update-dns-tool.py 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259
  1. #!/usr/bin/env python3
  2. #
  3. # Copyright (c) 2017-2020 Joe Clarke <jclarke@cisco.com>
  4. # All rights reserved.
  5. #
  6. # Redistribution and use in source and binary forms, with or without
  7. # modification, are permitted provided that the following conditions
  8. # are met:
  9. # 1. Redistributions of source code must retain the above copyright
  10. # notice, this list of conditions and the following disclaimer.
  11. # 2. Redistributions in binary form must reproduce the above copyright
  12. # notice, this list of conditions and the following disclaimer in the
  13. # documentation and/or other materials provided with the distribution.
  14. #
  15. # THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
  16. # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  17. # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  18. # ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  19. # FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  20. # DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  21. # OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  22. # HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  23. # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  24. # OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  25. # SUCH DAMAGE.
  26. # NOTE: This should move to an update NetBox script, which will then trigger DNS updates.
  27. from __future__ import print_function
  28. import requests
  29. from requests.packages.urllib3.exceptions import InsecureRequestWarning
  30. requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
  31. import json
  32. import sys
  33. import re
  34. import os
  35. import argparse
  36. import CLEUCreds
  37. from cleu.config import Config as C
  38. CNR_HEADERS = {"accept": "application/json", "content-type": "application/json"}
  39. CNR_AUTH = (CLEUCreds.CPNR_USERNAME, CLEUCreds.CPNR_PASSWORD)
  40. CACHE_FILE = "dns_records.dat"
  41. def get_devs():
  42. url = f"http://{C.TOOL}/get/switches/json"
  43. devices = []
  44. response = requests.request("GET", url)
  45. code = response.status_code
  46. if code == 200:
  47. j = response.json()
  48. for dev in j:
  49. dev_dic = {}
  50. if dev["IPAddress"] == "0.0.0.0":
  51. continue
  52. # Do not add MDF switches
  53. # TODO Validate what this be now that the tool is managing other things.
  54. if not re.search(r"^0", dev["Hostname"]):
  55. continue
  56. dev_dic["name"] = dev["Hostname"]
  57. dev_dic["aliases"] = [f"{dev['Name']}.{C.DNS_DOMAIN}.", f"{dev['AssetTag']}.{C.DNS_DOMAIN}."]
  58. dev_dic["ip"] = dev["IPAddress"]
  59. devices.append(dev_dic)
  60. return devices
  61. def purge_rr(name, url, zone):
  62. params = {"zoneOrigin": zone}
  63. try:
  64. response = requests.request("DELETE", url, headers=CNR_HEADERS, params=params, verify=False)
  65. response.raise_for_status()
  66. print(f"INFO: Purged entry for {name}")
  67. except Exception as e:
  68. sys.stderr.write(f"INFO: Failed to purge entry for {name}: {e}\n")
  69. def purge_rrs(hname, dev):
  70. aname = hname
  71. cnames = []
  72. for alias in dev["aliases"]:
  73. cnames.append(alias.split(".")[0])
  74. pname = ".".join(dev["ip"].split(".")[::-1][0:3])
  75. ubase = C.DNS_BASE + "CCMRRSet" + "/{}"
  76. url = ubase.format(aname)
  77. purge_rr(aname, url, C.DNS_DOMAIN)
  78. for cname in cnames:
  79. url = ubase.format(cname)
  80. purge_rr(cname, url, C.DNS_DOMAIN)
  81. url = ubase.format(pname)
  82. purge_rr(pname, url, "10.in-addr.arpa")
  83. def add_entry(url, hname, dev):
  84. global CNR_HEADERS, CNR_AUTH
  85. try:
  86. rrset = [
  87. f"IN 0 A {dev['ip']}",
  88. ]
  89. rrset_obj = {"name": hname, "rrs": {"stringItem": rrset}, "zoneOrigin": C.DNS_DOMAIN}
  90. response = requests.request("PUT", url, auth=CNR_AUTH, headers=CNR_HEADERS, json=rrset_obj, verify=False)
  91. response.raise_for_status()
  92. print(f"INFO: Added entry for {hname} ==> {dev['ip']}")
  93. except Exception as e:
  94. sys.stderr.write(f"ERROR: Failed to add entry for {hname}: {e}\n")
  95. return
  96. for alias in dev["aliases"]:
  97. aname = alias.split(".")[0]
  98. alias_rrset_obj = {
  99. "name": aname,
  100. "rrs": {"stringItem": [f"IN 0 CNAME {hname}.{C.DNS_DOMAIN}."]},
  101. "zoneOrigin": C.DNS_DOMAIN,
  102. }
  103. url = C.DNS_BASE + "CCMRRSet" + f"/{hname}"
  104. try:
  105. response = requests.request("PUT", url, auth=CNR_AUTH, headers=CNR_HEADERS, json=alias_rrset_obj, verify=False)
  106. response.raise_for_status()
  107. print(f"Added CNAME entry {alias} ==> {hname}")
  108. except Exception as e:
  109. sys.stderr.write(f"ERROR: Failed to add CNAME {alias} for {hname}: {e}\n")
  110. try:
  111. ptr_rrset = [f"IN 0 PTR {hname}.{C.DNS_DOMAIN}."]
  112. rip = ".".join(dev["ip"].split(".")[::-1][0:3])
  113. ptr_rrset_obj = {"name": rip, "rrs": {"stringItem": ptr_rrset}, "zoneOrigin": "10.in-addr.arpa."}
  114. url = C.DNS_BASE + "CCMRRSet" + "/{}".format(rip)
  115. response = requests.request("PUT", url, auth=CNR_AUTH, headers=CNR_HEADERS, json=ptr_rrset_obj, verify=False)
  116. response.raise_for_status()
  117. print(f"INFO: Added PTR entry {rip} ==> {hname}")
  118. except Exception as e:
  119. sys.stderr.write(f"ERROR: Failed to add PTR entry for {rip}: {e}\n")
  120. if __name__ == "__main__":
  121. parser = argparse.ArgumentParser(description="Usage:")
  122. # script arguments
  123. parser.add_argument("--purge", help="Purge previous records", action="store_true")
  124. args = parser.parse_args()
  125. prev_records = []
  126. if os.path.exists(CACHE_FILE):
  127. with open(CACHE_FILE) as fd:
  128. prev_records = json.load(fd)
  129. devs = get_devs()
  130. for record in prev_records:
  131. found_record = False
  132. for dev in devs:
  133. hname = dev["name"].replace(f".{C.DNS_DOMAIN}", "")
  134. if record == hname:
  135. found_record = True
  136. break
  137. if found_record:
  138. continue
  139. url = C.DNS_BASE + "CCMHost" + f"/{record}"
  140. try:
  141. response = requests.request(
  142. "DELETE", url, auth=CNR_AUTH, headers=CNR_HEADERS, params={"zoneOrigin": C.DNS_DOMAIN}, verify=False
  143. )
  144. response.raise_for_status()
  145. except Exception as e:
  146. sys.stderr.write(f"WARNING: Failed to delete entry for {record}\n")
  147. records = []
  148. for dev in devs:
  149. hname = dev["name"].replace(f".{C.DNS_DOMAIN}", "")
  150. records.append(hname)
  151. if args.purge:
  152. purge_rrs(hname, dev)
  153. url = C.DNS_BASE + "CCMHost" + f"/{hname}"
  154. response = requests.request("GET", url, auth=CNR_AUTH, headers=CNR_HEADERS, params={"zoneOrigin": C.DNS_DOMAIN}, verify=False)
  155. url = C.DNS_BASE + "CCMRRSet" + f"/{hname}"
  156. if response.status_code == 404:
  157. iurl = C.DNS_BASE + "CCMHost"
  158. response = requests.request(
  159. "GET", iurl, params={"zoneOrigin": C.DNS_DOMAIN, "addrs": dev["ip"] + "$"}, auth=CNR_AUTH, headers=CNR_HEADERS, verify=False
  160. )
  161. cur_entry = []
  162. if response.status_code != 404:
  163. cur_entry = response.json()
  164. if len(cur_entry) > 0:
  165. print("Found entry for {}: {}".format(dev["ip"], response.status_code))
  166. cur_entry = response.json()
  167. if len(cur_entry) > 1:
  168. print(f"ERROR: Found multiple entries for IP {dev['ip']}")
  169. continue
  170. print(f"INFO: Found old entry for IP {dev['ip']} => {cur_entry[0]['name']}")
  171. durl = C.DNS_BASE + "CCMHost" + f"/{cur_entry[0]['name']}"
  172. try:
  173. response = requests.request(
  174. "DELETE", durl, params={"zoneOrigin": C.DNS_DOMAIN}, auth=CNR_AUTH, headers=CNR_HEADERS, verify=False
  175. )
  176. response.raise_for_status()
  177. except Exception as e:
  178. sys.stderr.write(f"ERROR: Failed to delete stale entry for {cur_entry[0]['hname']} ({dev['ip']})\n")
  179. continue
  180. add_entry(url, hname, dev)
  181. else:
  182. cur_entry = response.json()
  183. create_new = True
  184. for addr in cur_entry["addrs"]["stringItem"]:
  185. if addr == dev["ip"]:
  186. if "aliases" in dev and "aliases" in cur_entry:
  187. if (len(dev["aliases"]) > 0 and "stringItem" not in cur_entry["aliases"]) or (
  188. len(dev["aliases"]) != len(cur_entry["aliases"]["stringItem"])
  189. ):
  190. break
  191. common = set(dev["aliases"]) & set(cur_entry["aliases"]["stringItem"])
  192. if len(common) != len(dev["aliases"]):
  193. break
  194. create_new = False
  195. break
  196. elif ("aliases" in dev and "aliases" not in cur_entry) or ("aliases" in cur_entry and "aliases" not in dev):
  197. break
  198. else:
  199. create_new = False
  200. break
  201. if create_new:
  202. print(f"INFO: Deleting entry for {hname}")
  203. purge_rrs(hname, dev)
  204. add_entry(url, hname, dev)
  205. else:
  206. # print("Not creating a new entry for {} as it already exists".format(dev["name"]))
  207. pass
  208. fd = open(CACHE_FILE, "w")
  209. with open(CACHE_FILE, "w") as fd:
  210. json.dump(records, fd, indent=4)