Last active
July 18, 2024 21:16
-
-
Save h3krn/17c6610281e585d6b4efb43d1395802d to your computer and use it in GitHub Desktop.
OPNsense unbound kea lease registration
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/local/bin/python3 | |
""" | |
Copyright (c) 2016-2020 Ad Schellevis <ad@opnsense.org> | |
All rights reserved. | |
Redistribution and use in source and binary forms, with or without | |
modification, are permitted provided that the following conditions are met: | |
1. Redistributions of source code must retain the above copyright notice, | |
this list of conditions and the following disclaimer. | |
2. Redistributions in binary form must reproduce the above copyright | |
notice, this list of conditions and the following disclaimer in the | |
documentation and/or other materials provided with the distribution. | |
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, | |
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY | |
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE | |
AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, | |
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | |
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS | |
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN | |
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE | |
POSSIBILITY OF SUCH DAMAGE. | |
-------------------------------------------------------------------------------------- | |
watch dhcp lease file and build include file for unbound | |
""" | |
import ipaddress | |
import os | |
import sys | |
import subprocess | |
import time | |
import tempfile | |
import argparse | |
import syslog | |
import re | |
import csv | |
import json | |
from configparser import ConfigParser | |
sys.path.insert(0, "/usr/local/opnsense/site-python") | |
from daemonize import Daemonize | |
import watchers.dhcpd | |
def unbound_control(commands, input=None, output_stream=None): | |
""" execute (chrooted) unbound-control command | |
:param commands: command list (parameters) | |
:param input: (optional ) list of lines to be sent to input stream | |
:param output_stream: (optional)output stream | |
:return: None | |
""" | |
input_string=None | |
if input: | |
nl='\n' | |
input_string = f'{nl.join(input)}{nl}' | |
# XXX invoke can fail (non-zero exit code), but unclear why and what to do | |
subprocess.run(['/usr/sbin/chroot', '-u', 'unbound', '-g', 'unbound', '/', | |
'/usr/local/sbin/unbound-control', '-c', '/var/unbound/unbound.conf'] + commands, | |
input=input_string, stdout=output_stream, stderr=subprocess.STDOUT, text=True) | |
if output_stream: | |
output_stream.seek(0) | |
class UnboundLocalData: | |
def __init__(self): | |
self._map_by_address = dict() | |
self._map_by_fqdn = dict() | |
with tempfile.NamedTemporaryFile() as output_stream: | |
unbound_control(['list_local_data'], output_stream=output_stream) | |
for line in output_stream: | |
parts = line.decode().split() | |
if len(parts) > 4 and parts[3] == 'A' and parts[4] != '0.0.0.0': | |
self.add_address(parts[4], parts[0][:-1]) | |
def add_address(self, address, fqdn): | |
if address not in self._map_by_address: | |
self._map_by_address[address] = list() | |
self._map_by_address[address].append(fqdn) | |
if fqdn not in self._map_by_fqdn: | |
self._map_by_fqdn[fqdn] = list() | |
self._map_by_fqdn[fqdn].append(address) | |
def all_fqdns(self, address, fqdn): | |
result = set() | |
if address in self._map_by_address: | |
for unbfqdn in self._map_by_address[address]: | |
result.add(unbfqdn) | |
if fqdn in self._map_by_fqdn: | |
result.add(fqdn) | |
return result | |
def cleanup(self, address, fqdn): | |
if address in self._map_by_address: | |
for rfqdn in self._map_by_address[address]: | |
if rfqdn in self._map_by_fqdn and address in self._map_by_fqdn[rfqdn]: | |
self._map_by_fqdn[rfqdn].remove(address) | |
if len(self._map_by_fqdn[rfqdn]) == 0: | |
del self._map_by_fqdn[rfqdn] | |
del self._map_by_address[address] | |
if fqdn in self._map_by_fqdn and address in self._map_by_fqdn[fqdn]: | |
self._map_by_fqdn[fqdn].remove(address) | |
if len(self._map_by_fqdn[fqdn]) == 0: | |
del self._map_by_fqdn[fqdn] | |
def is_equal(self, address, fqdn): | |
return fqdn in self._map_by_fqdn and address in self._map_by_fqdn[fqdn] | |
def fqdn_addresses(self, fqdn): | |
return self._map_by_fqdn[fqdn] if fqdn in self._map_by_fqdn else [] | |
class KeaLeases: | |
""" """ | |
def __init__(self, watch_file='/var/db/kea/kea-leases4.csv'): | |
""" init watcher | |
:param watch_file: filename to watch | |
:return: watcher object | |
""" | |
self.watch_file = watch_file | |
self._fhandle = None | |
self._last_pos = None | |
def _open(self): | |
""" (re)open watched file | |
:return: None | |
""" | |
try: | |
self._fhandle = open(self.watch_file, 'r', newline="") | |
self._leases = csv.DictReader(self._fhandle) | |
self._last_pos = None | |
except IOError: | |
self._fhandle = None | |
def __iter__(self): | |
""" """ | |
if self._fhandle is None: | |
# nothing to watch, try to (re)open return when failed | |
self._open() | |
elif self._fsize > os.path.getsize(self.watch_file): | |
# repoen kea lease file when cleaned, size shrunk | |
self._open() | |
elif self._last_pos is not None: | |
self._fhandle.seek(self._last_pos) | |
if self._fhandle is not None: | |
self._fsize = os.path.getsize(self.watch_file) | |
for lease in self._leases: | |
yield lease | |
self._last_pos = self._fhandle.tell() | |
def run_watcher(target_filename, default_domain, watch_file, config): | |
# cleanup interval (seconds) | |
cleanup_interval = 60 | |
# parse lease configs (ranges and domain names) | |
lease_configs = list() | |
if os.path.isfile(config): | |
with open(config,"r") as configh: | |
cnf = json.load(configh) | |
for section in cnf["Dhcp4"]["subnet4"]: | |
if 'option-data' in section: | |
for data in section['option-data']: | |
if data['name'] == 'domain-name': | |
lease_configs.append({ | |
'subnet': section["subnet"], | |
'domain': data['data'] | |
}) | |
# initiate lease watcher and setup cache | |
dhcpdleases = KeaLeases(watch_file) | |
cached_leases = dict() | |
unbound_local_data = UnboundLocalData() | |
hostname_pattern = re.compile("(?!-)[A-Z0-9-_]*(?<!-)$", re.IGNORECASE) | |
# start watching dhcp leases | |
last_cleanup = time.time() | |
while True: | |
dhcpd_changed = False | |
for lease in dhcpdleases: | |
if 'expire' in lease and int(lease['expire']) > time.time() \ | |
and 'hostname' in lease and 'address' in lease and lease['hostname']: | |
if all(hostname_pattern.match(part) for part in lease['hostname'].strip('.').split('.')): | |
address = ipaddress.ip_address(lease['address']) | |
lease['domain'] = default_domain | |
for lease_config in lease_configs: | |
if ipaddress.ip_address(address) in ipaddress.ip_network(lease_config['subnet']): | |
lease['domain'] = lease_config['domain'] | |
cached_leases[lease['address']] = lease | |
dhcpd_changed = True | |
else: | |
syslog.syslog( | |
syslog.LOG_WARNING, | |
"dhcpd leases: %s not a valid hostname, ignoring" % lease['hostname'] | |
) | |
remove_rr = list() | |
add_rr = list() | |
if time.time() - last_cleanup > cleanup_interval: | |
# cleanup every x seconds | |
last_cleanup = time.time() | |
addresses = list(cached_leases) | |
for address in addresses: | |
if int(cached_leases[address]['expire']) < time.time(): | |
syslog.syslog( | |
syslog.LOG_NOTICE, | |
"dhcpd expired %s @ %s" % (cached_leases[address]['hostname'], address) | |
) | |
fqdn = '%s.%s' % (cached_leases[address]['hostname'].rstrip('.'), cached_leases[address]['domain']) | |
remove_rr += [ ipaddress.ip_address(address).reverse_pointer, | |
fqdn ] | |
if unbound_local_data.is_equal(address, fqdn): | |
unbound_local_data.cleanup(address, fqdn) | |
# same fqdn may be hooked to other (new) hosts, reinject the existing ones after removal | |
for addr in unbound_local_data.fqdn_addresses(fqdn): | |
add_rr.append(f'{fqdn} IN A {addr}') | |
del cached_leases[address] | |
dhcpd_changed = True | |
if dhcpd_changed: | |
# dump dns output to target (used on initial startup, unbound_control is used as live feed) | |
with open(target_filename, 'w') as unbound_conf: | |
for address in cached_leases: | |
unbound_conf.write('local-data-ptr: "%s %s.%s"\n' % ( | |
address, cached_leases[address]['hostname'].rstrip('.'), cached_leases[address]['domain']) | |
) | |
unbound_conf.write('local-data: "%s.%s IN A %s"\n' % ( | |
cached_leases[address]['hostname'].rstrip('.'), cached_leases[address]['domain'], address) | |
) | |
# signal unbound | |
for address in cached_leases: | |
fqdn = '%s.%s' % (cached_leases[address]['hostname'].rstrip('.'), cached_leases[address]['domain']) | |
if not unbound_local_data.is_equal(address, fqdn): | |
remove_rr.append(ipaddress.ip_address(address).reverse_pointer) | |
for tmp_fqdn in unbound_local_data.all_fqdns(address, fqdn): | |
syslog.syslog(syslog.LOG_NOTICE, 'dhcpd entry changed %s @ %s.' % (tmp_fqdn, address)) | |
remove_rr.append(tmp_fqdn) | |
unbound_local_data.cleanup(address, fqdn) | |
add_rr += [ f'{ipaddress.ip_address(address).reverse_pointer} PTR {fqdn}', | |
f'{fqdn} IN A {address}' ] | |
unbound_local_data.add_address(address, fqdn) | |
# Updated unbound | |
if remove_rr: | |
unbound_control(['local_datas_remove'], input=remove_rr) | |
if add_rr: | |
unbound_control(['local_datas'], input=add_rr) | |
# wait for next cycle | |
time.sleep(1) | |
if __name__ == '__main__': | |
parser = argparse.ArgumentParser() | |
parser.add_argument('--pid', help='pid file location', default='/var/run/unbound_kea.pid') | |
parser.add_argument('--source', help='source leases file', | |
default='/var/db/kea/kea-leases4.csv') | |
parser.add_argument('--target', help='target config file, used when unbound restarts', | |
default='/var/unbound/dhcpleases.conf') | |
parser.add_argument('--foreground', help='run in foreground', default=False, action='store_true') | |
parser.add_argument('--domain', help='default domain to use', default='local') | |
parser.add_argument('--config', help='configuration file to use', default='/usr/local/etc/kea/kea-dhcp4.conf') | |
inputargs = parser.parse_args() | |
syslog.openlog('unbound', facility=syslog.LOG_LOCAL4) | |
if inputargs.foreground: | |
run_watcher( | |
target_filename=inputargs.target, | |
default_domain=inputargs.domain, | |
watch_file=inputargs.source, | |
config=inputargs.config | |
) | |
else: | |
syslog.syslog(syslog.LOG_NOTICE, 'daemonize unbound dhcpd watcher.') | |
cmd = lambda : run_watcher( | |
target_filename=inputargs.target, | |
default_domain=inputargs.domain, | |
watch_file=inputargs.source, | |
config=inputargs.config | |
) | |
daemon = Daemonize(app="unbound_dhcpd", pid=inputargs.pid, action=cmd) | |
daemon.start() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment