continue
385
386 os_release[m.group(1)] = m.group(2)
387
388 try:
389 return "%(ID)s-%(VERSION_ID)s" % os_release
390 except KeyError:
391 return
392
393 def __parse_system_release(self):
394 """
395 Tries to parse /etc/system-release and
396 returns a unique distribution identifier
397 if the file exists.
398 """
399 try:
400 f = open("/etc/system-release", "r")
401 except IOError, e:
402 # File not found
403 if e.errno == 2:
404 return
405
406 raise
407
408 with f:
409 # Read first line
410 line = f.readline()
411
412 # Check for IPFire systems
413 m = re.match(r"^IPFire (\d).(\d+)", line)
414 if m:
415 return "ipfire-%s" % m.group(1)