2019-09-12 16:28:57 +02:00
#!/usr/bin/env sh
#OPNsense Bind API
#https://docs.opnsense.org/development/api.html
#
#OPNs_Host="opnsense.example.com"
#OPNs_Port="443"
#OPNs_Key="qocfU9RSbt8vTIBcnW8bPqCrpfAHMDvj5OzadE7Str+rbjyCyk7u6yMrSCHtBXabgDDXx/dY0POUp7ZA"
#OPNs_Token="pZEQ+3ce8dDlfBBdg3N8EpqpF5I1MhFqdxX06le6Gl8YzyQvYCfCzNaFX9O9+IOSyAs7X71fwdRiZ+Lv"
2019-09-12 17:17:32 +02:00
#OPNs_Api_Insecure=0 # Set 1 for insecure and 0 for secure -> difference is whether ssl cert is checked for validity (0) or whether it is just accepted (1)
2019-09-12 16:28:57 +02:00
######## Public functions #####################
#Usage: add _acme-challenge.www.domain.com "123456789ABCDEF0000000000000000000000000000000000000"
#fulldomain
#txtvalue
dns_opnsense_add( ) {
fulldomain = $1
txtvalue = $2
_opns_check_auth || return 1
if ! set_record " $fulldomain " " $txtvalue " ; then
return 1
fi
return 0
}
#fulldomain
dns_opnsense_rm( ) {
fulldomain = $1
txtvalue = $2
_opns_check_auth || return 1
if ! rm_record " $fulldomain " " $txtvalue " ; then
return 1
fi
return 0
}
set_record( ) {
_info "Adding record"
fulldomain = $1
new_challenge = $2
_debug "Detect root zone"
if ! _get_root " $fulldomain " ; then
_err "invalid domain"
return 1
fi
_debug _domain " $_domain "
_debug _host " $_host "
_debug _domainid " $_domainid "
_return_str = ""
_record_string = ""
_build_record_string " $_domainid " " $_host " " $new_challenge "
_uuid = ""
if _existingchallenge " $_domain " " $_host " " $new_challenge " ; then
# Update
if _opns_rest "POST" " /record/setRecord/ ${ _uuid } " " $_record_string " ; then
_return_str = " $response "
else
return 1
fi
else
#create
if _opns_rest "POST" "/record/addRecord" " $_record_string " ; then
_return_str = " $response "
else
return 1
fi
fi
2019-09-12 17:24:00 +02:00
if echo " $_return_str " | _egrep_o "\"result\":\"saved\"" >/dev/null; then
2019-09-12 16:28:57 +02:00
_opns_rest "POST" "/service/reconfigure" "{}"
_debug "Record created"
else
_err " Error createing record $_record_string "
return 1
fi
return 0
}
rm_record( ) {
_info "Remove record"
fulldomain = $1
new_challenge = " $2 "
_debug "Detect root zone"
if ! _get_root " $fulldomain " ; then
_err "invalid domain"
return 1
fi
_debug _domain " $_domain "
_debug _host " $_host "
_debug _domainid " $_domainid "
_uuid = ""
if _existingchallenge " $_domain " " $_host " " $new_challenge " ; then
# Delete
2019-09-12 17:17:32 +02:00
if _opns_rest "POST" " /record/delRecord/ ${ _uuid } " "\{\}" ; then
if echo " $_return_str " | _egrep_o "\"result\":\"deleted\"" >/dev/null; then
2019-09-12 16:28:57 +02:00
_opns_rest "POST" "/service/reconfigure" "{}"
_debug "Record deleted"
else
_err " Error delteting record $fulldomain "
return 1
fi
else
2019-09-12 17:17:32 +02:00
_err " Error delteting record $fulldomain "
return 1
2019-09-12 16:28:57 +02:00
fi
else
_info "Record not found, nothing to remove"
fi
return 0
}
#################### Private functions below ##################################
#_acme-challenge.www.domain.com
#returns
# _domainid=domid
2019-09-12 17:17:32 +02:00
#_domain=domain.com
2019-09-12 16:28:57 +02:00
_get_root( ) {
domain = $1
i = 2
p = 1
if _opns_rest "GET" "/domain/get" ; then
_domain_response = " $response "
else
return 1
fi
while true; do
h = $( printf "%s" " $domain " | cut -d . -f $i -100)
if [ -z " $h " ] ; then
#not valid
return 1
fi
_debug h " $h "
2019-09-12 17:24:00 +02:00
id = $( echo " $_domain_response " | _egrep_o " \"[^\"]*\":{\"enabled\":\"1\",\"type\":{\"master\":{\"value\":\"master\",\"selected\":1},\"slave\":{\"value\":\"slave\",\"selected\":0}},\"masterip\":\"[^\"]*\",\"domainname\":\" ${ h } \" " | cut -d ':' -f 1 | cut -d '"' -f 2)
2019-09-12 16:28:57 +02:00
2019-09-12 17:17:32 +02:00
if [ -n " $id " ] ; then
2019-09-12 16:28:57 +02:00
_debug id " $id "
_host = $( printf "%s" " $domain " | cut -d . -f 1-$p )
_domain = " ${ h } "
_domainid = " ${ id } "
return 0
fi
p = $i
i = $( _math $i + 1)
done
_debug " $domain not found "
return 1
}
_opns_rest( ) {
method = $1
ep = $2
data = $3
#Percent encode user and token
2019-09-12 17:17:32 +02:00
key = $( echo " $OPNs_Key " | tr -d "\n\r" | _url_encode)
token = $( echo " $OPNs_Token " | tr -d "\n\r" | _url_encode)
2019-09-12 16:28:57 +02:00
opnsense_url = " https:// ${ key } : ${ token } @ ${ OPNs_Host } : ${ OPNs_Port } /api/bind ${ ep } "
export _H1 = "Content-Type: application/json"
if [ ! " $method " = "GET" ] ; then
_debug data " $data "
export _H1 = "Content-Type: application/json"
response = " $( _post " $data " " $opnsense_url " "" " $method " ) "
else
export _H1 = ""
response = " $( _get " $opnsense_url " ) "
fi
if [ " $? " != "0" ] ; then
_err " error $ep "
return 1
fi
_debug2 response " $response "
return 0
}
_build_record_string( ) {
_record_string = " {\"record\":{\"enabled\":\"1\",\"domain\":\" $1 \",\"name\":\" $2 \",\"type\":\"TXT\",\"value\":\" $3 \"}} "
}
_existingchallenge( ) {
if _opns_rest "GET" "/record/searchRecord" ; then
_record_response = " $response "
else
return 1
fi
_uuid = ""
2019-09-12 20:50:20 +02:00
_uuid = $( echo " $_record_response " | _egrep_o " \"uuid\":\"[^\"]*\",\"enabled\":\"[01]\",\"domain\":\" $1 \",\"name\":\" $2 \",\"type\":\"TXT\",\"value\":\" $3 \" " | cut -d ':' -f 2 | cut -d '"' -f 2)
2019-09-12 16:28:57 +02:00
2019-09-12 17:17:32 +02:00
if [ -n " $_uuid " ] ; then
2019-09-12 16:28:57 +02:00
_debug uuid " $_uuid "
return 0
fi
_debug " ${ 2 } . $1 {1} record not found "
return 1
}
_opns_check_auth( ) {
OPNs_Host = " ${ OPNs_Host :- $( _readaccountconf_mutable OPNs_Host) } "
OPNs_Port = " ${ OPNs_Port :- $( _readaccountconf_mutable OPNs_Port) } "
OPNs_Key = " ${ OPNs_Key :- $( _readaccountconf_mutable OPNs_Key) } "
OPNs_Token = " ${ OPNs_Token :- $( _readaccountconf_mutable OPNs_Token) } "
OPNs_Api_Insecure = " ${ OPNs_Api_Insecure :- $( _readaccountconf_mutable OPNs_Api_Insecure) } "
if [ -z " $OPNs_Host " ] ; then
OPNs_Host = "localhost"
_err "You don't specify OPNsense address."
2019-10-25 08:04:20 +02:00
return 1
else
_saveaccountconf_mutable OPNs_Host " $OPNs_Host "
2019-09-12 16:28:57 +02:00
fi
if [ -z " $OPNs_Port " ] ; then
OPNs_Port = "443"
2019-10-25 08:04:20 +02:00
else
_saveaccountconf_mutable OPNs_Port " $OPNs_Port "
2019-09-12 16:28:57 +02:00
fi
if [ -z " $OPNs_Api_Insecure " ] ; then
OPNs_Api_Insecure = "0"
2019-10-25 08:04:20 +02:00
else
#save the api addr and key to the account conf file.
_saveaccountconf_mutable OPNs_Api_Insecure " $OPNs_Api_Insecure "
2019-09-12 16:28:57 +02:00
fi
2019-10-25 08:04:20 +02:00
export HTTPS_INSECURE = " ${ OPNs_Api_Insecure } "
2019-09-12 16:28:57 +02:00
if [ -z " $OPNs_Key " ] ; then
OPNs_Key = ""
_err "You don't specify OPNsense api key id."
_err "Please set you OPNs_Key and try again."
return 1
2019-10-25 08:04:20 +02:00
else
_saveaccountconf_mutable OPNs_Key " $OPNs_Key "
2019-09-12 16:28:57 +02:00
fi
if [ -z " $OPNs_Token " ] ; then
OPNs_Token = ""
_err "You don't specify OPNsense token."
_err "Please create you OPNs_Token and try again."
return 1
2019-10-25 08:04:20 +02:00
else
_saveaccountconf_mutable OPNs_Token " $OPNs_Token "
2019-09-12 16:28:57 +02:00
fi
2019-09-12 17:17:32 +02:00
if ! _opns_rest "GET" "/general/get" ; then
2019-09-12 16:28:57 +02:00
_err "Can't Access OPNsense"
return 1
fi
return 0
}