Files
ddns-updater/internal/provider/providers/easydns/provider.go
Quentin McGaw 918df24488 change(all): deprecate provider_ip config field
- change should not affect any existing configurations
- change solves issues with dual stack updates (#767)
- was unneeded and adds unneeded complexity
2024-07-26 08:06:24 +00:00

163 lines
4.1 KiB
Go

package easydns
import (
"context"
"encoding/json"
"fmt"
"io"
"net/http"
"net/netip"
"net/url"
"strings"
"github.com/qdm12/ddns-updater/internal/models"
"github.com/qdm12/ddns-updater/internal/provider/constants"
"github.com/qdm12/ddns-updater/internal/provider/errors"
"github.com/qdm12/ddns-updater/internal/provider/headers"
"github.com/qdm12/ddns-updater/internal/provider/utils"
"github.com/qdm12/ddns-updater/pkg/publicip/ipversion"
)
type Provider struct {
domain string
owner string
ipVersion ipversion.IPVersion
ipv6Suffix netip.Prefix
username string
token string
}
func New(data json.RawMessage, domain, owner string,
ipVersion ipversion.IPVersion, ipv6Suffix netip.Prefix) (
p *Provider, err error) {
extraSettings := struct {
Username string `json:"username"`
Token string `json:"token"`
}{}
err = json.Unmarshal(data, &extraSettings)
if err != nil {
return nil, err
}
err = validateSettings(domain, extraSettings.Username, extraSettings.Token)
if err != nil {
return nil, fmt.Errorf("validating provider specific settings: %w", err)
}
return &Provider{
domain: domain,
owner: owner,
ipVersion: ipVersion,
ipv6Suffix: ipv6Suffix,
username: extraSettings.Username,
token: extraSettings.Token,
}, nil
}
func validateSettings(domain, username, token string) (err error) {
err = utils.CheckDomain(domain)
if err != nil {
return fmt.Errorf("%w: %w", errors.ErrDomainNotValid, err)
}
switch {
case username == "":
return fmt.Errorf("%w", errors.ErrUsernameNotSet)
case token == "":
return fmt.Errorf("%w", errors.ErrTokenNotSet)
}
return nil
}
func (p *Provider) String() string {
return utils.ToString(p.domain, p.owner, constants.EasyDNS, p.ipVersion)
}
func (p *Provider) Domain() string {
return p.domain
}
func (p *Provider) Owner() string {
return p.owner
}
func (p *Provider) IPVersion() ipversion.IPVersion {
return p.ipVersion
}
func (p *Provider) IPv6Suffix() netip.Prefix {
return p.ipv6Suffix
}
func (p *Provider) Proxied() bool {
return false
}
func (p *Provider) BuildDomainName() string {
return utils.BuildDomainName(p.owner, p.domain)
}
func (p *Provider) HTML() models.HTMLRow {
return models.HTMLRow{
Domain: fmt.Sprintf("<a href=\"http://%s\">%s</a>", p.BuildDomainName(), p.BuildDomainName()),
Owner: p.Owner(),
Provider: "<a href=\"https://easydns.com\">EasyDNS</a>",
IPVersion: p.ipVersion.String(),
}
}
func (p *Provider) Update(ctx context.Context, client *http.Client, ip netip.Addr) (
newIP netip.Addr, err error) {
u := url.URL{
Scheme: "https",
Host: "api.cp.easydns.com",
Path: "dyn/generic.php",
User: url.UserPassword(p.username, p.token),
}
values := url.Values{}
values.Set("hostname", utils.BuildURLQueryHostname(p.owner, p.domain))
values.Set("myip", ip.String())
if p.owner == "*" {
values.Set("wildcard", "ON")
}
u.RawQuery = values.Encode()
request, err := http.NewRequestWithContext(ctx, http.MethodGet, u.String(), nil)
if err != nil {
return netip.Addr{}, fmt.Errorf("creating http request: %w", err)
}
headers.SetUserAgent(request)
response, err := client.Do(request)
if err != nil {
return netip.Addr{}, err
}
defer response.Body.Close()
b, err := io.ReadAll(response.Body)
if err != nil {
return netip.Addr{}, fmt.Errorf("reading response body: %w", err)
}
s := string(b)
if response.StatusCode != http.StatusOK {
return netip.Addr{}, fmt.Errorf("%w: %d: %s", errors.ErrHTTPStatusNotValid,
response.StatusCode, utils.ToSingleLine(s))
}
switch {
case s == "":
return netip.Addr{}, fmt.Errorf("%w", errors.ErrReceivedNoResult)
case strings.Contains(s, "NO_SERVICE"):
return netip.Addr{}, fmt.Errorf("%w", errors.ErrNoService)
case strings.Contains(s, "NO_ACCESS"):
return netip.Addr{}, fmt.Errorf("%w", errors.ErrAuth)
case strings.Contains(s, "ILLEGAL_INPUT"), strings.Contains(s, "TOO_SOON"):
return netip.Addr{}, fmt.Errorf("%w", errors.ErrBannedAbuse)
case strings.Contains(s, "NO_ERROR"), strings.Contains(s, "OK"):
return ip, nil
default:
return netip.Addr{}, fmt.Errorf("%w: %s", errors.ErrUnknownResponse, utils.ToSingleLine(s))
}
}