cloudflare-dns-updater/src/main.rs

383 lines
16 KiB
Rust
Raw Normal View History

2023-12-26 03:10:10 +00:00
/*use cloudflare_old::{Instance, CloudflareDnsType};*/
2023-02-26 00:10:39 +00:00
use reqwest::blocking::get;
2023-12-26 03:10:10 +00:00
use std::{thread::{sleep}};
use std::error::Error;
use std::net::{Ipv4Addr, Ipv6Addr};
use std::str::FromStr;
use chrono::{Utc, Duration};
2023-12-26 03:10:10 +00:00
use dotenv::dotenv;
2023-12-25 15:24:40 +00:00
use log::{info, warn, error, LevelFilter};
2023-12-26 03:10:10 +00:00
use reqwest::StatusCode;
use systemd_journal_logger::{connected_to_journal, JournalLog};
use crate::cloudflare::{CloudflareZone, DnsRecordType};
2023-12-25 15:24:18 +00:00
mod config;
2023-02-26 00:10:39 +00:00
mod cloudflare;
2023-12-26 03:10:10 +00:00
struct Addresses {
ipv4_uri: String,
ipv6_uri: String,
ipv4: Ipv4Addr,
ipv6: Ipv6Addr,
}
2023-12-26 03:10:10 +00:00
impl Addresses {
fn new() -> Result<Self, Box<dyn Error>> {
let mut ret = Self {
2023-12-26 03:18:58 +00:00
ipv4_uri: "https://am.i.mullvad.net/ip".to_owned(),
ipv6_uri: "https://ipv6.am.i.mullvad.net/ip".to_owned(),
2023-12-26 03:10:10 +00:00
ipv4: Ipv4Addr::new(0, 0, 0, 0),
ipv6: Ipv6Addr::new(0, 0, 0, 0, 0, 0, 0, 0)
};
2023-12-26 03:10:10 +00:00
match ret.get_v4() {
Ok(ip) => ret.ipv4 = ip,
Err(_) => {
let err_msg = format!("Unable to fetch IPv4 from '{}' during init. Aborting!", ret.ipv4_uri);
match connected_to_journal() {
true => error!("[ERROR] {err_msg}"),
false => eprintln!("[ERROR] {err_msg}"),
}
panic!("{}", err_msg);
}
}
2023-12-26 03:10:10 +00:00
match ret.get_v6() {
Ok(ip) => ret.ipv6 = ip,
Err(_) => {
let err_msg = format!("Unable to fetch IPv6 from '{}' during init. Aborting!", ret.ipv6_uri);
match connected_to_journal() {
true => error!("[ERROR] {err_msg}"),
false => eprintln!("[ERROR] {err_msg}"),
}
panic!("{}", err_msg);
}
}
2023-02-26 00:10:39 +00:00
2023-12-26 03:10:10 +00:00
Ok(ret)
}
fn update(&mut self) {
2023-12-26 03:10:10 +00:00
match self.get_v4() {
Ok(ip) => {
if ip != self.ipv4 {
let info_msg = format!("IPv4 changed from '{}' to '{}'", self.ipv4, ip);
match connected_to_journal() {
true => info!("[INFO] {info_msg}"),
false => println!("[INFO] {info_msg}"),
}
self.ipv4 = ip;
}
2023-12-26 03:10:10 +00:00
}
Err(e) => {
let warn_msg = format!("Unable to fetch IPv4 from '{}'. Error: {}", self.ipv4_uri, e);
match connected_to_journal() {
true => warn!("[WARN] {warn_msg}"),
false => println!("[WARN] {warn_msg}"),
}
}
2023-02-27 15:15:00 +00:00
}
2023-12-26 03:10:10 +00:00
match self.get_v6() {
Ok(ip) => {
if ip != self.ipv6 {
let info_msg = format!("IPv6 changed from '{}' to '{}'", self.ipv6, ip);
match connected_to_journal() {
true => info!("[INFO] {info_msg}"),
false => println!("[INFO] {info_msg}"),
}
self.ipv6 = ip;
2023-12-26 03:10:10 +00:00
}
}
Err(e) => {
let warn_msg = format!("Unable to fetch IPv6 from '{}'. Error: {}", self.ipv6_uri, e);
match connected_to_journal() {
true => warn!("[WARN] {warn_msg}"),
false => println!("[WARN] {warn_msg}"),
}
}
2023-02-27 15:15:00 +00:00
}
2023-12-26 03:10:10 +00:00
}
fn get_v4(&self) -> Result<Ipv4Addr, reqwest::Error> {
match get(&self.ipv4_uri) {
Ok(res) => {
match res.status() {
StatusCode::OK => {
let ip_string = res.text().expect("Returned data should always contain text").trim_end().to_owned();
Ok(Ipv4Addr::from_str(ip_string.as_str()).expect("Returned IP should always be parseable"))
},
_ => {
let warn_msg = format!("Unexpected HTTP status {}", res.status());
match connected_to_journal() {
true => warn!("[WARN] {warn_msg}"),
false => println!("[WARN] {warn_msg}"),
}
Ok(Ipv4Addr::new(0, 0, 0, 0))
}
2023-12-26 03:10:10 +00:00
}
}
Err(e) => Err(e),
}
}
2023-02-26 00:10:39 +00:00
2023-12-26 03:10:10 +00:00
fn get_v6(&self) -> Result<Ipv6Addr, reqwest::Error> {
match get(&self.ipv6_uri) {
Ok(res) => {
match res.status() {
StatusCode::OK => {
let ip_string = res.text().expect("Returned data should always contain text").trim_end().to_owned();
Ok(Ipv6Addr::from_str(ip_string.as_str()).expect("Returned IP should always be parseable"))
},
_ => {
let warn_msg = format!("Unexpected HTTP status {}", res.status());
match connected_to_journal() {
true => warn!("[WARN] {warn_msg}"),
false => println!("[WARN] {warn_msg}"),
}
Ok(Ipv6Addr::new(0, 0, 0, 0, 0, 0, 0, 0))
}
}
},
2023-12-26 03:10:10 +00:00
Err(e) => Err(e),
}
}
}
2023-12-26 03:10:10 +00:00
fn main() {
dotenv().ok();
JournalLog::new().expect("Systemd-Logger crate error").install().expect("Systemd-Logger crate error");
log::set_max_level(LevelFilter::Info);
2023-02-26 00:10:39 +00:00
2023-12-26 03:10:10 +00:00
let mut ifaces = config::InterfaceConfig::load().unwrap();
let mut zone_cfgs= config::ZoneConfig::load().unwrap();
2023-02-26 00:10:39 +00:00
2023-12-26 03:10:10 +00:00
let mut now = Utc::now() - Duration::seconds(59);
let mut start = now;
2023-02-26 00:10:39 +00:00
2023-12-26 03:10:10 +00:00
let mut ips = match Addresses::new() {
Ok(ips) => ips,
Err(e) => panic!("{}", e)
};
2023-02-26 00:10:39 +00:00
2023-12-26 03:10:10 +00:00
loop {
now = Utc::now();
if now >= start + Duration::seconds(10) { // DEBUG was 60
2023-12-26 03:10:10 +00:00
start = now;
match config::InterfaceConfig::load() {
Ok(new_cfg) => {
if ifaces != new_cfg {
if ifaces.host_address != new_cfg.host_address {
let info_msg = format!("Host address in interfaces.toml changed from '{}' to '{}'", ifaces.host_address, new_cfg.host_address);
match connected_to_journal() {
true => info!("[INFO] {info_msg}"),
false => println!("[INFO] {info_msg}"),
}
}
if ifaces.interfaces != new_cfg.interfaces {
let mut new: Vec<(&String, &Ipv6Addr)> = vec![];
let mut deleted: Vec<(&String, &Ipv6Addr)>;
let mut modified: Vec<(&String, &Ipv6Addr)> = vec![];
new_cfg.interfaces.iter().for_each(|(interface, address)| {
if ifaces.interfaces.contains_key(interface) {
if ifaces.interfaces.get(interface) != Some(address) {
modified.push((interface, address));
}
}
else {
let matches: Vec<&Ipv6Addr> = ifaces.interfaces.values().filter(|addr| {
*addr == address
}).collect();
if matches.len() == 0 {
new.push((interface, address));
}
else {
modified.push((interface, address));
}
}
});
deleted = ifaces.interfaces.iter().filter(|(interface, address)| {
!new_cfg.interfaces.contains_key(*interface) && modified.iter().find(|(_, new_addr)| { new_addr == address }).is_none()
}).collect();
for (name, addr) in deleted {
let info_msg = format!("Deleted interface '{name}' with address '{addr}'");
match connected_to_journal() {
true => info!("[INFO] {info_msg}"),
false => println!("[INFO] {info_msg}"),
}
}
for (name, addr) in new {
let info_msg = format!("Added interface '{name}' with address '{addr}'");
match connected_to_journal() {
true => info!("[INFO] {info_msg}"),
false => println!("[INFO] {info_msg}"),
}
}
for (name, addr) in modified {
let info_msg;
if ifaces.interfaces.contains_key(name) {
let old_addr = ifaces.interfaces.get(name).expect("contains check on ifaces was successful");
info_msg = format!("Changed interface address of '{name}' from '{old_addr}' to '{addr}'");
}
else {
let old_name = ifaces.interfaces.iter()
.find(|(_, old_addr)| { old_addr == &addr })
.expect("modified entry should not exist if this fails")
.0;
info_msg = format!("Changed interface name for '{addr}' from '{old_name}' to '{name}'");
}
match connected_to_journal() {
true => info!("[INFO] {info_msg}"),
false => println!("[INFO] {info_msg}"),
}
}
}
ifaces = new_cfg
}
},
2023-12-26 03:10:10 +00:00
Err(e) => {
let err_msg = format!("Unable to load ínterfaces.toml with error: {}", e);
match connected_to_journal() {
true => error!("[ERROR] {err_msg}"),
false => eprintln!("[ERROR] {err_msg}"),
}
2023-03-15 20:36:52 +00:00
}
}
2023-02-26 00:10:39 +00:00
2023-12-26 03:10:10 +00:00
match config::ZoneConfig::load() {
Ok(new) => zone_cfgs = new,
Err(e) => {
let err_msg = format!("Unable to load from zones.d with error: {}", e);
match connected_to_journal() {
true => error!("[ERROR] {err_msg}"),
false => eprintln!("[ERROR] {err_msg}"),
}
2023-03-15 20:36:52 +00:00
}
}
ips.update();
for zone in &zone_cfgs {
let cf_zone = match CloudflareZone::new(zone) {
Ok(data) => data,
Err(e) => {
let err_msg = format!("Cloudflare Token likely not set. Error: {}", e);
match connected_to_journal() {
true => error!("[ERROR] {err_msg}"),
false => eprintln!("[ERROR] {err_msg}"),
}
continue
}
};
let cf_entries = match cf_zone.get_entries() {
Ok(entries) => entries,
Err(_) => {
continue
}
};
for entry in &zone.entries {
let ipv6;
let ipv4;
match entry.r#type[..] {
[DnsRecordType::AAAA, DnsRecordType::A] => {
ipv6 = match ifaces.full_v6(&entry.interface, ips.ipv6) {
Ok(ip) => Some(ip),
Err(_) => {
continue
}
};
ipv4 = Some(ips.ipv4);
},
[DnsRecordType::A, DnsRecordType::AAAA] => {
ipv6 = match ifaces.full_v6(&entry.interface, ips.ipv6) {
Ok(ip) => Some(ip),
Err(_) => {
continue
}
};
ipv4 = Some(ips.ipv4);
},
[DnsRecordType::AAAA] => {
ipv6 = match ifaces.full_v6(&entry.interface, ips.ipv6) {
Ok(ip) => Some(ip),
Err(_) => {
continue
}
};
ipv4 = None;
},
[DnsRecordType::A] => {
ipv6 = None;
ipv4 = Some(ips.ipv4);
},
_ => {
let warn_msg = "Config contains unsupported type identifier";
2023-12-26 03:10:10 +00:00
match connected_to_journal() {
true => warn!("[WARN] {warn_msg}"),
false => println!("[WARN] {warn_msg}"),
2023-12-26 03:10:10 +00:00
}
continue
}
}
for r#type in &entry.r#type {
let cf_entry = cf_entries.iter().find(|cf_entry| {
cf_entry.name == entry.name && &cf_entry.r#type == r#type
});
if let Some(cf_entry) = cf_entry {
match cf_entry.r#type {
DnsRecordType::A => {
let cf_ip = Ipv4Addr::from_str(cf_entry.content.as_str()).expect("Cloudflare return should always be valid IP");
if Some(cf_ip) == ipv4 {
continue
}
},
DnsRecordType::AAAA => {
let cf_ip = Ipv6Addr::from_str(cf_entry.content.as_str()).expect("Cloudflare return should always be valid IP");
if Some(cf_ip) == ipv6 {
continue
}
},
_ => {},
}
2023-12-27 12:39:02 +00:00
if cf_zone.update(entry, r#type, &cf_entry.id, ipv6, ipv4).is_ok() {
let info_msg = format!("Updated {} DNS Record for entry '{}' in zone '{}'", r#type, entry.name, zone.name);
match connected_to_journal() {
true => warn!("[INFO] {info_msg}"),
false => println!("[INFO] {info_msg}"),
}
}
}
2023-12-27 12:39:02 +00:00
else if cf_zone.create(entry, r#type, ipv6, ipv4).is_ok() {
let info_msg = format!("Created {} DNS Record for entry '{}' in zone '{}'", r#type, entry.name, zone.name);
match connected_to_journal() {
true => info!("[INFO] {info_msg}"),
false => println!("[INFO] {info_msg}"),
};
2023-12-26 03:10:10 +00:00
}
}
// handle return values
2023-12-26 03:10:10 +00:00
}
}
}
else {
2023-12-26 03:10:10 +00:00
sleep(std::time::Duration::from_millis(200));
}
}
2023-02-26 00:10:39 +00:00
}