updates for more flags

This commit is contained in:
2026-01-24 13:34:18 -05:00
parent fc67da62f7
commit 427fc3ee4b
5 changed files with 190 additions and 89 deletions

View File

@@ -2,47 +2,64 @@
use strict;
use warnings;
use Martnet::DDNS;
use Regexp::Common qw/net/;
use Getopt::Long qw/GetOptions/;
use JSON::PP qw/encode_json true false/;
sub usage {
die "Usage: add-custom [--enable-dnssec|--disable-dnssec] --master <IPv4|IPv6> <zone.>\n";
}
use Getopt::Long qw/GetOptions/;
use JSON::PP ();
use Regexp::Common qw/net/;
use Martnet::DDNS;
my $master;
my $enable_dnssec = 0;
my $edit = 0;
my @ddns_keys;
my $enable_dnssec = 0;
my $disable_dnssec = 0;
GetOptions(
'master|m=s' => \$master,
'enable-dnssec' => \$enable_dnssec,
'disable-dnssec' => \$disable_dnssec,
) or usage();
'master|m=s' => \$master,
'edit!' => \$edit,
'ddns-keyname=s' => \@ddns_keys,
'enable-dnssec!' => \$enable_dnssec,
'disable-dnssec!' => \$disable_dnssec,
) or die "Usage: add-custom --master <ip> [--edit] [--ddns-keyname <key>]... [--enable-dnssec|--disable-dnssec] <zone.>\n";
usage() unless defined $master;
my $zone = shift || die "No zone provided\n";
die "Cannot specify both --enable-dnssec and --disable-dnssec\n"
if ($enable_dnssec && $disable_dnssec);
die "Zone must end in a dot\n"
unless ($zone =~ /^[a-zA-Z0-9\.\-\_]+\.$/);
my $host = shift || die "No zonename provided\n";
my $ddns = Martnet::DDNS->new();
die "Zonename must end in a dot\n"
unless ($host =~ /^[a-zA-Z0-9\.\-\_]+\.$/);
die "--master is required\n"
unless defined $master && $master ne '';
my $regex = $RE{net}{IPv4} . '|' . $RE{net}{IPv6};
die "Master must be an IPv4 or IPv6 address\n"
unless ($master =~ /^$regex$/);
my $payload = { master => $master };
if ($enable_dnssec) {
$payload->{dnssec} = true;
} elsif ($disable_dnssec) {
$payload->{dnssec} = false;
die "Specify only one of --enable-dnssec or --disable-dnssec\n"
if ($enable_dnssec && $disable_dnssec);
# Build canonical JSON payload; operators do not hand-author JSON.
my %payload = (
master => $master,
);
if (@ddns_keys) {
$payload{ddns_keys} = [ @ddns_keys ];
}
$ddns->add($host, encode_json($payload), '_custom');
if ($enable_dnssec) {
$payload{dnssec} = JSON::PP::true;
} elsif ($disable_dnssec) {
$payload{dnssec} = JSON::PP::false;
}
my $json = JSON::PP->new->canonical(1)->encode(\%payload);
my $ddns = Martnet::DDNS->new();
if ($edit) {
$ddns->set($zone, $json, '_custom');
} else {
$ddns->add($zone, $json, '_custom');
}
exit 0;

View File

@@ -2,47 +2,64 @@
use strict;
use warnings;
use Martnet::DDNS;
use Regexp::Common qw/net/;
use Getopt::Long qw/GetOptions/;
use JSON::PP qw/encode_json true false/;
sub usage {
die "Usage: add-slave [--enable-dnssec|--disable-dnssec] --master <IPv4|IPv6> <zone.>\n";
}
use Getopt::Long qw/GetOptions/;
use JSON::PP ();
use Regexp::Common qw/net/;
use Martnet::DDNS;
my $master;
my $enable_dnssec = 0;
my $edit = 0;
my @ddns_keys;
my $enable_dnssec = 0;
my $disable_dnssec = 0;
GetOptions(
'master|m=s' => \$master,
'enable-dnssec' => \$enable_dnssec,
'disable-dnssec' => \$disable_dnssec,
) or usage();
'master|m=s' => \$master,
'edit!' => \$edit,
'ddns-keyname=s' => \@ddns_keys,
'enable-dnssec!' => \$enable_dnssec,
'disable-dnssec!' => \$disable_dnssec,
) or die "Usage: add-slave --master <ip> [--edit] [--ddns-keyname <key>]... [--enable-dnssec|--disable-dnssec] <zone.>\n";
usage() unless defined $master;
my $zone = shift || die "No zone provided\n";
die "Cannot specify both --enable-dnssec and --disable-dnssec\n"
if ($enable_dnssec && $disable_dnssec);
die "Zone must end in a dot\n"
unless ($zone =~ /^[a-zA-Z0-9\.\-\_]+\.$/);
my $host = shift || die "No zonename provided\n";
my $ddns = Martnet::DDNS->new();
die "Zonename must end in a dot\n"
unless ($host =~ /^[a-zA-Z0-9\.\-\_]+\.$/);
die "--master is required\n"
unless defined $master && $master ne '';
my $regex = $RE{net}{IPv4} . '|' . $RE{net}{IPv6};
die "Master must be an IPv4 or IPv6 address\n"
unless ($master =~ /^$regex$/);
my $payload = { master => $master };
if ($enable_dnssec) {
$payload->{dnssec} = true;
} elsif ($disable_dnssec) {
$payload->{dnssec} = false;
die "Specify only one of --enable-dnssec or --disable-dnssec\n"
if ($enable_dnssec && $disable_dnssec);
# Build canonical JSON payload; operators do not hand-author JSON.
my %payload = (
master => $master,
);
if (@ddns_keys) {
$payload{ddns_keys} = [ @ddns_keys ];
}
$ddns->add($host, encode_json($payload), '_pureslave');
if ($enable_dnssec) {
$payload{dnssec} = JSON::PP::true;
} elsif ($disable_dnssec) {
$payload{dnssec} = JSON::PP::false;
}
my $json = JSON::PP->new->canonical(1)->encode(\%payload);
my $ddns = Martnet::DDNS->new();
if ($edit) {
$ddns->set($zone, $json, '_pureslave');
} else {
$ddns->add($zone, $json, '_pureslave');
}
exit 0;

View File

@@ -2,47 +2,64 @@
use strict;
use warnings;
use Martnet::DDNS;
use Regexp::Common qw/net/;
use Getopt::Long qw/GetOptions/;
use JSON::PP qw/encode_json true false/;
sub usage {
die "Usage: add-vhost [--enable-dnssec|--disable-dnssec] --master <IPv4|IPv6> <zone.>\n";
}
use Getopt::Long qw/GetOptions/;
use JSON::PP ();
use Regexp::Common qw/net/;
use Martnet::DDNS;
my $master;
my $enable_dnssec = 0;
my $edit = 0;
my @ddns_keys;
my $enable_dnssec = 0;
my $disable_dnssec = 0;
GetOptions(
'master|m=s' => \$master,
'enable-dnssec' => \$enable_dnssec,
'disable-dnssec' => \$disable_dnssec,
) or usage();
'master|m=s' => \$master,
'edit!' => \$edit,
'ddns-keyname=s' => \@ddns_keys,
'enable-dnssec!' => \$enable_dnssec,
'disable-dnssec!' => \$disable_dnssec,
) or die "Usage: add-vhost --master <ip> [--edit] [--ddns-keyname <key>]... [--enable-dnssec|--disable-dnssec] <zone.>\n";
usage() unless defined $master;
my $zone = shift || die "No zone provided\n";
die "Cannot specify both --enable-dnssec and --disable-dnssec\n"
if ($enable_dnssec && $disable_dnssec);
die "Zone must end in a dot\n"
unless ($zone =~ /^[a-zA-Z0-9\.\-\_]+\.$/);
my $host = shift || die "No zonename provided\n";
my $ddns = Martnet::DDNS->new();
die "Zonename must end in a dot\n"
unless ($host =~ /^[a-zA-Z0-9\.\-\_]+\.$/);
die "--master is required\n"
unless defined $master && $master ne '';
my $regex = $RE{net}{IPv4} . '|' . $RE{net}{IPv6};
die "Master must be an IPv4 or IPv6 address\n"
unless ($master =~ /^$regex$/);
my $payload = { master => $master };
if ($enable_dnssec) {
$payload->{dnssec} = true;
} elsif ($disable_dnssec) {
$payload->{dnssec} = false;
die "Specify only one of --enable-dnssec or --disable-dnssec\n"
if ($enable_dnssec && $disable_dnssec);
# Build canonical JSON payload; operators do not hand-author JSON.
my %payload = (
master => $master,
);
if (@ddns_keys) {
$payload{ddns_keys} = [ @ddns_keys ];
}
$ddns->add($host, encode_json($payload), '_vhosts');
if ($enable_dnssec) {
$payload{dnssec} = JSON::PP::true;
} elsif ($disable_dnssec) {
$payload{dnssec} = JSON::PP::false;
}
my $json = JSON::PP->new->canonical(1)->encode(\%payload);
my $ddns = Martnet::DDNS->new();
if ($edit) {
$ddns->set($zone, $json, '_vhosts');
} else {
$ddns->add($zone, $json, '_vhosts');
}
exit 0;

View File

@@ -10,7 +10,7 @@ use Martnet::DDNS;
# Hidden-master unified include generator.
#
# - Generates /etc/bind/unified.zones.9
# - Generates /var/lib/bind/unified.zones.9
# - Creates missing zonefiles for any emitted zones (minimal skeleton)
# - Deterministic output; only rewrites include file if content changes
#
@@ -19,13 +19,15 @@ use Martnet::DDNS;
# - Does NOT attempt to infer DNSSEC (you are removing _dnssec entirely).
# - Filters out private.invalid (core static config) and _pureslave (slave-only).
my $out = '/etc/bind/unified.zones.9';
my $out = '/var/lib/bind/unified.zones.9';
my $self_master = undef; # if unset, uses $ddns->default_master()
my $force_zf = 0; # overwrite existing zonefiles too
my $force_out = 0; # rewrite unified include even if identical
my $reload_cmd = '/usr/sbin/rndc';
my $reconfig = 1; # use rndc reconfig (safer for include file updates)
my $default_ddns_key = 'master-ddns-tsig';
GetOptions(
'out=s' => \$out,
'self=s' => \$self_master,
@@ -160,11 +162,38 @@ for my $r (@zones) {
my $type = $r->{type} // '';
my $zf = zonefile_for($zone, $type);
# Stable, single-line formatting
$content .= sprintf(
"zone \"%s\" { type master; file \"%s\"; };\n",
$zone, $zf
);
# Always enable DDNS updates via the default key, plus any additional keys recorded in JSON.
my @keys = ($default_ddns_key);
if (defined($r->{payload}) && ref($r->{payload}) eq 'HASH') {
my $ak = $r->{payload}->{ddns_keys};
if (defined $ak) {
if (ref($ak) eq 'ARRAY') {
push @keys, grep { defined($_) && $_ ne '' } @$ak;
} elsif (!ref($ak) && $ak ne '') {
push @keys, $ak;
}
}
}
# Deduplicate while preserving order.
my %seen;
@keys = grep { !$seen{$_}++ } @keys;
my $allow_transfer = 'allow-transfer { trusted; ' . join(' ', map { 'key "' . $_ . '";' } @keys) . ' };';
my $update_policy = 'update-policy { ' . join(' ', map { 'grant ' . $_ . ' zonesub ANY;' } @keys) . ' };';
my $journal = 'journal "' . $zf . '.jnl";';
my $serial_update = 'serial-update-method unixtime;';
my $dnssec = 0;
if (defined($r->{payload}) && ref($r->{payload}) eq 'HASH' && $r->{payload}->{dnssec}) {
$dnssec = 1;
}
my $dnssec_opts = $dnssec ? ' auto-dnssec maintain; inline-signing yes;' : '';
$content .= sprintf(
"zone \"%s\" { type master; file \"%s\";%s %s %s %s %s };\n",
$zone, $zf, $dnssec_opts, $allow_transfer, $update_policy, $journal, $serial_update
);
}
# Decide whether unified include changed