2017-02-07 21:33:23 +00:00
|
|
|
// Package route53 implements a DNS provider for solving the DNS-01 challenge
|
|
|
|
// using AWS Route 53 DNS.
|
|
|
|
package route53
|
|
|
|
|
|
|
|
import (
|
2018-07-23 15:30:03 +00:00
|
|
|
"errors"
|
2017-02-07 21:33:23 +00:00
|
|
|
"fmt"
|
|
|
|
"math/rand"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
|
|
"github.com/aws/aws-sdk-go/aws/client"
|
|
|
|
"github.com/aws/aws-sdk-go/aws/request"
|
|
|
|
"github.com/aws/aws-sdk-go/aws/session"
|
|
|
|
"github.com/aws/aws-sdk-go/service/route53"
|
2018-05-31 07:30:04 +00:00
|
|
|
"github.com/xenolf/lego/acme"
|
2018-09-14 08:06:03 +00:00
|
|
|
"github.com/xenolf/lego/platform/config/env"
|
2017-02-07 21:33:23 +00:00
|
|
|
)
|
|
|
|
|
2018-07-23 15:30:03 +00:00
|
|
|
// Config is used to configure the creation of the DNSProvider
|
|
|
|
type Config struct {
|
|
|
|
MaxRetries int
|
|
|
|
TTL int
|
|
|
|
PropagationTimeout time.Duration
|
|
|
|
PollingInterval time.Duration
|
|
|
|
HostedZoneID string
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewDefaultConfig returns a default configuration for the DNSProvider
|
|
|
|
func NewDefaultConfig() *Config {
|
|
|
|
return &Config{
|
2018-09-14 08:06:03 +00:00
|
|
|
MaxRetries: env.GetOrDefaultInt("AWS_MAX_RETRIES", 5),
|
|
|
|
TTL: env.GetOrDefaultInt("AWS_TTL", 10),
|
2018-09-17 13:16:03 +00:00
|
|
|
PropagationTimeout: env.GetOrDefaultSecond("AWS_PROPAGATION_TIMEOUT", 2*time.Minute),
|
|
|
|
PollingInterval: env.GetOrDefaultSecond("AWS_POLLING_INTERVAL", 4*time.Second),
|
2018-10-10 14:28:04 +00:00
|
|
|
HostedZoneID: env.GetOrFile("AWS_HOSTED_ZONE_ID"),
|
2018-07-23 15:30:03 +00:00
|
|
|
}
|
|
|
|
}
|
2017-02-07 21:33:23 +00:00
|
|
|
|
2018-05-31 07:30:04 +00:00
|
|
|
// DNSProvider implements the acme.ChallengeProvider interface
|
2017-02-07 21:33:23 +00:00
|
|
|
type DNSProvider struct {
|
2018-07-23 15:30:03 +00:00
|
|
|
client *route53.Route53
|
|
|
|
config *Config
|
2017-02-07 21:33:23 +00:00
|
|
|
}
|
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
// customRetryer implements the client.Retryer interface by composing the DefaultRetryer.
|
|
|
|
// It controls the logic for retrying recoverable request errors (e.g. when rate limits are exceeded).
|
2017-02-07 21:33:23 +00:00
|
|
|
type customRetryer struct {
|
|
|
|
client.DefaultRetryer
|
|
|
|
}
|
|
|
|
|
|
|
|
// RetryRules overwrites the DefaultRetryer's method.
|
2018-10-10 14:28:04 +00:00
|
|
|
// It uses a basic exponential backoff algorithm:
|
|
|
|
// that returns an initial delay of ~400ms with an upper limit of ~30 seconds,
|
|
|
|
// which should prevent causing a high number of consecutive throttling errors.
|
2017-02-07 21:33:23 +00:00
|
|
|
// For reference: Route 53 enforces an account-wide(!) 5req/s query limit.
|
|
|
|
func (d customRetryer) RetryRules(r *request.Request) time.Duration {
|
|
|
|
retryCount := r.RetryCount
|
|
|
|
if retryCount > 7 {
|
|
|
|
retryCount = 7
|
|
|
|
}
|
|
|
|
|
|
|
|
delay := (1 << uint(retryCount)) * (rand.Intn(50) + 200)
|
|
|
|
return time.Duration(delay) * time.Millisecond
|
|
|
|
}
|
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
// NewDNSProvider returns a DNSProvider instance configured for the AWS Route 53 service.
|
2017-02-07 21:33:23 +00:00
|
|
|
//
|
2018-10-10 14:28:04 +00:00
|
|
|
// AWS Credentials are automatically detected in the following locations and prioritized in the following order:
|
2017-02-07 21:33:23 +00:00
|
|
|
// 1. Environment variables: AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY,
|
|
|
|
// AWS_REGION, [AWS_SESSION_TOKEN]
|
|
|
|
// 2. Shared credentials file (defaults to ~/.aws/credentials)
|
|
|
|
// 3. Amazon EC2 IAM role
|
|
|
|
//
|
2018-10-10 14:28:04 +00:00
|
|
|
// If AWS_HOSTED_ZONE_ID is not set, Lego tries to determine the correct public hosted zone via the FQDN.
|
2017-10-31 09:42:03 +00:00
|
|
|
//
|
2017-02-07 21:33:23 +00:00
|
|
|
// See also: https://github.com/aws/aws-sdk-go/wiki/configuring-sdk
|
|
|
|
func NewDNSProvider() (*DNSProvider, error) {
|
2018-07-23 15:30:03 +00:00
|
|
|
return NewDNSProviderConfig(NewDefaultConfig())
|
|
|
|
}
|
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
// NewDNSProviderConfig takes a given config ans returns a custom configured DNSProvider instance
|
2018-07-23 15:30:03 +00:00
|
|
|
func NewDNSProviderConfig(config *Config) (*DNSProvider, error) {
|
|
|
|
if config == nil {
|
2018-09-17 13:16:03 +00:00
|
|
|
return nil, errors.New("route53: the configuration of the Route53 DNS provider is nil")
|
2018-07-23 15:30:03 +00:00
|
|
|
}
|
2017-10-31 09:42:03 +00:00
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
retry := customRetryer{}
|
|
|
|
retry.NumMaxRetries = config.MaxRetries
|
|
|
|
sessionCfg := request.WithRetryer(aws.NewConfig(), retry)
|
|
|
|
|
2018-09-17 13:16:03 +00:00
|
|
|
sess, err := session.NewSessionWithOptions(session.Options{Config: *sessionCfg})
|
2018-05-31 07:30:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2017-02-07 21:33:23 +00:00
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
cl := route53.New(sess)
|
|
|
|
return &DNSProvider{client: cl, config: config}, nil
|
2017-02-07 21:33:23 +00:00
|
|
|
}
|
|
|
|
|
2018-07-23 15:30:03 +00:00
|
|
|
// Timeout returns the timeout and interval to use when checking for DNS
|
|
|
|
// propagation.
|
2018-10-10 14:28:04 +00:00
|
|
|
func (d *DNSProvider) Timeout() (timeout, interval time.Duration) {
|
|
|
|
return d.config.PropagationTimeout, d.config.PollingInterval
|
2018-07-23 15:30:03 +00:00
|
|
|
}
|
|
|
|
|
2017-02-07 21:33:23 +00:00
|
|
|
// Present creates a TXT record using the specified parameters
|
2018-10-10 14:28:04 +00:00
|
|
|
func (d *DNSProvider) Present(domain, token, keyAuth string) error {
|
2018-05-31 07:30:04 +00:00
|
|
|
fqdn, value, _ := acme.DNS01Record(domain, keyAuth)
|
2018-09-17 13:16:03 +00:00
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
hostedZoneID, err := d.getHostedZoneID(fqdn)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("route53: failed to determine hosted zone ID: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
records, err := d.getExistingRecordSets(hostedZoneID, fqdn)
|
2018-09-17 13:16:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("route53: %v", err)
|
|
|
|
}
|
2017-02-07 21:33:23 +00:00
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
realValue := `"` + value + `"`
|
2018-09-17 13:16:03 +00:00
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
var found bool
|
|
|
|
for _, record := range records {
|
|
|
|
if aws.StringValue(record.Value) == realValue {
|
|
|
|
found = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if !found {
|
|
|
|
records = append(records, &route53.ResourceRecord{Value: aws.String(realValue)})
|
|
|
|
}
|
|
|
|
|
|
|
|
recordSet := &route53.ResourceRecordSet{
|
|
|
|
Name: aws.String(fqdn),
|
|
|
|
Type: aws.String("TXT"),
|
|
|
|
TTL: aws.Int64(int64(d.config.TTL)),
|
|
|
|
ResourceRecords: records,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = d.changeRecord(route53.ChangeActionUpsert, hostedZoneID, recordSet)
|
2018-09-17 13:16:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("route53: %v", err)
|
|
|
|
}
|
|
|
|
return nil
|
2017-02-07 21:33:23 +00:00
|
|
|
}
|
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
// CleanUp removes the TXT record matching the specified parameters
|
|
|
|
func (d *DNSProvider) CleanUp(domain, token, keyAuth string) error {
|
|
|
|
fqdn, _, _ := acme.DNS01Record(domain, keyAuth)
|
|
|
|
|
|
|
|
hostedZoneID, err := d.getHostedZoneID(fqdn)
|
2017-02-07 21:33:23 +00:00
|
|
|
if err != nil {
|
2018-05-31 07:30:04 +00:00
|
|
|
return fmt.Errorf("failed to determine Route 53 hosted zone ID: %v", err)
|
2017-02-07 21:33:23 +00:00
|
|
|
}
|
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
records, err := d.getExistingRecordSets(hostedZoneID, fqdn)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("route53: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(records) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
recordSet := &route53.ResourceRecordSet{
|
|
|
|
Name: aws.String(fqdn),
|
|
|
|
Type: aws.String("TXT"),
|
|
|
|
TTL: aws.Int64(int64(d.config.TTL)),
|
|
|
|
ResourceRecords: records,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = d.changeRecord(route53.ChangeActionDelete, hostedZoneID, recordSet)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("route53: %v", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *DNSProvider) changeRecord(action, hostedZoneID string, recordSet *route53.ResourceRecordSet) error {
|
|
|
|
recordSetInput := &route53.ChangeResourceRecordSetsInput{
|
2017-02-07 21:33:23 +00:00
|
|
|
HostedZoneId: aws.String(hostedZoneID),
|
|
|
|
ChangeBatch: &route53.ChangeBatch{
|
|
|
|
Comment: aws.String("Managed by Lego"),
|
2018-10-10 14:28:04 +00:00
|
|
|
Changes: []*route53.Change{{
|
|
|
|
Action: aws.String(action),
|
|
|
|
ResourceRecordSet: recordSet,
|
|
|
|
}},
|
2017-02-07 21:33:23 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
resp, err := d.client.ChangeResourceRecordSets(recordSetInput)
|
2017-02-07 21:33:23 +00:00
|
|
|
if err != nil {
|
2018-09-17 13:16:03 +00:00
|
|
|
return fmt.Errorf("failed to change record set: %v", err)
|
2017-02-07 21:33:23 +00:00
|
|
|
}
|
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
changeID := resp.ChangeInfo.Id
|
2017-02-07 21:33:23 +00:00
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
return acme.WaitFor(d.config.PropagationTimeout, d.config.PollingInterval, func() (bool, error) {
|
|
|
|
reqParams := &route53.GetChangeInput{Id: changeID}
|
|
|
|
|
|
|
|
resp, err := d.client.GetChange(reqParams)
|
2017-02-07 21:33:23 +00:00
|
|
|
if err != nil {
|
2018-09-17 13:16:03 +00:00
|
|
|
return false, fmt.Errorf("failed to query change status: %v", err)
|
2017-02-07 21:33:23 +00:00
|
|
|
}
|
2018-10-10 14:28:04 +00:00
|
|
|
|
2018-05-31 07:30:04 +00:00
|
|
|
if aws.StringValue(resp.ChangeInfo.Status) == route53.ChangeStatusInsync {
|
2017-02-07 21:33:23 +00:00
|
|
|
return true, nil
|
|
|
|
}
|
2018-10-10 14:28:04 +00:00
|
|
|
return false, fmt.Errorf("unable to retrieve change: ID=%s", aws.StringValue(changeID))
|
2017-02-07 21:33:23 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2018-10-10 14:28:04 +00:00
|
|
|
func (d *DNSProvider) getExistingRecordSets(hostedZoneID string, fqdn string) ([]*route53.ResourceRecord, error) {
|
|
|
|
listInput := &route53.ListResourceRecordSetsInput{
|
|
|
|
HostedZoneId: aws.String(hostedZoneID),
|
|
|
|
StartRecordName: aws.String(fqdn),
|
|
|
|
StartRecordType: aws.String("TXT"),
|
|
|
|
}
|
|
|
|
|
|
|
|
recordSetsOutput, err := d.client.ListResourceRecordSets(listInput)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if recordSetsOutput == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var records []*route53.ResourceRecord
|
|
|
|
|
|
|
|
for _, recordSet := range recordSetsOutput.ResourceRecordSets {
|
|
|
|
if aws.StringValue(recordSet.Name) == fqdn {
|
|
|
|
records = append(records, recordSet.ResourceRecords...)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return records, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *DNSProvider) getHostedZoneID(fqdn string) (string, error) {
|
|
|
|
if d.config.HostedZoneID != "" {
|
|
|
|
return d.config.HostedZoneID, nil
|
2017-10-31 09:42:03 +00:00
|
|
|
}
|
|
|
|
|
2018-05-31 07:30:04 +00:00
|
|
|
authZone, err := acme.FindZoneByFqdn(fqdn, acme.RecursiveNameservers)
|
2017-02-07 21:33:23 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
// .DNSName should not have a trailing dot
|
|
|
|
reqParams := &route53.ListHostedZonesByNameInput{
|
2018-05-31 07:30:04 +00:00
|
|
|
DNSName: aws.String(acme.UnFqdn(authZone)),
|
2017-02-07 21:33:23 +00:00
|
|
|
}
|
2018-10-10 14:28:04 +00:00
|
|
|
resp, err := d.client.ListHostedZonesByName(reqParams)
|
2017-02-07 21:33:23 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
var hostedZoneID string
|
|
|
|
for _, hostedZone := range resp.HostedZones {
|
|
|
|
// .Name has a trailing dot
|
2018-05-31 07:30:04 +00:00
|
|
|
if !aws.BoolValue(hostedZone.Config.PrivateZone) && aws.StringValue(hostedZone.Name) == authZone {
|
|
|
|
hostedZoneID = aws.StringValue(hostedZone.Id)
|
2017-02-07 21:33:23 +00:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(hostedZoneID) == 0 {
|
2018-09-17 13:16:03 +00:00
|
|
|
return "", fmt.Errorf("zone %s not found for domain %s", authZone, fqdn)
|
2017-02-07 21:33:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if strings.HasPrefix(hostedZoneID, "/hostedzone/") {
|
|
|
|
hostedZoneID = strings.TrimPrefix(hostedZoneID, "/hostedzone/")
|
|
|
|
}
|
|
|
|
|
|
|
|
return hostedZoneID, nil
|
|
|
|
}
|