X-Git-Url: http://git.ipfire.org/?p=oddments%2Fddns.git;a=blobdiff_plain;f=src%2Fddns%2Fproviders.py;h=6b25cb6dd8c4dc4de92cc8bb68e115d29cf5650f;hp=797ef3d7a2a03d98a7e7daf6b0fcc02284081909;hb=747038858121aa44f7be0f158cd7d440d95c67a0;hpb=7b5d382e72b02e79df453da91b843c7f7cdc4f8a diff --git a/src/ddns/providers.py b/src/ddns/providers.py index 797ef3d..6b25cb6 100644 --- a/src/ddns/providers.py +++ b/src/ddns/providers.py @@ -63,6 +63,10 @@ class DDNSProvider(object): # the IP address has changed. holdoff_days = 30 + # holdoff time for update failures - Number of days no update + # is tried after the last one has failed. + holdoff_failure_days = 0.5 + # True if the provider is able to remove records, too. # Required to remove AAAA records if IPv6 is absent again. can_remove_records = True @@ -149,14 +153,23 @@ class DDNSProvider(object): if force: logger.debug(_("Updating %s forced") % self.hostname) - # Do nothing if no update is required - elif not self.requires_update: + # Do nothing if the last update has failed or no update is required + elif self.has_failure or not self.requires_update: return # Execute the update. try: self.update() + # 1) Catch network errors early, because we do not want to log + # them to the database. They are usually temporary and caused + # by the client side, so that we will retry quickly. + # 2) If there is an internet server error (HTTP code 500) on the + # provider's site, we will not log a failure and try again + # shortly. + except (DDNSNetworkError, DDNSInternalServerError): + raise + # In case of any errors, log the failed request and # raise the exception. except DDNSError as e: @@ -207,6 +220,49 @@ class DDNSProvider(object): return False + @property + def has_failure(self): + """ + Returns True when the last update has failed and no retry + should be performed, yet. + """ + last_status = self.db.last_update_status(self.hostname) + + # Return False if the last update has not failed. + if not last_status == "failure": + return False + + # If there is no holdoff time, we won't update ever again. + if self.holdoff_failure_days is None: + logger.warning(_("An update has not been performed because earlier updates failed for %s") \ + % self.hostname) + logger.warning(_("There will be no retries")) + + return True + + # Determine when the holdoff time ends + last_update = self.db.last_update(self.hostname, status=last_status) + holdoff_end = last_update + datetime.timedelta(days=self.holdoff_failure_days) + + now = datetime.datetime.utcnow() + if now < holdoff_end: + failure_message = self.db.last_update_failure_message(self.hostname) + + logger.warning(_("An update has not been performed because earlier updates failed for %s") \ + % self.hostname) + + if failure_message: + logger.warning(_("Last failure message:")) + + for line in failure_message.splitlines(): + logger.warning(" %s" % line) + + logger.warning(_("Further updates will be withheld until %s") % holdoff_end) + + return True + + return False + def ip_address_changed(self, protos): """ Returns True if this host is already up to date @@ -243,7 +299,7 @@ class DDNSProvider(object): return False # Get the timestamp of the last successfull update - last_update = self.db.last_update(self.hostname) + last_update = self.db.last_update(self.hostname, status="success") # If no timestamp has been recorded, no update has been # performed. An update should be performed now. @@ -335,13 +391,13 @@ class DDNSProtocolDynDNS2(object): elif output == "abuse": raise DDNSAbuseError elif output == "notfqdn": - raise DDNSRequestError(_("No valid FQDN was given.")) + raise DDNSRequestError(_("No valid FQDN was given")) elif output == "nohost": - raise DDNSRequestError(_("Specified host does not exist.")) + raise DDNSRequestError(_("Specified host does not exist")) elif output == "911": raise DDNSInternalServerError elif output == "dnserr": - raise DDNSInternalServerError(_("DNS error encountered.")) + raise DDNSInternalServerError(_("DNS error encountered")) elif output == "badagent": raise DDNSBlockedError @@ -492,6 +548,137 @@ class DDNSProviderBindNsupdate(DDNSProvider): return "\n".join(scriptlet) +class DDNSProviderChangeIP(DDNSProvider): + handle = "changeip.com" + name = "ChangeIP.com" + website = "https://changeip.com" + protocols = ("ipv4",) + + # Detailed information about the update api can be found here. + # http://www.changeip.com/accounts/knowledgebase.php?action=displayarticle&id=34 + + url = "https://nic.changeip.com/nic/update" + can_remove_records = False + + def update_protocol(self, proto): + data = { + "hostname" : self.hostname, + "myip" : self.get_address(proto), + } + + # Send update to the server. + try: + response = self.send_request(self.url, username=self.username, password=self.password, + data=data) + + # Handle error codes. + except urllib2.HTTPError, e: + if e.code == 422: + raise DDNSRequestError(_("Domain not found.")) + + raise + + # Handle success message. + if response.code == 200: + return + + # If we got here, some other update error happened. + raise DDNSUpdateError(_("Server response: %s") % output) + + +class DDNSProviderDesecIO(DDNSProtocolDynDNS2, DDNSProvider): + handle = "desec.io" + name = "desec.io" + website = "https://www.desec.io" + protocols = ("ipv6", "ipv4",) + + # ipv4 / ipv6 records are automatically removed when the update + # request originates from the respectively other protocol and no + # address is explicitly provided for the unused protocol. + + url = "https://update.dedyn.io" + + # desec.io sends the IPv6 and IPv4 address in one request + + def update(self): + data = DDNSProtocolDynDNS2.prepare_request_data(self, "ipv4") + + # This one supports IPv6 + myipv6 = self.get_address("ipv6") + + # Add update information if we have an IPv6 address. + if myipv6: + data["myipv6"] = myipv6 + + self.send_request(data) + + +class DDNSProviderDDNSS(DDNSProvider): + handle = "ddnss.de" + name = "DDNSS" + website = "http://www.ddnss.de" + protocols = ("ipv4",) + + # Detailed information about how to send the update request and possible response + # codes can be obtained from here. + # http://www.ddnss.de/info.php + # http://www.megacomputing.de/2014/08/dyndns-service-response-time/#more-919 + + url = "http://www.ddnss.de/upd.php" + can_remove_records = False + + def update_protocol(self, proto): + data = { + "ip" : self.get_address(proto), + "host" : self.hostname, + } + + # Check if a token has been set. + if self.token: + data["key"] = self.token + + # Check if username and hostname are given. + elif self.username and self.password: + data.update({ + "user" : self.username, + "pwd" : self.password, + }) + + # Raise an error if no auth details are given. + else: + raise DDNSConfigurationError + + # Send update to the server. + response = self.send_request(self.url, data=data) + + # This provider sends the response code as part of the header. + header = response.info() + + # Get status information from the header. + output = header.getheader('ddnss-response') + + # Handle success messages. + if output == "good" or output == "nochg": + return + + # Handle error codes. + if output == "badauth": + raise DDNSAuthenticationError + elif output == "notfqdn": + raise DDNSRequestError(_("No valid FQDN was given")) + elif output == "nohost": + raise DDNSRequestError(_("Specified host does not exist")) + elif output == "911": + raise DDNSInternalServerError + elif output == "dnserr": + raise DDNSInternalServerError(_("DNS error encountered")) + elif output == "disabled": + raise DDNSRequestError(_("Account disabled or locked")) + + # If we got here, some other update error happened. + raise DDNSUpdateError + + class DDNSProviderDHS(DDNSProvider): handle = "dhs.org" name = "DHS International" @@ -562,13 +749,13 @@ class DDNSProviderDNSpark(DDNSProvider): elif output == "blocked": raise DDNSBlockedError elif output == "nofqdn": - raise DDNSRequestError(_("No valid FQDN was given.")) + raise DDNSRequestError(_("No valid FQDN was given")) elif output == "nohost": - raise DDNSRequestError(_("Invalid hostname specified.")) + raise DDNSRequestError(_("Invalid hostname specified")) elif output == "notdyn": - raise DDNSRequestError(_("Hostname not marked as a dynamic host.")) + raise DDNSRequestError(_("Hostname not marked as a dynamic host")) elif output == "invalid": - raise DDNSRequestError(_("Invalid IP address has been sent.")) + raise DDNSRequestError(_("Invalid IP address has been sent")) # If we got here, some other update error happened. raise DDNSUpdateError @@ -608,27 +795,39 @@ class DDNSProviderDtDNS(DDNSProvider): # Handle error codes. if output == "No hostname to update was supplied.": - raise DDNSRequestError(_("No hostname specified.")) + raise DDNSRequestError(_("No hostname specified")) elif output == "The hostname you supplied is not valid.": - raise DDNSRequestError(_("Invalid hostname specified.")) + raise DDNSRequestError(_("Invalid hostname specified")) elif output == "The password you supplied is not valid.": raise DDNSAuthenticationError elif output == "Administration has disabled this account.": - raise DDNSRequestError(_("Account has been disabled.")) + raise DDNSRequestError(_("Account has been disabled")) elif output == "Illegal character in IP.": - raise DDNSRequestError(_("Invalid IP address has been sent.")) + raise DDNSRequestError(_("Invalid IP address has been sent")) elif output == "Too many failed requests.": - raise DDNSRequestError(_("Too many failed requests.")) + raise DDNSRequestError(_("Too many failed requests")) # If we got here, some other update error happened. raise DDNSUpdateError +class DDNSProviderDuckDNS(DDNSProtocolDynDNS2, DDNSProvider): + handle = "duckdns.org" + name = "Duck DNS" + website = "http://www.duckdns.org/" + protocols = ("ipv4",) + + # Information about the format of the request is to be found + # https://www.duckdns.org/install.jsp + + url = "https://www.duckdns.org/nic/update" + + class DDNSProviderDynDNS(DDNSProtocolDynDNS2, DDNSProvider): handle = "dyndns.org" name = "Dyn" @@ -669,18 +868,54 @@ class DDNSProviderDynU(DDNSProtocolDynDNS2, DDNSProvider): self.send_request(data) -class DDNSProviderEasyDNS(DDNSProtocolDynDNS2, DDNSProvider): +class DDNSProviderEasyDNS(DDNSProvider): handle = "easydns.com" name = "EasyDNS" website = "http://www.easydns.com/" protocols = ("ipv4",) - # There is only some basic documentation provided by the vendor, - # also searching the web gain very poor results. - # http://mediawiki.easydns.com/index.php/Dynamic_DNS + # Detailed information about the request and response codes + # (API 1.3) are available on the providers webpage. + # https://fusion.easydns.com/index.php?/Knowledgebase/Article/View/102/7/dynamic-dns url = "http://api.cp.easydns.com/dyn/tomato.php" + def update_protocol(self, proto): + data = { + "myip" : self.get_address(proto, "-"), + "hostname" : self.hostname, + } + + # Send update to the server. + response = self.send_request(self.url, data=data, + username=self.username, password=self.password) + + # Get the full response message. + output = response.read() + + # Remove all leading and trailing whitespace. + output = output.strip() + + # Handle success messages. + if output.startswith("NOERROR"): + return + + # Handle error codes. + if output.startswith("NOACCESS"): + raise DDNSAuthenticationError + + elif output.startswith("NOSERVICE"): + raise DDNSRequestError(_("Dynamic DNS is not turned on for this domain")) + + elif output.startswith("ILLEGAL INPUT"): + raise DDNSRequestError(_("Invalid data has been sent")) + + elif output.startswith("TOOSOON"): + raise DDNSRequestError(_("Too frequent update requests have been sent")) + + # If we got here, some other update error happened. + raise DDNSUpdateError + class DDNSProviderDomopoli(DDNSProtocolDynDNS2, DDNSProvider): handle = "domopoli.de" @@ -726,11 +961,11 @@ class DDNSProviderDynsNet(DDNSProvider): # Handle error codes. if output.startswith("400"): - raise DDNSRequestError(_("Malformed request has been sent.")) + raise DDNSRequestError(_("Malformed request has been sent")) elif output.startswith("401"): raise DDNSAuthenticationError elif output.startswith("402"): - raise DDNSRequestError(_("Too frequent update requests have been sent.")) + raise DDNSRequestError(_("Too frequent update requests have been sent")) elif output.startswith("403"): raise DDNSInternalServerError @@ -776,7 +1011,7 @@ class DDNSProviderEnomCom(DDNSResponseParserXML, DDNSProvider): if errorcode == "304155": raise DDNSAuthenticationError elif errorcode == "304153": - raise DDNSRequestError(_("Domain not found.")) + raise DDNSRequestError(_("Domain not found")) # If we got here, some other update error happened. raise DDNSUpdateError @@ -855,12 +1090,37 @@ class DDNSProviderFreeDNSAfraidOrg(DDNSProvider): if output == "ERROR: Unable to locate this record": raise DDNSAuthenticationError elif "is an invalid IP address" in output: - raise DDNSRequestError(_("Invalid IP address has been sent.")) + raise DDNSRequestError(_("Invalid IP address has been sent")) # If we got here, some other update error happened. raise DDNSUpdateError +class DDNSProviderJoker(DDNSProtocolDynDNS2, DDNSProvider): + handle = "joker.com" + name = "Joker.com Dynamic DNS" + website = "https://joker.com/" + protocols = ("ipv4",) + + # Information about the request can be found here: + # https://joker.com/faq/content/11/427/en/what-is-dynamic-dns-dyndns.html + # Using DynDNS V2 protocol over HTTPS here + + url = "https://svc.joker.com/nic/update" + + +class DDNSProviderGoogle(DDNSProtocolDynDNS2, DDNSProvider): + handle = "domains.google.com" + name = "Google Domains" + website = "https://domains.google.com/" + protocols = ("ipv4",) + + # Information about the format of the HTTP request is to be found + # here: https://support.google.com/domains/answer/6147083?hl=en + + url = "https://domains.google.com/nic/update" + + class DDNSProviderLightningWireLabs(DDNSProvider): handle = "dns.lightningwirelabs.com" name = "Lightning Wire Labs DNS Service" @@ -904,6 +1164,18 @@ class DDNSProviderLightningWireLabs(DDNSProvider): raise DDNSUpdateError +class DDNSProviderLoopia(DDNSProtocolDynDNS2, DDNSProvider): + handle = "loopia.se" + name = "Loopia AB" + website = "https://www.loopia.com" + protocols = ("ipv4",) + + # Information about the format of the HTTP request is to be found + # here: https://support.loopia.com/wiki/About_the_DynDNS_support + + url = "https://dns.loopia.se/XDynDNSServer/XDynDNS.php" + + class DDNSProviderMyOnlinePortal(DDNSProtocolDynDNS2, DDNSProvider): handle = "myonlineportal.net" name = "myonlineportal.net" @@ -940,8 +1212,11 @@ class DDNSProviderNamecheap(DDNSResponseParserXML, DDNSProvider): # Namecheap requires the hostname splitted into a host and domain part. host, domain = self.hostname.split(".", 1) + # Get and store curent IP address. + address = self.get_address(proto) + data = { - "ip" : self.get_address(proto), + "ip" : address, "password" : self.password, "host" : host, "domain" : domain @@ -963,9 +1238,9 @@ class DDNSProviderNamecheap(DDNSResponseParserXML, DDNSProvider): if errorcode == "304156": raise DDNSAuthenticationError elif errorcode == "316153": - raise DDNSRequestError(_("Domain not found.")) + raise DDNSRequestError(_("Domain not found")) elif errorcode == "316154": - raise DDNSRequestError(_("Domain not active.")) + raise DDNSRequestError(_("Domain not active")) elif errorcode in ("380098", "380099"): raise DDNSInternalServerError @@ -1012,6 +1287,10 @@ class DDNSProviderNsupdateINFO(DDNSProtocolDynDNS2, DDNSProvider): # has not been implemented here, yet. can_remove_records = False + # After a failed update, there will be no retries + # https://bugzilla.ipfire.org/show_bug.cgi?id=10603 + holdoff_failure_days = None + # Nsupdate.info uses the hostname as user part for the HTTP basic auth, # and for the password a so called secret. @property @@ -1111,7 +1390,7 @@ class DDNSProviderRegfish(DDNSProvider): # Raise an error if no token and no useranem and password # are given. elif not self.username and not self.password: - raise DDNSConfigurationError(_("No Auth details specified.")) + raise DDNSConfigurationError(_("No Auth details specified")) # HTTP Basic Auth is only allowed if no token is used. if self.token: @@ -1133,11 +1412,11 @@ class DDNSProviderRegfish(DDNSProvider): if "401" or "402" in output: raise DDNSAuthenticationError elif "408" in output: - raise DDNSRequestError(_("Invalid IPv4 address has been sent.")) + raise DDNSRequestError(_("Invalid IPv4 address has been sent")) elif "409" in output: - raise DDNSRequestError(_("Invalid IPv6 address has been sent.")) + raise DDNSRequestError(_("Invalid IPv6 address has been sent")) elif "412" in output: - raise DDNSRequestError(_("No valid FQDN was given.")) + raise DDNSRequestError(_("No valid FQDN was given")) elif "414" in output: raise DDNSInternalServerError @@ -1164,8 +1443,8 @@ class DDNSProviderSelfhost(DDNSProtocolDynDNS2, DDNSProvider): class DDNSProviderSPDNS(DDNSProtocolDynDNS2, DDNSProvider): handle = "spdns.org" - name = "SPDNS" - website = "http://spdns.org/" + name = "SPDYN" + website = "https://www.spdyn.de/" # Detailed information about request and response codes are provided # by the vendor. They are using almost the same mechanism and status @@ -1174,7 +1453,7 @@ class DDNSProviderSPDNS(DDNSProtocolDynDNS2, DDNSProvider): # http://wiki.securepoint.de/index.php/SPDNS_FAQ # http://wiki.securepoint.de/index.php/SPDNS_Update-Tokens - url = "https://update.spdns.de/nic/update" + url = "https://update.spdyn.de/nic/update" @property def username(self): @@ -1182,7 +1461,7 @@ class DDNSProviderSPDNS(DDNSProtocolDynDNS2, DDNSProvider): @property def password(self): - return self.get("username") or self.token + return self.get("password") or self.token class DDNSProviderStrato(DDNSProtocolDynDNS2, DDNSProvider): @@ -1196,6 +1475,15 @@ class DDNSProviderStrato(DDNSProtocolDynDNS2, DDNSProvider): url = "https://dyndns.strato.com/nic/update" + def prepare_request_data(self, proto): + data = DDNSProtocolDynDNS2.prepare_request_data(self, proto) + data.update({ + "mx" : "NOCHG", + "backupmx" : "NOCHG" + }) + + return data + class DDNSProviderTwoDNS(DDNSProtocolDynDNS2, DDNSProvider): handle = "twodns.de" @@ -1252,7 +1540,19 @@ class DDNSProviderVariomedia(DDNSProtocolDynDNS2, DDNSProvider): return data -class DDNSProviderZoneedit(DDNSProtocolDynDNS2, DDNSProvider): +class DDNSProviderXLhost(DDNSProtocolDynDNS2, DDNSProvider): + handle = "xlhost.de" + name = "XLhost" + website = "http://xlhost.de/" + protocols = ("ipv4",) + + # Information about the format of the HTTP request is to be found + # here: https://xlhost.de/faq/index_html?topicId=CQA2ELIPO4SQ + + url = "https://nsupdate.xlhost.de/" + + +class DDNSProviderZoneedit(DDNSProvider): handle = "zoneedit.com" name = "Zoneedit" website = "http://www.zoneedit.com" @@ -1286,14 +1586,62 @@ class DDNSProviderZoneedit(DDNSProtocolDynDNS2, DDNSProvider): if output.startswith("invalid login"): raise DDNSAuthenticationError elif output.startswith("