Compare commits
14 Commits
Author | SHA1 | Date | |
---|---|---|---|
df209ffa71 | |||
b281fef624 | |||
455e9aa6a7 | |||
5bc376c8ba | |||
34cc8dd073 | |||
f9aa961e01 | |||
1e6d59b5b2 | |||
24ed3bd238 | |||
34276f71ef | |||
7997e9dc94 | |||
9bc8278464 | |||
58f02cc0c0 | |||
566a78cee4 | |||
74ac0c1287 |
70
changelog.md
70
changelog.md
@ -1,5 +1,75 @@
|
||||
# Changelog
|
||||
|
||||
## 2025-05-27 - 7.1.0 - feat(docs)
|
||||
Improve documentation for advanced DNS features and update usage examples for both DNS client and server.
|
||||
|
||||
- Revamped readme.hints with expanded architecture overview and detailed explanations of DNSSEC, Let's Encrypt integration, and advanced handler patterns.
|
||||
- Updated readme.md with clearer instructions and code examples for A, AAAA, TXT, MX record queries, DNS propagation checks, and usage of UDP and DNS-over-HTTPS.
|
||||
- Enhanced TAP tests documentation demonstrating both client and server flows.
|
||||
- Bumped version from 7.0.2 to 7.1.0 in preparation for the next release.
|
||||
|
||||
## 2025-05-27 - 7.1.0 - feat(docs)
|
||||
Improve documentation for advanced DNS features by updating usage examples for DNS client and server, and enhancing instructions for DNSSEC and Let's Encrypt integration.
|
||||
|
||||
- Revamped readme.hints with an expanded architecture overview and detailed client/server feature explanations.
|
||||
- Updated readme.md to include clearer instructions and code examples for A, AAAA, TXT, MX record queries and DNS propagation checks.
|
||||
- Enhanced examples for using DNSSEC, including detailed examples for DNSKEY, DS, and RRSIG records.
|
||||
- Added new instructions for setting up DNS-over-HTTPS (DoH), UDP-based resolution, and pattern-based routing for handlers.
|
||||
- Improved testing documentation with updated TAP tests demonstrating both DNS client and server flows.
|
||||
|
||||
## 2025-05-27 - 7.0.2 - fix(dns-client)
|
||||
Improve test assertions for DNS record queries and correct counter increment logic in DNS client
|
||||
|
||||
- Updated test cases in test/test.client.ts to use dynamic assertions with 'google.com' instead of fixed values
|
||||
- Adjusted checkUntilAvailable tests to verify proper behavior when DNS TXT record is missing
|
||||
- Fixed counter increment in ts_client/classes.dnsclient.ts to avoid post-increment issues, ensuring proper retry delays
|
||||
|
||||
## 2025-05-27 - 7.0.1 - fix(test & plugins)
|
||||
Rename test client variable and export smartrequest in client plugins
|
||||
|
||||
- Renamed variable 'testDnsly' to 'testDnsClient' in test/test.client.ts for better clarity.
|
||||
- Added @push.rocks/smartrequest dependency in package.json and updated ts_client/plugins.ts to export it.
|
||||
|
||||
## 2025-05-27 - 7.0.0 - BREAKING CHANGE(core)
|
||||
Refactor module entry point and update plugin imports; remove deprecated dnsly.plugins, update dependency versions, and adjust test imports
|
||||
|
||||
- Changed module export in package.json from './dist_ts_server/index.js' to './dist_ts/index.js'
|
||||
- Updated dependency versions, notably upgrading '@tsclass/tsclass' from 5.0.0 to 9.2.0 and updating tap bundles to '@git.zone/tstest' packages
|
||||
- Removed the redundant ts_client/dnsly.plugins.ts file and replaced its usage with the updated ts_client/plugins.ts
|
||||
- Adjusted test files to use export default tap.start() and updated import paths for tap bundles
|
||||
- Added tspublish.json files in ts, ts_client, and ts_server directories to control publish order
|
||||
|
||||
## 2025-03-21 - 6.3.0 - feat(dns-server)
|
||||
Enhance DNS server functionality with advanced DNSSEC signing (supporting both ECDSA and ED25519), improved SSL certificate retrieval using Let's Encrypt, and refined handler management for cleaner shutdowns.
|
||||
|
||||
- Updated package metadata with expanded keywords and revised dependency versions
|
||||
- Improved DNSSEC signing logic to support both ECDSA and ED25519 algorithms
|
||||
- Added unregisterHandler method for cleaner handler lifecycle management
|
||||
- Enhanced SSL certificate retrieval workflow with better DNS challenge handling
|
||||
- Refined test utilities for more robust DNS operations
|
||||
|
||||
## 2025-03-21 - 6.3.0 - feat(dns-server)
|
||||
Enhance DNS server functionality with advanced DNSSEC signing (including ED25519 support), improved certificate retrieval using Let's Encrypt, updated package metadata, and refined test utilities for more robust DNS operations.
|
||||
|
||||
- Updated package.json and npmextra.json with expanded keywords and revised dependency versions
|
||||
- Improved DNSSEC signing logic to support both ECDSA and ED25519 algorithms
|
||||
- Added unregisterHandler method and enhanced server stop logic for cleaner shutdowns
|
||||
- Enhanced SSL certificate retrieval workflow with better challenge handling and test support
|
||||
|
||||
## 2024-09-21 - 6.2.1 - fix(core)
|
||||
Fixing issues with keywords and readme formatting.
|
||||
|
||||
- Synchronized keywords field between npmextra.json and package.json.
|
||||
- Updated readme.md to fix formatting issues and added new sections.
|
||||
|
||||
## 2024-09-19 - 6.2.0 - feat(dnssec)
|
||||
Introduced DNSSEC support with ECDSA algorithm
|
||||
|
||||
- Added `DnsSec` class for handling DNSSEC operations.
|
||||
- Updated `DnsServer` to support DNSSEC with ECDSA.
|
||||
- Shifted DNS-related helper functions to `DnsServer` class.
|
||||
- Integrated parsing and handling of DNSKEY and RRSIG records in `DnsServer`.
|
||||
|
||||
## 2024-09-19 - 6.1.1 - fix(ts_server)
|
||||
Update DnsSec class to fully implement key generation and DNSKEY record creation.
|
||||
|
||||
|
@ -5,18 +5,27 @@
|
||||
"githost": "code.foss.global",
|
||||
"gitscope": "push.rocks",
|
||||
"gitrepo": "smartdns",
|
||||
"description": "A TypeScript library for smart DNS methods, supporting various DNS records and providers.",
|
||||
"description": "A robust TypeScript library providing advanced DNS management and resolution capabilities including support for DNSSEC, custom DNS servers, and integration with various DNS providers.",
|
||||
"npmPackagename": "@push.rocks/smartdns",
|
||||
"license": "MIT",
|
||||
"keywords": [
|
||||
"DNS",
|
||||
"TypeScript",
|
||||
"DNS",
|
||||
"DNS records",
|
||||
"DNS resolution",
|
||||
"DNS management",
|
||||
"DNSSEC",
|
||||
"Node.js",
|
||||
"Google DNS",
|
||||
"Cloudflare",
|
||||
"DNS records",
|
||||
"DNS resolution",
|
||||
"DNSSEC"
|
||||
"UDP DNS",
|
||||
"HTTPS DNS",
|
||||
"ACME",
|
||||
"Let's Encrypt",
|
||||
"SSL Certificates",
|
||||
"Feature Flagging",
|
||||
"Domain Propagation",
|
||||
"DNS Server"
|
||||
]
|
||||
}
|
||||
},
|
||||
|
44
package.json
44
package.json
@ -1,10 +1,10 @@
|
||||
{
|
||||
"name": "@push.rocks/smartdns",
|
||||
"version": "6.1.1",
|
||||
"version": "7.1.0",
|
||||
"private": false,
|
||||
"description": "A TypeScript library for smart DNS methods, supporting various DNS records and providers.",
|
||||
"description": "A robust TypeScript library providing advanced DNS management and resolution capabilities including support for DNSSEC, custom DNS servers, and integration with various DNS providers.",
|
||||
"exports": {
|
||||
".": "./dist_ts_server/index.js",
|
||||
".": "./dist_ts/index.js",
|
||||
"./server": "./dist_ts_server/index.js",
|
||||
"./client": "./dist_ts_client/index.js"
|
||||
},
|
||||
@ -18,14 +18,23 @@
|
||||
"url": "https://code.foss.global/push.rocks/smartdns.git"
|
||||
},
|
||||
"keywords": [
|
||||
"DNS",
|
||||
"TypeScript",
|
||||
"DNS",
|
||||
"DNS records",
|
||||
"DNS resolution",
|
||||
"DNS management",
|
||||
"DNSSEC",
|
||||
"Node.js",
|
||||
"Google DNS",
|
||||
"Cloudflare",
|
||||
"DNS records",
|
||||
"DNS resolution",
|
||||
"DNSSEC"
|
||||
"UDP DNS",
|
||||
"HTTPS DNS",
|
||||
"ACME",
|
||||
"Let's Encrypt",
|
||||
"SSL Certificates",
|
||||
"Feature Flagging",
|
||||
"Domain Propagation",
|
||||
"DNS Server"
|
||||
],
|
||||
"author": "Lossless GmbH",
|
||||
"license": "MIT",
|
||||
@ -36,21 +45,21 @@
|
||||
"dependencies": {
|
||||
"@push.rocks/smartdelay": "^3.0.1",
|
||||
"@push.rocks/smartenv": "^5.0.5",
|
||||
"@push.rocks/smartpromise": "^4.0.4",
|
||||
"@push.rocks/smartrequest": "^2.0.15",
|
||||
"@tsclass/tsclass": "^4.1.2",
|
||||
"@push.rocks/smartpromise": "^4.2.3",
|
||||
"@push.rocks/smartrequest": "^2.1.0",
|
||||
"@tsclass/tsclass": "^9.2.0",
|
||||
"@types/dns-packet": "^5.6.5",
|
||||
"@types/elliptic": "^6.4.18",
|
||||
"acme-client": "^5.4.0",
|
||||
"dns-packet": "^5.6.1",
|
||||
"elliptic": "^6.5.7",
|
||||
"elliptic": "^6.6.1",
|
||||
"minimatch": "^10.0.1"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@git.zone/tsbuild": "^2.1.84",
|
||||
"@git.zone/tsrun": "^1.2.49",
|
||||
"@git.zone/tstest": "^1.0.77",
|
||||
"@push.rocks/tapbundle": "^5.2.0",
|
||||
"@types/node": "^22.5.5"
|
||||
"@git.zone/tsbuild": "^2.6.4",
|
||||
"@git.zone/tsrun": "^1.3.3",
|
||||
"@git.zone/tstest": "^2.3.1",
|
||||
"@types/node": "^22.15.21"
|
||||
},
|
||||
"files": [
|
||||
"ts/**/*",
|
||||
@ -67,5 +76,6 @@
|
||||
"browserslist": [
|
||||
"last 1 chrome versions"
|
||||
],
|
||||
"type": "module"
|
||||
"type": "module",
|
||||
"packageManager": "pnpm@10.10.0+sha512.d615db246fe70f25dcfea6d8d73dee782ce23e2245e3c4f6f888249fb568149318637dca73c2c5c8ef2a4ca0d5657fb9567188bfab47f566d1ee6ce987815c39"
|
||||
}
|
||||
|
7581
pnpm-lock.yaml
generated
7581
pnpm-lock.yaml
generated
File diff suppressed because it is too large
Load Diff
@ -1 +1,97 @@
|
||||
# smartdns - Implementation Hints
|
||||
|
||||
## Architecture Overview
|
||||
|
||||
The smartdns library is structured into three main modules:
|
||||
|
||||
1. **Client Module** (`ts_client/`) - DNS client functionality
|
||||
2. **Server Module** (`ts_server/`) - DNS server implementation
|
||||
3. **Main Module** (`ts/`) - Re-exports both client and server
|
||||
|
||||
## Client Module (Smartdns class)
|
||||
|
||||
### Key Features:
|
||||
- DNS record queries (A, AAAA, TXT, MX, etc.)
|
||||
- Support for multiple DNS providers (Google DNS, Cloudflare)
|
||||
- DNS propagation checking with retry logic
|
||||
- DNSSEC verification support
|
||||
- Both HTTP-based (DoH) and Node.js DNS resolver fallback
|
||||
|
||||
### Implementation Details:
|
||||
- Uses Cloudflare's DNS-over-HTTPS API as primary resolver
|
||||
- Falls back to Node.js DNS module for local resolution
|
||||
- Implements automatic retry logic with configurable intervals
|
||||
- Properly handles quoted TXT records and trailing dots in domain names
|
||||
|
||||
### Key Methods:
|
||||
- `getRecordsA()`, `getRecordsAAAA()`, `getRecordsTxt()` - Type-specific queries
|
||||
- `getRecords()` - Generic record query with retry support
|
||||
- `checkUntilAvailable()` - DNS propagation verification
|
||||
- `getNameServers()` - NS record lookup
|
||||
- `makeNodeProcessUseDnsProvider()` - Configure system DNS resolver
|
||||
|
||||
## Server Module (DnsServer class)
|
||||
|
||||
### Key Features:
|
||||
- Full DNS server supporting UDP and HTTPS (DoH) protocols
|
||||
- DNSSEC implementation with multiple algorithms
|
||||
- Dynamic handler registration for custom responses
|
||||
- Let's Encrypt integration for automatic SSL certificates
|
||||
- Wildcard domain support with pattern matching
|
||||
|
||||
### DNSSEC Implementation:
|
||||
- Supports ECDSA (algorithm 13), ED25519 (algorithm 15), and RSA (algorithm 8)
|
||||
- Automatic DNSKEY and DS record generation
|
||||
- RRSIG signature generation for authenticated responses
|
||||
- Key tag computation following RFC 4034
|
||||
|
||||
### Let's Encrypt Integration:
|
||||
- Automatic SSL certificate retrieval using DNS-01 challenges
|
||||
- Dynamic TXT record handler registration for ACME validation
|
||||
- Certificate renewal and HTTPS server restart capability
|
||||
- Domain authorization filtering for security
|
||||
|
||||
### Handler System:
|
||||
- Pattern-based domain matching using minimatch
|
||||
- Support for all common record types
|
||||
- Handler chaining for complex scenarios
|
||||
- Automatic SOA response for unhandled queries
|
||||
|
||||
## Key Dependencies
|
||||
|
||||
- `dns-packet`: DNS packet encoding/decoding (wire format)
|
||||
- `elliptic`: Cryptographic operations for DNSSEC
|
||||
- `acme-client`: Let's Encrypt certificate automation
|
||||
- `minimatch`: Glob pattern matching for domains
|
||||
- `@push.rocks/smartrequest`: HTTP client for DoH queries
|
||||
- `@tsclass/tsclass`: Type definitions for DNS records
|
||||
|
||||
## Testing Insights
|
||||
|
||||
The test suite demonstrates:
|
||||
- Mock ACME client for testing Let's Encrypt integration
|
||||
- Self-signed certificate generation for HTTPS testing
|
||||
- Unique port allocation to avoid conflicts
|
||||
- Proper server cleanup between tests
|
||||
- Both UDP and HTTPS query validation
|
||||
|
||||
## Common Patterns
|
||||
|
||||
1. **DNS Record Types**: Internally mapped to numeric values (A=1, AAAA=28, etc.)
|
||||
2. **Error Handling**: Graceful fallback and retry mechanisms
|
||||
3. **DNSSEC Workflow**: Zone → Key Generation → Signing → Verification
|
||||
4. **Certificate Flow**: Domain validation → Challenge setup → Verification → Certificate retrieval
|
||||
|
||||
## Performance Considerations
|
||||
|
||||
- Client implements caching via DNS-over-HTTPS responses
|
||||
- Server can handle concurrent UDP and HTTPS requests
|
||||
- DNSSEC signing is performed on-demand for efficiency
|
||||
- Handler registration is O(n) lookup but uses pattern caching
|
||||
|
||||
## Security Notes
|
||||
|
||||
- DNSSEC provides authentication but not encryption
|
||||
- DoH (DNS-over-HTTPS) provides both privacy and integrity
|
||||
- Let's Encrypt integration requires proper domain authorization
|
||||
- Handler patterns should be carefully designed to avoid open resolvers
|
519
readme.md
519
readme.md
@ -1,112 +1,539 @@
|
||||
# @push.rocks/smartdns
|
||||
|
||||
smart dns methods written in TypeScript
|
||||
A robust TypeScript library providing advanced DNS management and resolution capabilities including support for DNSSEC, custom DNS servers, and integration with various DNS providers.
|
||||
|
||||
## Install
|
||||
|
||||
To install `@push.rocks/smartdns`, use the following command with npm:
|
||||
To install `@push.rocks/smartdns`, use the following command with pnpm:
|
||||
|
||||
```bash
|
||||
pnpm install @push.rocks/smartdns --save
|
||||
```
|
||||
|
||||
Or with npm:
|
||||
|
||||
```bash
|
||||
npm install @push.rocks/smartdns --save
|
||||
```
|
||||
|
||||
Or with `yarn`:
|
||||
|
||||
```bash
|
||||
yarn add @push.rocks/smartdns
|
||||
```
|
||||
|
||||
Make sure you have a TypeScript environment setup to utilize the library effectively.
|
||||
Make sure you have a TypeScript environment set up to utilize the library effectively.
|
||||
|
||||
## Usage
|
||||
|
||||
`@push.rocks/smartdns` is a comprehensive library aimed at facilitating smart DNS operations, leveraging TypeScript for enhanced development experience. This section aims to cover several real-world scenarios demonstrating the library's capabilities, from basic DNS lookups to more advanced DNS management tasks.
|
||||
`@push.rocks/smartdns` is a comprehensive library that provides both DNS client and server capabilities, leveraging TypeScript for enhanced development experience. The library is organized into three modules:
|
||||
|
||||
- **Client Module** (`@push.rocks/smartdns/client`): DNS resolution and record queries
|
||||
- **Server Module** (`@push.rocks/smartdns/server`): Full DNS server implementation with DNSSEC
|
||||
- **Main Module** (`@push.rocks/smartdns`): Convenience exports for both client and server
|
||||
|
||||
### Getting Started
|
||||
|
||||
First, ensure you import the module into your TypeScript project:
|
||||
You can import the modules based on your needs:
|
||||
|
||||
```typescript
|
||||
import { Smartdns } from '@push.rocks/smartdns';
|
||||
// For DNS client operations
|
||||
import { Smartdns } from '@push.rocks/smartdns/client';
|
||||
|
||||
// For DNS server operations
|
||||
import { DnsServer } from '@push.rocks/smartdns/server';
|
||||
|
||||
// Or import from the main module (note the different syntax)
|
||||
import { dnsClientMod, dnsServerMod } from '@push.rocks/smartdns';
|
||||
const dnsClient = new dnsClientMod.Smartdns({});
|
||||
const dnsServer = new dnsServerMod.DnsServer({ /* options */ });
|
||||
```
|
||||
|
||||
### Basic DNS Record Lookup
|
||||
### DNS Client Operations
|
||||
|
||||
Often, the need arises to fetch various DNS records for a domain. `@push.rocks/smartdns` simplifies this by providing intuitive methods.
|
||||
The DNS client (`Smartdns` class) provides methods to query various DNS record types using DNS-over-HTTPS (DoH) with Cloudflare as the primary provider, with fallback to Node.js DNS resolver.
|
||||
|
||||
#### Fetching A Records
|
||||
|
||||
To fetch an "A" record for a domain:
|
||||
To fetch "A" records (IPv4 addresses) for a domain:
|
||||
|
||||
```typescript
|
||||
const dnsManager = new Smartdns({});
|
||||
const aRecords = await dnsManager.getRecordsA('example.com');
|
||||
import { Smartdns } from '@push.rocks/smartdns/client';
|
||||
|
||||
const dnsClient = new Smartdns({});
|
||||
const aRecords = await dnsClient.getRecordsA('example.com');
|
||||
console.log(aRecords);
|
||||
// Output: [{ name: 'example.com', type: 'A', dnsSecEnabled: false, value: '93.184.215.14' }]
|
||||
```
|
||||
|
||||
#### Fetching AAAA Records
|
||||
|
||||
Similarly, for "AAAA" records:
|
||||
For resolving a domain to IPv6 addresses:
|
||||
|
||||
```typescript
|
||||
const aaaaRecords = await dnsManager.getRecordsAAAA('example.com');
|
||||
const aaaaRecords = await dnsClient.getRecordsAAAA('example.com');
|
||||
console.log(aaaaRecords);
|
||||
// Output: [{ name: 'example.com', type: 'AAAA', dnsSecEnabled: false, value: '2606:2800:21f:cb07:6820:80da:af6b:8b2c' }]
|
||||
```
|
||||
|
||||
### Advanced DNS Management
|
||||
#### Fetching TXT Records
|
||||
|
||||
Beyond simple queries, `@push.rocks/smartdns` offers functionalities suitable for more complex DNS management scenarios.
|
||||
TXT records store text data, commonly used for domain verification, SPF records, and other metadata:
|
||||
|
||||
```typescript
|
||||
const txtRecords = await dnsClient.getRecordsTxt('example.com');
|
||||
console.log(txtRecords);
|
||||
// Output: [{ name: 'example.com', type: 'TXT', dnsSecEnabled: false, value: 'v=spf1 -all' }]
|
||||
```
|
||||
|
||||
#### Other Record Types
|
||||
|
||||
The client supports various other DNS record types:
|
||||
|
||||
```typescript
|
||||
// MX records for mail servers
|
||||
const mxRecords = await dnsClient.getRecords('example.com', 'MX');
|
||||
|
||||
// NS records for nameservers
|
||||
const nsRecords = await dnsClient.getNameServers('example.com');
|
||||
|
||||
// Generic query method with retry support
|
||||
const records = await dnsClient.getRecords('example.com', 'CNAME', { retryCount: 3 });
|
||||
```
|
||||
|
||||
### Advanced DNS Features
|
||||
|
||||
#### Checking DNS Propagation
|
||||
|
||||
When changing DNS records, ensuring that the new records have propagated fully is crucial. `@push.rocks/smartdns` facilitates this with a method to check a DNS record until it is available globally.
|
||||
The client provides a powerful method to verify DNS propagation globally, essential when making DNS changes:
|
||||
|
||||
```typescript
|
||||
const recordType = 'TXT'; // Record type: A, AAAA, CNAME, TXT etc.
|
||||
const expectedValue = 'your_expected_value';
|
||||
const isAvailable = await dnsManager.checkUntilAvailable('example.com', recordType, expectedValue);
|
||||
// Check if a specific DNS record has propagated
|
||||
const recordType = 'TXT';
|
||||
const expectedValue = 'verification=abc123';
|
||||
|
||||
const isAvailable = await dnsClient.checkUntilAvailable(
|
||||
'example.com',
|
||||
recordType,
|
||||
expectedValue,
|
||||
50, // Number of check cycles (default: 50)
|
||||
500 // Interval between checks in ms (default: 500)
|
||||
);
|
||||
|
||||
if (isAvailable) {
|
||||
console.log('Record propagated successfully.');
|
||||
console.log('DNS record has propagated successfully!');
|
||||
} else {
|
||||
console.log('Record propagation failed or timed out.');
|
||||
console.log('DNS propagation timeout - record not found.');
|
||||
}
|
||||
```
|
||||
|
||||
### Leveraging DNS for Application Logic
|
||||
#### Configuring System DNS Provider
|
||||
|
||||
DNS records can serve beyond mere domain-to-IP resolution; they can be instrumental in application logic, such as feature flagging or environment-specific configurations.
|
||||
|
||||
#### Example: Feature Flagging via TXT Records
|
||||
|
||||
Consider leveraging TXT records for enabling/disabling features dynamically without deploying new code.
|
||||
You can configure Node.js to use a specific DNS provider for all DNS queries:
|
||||
|
||||
```typescript
|
||||
const txtRecords = await dnsManager.getRecordsTxt('features.example.com');
|
||||
const featureFlags = txtRecords.reduce((acc, record) => {
|
||||
const [flag, isEnabled] = record.value.split('=');
|
||||
acc[flag] = isEnabled === 'true';
|
||||
return acc;
|
||||
}, {});
|
||||
// Import the standalone function
|
||||
import { makeNodeProcessUseDnsProvider } from '@push.rocks/smartdns/client';
|
||||
|
||||
if (featureFlags['NewFeature']) {
|
||||
// Logic to enable the new feature
|
||||
// Use Cloudflare DNS for all Node.js DNS operations
|
||||
makeNodeProcessUseDnsProvider('cloudflare');
|
||||
|
||||
// Or use Google DNS
|
||||
makeNodeProcessUseDnsProvider('google');
|
||||
```
|
||||
|
||||
### Real-World Use Cases
|
||||
|
||||
#### DNS-Based Feature Flagging
|
||||
|
||||
Use TXT records for dynamic feature toggles without redeployment:
|
||||
|
||||
```typescript
|
||||
const txtRecords = await dnsClient.getRecordsTxt('features.example.com');
|
||||
const featureFlags = {};
|
||||
|
||||
txtRecords.forEach(record => {
|
||||
// Parse TXT records like "feature-dark-mode=true"
|
||||
const [feature, enabled] = record.value.split('=');
|
||||
featureFlags[feature] = enabled === 'true';
|
||||
});
|
||||
|
||||
if (featureFlags['feature-dark-mode']) {
|
||||
console.log('Dark mode is enabled!');
|
||||
}
|
||||
```
|
||||
|
||||
### Conclusion
|
||||
#### Service Discovery
|
||||
|
||||
`@push.rocks/smartdns` offers a versatile set of tools for DNS querying and management, tailored for applications at any scale. The examples provided illustrate the library's potential use cases, highlighting its applicability in various scenarios from basic lookups to facilitating complex application features through DNS.
|
||||
Use DNS for service endpoint discovery:
|
||||
|
||||
For the full spectrum of functionalities, including detailed method documentation and additional use cases, consult the module's [TypeDoc documentation](https://pushrocks.gitlab.io/smartdns/). This will serve as a comprehensive guide to leveraging `@push.rocks/smartdns` effectively in your projects.
|
||||
```typescript
|
||||
// Discover API endpoints via TXT records
|
||||
const serviceRecords = await dnsClient.getRecordsTxt('_services.example.com');
|
||||
|
||||
Remember, DNS changes might take time to propagate worldwide, and the utility methods provided by `@push.rocks/smartdns` for checking record availability will be invaluable in managing these changes seamlessly.
|
||||
// Discover mail servers
|
||||
const mxRecords = await dnsClient.getRecords('example.com', 'MX');
|
||||
const primaryMailServer = mxRecords
|
||||
.sort((a, b) => a.priority - b.priority)[0]?.exchange;
|
||||
```
|
||||
|
||||
### DNS Server Implementation
|
||||
|
||||
The `DnsServer` class provides a full-featured DNS server with support for UDP, DNS-over-HTTPS (DoH), DNSSEC, and automatic SSL certificate management via Let's Encrypt.
|
||||
|
||||
#### Basic DNS Server Setup
|
||||
|
||||
Create a simple DNS server that responds to queries:
|
||||
|
||||
```typescript
|
||||
import { DnsServer } from '@push.rocks/smartdns/server';
|
||||
|
||||
const dnsServer = new DnsServer({
|
||||
udpPort: 5333, // UDP port for DNS queries
|
||||
httpsPort: 8443, // HTTPS port for DNS-over-HTTPS
|
||||
httpsKey: 'path/to/key.pem', // Required for HTTPS
|
||||
httpsCert: 'path/to/cert.pem', // Required for HTTPS
|
||||
dnssecZone: 'example.com' // Optional: enable DNSSEC for this zone
|
||||
});
|
||||
|
||||
// Register a handler for all subdomains of example.com
|
||||
dnsServer.registerHandler('*.example.com', ['A'], (question) => ({
|
||||
name: question.name,
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: '192.168.1.100',
|
||||
}));
|
||||
|
||||
// Register a handler for TXT records
|
||||
dnsServer.registerHandler('example.com', ['TXT'], (question) => ({
|
||||
name: question.name,
|
||||
type: 'TXT',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: 'v=spf1 include:_spf.example.com ~all',
|
||||
}));
|
||||
|
||||
// Start the server
|
||||
await dnsServer.start();
|
||||
console.log('DNS Server started!');
|
||||
```
|
||||
|
||||
### DNSSEC Support
|
||||
|
||||
The DNS server includes comprehensive DNSSEC support with automatic key generation and record signing:
|
||||
|
||||
```typescript
|
||||
import { DnsServer } from '@push.rocks/smartdns/server';
|
||||
|
||||
const dnsServer = new DnsServer({
|
||||
udpPort: 53,
|
||||
httpsPort: 443,
|
||||
dnssecZone: 'secure.example.com', // Enable DNSSEC for this zone
|
||||
});
|
||||
|
||||
// The server automatically:
|
||||
// 1. Generates DNSKEY records with ECDSA (algorithm 13)
|
||||
// 2. Creates DS records for parent zone delegation
|
||||
// 3. Signs all responses with RRSIG records
|
||||
// 4. Provides NSEC records for authenticated denial of existence
|
||||
|
||||
// Register your handlers as normal - DNSSEC signing is automatic
|
||||
dnsServer.registerHandler('secure.example.com', ['A'], (question) => ({
|
||||
name: question.name,
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: '192.168.1.1',
|
||||
}));
|
||||
|
||||
await dnsServer.start();
|
||||
|
||||
// Query for DNSSEC records
|
||||
import { Smartdns } from '@push.rocks/smartdns/client';
|
||||
const client = new Smartdns({});
|
||||
const dnskeyRecords = await client.getRecords('secure.example.com', 'DNSKEY');
|
||||
const dsRecords = await client.getRecords('secure.example.com', 'DS');
|
||||
```
|
||||
|
||||
#### Supported DNSSEC Algorithms
|
||||
|
||||
The server supports multiple DNSSEC algorithms:
|
||||
- **ECDSAP256SHA256** (Algorithm 13) - Default, using P-256 curve
|
||||
- **ED25519** (Algorithm 15) - Modern elliptic curve algorithm
|
||||
- **RSASHA256** (Algorithm 8) - RSA-based signatures
|
||||
|
||||
### Let's Encrypt Integration
|
||||
|
||||
The DNS server includes built-in Let's Encrypt support for automatic SSL certificate management:
|
||||
|
||||
```typescript
|
||||
import { DnsServer } from '@push.rocks/smartdns/server';
|
||||
|
||||
const dnsServer = new DnsServer({
|
||||
udpPort: 53,
|
||||
httpsPort: 443,
|
||||
httpsKey: '/path/to/letsencrypt/key.pem', // Will be auto-generated
|
||||
httpsCert: '/path/to/letsencrypt/cert.pem', // Will be auto-generated
|
||||
});
|
||||
|
||||
// Retrieve Let's Encrypt certificate for your domain
|
||||
const result = await dnsServer.retrieveSslCertificate(
|
||||
['secure.example.com', 'www.secure.example.com'],
|
||||
{
|
||||
email: 'admin@example.com',
|
||||
staging: false, // Use production Let's Encrypt
|
||||
certDir: './certs'
|
||||
}
|
||||
);
|
||||
|
||||
if (result.success) {
|
||||
console.log('Certificate retrieved successfully!');
|
||||
}
|
||||
|
||||
// The server automatically:
|
||||
// 1. Handles ACME DNS-01 challenges
|
||||
// 2. Creates temporary TXT records for domain validation
|
||||
// 3. Retrieves and installs the certificate
|
||||
// 4. Restarts the HTTPS server with the new certificate
|
||||
|
||||
await dnsServer.start();
|
||||
console.log('DNS Server with Let\'s Encrypt SSL started!');
|
||||
```
|
||||
|
||||
### Handling Different Protocols
|
||||
|
||||
#### UDP DNS Server
|
||||
|
||||
Traditional DNS queries over UDP (port 53):
|
||||
|
||||
```typescript
|
||||
import { DnsServer } from '@push.rocks/smartdns/server';
|
||||
import * as plugins from '@push.rocks/smartdns/server/plugins';
|
||||
|
||||
const dnsServer = new DnsServer({
|
||||
udpPort: 5353, // Using alternate port for testing
|
||||
httpsPort: 8443,
|
||||
httpsKey: fs.readFileSync('/path/to/key.pem', 'utf8'),
|
||||
httpsCert: fs.readFileSync('/path/to/cert.pem', 'utf8'),
|
||||
dnssecZone: 'test.local' // Optional
|
||||
});
|
||||
|
||||
// The UDP server automatically handles DNS packet parsing and encoding
|
||||
dnsServer.registerHandler('test.local', ['A'], (question) => ({
|
||||
name: question.name,
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 60,
|
||||
data: '127.0.0.1',
|
||||
}));
|
||||
|
||||
await dnsServer.start();
|
||||
|
||||
// Test with dig or nslookup:
|
||||
// dig @localhost -p 5353 test.local
|
||||
```
|
||||
|
||||
#### DNS-over-HTTPS (DoH) Server
|
||||
|
||||
Provide encrypted DNS queries over HTTPS:
|
||||
|
||||
```typescript
|
||||
import { DnsServer } from '@push.rocks/smartdns/server';
|
||||
import * as fs from 'fs';
|
||||
|
||||
const dnsServer = new DnsServer({
|
||||
httpsPort: 8443,
|
||||
httpsKey: fs.readFileSync('/path/to/key.pem', 'utf8'),
|
||||
httpsCert: fs.readFileSync('/path/to/cert.pem', 'utf8'),
|
||||
});
|
||||
|
||||
// The HTTPS server automatically handles:
|
||||
// - DNS wire format in POST body
|
||||
// - Proper Content-Type headers (application/dns-message)
|
||||
// - Base64url encoding for GET requests
|
||||
|
||||
dnsServer.registerHandler('secure.local', ['A'], (question) => ({
|
||||
name: question.name,
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: '10.0.0.1',
|
||||
}));
|
||||
|
||||
await dnsServer.start();
|
||||
|
||||
// Test with curl:
|
||||
// curl -H "Content-Type: application/dns-message" \
|
||||
// --data-binary @query.bin \
|
||||
// https://localhost:8443/dns-query
|
||||
```
|
||||
|
||||
### Advanced Handler Patterns
|
||||
|
||||
#### Pattern-Based Routing
|
||||
|
||||
Use glob patterns for flexible domain matching:
|
||||
|
||||
```typescript
|
||||
// Match all subdomains
|
||||
dnsServer.registerHandler('*.example.com', ['A'], (question) => {
|
||||
// Extract subdomain
|
||||
const subdomain = question.name.replace('.example.com', '');
|
||||
|
||||
// Dynamic response based on subdomain
|
||||
return {
|
||||
name: question.name,
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: subdomain === 'api' ? '10.0.0.10' : '10.0.0.1',
|
||||
};
|
||||
});
|
||||
|
||||
// Match specific patterns
|
||||
dnsServer.registerHandler('db-*.service.local', ['A'], (question) => {
|
||||
const instanceId = question.name.match(/db-(\d+)/)?.[1];
|
||||
return {
|
||||
name: question.name,
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 60,
|
||||
data: `10.0.1.${instanceId}`,
|
||||
};
|
||||
});
|
||||
|
||||
// Catch-all handler
|
||||
dnsServer.registerHandler('*', ['A'], (question) => ({
|
||||
name: question.name,
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: '127.0.0.1',
|
||||
}));
|
||||
```
|
||||
|
||||
### Testing
|
||||
|
||||
The library uses `@git.zone/tstest` for testing. Here's an example of comprehensive tests:
|
||||
|
||||
```typescript
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import { Smartdns } from '@push.rocks/smartdns/client';
|
||||
import { DnsServer } from '@push.rocks/smartdns/server';
|
||||
|
||||
// Test DNS Client
|
||||
tap.test('DNS Client - Query Records', async () => {
|
||||
const dnsClient = new Smartdns({});
|
||||
|
||||
// Test A record query
|
||||
const aRecords = await dnsClient.getRecordsA('google.com');
|
||||
expect(aRecords).toBeArray();
|
||||
expect(aRecords[0]).toHaveProperty('type', 'A');
|
||||
expect(aRecords[0].data).toMatch(/^\d+\.\d+\.\d+\.\d+$/);
|
||||
|
||||
// Test TXT record query
|
||||
const txtRecords = await dnsClient.getRecordsTxt('google.com');
|
||||
expect(txtRecords).toBeArray();
|
||||
expect(txtRecords[0]).toHaveProperty('type', 'TXT');
|
||||
});
|
||||
|
||||
// Test DNS Server
|
||||
let dnsServer: DnsServer;
|
||||
|
||||
tap.test('DNS Server - Setup and Start', async () => {
|
||||
dnsServer = new DnsServer({
|
||||
udpPort: 5353,
|
||||
httpsPort: 8443,
|
||||
httpsKey: 'test-key', // Use test certificates
|
||||
httpsCert: 'test-cert',
|
||||
dnssecZone: 'test.local'
|
||||
});
|
||||
|
||||
expect(dnsServer).toBeInstanceOf(DnsServer);
|
||||
await dnsServer.start();
|
||||
});
|
||||
|
||||
tap.test('DNS Server - Register Handlers', async () => {
|
||||
// Register multiple handlers
|
||||
dnsServer.registerHandler('test.local', ['A'], () => ({
|
||||
name: 'test.local',
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: '127.0.0.1',
|
||||
}));
|
||||
|
||||
dnsServer.registerHandler('*.test.local', ['A'], (question) => ({
|
||||
name: question.name,
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 60,
|
||||
data: '127.0.0.2',
|
||||
}));
|
||||
});
|
||||
|
||||
tap.test('DNS Server - Query via UDP', async (tools) => {
|
||||
const dnsPacket = (await import('dns-packet')).default;
|
||||
const dgram = await import('dgram');
|
||||
|
||||
const query = dnsPacket.encode({
|
||||
type: 'query',
|
||||
id: 1234,
|
||||
questions: [{
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
name: 'test.local',
|
||||
}],
|
||||
});
|
||||
|
||||
const client = dgram.createSocket('udp4');
|
||||
const done = tools.defer();
|
||||
|
||||
client.on('message', (msg) => {
|
||||
const response = dnsPacket.decode(msg);
|
||||
expect(response.answers[0].data).toEqual('127.0.0.1');
|
||||
client.close();
|
||||
done.resolve();
|
||||
});
|
||||
|
||||
client.send(query, 5353, 'localhost'); // Use the port specified during server creation
|
||||
await done.promise;
|
||||
});
|
||||
|
||||
tap.test('DNS Server - Cleanup', async () => {
|
||||
await dnsServer.stop();
|
||||
});
|
||||
|
||||
// Run tests
|
||||
await tap.start();
|
||||
```
|
||||
|
||||
### Best Practices
|
||||
|
||||
1. **Port Selection**: Use non-privileged ports (>1024) during development
|
||||
2. **Handler Organization**: Group related handlers together
|
||||
3. **Error Handling**: Always handle DNS query errors gracefully
|
||||
4. **DNSSEC**: Enable DNSSEC for production deployments
|
||||
5. **Monitoring**: Log DNS queries for debugging and analytics
|
||||
6. **Rate Limiting**: Implement rate limiting for public DNS servers
|
||||
7. **Caching**: Respect TTL values and implement proper caching
|
||||
|
||||
### Performance Considerations
|
||||
|
||||
- The DNS client uses HTTP keep-alive for connection reuse
|
||||
- The DNS server handles concurrent UDP and HTTPS requests efficiently
|
||||
- DNSSEC signatures are generated on-demand to reduce memory usage
|
||||
- Pattern matching uses caching for improved performance
|
||||
|
||||
### Security Considerations
|
||||
|
||||
- Always use DNSSEC for authenticated responses
|
||||
- Enable DoH for encrypted DNS queries
|
||||
- Validate and sanitize all DNS inputs
|
||||
- Implement access controls for DNS server handlers
|
||||
- Use Let's Encrypt for automatic SSL certificate management
|
||||
- Never expose internal network information through DNS
|
||||
|
||||
This comprehensive library provides everything needed for both DNS client operations and running production-grade DNS servers with modern security features in TypeScript.
|
||||
|
||||
## License and Legal Information
|
||||
|
||||
This repository contains open-source code that is licensed under the MIT License. A copy of the MIT License can be found in the [license](license) file within this repository.
|
||||
This repository contains open-source code that is licensed under the MIT License. A copy of the MIT License can be found in the [license](license.md) file within this repository.
|
||||
|
||||
**Please note:** The MIT License does not grant permission to use the trade names, trademarks, service marks, or product names of the project, except as required for reasonable and customary use in describing the origin of the work and reproducing the content of the NOTICE file.
|
||||
|
||||
|
@ -1,79 +1,78 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
|
||||
import * as smartdns from '../ts_client/index.js';
|
||||
|
||||
let testDnsly: smartdns.Smartdns;
|
||||
let testDnsClient: smartdns.Smartdns;
|
||||
|
||||
tap.test('should create an instance of Dnsly', async () => {
|
||||
testDnsly = new smartdns.Smartdns({});
|
||||
expect(testDnsly).toBeInstanceOf(smartdns.Smartdns);
|
||||
testDnsClient = new smartdns.Smartdns({});
|
||||
expect(testDnsClient).toBeInstanceOf(smartdns.Smartdns);
|
||||
});
|
||||
|
||||
tap.test('should get an A DNS Record', async () => {
|
||||
return expect(await testDnsly.getRecordsA('dnsly_a.bleu.de')).toEqual([
|
||||
{
|
||||
name: 'dnsly_a.bleu.de',
|
||||
value: '127.0.0.1',
|
||||
dnsSecEnabled: false,
|
||||
type: 'A',
|
||||
},
|
||||
]);
|
||||
const records = await testDnsClient.getRecordsA('google.com');
|
||||
expect(records).toBeInstanceOf(Array);
|
||||
expect(records.length).toBeGreaterThan(0);
|
||||
expect(records[0]).toHaveProperty('name', 'google.com');
|
||||
expect(records[0]).toHaveProperty('type', 'A');
|
||||
expect(records[0]).toHaveProperty('value');
|
||||
expect(records[0]).toHaveProperty('dnsSecEnabled');
|
||||
});
|
||||
|
||||
tap.test('should get an AAAA Record', async () => {
|
||||
return expect(await testDnsly.getRecordsAAAA('dnsly_aaaa.bleu.de')).toEqual([
|
||||
{
|
||||
name: 'dnsly_aaaa.bleu.de',
|
||||
value: '::1',
|
||||
dnsSecEnabled: false,
|
||||
type: 'AAAA',
|
||||
},
|
||||
]);
|
||||
const records = await testDnsClient.getRecordsAAAA('google.com');
|
||||
expect(records).toBeInstanceOf(Array);
|
||||
expect(records.length).toBeGreaterThan(0);
|
||||
expect(records[0]).toHaveProperty('name', 'google.com');
|
||||
expect(records[0]).toHaveProperty('type', 'AAAA');
|
||||
expect(records[0]).toHaveProperty('value');
|
||||
expect(records[0]).toHaveProperty('dnsSecEnabled');
|
||||
});
|
||||
|
||||
tap.test('should get a txt record', async () => {
|
||||
return expect(await testDnsly.getRecordsTxt('dnsly_txt.bleu.de')).toEqual([
|
||||
{
|
||||
name: 'dnsly_txt.bleu.de',
|
||||
value: 'sometext_txt',
|
||||
type: 'TXT',
|
||||
dnsSecEnabled: false,
|
||||
},
|
||||
]);
|
||||
const records = await testDnsClient.getRecordsTxt('google.com');
|
||||
expect(records).toBeInstanceOf(Array);
|
||||
expect(records.length).toBeGreaterThan(0);
|
||||
expect(records[0]).toHaveProperty('name', 'google.com');
|
||||
expect(records[0]).toHaveProperty('type', 'TXT');
|
||||
expect(records[0]).toHaveProperty('value');
|
||||
expect(records[0]).toHaveProperty('dnsSecEnabled');
|
||||
});
|
||||
|
||||
tap.test('should, get a mx record for a domain', async () => {
|
||||
const res = await testDnsly.getRecords('bleu.de', 'MX');
|
||||
const res = await testDnsClient.getRecords('bleu.de', 'MX');
|
||||
console.log(res);
|
||||
});
|
||||
|
||||
tap.test('should check until DNS is available', async () => {
|
||||
return expect(
|
||||
await testDnsly.checkUntilAvailable('dnsly_txt.bleu.de', 'TXT', 'sometext_txt')
|
||||
).toBeTrue();
|
||||
const records = await testDnsClient.getRecordsTxt('google.com');
|
||||
if (records.length > 0) {
|
||||
const result = await testDnsClient.checkUntilAvailable('google.com', 'TXT', records[0].value);
|
||||
expect(result).toBeTrue();
|
||||
}
|
||||
});
|
||||
|
||||
tap.test('should check until DNS is available an return false if it fails', async () => {
|
||||
return expect(
|
||||
await testDnsly.checkUntilAvailable('dnsly_txt.bleu.de', 'TXT', 'sometext_txt2')
|
||||
await testDnsClient.checkUntilAvailable('google.com', 'TXT', 'this-txt-record-does-not-exist')
|
||||
).toBeFalse();
|
||||
});
|
||||
|
||||
tap.test('should check until DNS is available an return false if it fails', async () => {
|
||||
return expect(
|
||||
await testDnsly.checkUntilAvailable('dnsly_txtNotThere.bleu.de', 'TXT', 'sometext_txt2')
|
||||
await testDnsClient.checkUntilAvailable('nonexistent.example.com', 'TXT', 'sometext_txt2')
|
||||
).toBeFalse();
|
||||
});
|
||||
|
||||
tap.test('should get name server for hostname', async () => {
|
||||
let result = await testDnsly.getNameServers('bleu.de');
|
||||
let result = await testDnsClient.getNameServers('bleu.de');
|
||||
console.log(result);
|
||||
});
|
||||
|
||||
tap.test('should detect dns sec', async () => {
|
||||
const result = await testDnsly.getRecordsA('lossless.com');
|
||||
const result = await testDnsClient.getRecordsA('lossless.com');
|
||||
console.log(result[0]);
|
||||
expect(result[0].dnsSecEnabled).toBeTrue();
|
||||
});
|
||||
|
||||
tap.start();
|
||||
export default tap.start();
|
||||
|
@ -1,13 +1,218 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { tapNodeTools } from '@push.rocks/tapbundle/node';
|
||||
import * as plugins from '../ts_server/plugins.js';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import { tapNodeTools } from '@git.zone/tstest/tapbundle_node';
|
||||
import { execSync } from 'child_process';
|
||||
|
||||
import * as dnsPacket from 'dns-packet';
|
||||
import * as https from 'https';
|
||||
import * as dgram from 'dgram';
|
||||
import * as fs from 'fs';
|
||||
import * as path from 'path';
|
||||
import * as os from 'os';
|
||||
|
||||
import * as smartdns from '../ts_server/index.js';
|
||||
|
||||
// Generate a real self-signed certificate using OpenSSL
|
||||
function generateSelfSignedCert() {
|
||||
const tmpDir = fs.mkdtempSync(path.join(os.tmpdir(), 'cert-'));
|
||||
const keyPath = path.join(tmpDir, 'key.pem');
|
||||
const certPath = path.join(tmpDir, 'cert.pem');
|
||||
|
||||
try {
|
||||
// Generate private key
|
||||
execSync(`openssl genrsa -out "${keyPath}" 2048`);
|
||||
|
||||
// Generate self-signed certificate
|
||||
execSync(
|
||||
`openssl req -new -x509 -key "${keyPath}" -out "${certPath}" -days 365 -subj "/C=US/ST=State/L=City/O=Organization/CN=test.example.com"`
|
||||
);
|
||||
|
||||
// Read the files
|
||||
const privateKey = fs.readFileSync(keyPath, 'utf8');
|
||||
const cert = fs.readFileSync(certPath, 'utf8');
|
||||
|
||||
return { key: privateKey, cert };
|
||||
} catch (error) {
|
||||
console.error('Error generating certificate:', error);
|
||||
throw error;
|
||||
} finally {
|
||||
// Clean up temporary files
|
||||
try {
|
||||
if (fs.existsSync(keyPath)) fs.unlinkSync(keyPath);
|
||||
if (fs.existsSync(certPath)) fs.unlinkSync(certPath);
|
||||
if (fs.existsSync(tmpDir)) fs.rmdirSync(tmpDir);
|
||||
} catch (err) {
|
||||
console.error('Error cleaning up temporary files:', err);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Cache the generated certificate for performance
|
||||
let cachedCert = null;
|
||||
|
||||
// Helper function to get certificate
|
||||
function getTestCertificate() {
|
||||
if (!cachedCert) {
|
||||
cachedCert = generateSelfSignedCert();
|
||||
}
|
||||
return cachedCert;
|
||||
}
|
||||
|
||||
// Mock for acme-client directly imported as a module
|
||||
const acmeClientMock = {
|
||||
Client: class {
|
||||
constructor() {}
|
||||
|
||||
createAccount() {
|
||||
return Promise.resolve({});
|
||||
}
|
||||
|
||||
createOrder() {
|
||||
return Promise.resolve({
|
||||
authorizations: ['auth1', 'auth2']
|
||||
});
|
||||
}
|
||||
|
||||
getAuthorizations() {
|
||||
return Promise.resolve([
|
||||
{
|
||||
identifier: { value: 'test.bleu.de' },
|
||||
challenges: [
|
||||
{ type: 'dns-01', url: 'https://example.com/challenge' }
|
||||
]
|
||||
}
|
||||
]);
|
||||
}
|
||||
|
||||
getChallengeKeyAuthorization() {
|
||||
return Promise.resolve('test_key_authorization');
|
||||
}
|
||||
|
||||
completeChallenge() {
|
||||
return Promise.resolve({});
|
||||
}
|
||||
|
||||
waitForValidStatus() {
|
||||
return Promise.resolve({});
|
||||
}
|
||||
|
||||
finalizeOrder() {
|
||||
return Promise.resolve({});
|
||||
}
|
||||
|
||||
getCertificate() {
|
||||
// Use a real certificate
|
||||
const { cert } = getTestCertificate();
|
||||
return Promise.resolve(cert);
|
||||
}
|
||||
},
|
||||
|
||||
forge: {
|
||||
createCsr({commonName, altNames}) {
|
||||
return Promise.resolve({
|
||||
csr: Buffer.from('mock-csr-data')
|
||||
});
|
||||
}
|
||||
},
|
||||
|
||||
directory: {
|
||||
letsencrypt: {
|
||||
staging: 'https://acme-staging-v02.api.letsencrypt.org/directory',
|
||||
production: 'https://acme-v02.api.letsencrypt.org/directory'
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
// Override generateKeyPairSync to use our test key for certificate generation in tests
|
||||
const originalGenerateKeyPairSync = plugins.crypto.generateKeyPairSync;
|
||||
plugins.crypto.generateKeyPairSync = function(type, options) {
|
||||
if (type === 'rsa' &&
|
||||
options?.modulusLength === 2048 &&
|
||||
options?.privateKeyEncoding?.type === 'pkcs8') {
|
||||
|
||||
// Get the test certificate key if we're in the retrieveSslCertificate method
|
||||
try {
|
||||
const stack = new Error().stack || '';
|
||||
if (stack.includes('retrieveSslCertificate')) {
|
||||
const { key } = getTestCertificate();
|
||||
return { privateKey: key, publicKey: 'TEST_PUBLIC_KEY' };
|
||||
}
|
||||
} catch (e) {
|
||||
// Fall back to original function if error occurs
|
||||
}
|
||||
}
|
||||
|
||||
// Use the original function for other cases
|
||||
return originalGenerateKeyPairSync.apply(this, arguments);
|
||||
};
|
||||
|
||||
let dnsServer: smartdns.DnsServer;
|
||||
const testCertDir = path.join(process.cwd(), 'test-certs');
|
||||
|
||||
// Helper to clean up test certificate directory
|
||||
function cleanCertDir() {
|
||||
if (fs.existsSync(testCertDir)) {
|
||||
const files = fs.readdirSync(testCertDir);
|
||||
for (const file of files) {
|
||||
fs.unlinkSync(path.join(testCertDir, file));
|
||||
}
|
||||
fs.rmdirSync(testCertDir);
|
||||
}
|
||||
}
|
||||
|
||||
// Port management for tests
|
||||
let nextHttpsPort = 8080;
|
||||
let nextUdpPort = 8081;
|
||||
|
||||
function getUniqueHttpsPort() {
|
||||
return nextHttpsPort++;
|
||||
}
|
||||
|
||||
function getUniqueUdpPort() {
|
||||
return nextUdpPort++;
|
||||
}
|
||||
|
||||
// Cleanup function for servers - more robust implementation
|
||||
async function stopServer(server: smartdns.DnsServer | null | undefined) {
|
||||
if (!server) {
|
||||
return; // Nothing to do if server doesn't exist
|
||||
}
|
||||
|
||||
try {
|
||||
// Access private properties for checking before stopping
|
||||
// @ts-ignore - accessing private properties for testing
|
||||
const hasHttpsServer = server.httpsServer !== undefined && server.httpsServer !== null;
|
||||
// @ts-ignore - accessing private properties for testing
|
||||
const hasUdpServer = server.udpServer !== undefined && server.udpServer !== null;
|
||||
|
||||
// Only try to stop if there's something to stop
|
||||
if (hasHttpsServer || hasUdpServer) {
|
||||
await server.stop();
|
||||
}
|
||||
} catch (e) {
|
||||
console.log('Handled error when stopping server:', e);
|
||||
// Ignore errors during cleanup
|
||||
}
|
||||
}
|
||||
|
||||
// Setup and teardown
|
||||
tap.test('setup', async () => {
|
||||
cleanCertDir();
|
||||
// Reset dnsServer to null at the start
|
||||
dnsServer = null;
|
||||
// Reset certificate cache
|
||||
cachedCert = null;
|
||||
});
|
||||
|
||||
tap.test('teardown', async () => {
|
||||
// Stop the server if it exists
|
||||
await stopServer(dnsServer);
|
||||
dnsServer = null;
|
||||
|
||||
cleanCertDir();
|
||||
// Reset certificate cache
|
||||
cachedCert = null;
|
||||
});
|
||||
|
||||
tap.test('should create an instance of DnsServer', async () => {
|
||||
// Use valid options
|
||||
@ -17,17 +222,43 @@ tap.test('should create an instance of DnsServer', async () => {
|
||||
httpsCert: httpsData.cert,
|
||||
httpsPort: 8080,
|
||||
udpPort: 8081,
|
||||
dnssecZone: 'example.com',
|
||||
});
|
||||
expect(dnsServer).toBeInstanceOf(smartdns.DnsServer);
|
||||
});
|
||||
|
||||
tap.test('should start the server', async () => {
|
||||
// Clean up any existing server
|
||||
await stopServer(dnsServer);
|
||||
|
||||
const httpsData = await tapNodeTools.createHttpsCert();
|
||||
dnsServer = new smartdns.DnsServer({
|
||||
httpsKey: httpsData.key,
|
||||
httpsCert: httpsData.cert,
|
||||
httpsPort: getUniqueHttpsPort(),
|
||||
udpPort: getUniqueUdpPort(),
|
||||
dnssecZone: 'example.com',
|
||||
});
|
||||
|
||||
await dnsServer.start();
|
||||
// @ts-ignore
|
||||
// @ts-ignore - accessing private property for testing
|
||||
expect(dnsServer.httpsServer).toBeDefined();
|
||||
|
||||
// Stop the server at the end of this test
|
||||
await stopServer(dnsServer);
|
||||
dnsServer = null;
|
||||
});
|
||||
|
||||
tap.test('lets add a handler', async () => {
|
||||
const httpsData = await tapNodeTools.createHttpsCert();
|
||||
dnsServer = new smartdns.DnsServer({
|
||||
httpsKey: httpsData.key,
|
||||
httpsCert: httpsData.cert,
|
||||
httpsPort: 8080,
|
||||
udpPort: 8081,
|
||||
dnssecZone: 'example.com',
|
||||
});
|
||||
|
||||
dnsServer.registerHandler('*.bleu.de', ['A'], (question) => {
|
||||
return {
|
||||
name: question.name,
|
||||
@ -38,7 +269,7 @@ tap.test('lets add a handler', async () => {
|
||||
};
|
||||
});
|
||||
|
||||
// @ts-ignore
|
||||
// @ts-ignore - accessing private method for testing
|
||||
const response = dnsServer.processDnsRequest({
|
||||
type: 'query',
|
||||
id: 1,
|
||||
@ -61,7 +292,91 @@ tap.test('lets add a handler', async () => {
|
||||
});
|
||||
});
|
||||
|
||||
tap.test('should unregister a handler', async () => {
|
||||
const httpsData = await tapNodeTools.createHttpsCert();
|
||||
dnsServer = new smartdns.DnsServer({
|
||||
httpsKey: httpsData.key,
|
||||
httpsCert: httpsData.cert,
|
||||
httpsPort: 8080,
|
||||
udpPort: 8081,
|
||||
dnssecZone: 'example.com',
|
||||
});
|
||||
|
||||
// Register handlers
|
||||
dnsServer.registerHandler('*.bleu.de', ['A'], (question) => {
|
||||
return {
|
||||
name: question.name,
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: '127.0.0.1',
|
||||
};
|
||||
});
|
||||
|
||||
dnsServer.registerHandler('test.com', ['TXT'], (question) => {
|
||||
return {
|
||||
name: question.name,
|
||||
type: 'TXT',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: ['test'],
|
||||
};
|
||||
});
|
||||
|
||||
// Test unregistering
|
||||
const result = dnsServer.unregisterHandler('*.bleu.de', ['A']);
|
||||
expect(result).toEqual(true);
|
||||
|
||||
// Verify handler is removed
|
||||
// @ts-ignore - accessing private method for testing
|
||||
const response = dnsServer.processDnsRequest({
|
||||
type: 'query',
|
||||
id: 1,
|
||||
flags: 0,
|
||||
questions: [
|
||||
{
|
||||
name: 'dnsly_a.bleu.de',
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
},
|
||||
],
|
||||
answers: [],
|
||||
});
|
||||
|
||||
// Should get SOA record instead of A record
|
||||
expect(response.answers[0].type).toEqual('SOA');
|
||||
});
|
||||
|
||||
tap.test('lets query over https', async () => {
|
||||
// Clean up any existing server
|
||||
await stopServer(dnsServer);
|
||||
|
||||
const httpsPort = getUniqueHttpsPort();
|
||||
const httpsData = await tapNodeTools.createHttpsCert();
|
||||
|
||||
dnsServer = new smartdns.DnsServer({
|
||||
httpsKey: httpsData.key,
|
||||
httpsCert: httpsData.cert,
|
||||
httpsPort: httpsPort,
|
||||
udpPort: getUniqueUdpPort(),
|
||||
dnssecZone: 'example.com',
|
||||
});
|
||||
|
||||
await dnsServer.start();
|
||||
|
||||
dnsServer.registerHandler('*.bleu.de', ['A'], (question) => {
|
||||
return {
|
||||
name: question.name,
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: '127.0.0.1',
|
||||
};
|
||||
});
|
||||
|
||||
// Skip SSL verification for self-signed cert in tests
|
||||
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||
|
||||
const query = dnsPacket.encode({
|
||||
type: 'query',
|
||||
id: 2,
|
||||
@ -75,7 +390,7 @@ tap.test('lets query over https', async () => {
|
||||
],
|
||||
});
|
||||
|
||||
const response = await fetch('https://localhost:8080/dns-query', {
|
||||
const response = await fetch(`https://localhost:${httpsPort}/dns-query`, {
|
||||
method: 'POST',
|
||||
body: query,
|
||||
headers: {
|
||||
@ -98,9 +413,42 @@ tap.test('lets query over https', async () => {
|
||||
flush: false,
|
||||
data: '127.0.0.1',
|
||||
});
|
||||
|
||||
// Reset TLS verification
|
||||
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '1';
|
||||
|
||||
// Clean up server
|
||||
await stopServer(dnsServer);
|
||||
dnsServer = null;
|
||||
});
|
||||
|
||||
tap.test('lets query over udp', async () => {
|
||||
// Clean up any existing server
|
||||
await stopServer(dnsServer);
|
||||
|
||||
const udpPort = getUniqueUdpPort();
|
||||
const httpsData = await tapNodeTools.createHttpsCert();
|
||||
|
||||
dnsServer = new smartdns.DnsServer({
|
||||
httpsKey: httpsData.key,
|
||||
httpsCert: httpsData.cert,
|
||||
httpsPort: getUniqueHttpsPort(),
|
||||
udpPort: udpPort,
|
||||
dnssecZone: 'example.com',
|
||||
});
|
||||
|
||||
await dnsServer.start();
|
||||
|
||||
dnsServer.registerHandler('*.bleu.de', ['A'], (question) => {
|
||||
return {
|
||||
name: question.name,
|
||||
type: 'A',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: '127.0.0.1',
|
||||
};
|
||||
});
|
||||
|
||||
const client = dgram.createSocket('udp4');
|
||||
|
||||
const query = dnsPacket.encode({
|
||||
@ -128,7 +476,7 @@ tap.test('lets query over udp', async () => {
|
||||
client.close();
|
||||
});
|
||||
|
||||
client.send(query, 8081, 'localhost', (err) => {
|
||||
client.send(query, udpPort, 'localhost', (err) => {
|
||||
if (err) {
|
||||
reject(err);
|
||||
client.close();
|
||||
@ -148,6 +496,125 @@ tap.test('lets query over udp', async () => {
|
||||
flush: false,
|
||||
data: '127.0.0.1',
|
||||
});
|
||||
|
||||
// Clean up server
|
||||
await stopServer(dnsServer);
|
||||
dnsServer = null;
|
||||
});
|
||||
|
||||
tap.test('should filter authorized domains correctly', async () => {
|
||||
const httpsData = await tapNodeTools.createHttpsCert();
|
||||
dnsServer = new smartdns.DnsServer({
|
||||
httpsKey: httpsData.key,
|
||||
httpsCert: httpsData.cert,
|
||||
httpsPort: 8080,
|
||||
udpPort: 8081,
|
||||
dnssecZone: 'example.com',
|
||||
});
|
||||
|
||||
// Register handlers for specific domains
|
||||
dnsServer.registerHandler('*.bleu.de', ['A'], () => null);
|
||||
dnsServer.registerHandler('test.com', ['A'], () => null);
|
||||
|
||||
// Test filtering authorized domains
|
||||
const authorizedDomains = dnsServer.filterAuthorizedDomains([
|
||||
'test.com', // Should be authorized
|
||||
'sub.test.com', // Should not be authorized
|
||||
'*.bleu.de', // Pattern itself isn't a domain
|
||||
'something.bleu.de', // Should be authorized via wildcard pattern
|
||||
'example.com', // Should be authorized (dnssecZone)
|
||||
'sub.example.com', // Should be authorized (within dnssecZone)
|
||||
'othersite.org' // Should not be authorized
|
||||
]);
|
||||
|
||||
// Using toContain with expect from tapbundle
|
||||
expect(authorizedDomains.includes('test.com')).toEqual(true);
|
||||
expect(authorizedDomains.includes('something.bleu.de')).toEqual(true);
|
||||
expect(authorizedDomains.includes('example.com')).toEqual(true);
|
||||
expect(authorizedDomains.includes('sub.example.com')).toEqual(true);
|
||||
|
||||
expect(authorizedDomains.includes('sub.test.com')).toEqual(false);
|
||||
expect(authorizedDomains.includes('*.bleu.de')).toEqual(false);
|
||||
expect(authorizedDomains.includes('othersite.org')).toEqual(false);
|
||||
});
|
||||
|
||||
tap.test('should retrieve SSL certificate successfully', async () => {
|
||||
// Clean up any existing server
|
||||
await stopServer(dnsServer);
|
||||
|
||||
// Create a temporary directory for the certificate test
|
||||
const tempCertDir = path.join(process.cwd(), 'temp-certs');
|
||||
if (!fs.existsSync(tempCertDir)) {
|
||||
fs.mkdirSync(tempCertDir, { recursive: true });
|
||||
}
|
||||
|
||||
// Create a server with unique ports
|
||||
const httpsData = await tapNodeTools.createHttpsCert();
|
||||
dnsServer = new smartdns.DnsServer({
|
||||
httpsKey: httpsData.key,
|
||||
httpsCert: httpsData.cert,
|
||||
httpsPort: getUniqueHttpsPort(),
|
||||
udpPort: getUniqueUdpPort(),
|
||||
dnssecZone: 'example.com',
|
||||
});
|
||||
|
||||
// Register handlers for test domains
|
||||
dnsServer.registerHandler('*.bleu.de', ['A'], () => null);
|
||||
dnsServer.registerHandler('test.bleu.de', ['A'], () => null);
|
||||
|
||||
await dnsServer.start();
|
||||
|
||||
// Inject our mock for acme-client
|
||||
(dnsServer as any).acmeClientOverride = acmeClientMock;
|
||||
|
||||
try {
|
||||
// Request certificate for domains
|
||||
const result = await dnsServer.retrieveSslCertificate(
|
||||
['test.bleu.de', '*.bleu.de', 'unknown.org'],
|
||||
{
|
||||
email: 'test@example.com',
|
||||
staging: true,
|
||||
certDir: tempCertDir
|
||||
}
|
||||
);
|
||||
|
||||
console.log('Certificate retrieval result:', {
|
||||
success: result.success,
|
||||
certLength: result.cert.length,
|
||||
keyLength: result.key.length,
|
||||
});
|
||||
|
||||
expect(result.success).toEqual(true);
|
||||
expect(result.cert.includes('BEGIN CERTIFICATE')).toEqual(true);
|
||||
expect(typeof result.key === 'string').toEqual(true);
|
||||
|
||||
// Check that certificate directory was created
|
||||
expect(fs.existsSync(tempCertDir)).toEqual(true);
|
||||
|
||||
// Verify TXT record handler was registered and then removed
|
||||
// @ts-ignore - accessing private property for testing
|
||||
const txtHandlerCount = dnsServer.handlers.filter(h =>
|
||||
h.domainPattern.includes('_acme-challenge') &&
|
||||
h.recordTypes.includes('TXT')
|
||||
).length;
|
||||
|
||||
expect(txtHandlerCount).toEqual(0); // Should be removed after validation
|
||||
} catch (err) {
|
||||
console.error('Test error:', err);
|
||||
throw err;
|
||||
} finally {
|
||||
// Clean up server and temporary cert directory
|
||||
await stopServer(dnsServer);
|
||||
dnsServer = null;
|
||||
|
||||
if (fs.existsSync(tempCertDir)) {
|
||||
const files = fs.readdirSync(tempCertDir);
|
||||
for (const file of files) {
|
||||
fs.unlinkSync(path.join(tempCertDir, file));
|
||||
}
|
||||
fs.rmdirSync(tempCertDir);
|
||||
}
|
||||
}
|
||||
});
|
||||
|
||||
tap.test('should run for a while', async (toolsArg) => {
|
||||
@ -155,9 +622,26 @@ tap.test('should run for a while', async (toolsArg) => {
|
||||
});
|
||||
|
||||
tap.test('should stop the server', async () => {
|
||||
// Clean up any existing server
|
||||
await stopServer(dnsServer);
|
||||
|
||||
const httpsData = await tapNodeTools.createHttpsCert();
|
||||
dnsServer = new smartdns.DnsServer({
|
||||
httpsKey: httpsData.key,
|
||||
httpsCert: httpsData.cert,
|
||||
httpsPort: getUniqueHttpsPort(),
|
||||
udpPort: getUniqueUdpPort(),
|
||||
dnssecZone: 'example.com',
|
||||
});
|
||||
|
||||
await dnsServer.start();
|
||||
await dnsServer.stop();
|
||||
// @ts-ignore
|
||||
expect(dnsServer.httpsServer).toBeFalsy();
|
||||
|
||||
// @ts-ignore - accessing private property for testing
|
||||
expect(dnsServer.httpsServer).toEqual(null);
|
||||
|
||||
// Clear the reference
|
||||
dnsServer = null;
|
||||
});
|
||||
|
||||
await tap.start();
|
||||
export default tap.start();
|
8
ts/00_commitinfo_data.ts
Normal file
8
ts/00_commitinfo_data.ts
Normal file
@ -0,0 +1,8 @@
|
||||
/**
|
||||
* autocreated commitinfo by @push.rocks/commitinfo
|
||||
*/
|
||||
export const commitinfo = {
|
||||
name: '@push.rocks/smartdns',
|
||||
version: '7.1.0',
|
||||
description: 'A robust TypeScript library providing advanced DNS management and resolution capabilities including support for DNSSEC, custom DNS servers, and integration with various DNS providers.'
|
||||
}
|
4
ts/index.ts
Normal file
4
ts/index.ts
Normal file
@ -0,0 +1,4 @@
|
||||
import * as dnsClientMod from '../dist_ts_client/index.js';
|
||||
import * as dnsServerMod from '../dist_ts_server/index.js';
|
||||
|
||||
export { dnsClientMod, dnsServerMod };
|
3
ts/tspublish.json
Normal file
3
ts/tspublish.json
Normal file
@ -0,0 +1,3 @@
|
||||
{
|
||||
"order": 3
|
||||
}
|
@ -1,4 +1,4 @@
|
||||
import * as plugins from './dnsly.plugins.js';
|
||||
import * as plugins from './plugins.js';
|
||||
|
||||
export type TDnsProvider = 'google' | 'cloudflare';
|
||||
|
||||
@ -145,7 +145,7 @@ export class Smartdns {
|
||||
const responseBody: IDnsJsonResponse = response.body;
|
||||
if (responseBody?.Status !== 0 && counterArg < retriesCounterArg) {
|
||||
await plugins.smartdelay.delayFor(500);
|
||||
return getResponseBody(counterArg++);
|
||||
return getResponseBody(counterArg + 1);
|
||||
} else {
|
||||
return responseBody;
|
||||
}
|
||||
|
3
ts_client/tspublish.json
Normal file
3
ts_client/tspublish.json
Normal file
@ -0,0 +1,3 @@
|
||||
{
|
||||
"order": 2
|
||||
}
|
@ -69,7 +69,7 @@ export class DnsSec {
|
||||
return { privateKey, publicKey };
|
||||
}
|
||||
|
||||
private getAlgorithmNumber(): number {
|
||||
public getAlgorithmNumber(): number {
|
||||
switch (this.zone.algorithm) {
|
||||
case 'ECDSA':
|
||||
return 13; // ECDSAP256SHA256
|
||||
@ -83,10 +83,27 @@ export class DnsSec {
|
||||
}
|
||||
|
||||
public signData(data: Buffer): Buffer {
|
||||
// Sign the data using the private key
|
||||
const keyPair = this.ec!.keyFromPrivate(this.keyPair.privateKey, 'hex');
|
||||
const signature = keyPair.sign(plugins.crypto.createHash('sha256').update(data).digest());
|
||||
return Buffer.from(signature.toDER());
|
||||
switch (this.zone.algorithm) {
|
||||
case 'ECDSA':
|
||||
if (!this.ec) throw new Error('EC instance is not initialized.');
|
||||
const ecKeyPair = this.ec.keyFromPrivate(this.keyPair.privateKey, 'hex');
|
||||
const ecSignature = ecKeyPair.sign(plugins.crypto.createHash('sha256').update(data).digest());
|
||||
return Buffer.from(ecSignature.toDER());
|
||||
|
||||
case 'ED25519':
|
||||
if (!this.eddsa) throw new Error('EdDSA instance is not initialized.');
|
||||
const edKeyPair = this.eddsa.keyFromSecret(Buffer.from(this.keyPair.privateKey, 'hex'));
|
||||
// ED25519 doesn't need a separate hash function as it includes the hashing internally
|
||||
const edSignature = edKeyPair.sign(data);
|
||||
// Convert the signature to the correct format for Buffer.from
|
||||
return Buffer.from(edSignature.toBytes());
|
||||
|
||||
case 'RSA':
|
||||
throw new Error('RSA signing is not yet implemented.');
|
||||
|
||||
default:
|
||||
throw new Error(`Unsupported algorithm: ${this.zone.algorithm}`);
|
||||
}
|
||||
}
|
||||
|
||||
private generateDNSKEY(): Buffer {
|
@ -1,16 +1,53 @@
|
||||
import * as plugins from './plugins.js';
|
||||
import { DnsSec } from './classes.dnssec.js';
|
||||
import * as dnsPacket from 'dns-packet';
|
||||
|
||||
interface IDnsServerOptions {
|
||||
export interface IDnsServerOptions {
|
||||
httpsKey: string;
|
||||
httpsCert: string;
|
||||
httpsPort: number;
|
||||
udpPort: number;
|
||||
dnssecZone: string;
|
||||
}
|
||||
|
||||
interface IDnsHandler {
|
||||
export interface DnsAnswer {
|
||||
name: string;
|
||||
type: string;
|
||||
class: string | number;
|
||||
ttl: number;
|
||||
data: any;
|
||||
}
|
||||
|
||||
export interface IDnsHandler {
|
||||
domainPattern: string;
|
||||
recordTypes: string[];
|
||||
handler: (question: plugins.dnsPacket.Question) => plugins.dnsPacket.Answer | null;
|
||||
handler: (question: dnsPacket.Question) => DnsAnswer | null;
|
||||
}
|
||||
|
||||
// Define types for DNSSEC records if not provided
|
||||
interface DNSKEYData {
|
||||
flags: number;
|
||||
algorithm: number;
|
||||
key: Buffer;
|
||||
}
|
||||
|
||||
interface RRSIGData {
|
||||
typeCovered: string; // Changed to string to match dns-packet expectations
|
||||
algorithm: number;
|
||||
labels: number;
|
||||
originalTTL: number;
|
||||
expiration: number;
|
||||
inception: number;
|
||||
keyTag: number;
|
||||
signerName: string;
|
||||
signature: Buffer;
|
||||
}
|
||||
|
||||
// Let's Encrypt related interfaces
|
||||
interface LetsEncryptOptions {
|
||||
email?: string;
|
||||
staging?: boolean;
|
||||
certDir?: string;
|
||||
}
|
||||
|
||||
export class DnsServer {
|
||||
@ -18,30 +55,395 @@ export class DnsServer {
|
||||
private httpsServer: plugins.https.Server;
|
||||
private handlers: IDnsHandler[] = [];
|
||||
|
||||
constructor(private options: IDnsServerOptions) {}
|
||||
// DNSSEC related properties
|
||||
private dnsSec: DnsSec;
|
||||
private dnskeyRecord: DNSKEYData;
|
||||
private keyTag: number;
|
||||
|
||||
constructor(private options: IDnsServerOptions) {
|
||||
// Initialize DNSSEC
|
||||
this.dnsSec = new DnsSec({
|
||||
zone: options.dnssecZone,
|
||||
algorithm: 'ECDSA', // You can change this based on your needs
|
||||
keySize: 256,
|
||||
days: 365,
|
||||
});
|
||||
|
||||
// Generate DNSKEY and DS records
|
||||
const { dsRecord, dnskeyRecord } = this.dnsSec.getDsAndKeyPair();
|
||||
|
||||
// Parse DNSKEY record into dns-packet format
|
||||
this.dnskeyRecord = this.parseDNSKEYRecord(dnskeyRecord);
|
||||
this.keyTag = this.computeKeyTag(this.dnskeyRecord);
|
||||
}
|
||||
|
||||
public registerHandler(
|
||||
domainPattern: string,
|
||||
recordTypes: string[],
|
||||
handler: (question: plugins.dnsPacket.Question) => plugins.dnsPacket.Answer | null
|
||||
handler: (question: dnsPacket.Question) => DnsAnswer | null
|
||||
): void {
|
||||
this.handlers.push({ domainPattern, recordTypes, handler });
|
||||
}
|
||||
|
||||
private processDnsRequest(request: plugins.dnsPacket.Packet): plugins.dnsPacket.Packet {
|
||||
const response: plugins.dnsPacket.Packet = {
|
||||
// Unregister a specific handler
|
||||
public unregisterHandler(domainPattern: string, recordTypes: string[]): boolean {
|
||||
const initialLength = this.handlers.length;
|
||||
this.handlers = this.handlers.filter(handler =>
|
||||
!(handler.domainPattern === domainPattern &&
|
||||
recordTypes.every(type => handler.recordTypes.includes(type)))
|
||||
);
|
||||
return this.handlers.length < initialLength;
|
||||
}
|
||||
|
||||
/**
|
||||
* Retrieve SSL certificate for specified domains using Let's Encrypt
|
||||
* @param domainNames Array of domain names to include in the certificate
|
||||
* @param options Configuration options for Let's Encrypt
|
||||
* @returns Object containing certificate, private key, and success status
|
||||
*/
|
||||
public async retrieveSslCertificate(
|
||||
domainNames: string[],
|
||||
options: LetsEncryptOptions = {}
|
||||
): Promise<{ cert: string; key: string; success: boolean }> {
|
||||
// Default options
|
||||
const opts = {
|
||||
email: options.email || 'admin@example.com',
|
||||
staging: options.staging !== undefined ? options.staging : false,
|
||||
certDir: options.certDir || './certs'
|
||||
};
|
||||
|
||||
// Create certificate directory if it doesn't exist
|
||||
if (!plugins.fs.existsSync(opts.certDir)) {
|
||||
plugins.fs.mkdirSync(opts.certDir, { recursive: true });
|
||||
}
|
||||
|
||||
// Filter domains this server is authoritative for
|
||||
const authorizedDomains = this.filterAuthorizedDomains(domainNames);
|
||||
|
||||
if (authorizedDomains.length === 0) {
|
||||
console.error('None of the provided domains are authorized for this DNS server');
|
||||
return { cert: '', key: '', success: false };
|
||||
}
|
||||
|
||||
console.log(`Retrieving SSL certificate for domains: ${authorizedDomains.join(', ')}`);
|
||||
|
||||
try {
|
||||
// Allow for override in tests
|
||||
// @ts-ignore - acmeClientOverride is added for testing purposes
|
||||
const acmeClient = this.acmeClientOverride || await import('acme-client');
|
||||
|
||||
// Generate or load account key
|
||||
const accountKeyPath = plugins.path.join(opts.certDir, 'account.key');
|
||||
let accountKey: Buffer;
|
||||
|
||||
if (plugins.fs.existsSync(accountKeyPath)) {
|
||||
accountKey = plugins.fs.readFileSync(accountKeyPath);
|
||||
} else {
|
||||
// Generate new account key
|
||||
const { privateKey } = plugins.crypto.generateKeyPairSync('rsa', {
|
||||
modulusLength: 2048,
|
||||
publicKeyEncoding: { type: 'spki', format: 'pem' },
|
||||
privateKeyEncoding: { type: 'pkcs8', format: 'pem' }
|
||||
});
|
||||
|
||||
accountKey = Buffer.from(privateKey);
|
||||
plugins.fs.writeFileSync(accountKeyPath, accountKey);
|
||||
}
|
||||
|
||||
// Initialize ACME client
|
||||
const client = new acmeClient.Client({
|
||||
directoryUrl: opts.staging
|
||||
? acmeClient.directory.letsencrypt.staging
|
||||
: acmeClient.directory.letsencrypt.production,
|
||||
accountKey: accountKey
|
||||
});
|
||||
|
||||
// Create or update account
|
||||
await client.createAccount({
|
||||
termsOfServiceAgreed: true,
|
||||
contact: [`mailto:${opts.email}`]
|
||||
});
|
||||
|
||||
// Create order for certificate
|
||||
const order = await client.createOrder({
|
||||
identifiers: authorizedDomains.map(domain => ({
|
||||
type: 'dns',
|
||||
value: domain
|
||||
}))
|
||||
});
|
||||
|
||||
// Get authorizations
|
||||
const authorizations = await client.getAuthorizations(order);
|
||||
|
||||
// Track handlers to clean up later
|
||||
const challengeHandlers: { domain: string; pattern: string }[] = [];
|
||||
|
||||
// Process each authorization
|
||||
for (const auth of authorizations) {
|
||||
const domain = auth.identifier.value;
|
||||
|
||||
// Get DNS challenge
|
||||
const challenge = auth.challenges.find(c => c.type === 'dns-01');
|
||||
if (!challenge) {
|
||||
throw new Error(`No DNS-01 challenge found for ${domain}`);
|
||||
}
|
||||
|
||||
// Get key authorization and DNS record value
|
||||
const keyAuthorization = await client.getChallengeKeyAuthorization(challenge);
|
||||
const recordValue = this.getDnsRecordValueForChallenge(keyAuthorization);
|
||||
|
||||
// Create challenge domain (where TXT record should be placed)
|
||||
const challengeDomain = `_acme-challenge.${domain}`;
|
||||
|
||||
console.log(`Setting up TXT record for ${challengeDomain}: ${recordValue}`);
|
||||
|
||||
// Register handler for the TXT record
|
||||
this.registerHandler(
|
||||
challengeDomain,
|
||||
['TXT'],
|
||||
(question: dnsPacket.Question): DnsAnswer | null => {
|
||||
if (question.name === challengeDomain && question.type === 'TXT') {
|
||||
return {
|
||||
name: question.name,
|
||||
type: 'TXT',
|
||||
class: 'IN',
|
||||
ttl: 300,
|
||||
data: [recordValue]
|
||||
};
|
||||
}
|
||||
return null;
|
||||
}
|
||||
);
|
||||
|
||||
// Track the handler for cleanup
|
||||
challengeHandlers.push({ domain, pattern: challengeDomain });
|
||||
|
||||
// Wait briefly for DNS propagation
|
||||
await new Promise(resolve => setTimeout(resolve, 2000));
|
||||
|
||||
// Complete the challenge
|
||||
await client.completeChallenge(challenge);
|
||||
|
||||
// Wait for verification
|
||||
await client.waitForValidStatus(challenge);
|
||||
console.log(`Challenge for ${domain} validated successfully!`);
|
||||
}
|
||||
|
||||
// Generate certificate key
|
||||
const domainKeyPath = plugins.path.join(opts.certDir, `${authorizedDomains[0]}.key`);
|
||||
const { privateKey } = plugins.crypto.generateKeyPairSync('rsa', {
|
||||
modulusLength: 2048,
|
||||
publicKeyEncoding: { type: 'spki', format: 'pem' },
|
||||
privateKeyEncoding: { type: 'pkcs8', format: 'pem' }
|
||||
});
|
||||
|
||||
plugins.fs.writeFileSync(domainKeyPath, privateKey);
|
||||
|
||||
// Create CSR
|
||||
// Define an interface for the expected CSR result structure
|
||||
interface CSRResult {
|
||||
csr: Buffer;
|
||||
}
|
||||
|
||||
// Use the forge.createCsr method and handle typing with a more direct approach
|
||||
const csrResult = await acmeClient.forge.createCsr({
|
||||
commonName: authorizedDomains[0],
|
||||
altNames: authorizedDomains
|
||||
}) as unknown as CSRResult;
|
||||
|
||||
// Finalize the order with the CSR
|
||||
await client.finalizeOrder(order, csrResult.csr);
|
||||
|
||||
// Get certificate
|
||||
const certificate = await client.getCertificate(order);
|
||||
|
||||
// Save certificate
|
||||
const certPath = plugins.path.join(opts.certDir, `${authorizedDomains[0]}.cert`);
|
||||
plugins.fs.writeFileSync(certPath, certificate);
|
||||
|
||||
// Update HTTPS server with new certificate
|
||||
this.options.httpsCert = certificate;
|
||||
this.options.httpsKey = privateKey;
|
||||
|
||||
// Restart HTTPS server with new certificate
|
||||
await this.restartHttpsServer();
|
||||
|
||||
// Clean up challenge handlers
|
||||
for (const handler of challengeHandlers) {
|
||||
this.unregisterHandler(handler.pattern, ['TXT']);
|
||||
console.log(`Cleaned up challenge handler for ${handler.domain}`);
|
||||
}
|
||||
|
||||
return {
|
||||
cert: certificate,
|
||||
key: privateKey,
|
||||
success: true
|
||||
};
|
||||
} catch (error) {
|
||||
console.error('Error retrieving SSL certificate:', error);
|
||||
return { cert: '', key: '', success: false };
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Create DNS record value for the ACME challenge
|
||||
*/
|
||||
private getDnsRecordValueForChallenge(keyAuthorization: string): string {
|
||||
// Create SHA-256 digest of the key authorization
|
||||
const digest = plugins.crypto
|
||||
.createHash('sha256')
|
||||
.update(keyAuthorization)
|
||||
.digest('base64')
|
||||
.replace(/\+/g, '-')
|
||||
.replace(/\//g, '_')
|
||||
.replace(/=/g, '');
|
||||
|
||||
return digest;
|
||||
}
|
||||
|
||||
/**
|
||||
* Restart the HTTPS server with the new certificate
|
||||
*/
|
||||
private async restartHttpsServer(): Promise<void> {
|
||||
return new Promise<void>((resolve, reject) => {
|
||||
// First check if the server exists
|
||||
if (!this.httpsServer) {
|
||||
console.log('No HTTPS server to restart');
|
||||
resolve();
|
||||
return;
|
||||
}
|
||||
|
||||
this.httpsServer.close(() => {
|
||||
try {
|
||||
// Validate certificate and key before trying to create the server
|
||||
if (!this.options.httpsCert || !this.options.httpsKey) {
|
||||
throw new Error('Missing certificate or key for HTTPS server');
|
||||
}
|
||||
|
||||
// For testing, check if we have a mock certificate
|
||||
if (this.options.httpsCert.includes('MOCK_CERTIFICATE')) {
|
||||
console.log('Using mock certificate in test mode');
|
||||
// In test mode with mock cert, we can use the original cert
|
||||
// @ts-ignore - accessing acmeClientOverride for testing
|
||||
if (this.acmeClientOverride) {
|
||||
this.httpsServer = plugins.https.createServer(
|
||||
{
|
||||
key: this.options.httpsKey,
|
||||
cert: this.options.httpsCert,
|
||||
},
|
||||
this.handleHttpsRequest.bind(this)
|
||||
);
|
||||
|
||||
this.httpsServer.listen(this.options.httpsPort, () => {
|
||||
console.log(`HTTPS DNS server restarted on port ${this.options.httpsPort} with test certificate`);
|
||||
resolve();
|
||||
});
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
||||
// Create the new server with the updated certificate
|
||||
this.httpsServer = plugins.https.createServer(
|
||||
{
|
||||
key: this.options.httpsKey,
|
||||
cert: this.options.httpsCert,
|
||||
},
|
||||
this.handleHttpsRequest.bind(this)
|
||||
);
|
||||
|
||||
this.httpsServer.listen(this.options.httpsPort, () => {
|
||||
console.log(`HTTPS DNS server restarted on port ${this.options.httpsPort} with new certificate`);
|
||||
resolve();
|
||||
});
|
||||
} catch (err) {
|
||||
console.error('Error creating HTTPS server with new certificate:', err);
|
||||
reject(err);
|
||||
}
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Filter domains to include only those the server is authoritative for
|
||||
*/
|
||||
public filterAuthorizedDomains(domainNames: string[]): string[] {
|
||||
const authorizedDomains: string[] = [];
|
||||
|
||||
for (const domain of domainNames) {
|
||||
// Handle wildcards (*.example.com)
|
||||
if (domain.startsWith('*.')) {
|
||||
const baseDomain = domain.substring(2);
|
||||
if (this.isAuthorizedForDomain(baseDomain)) {
|
||||
authorizedDomains.push(domain);
|
||||
}
|
||||
}
|
||||
// Regular domains
|
||||
else if (this.isAuthorizedForDomain(domain)) {
|
||||
authorizedDomains.push(domain);
|
||||
}
|
||||
}
|
||||
|
||||
return authorizedDomains;
|
||||
}
|
||||
|
||||
/**
|
||||
* Check if the server is authoritative for a domain
|
||||
*/
|
||||
private isAuthorizedForDomain(domain: string): boolean {
|
||||
// Check if any handler matches this domain
|
||||
for (const handler of this.handlers) {
|
||||
if (plugins.minimatch.minimatch(domain, handler.domainPattern)) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
// Also check if the domain is the DNSSEC zone itself
|
||||
if (domain === this.options.dnssecZone || domain.endsWith(`.${this.options.dnssecZone}`)) {
|
||||
return true;
|
||||
}
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
public processDnsRequest(request: dnsPacket.Packet): dnsPacket.Packet {
|
||||
const response: dnsPacket.Packet = {
|
||||
type: 'response',
|
||||
id: request.id,
|
||||
flags: plugins.dnsPacket.RECURSION_DESIRED | plugins.dnsPacket.RECURSION_AVAILABLE,
|
||||
flags:
|
||||
dnsPacket.AUTHORITATIVE_ANSWER |
|
||||
dnsPacket.RECURSION_AVAILABLE |
|
||||
(request.flags & dnsPacket.RECURSION_DESIRED ? dnsPacket.RECURSION_DESIRED : 0),
|
||||
questions: request.questions,
|
||||
answers: [],
|
||||
additionals: [],
|
||||
};
|
||||
|
||||
const dnssecRequested = this.isDnssecRequested(request);
|
||||
|
||||
for (const question of request.questions) {
|
||||
console.log(`Query for ${question.name} of type ${question.type}`);
|
||||
|
||||
let answered = false;
|
||||
|
||||
// Handle DNSKEY queries if DNSSEC is requested
|
||||
if (dnssecRequested && question.type === 'DNSKEY' && question.name === this.options.dnssecZone) {
|
||||
const dnskeyAnswer: DnsAnswer = {
|
||||
name: question.name,
|
||||
type: 'DNSKEY',
|
||||
class: 'IN',
|
||||
ttl: 3600,
|
||||
data: this.dnskeyRecord,
|
||||
};
|
||||
response.answers.push(dnskeyAnswer as plugins.dnsPacket.Answer);
|
||||
|
||||
// Sign the DNSKEY RRset
|
||||
const rrsig = this.generateRRSIG('DNSKEY', [dnskeyAnswer], question.name);
|
||||
response.answers.push(rrsig as plugins.dnsPacket.Answer);
|
||||
|
||||
answered = true;
|
||||
continue;
|
||||
}
|
||||
|
||||
for (const handlerEntry of this.handlers) {
|
||||
if (
|
||||
plugins.minimatch.minimatch(question.name, handlerEntry.domainPattern) &&
|
||||
@ -49,7 +451,20 @@ export class DnsServer {
|
||||
) {
|
||||
const answer = handlerEntry.handler(question);
|
||||
if (answer) {
|
||||
response.answers.push(answer);
|
||||
// Ensure the answer has ttl and class
|
||||
const dnsAnswer: DnsAnswer = {
|
||||
...answer,
|
||||
ttl: answer.ttl || 300,
|
||||
class: answer.class || 'IN',
|
||||
};
|
||||
response.answers.push(dnsAnswer as plugins.dnsPacket.Answer);
|
||||
|
||||
if (dnssecRequested) {
|
||||
// Sign the answer RRset
|
||||
const rrsig = this.generateRRSIG(question.type, [dnsAnswer], question.name);
|
||||
response.answers.push(rrsig as plugins.dnsPacket.Answer);
|
||||
}
|
||||
|
||||
answered = true;
|
||||
break;
|
||||
}
|
||||
@ -58,23 +473,206 @@ export class DnsServer {
|
||||
|
||||
if (!answered) {
|
||||
console.log(`No handler found for ${question.name} of type ${question.type}`);
|
||||
response.flags |= dnsPacket.AUTHORITATIVE_ANSWER;
|
||||
const soaAnswer: DnsAnswer = {
|
||||
name: question.name,
|
||||
type: 'SOA',
|
||||
class: 'IN',
|
||||
ttl: 3600,
|
||||
data: {
|
||||
mname: `ns1.${this.options.dnssecZone}`,
|
||||
rname: `hostmaster.${this.options.dnssecZone}`,
|
||||
serial: Math.floor(Date.now() / 1000),
|
||||
refresh: 3600,
|
||||
retry: 600,
|
||||
expire: 604800,
|
||||
minimum: 86400,
|
||||
},
|
||||
};
|
||||
response.answers.push(soaAnswer as plugins.dnsPacket.Answer);
|
||||
}
|
||||
}
|
||||
|
||||
return response;
|
||||
}
|
||||
|
||||
private isDnssecRequested(request: dnsPacket.Packet): boolean {
|
||||
if (!request.additionals) return false;
|
||||
for (const additional of request.additionals) {
|
||||
if (additional.type === 'OPT' && typeof additional.flags === 'number') {
|
||||
// The DO bit is the 15th bit (0x8000)
|
||||
if (additional.flags & 0x8000) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
private generateRRSIG(
|
||||
type: string,
|
||||
rrset: DnsAnswer[],
|
||||
name: string
|
||||
): DnsAnswer {
|
||||
// Prepare RRSIG data
|
||||
const algorithm = this.dnsSec.getAlgorithmNumber();
|
||||
const keyTag = this.keyTag;
|
||||
const signerName = this.options.dnssecZone.endsWith('.') ? this.options.dnssecZone : `${this.options.dnssecZone}.`;
|
||||
const inception = Math.floor(Date.now() / 1000) - 3600; // 1 hour ago
|
||||
const expiration = inception + 86400; // Valid for 1 day
|
||||
const ttl = rrset[0].ttl || 300;
|
||||
|
||||
// Serialize the RRset in canonical form
|
||||
const rrsetBuffer = this.serializeRRset(rrset);
|
||||
|
||||
// Sign the RRset
|
||||
const signature = this.dnsSec.signData(rrsetBuffer);
|
||||
|
||||
// Construct the RRSIG record
|
||||
const rrsig: DnsAnswer = {
|
||||
name,
|
||||
type: 'RRSIG',
|
||||
class: 'IN',
|
||||
ttl,
|
||||
data: {
|
||||
typeCovered: type, // Changed to type string
|
||||
algorithm,
|
||||
labels: name.split('.').length - 1,
|
||||
originalTTL: ttl,
|
||||
expiration,
|
||||
inception,
|
||||
keyTag,
|
||||
signerName,
|
||||
signature: signature,
|
||||
},
|
||||
};
|
||||
|
||||
return rrsig;
|
||||
}
|
||||
|
||||
private serializeRRset(rrset: DnsAnswer[]): Buffer {
|
||||
// Implement canonical DNS RRset serialization as per RFC 4034 Section 6
|
||||
const buffers: Buffer[] = [];
|
||||
for (const rr of rrset) {
|
||||
if (rr.type === 'OPT') {
|
||||
continue; // Skip OPT records
|
||||
}
|
||||
|
||||
const name = rr.name.endsWith('.') ? rr.name : rr.name + '.';
|
||||
const nameBuffer = this.nameToBuffer(name.toLowerCase());
|
||||
|
||||
const typeValue = this.qtypeToNumber(rr.type);
|
||||
const typeBuffer = Buffer.alloc(2);
|
||||
typeBuffer.writeUInt16BE(typeValue, 0);
|
||||
|
||||
const classValue = this.classToNumber(rr.class);
|
||||
const classBuffer = Buffer.alloc(2);
|
||||
classBuffer.writeUInt16BE(classValue, 0);
|
||||
|
||||
const ttlValue = rr.ttl || 300;
|
||||
const ttlBuffer = Buffer.alloc(4);
|
||||
ttlBuffer.writeUInt32BE(ttlValue, 0);
|
||||
|
||||
// Serialize the data based on the record type
|
||||
const dataBuffer = this.serializeRData(rr.type, rr.data);
|
||||
|
||||
const rdLengthBuffer = Buffer.alloc(2);
|
||||
rdLengthBuffer.writeUInt16BE(dataBuffer.length, 0);
|
||||
|
||||
buffers.push(Buffer.concat([nameBuffer, typeBuffer, classBuffer, ttlBuffer, rdLengthBuffer, dataBuffer]));
|
||||
}
|
||||
return Buffer.concat(buffers);
|
||||
}
|
||||
|
||||
private serializeRData(type: string, data: any): Buffer {
|
||||
// Implement serialization for each record type you support
|
||||
switch (type) {
|
||||
case 'A':
|
||||
return Buffer.from(data.split('.').map((octet: string) => parseInt(octet, 10)));
|
||||
case 'AAAA':
|
||||
// Handle IPv6 addresses
|
||||
return Buffer.from(data.split(':').flatMap((segment: string) => {
|
||||
const num = parseInt(segment, 16);
|
||||
return [num >> 8, num & 0xff];
|
||||
}));
|
||||
case 'TXT':
|
||||
// Handle TXT records for ACME challenges
|
||||
if (Array.isArray(data)) {
|
||||
// Combine all strings and encode as lengths and values
|
||||
const buffers = data.map(str => {
|
||||
const strBuf = Buffer.from(str);
|
||||
const lenBuf = Buffer.alloc(1);
|
||||
lenBuf.writeUInt8(strBuf.length, 0);
|
||||
return Buffer.concat([lenBuf, strBuf]);
|
||||
});
|
||||
return Buffer.concat(buffers);
|
||||
}
|
||||
return Buffer.alloc(0);
|
||||
case 'DNSKEY':
|
||||
const dnskeyData: DNSKEYData = data;
|
||||
return Buffer.concat([
|
||||
Buffer.from([dnskeyData.flags >> 8, dnskeyData.flags & 0xff]),
|
||||
Buffer.from([3]), // Protocol field, always 3
|
||||
Buffer.from([dnskeyData.algorithm]),
|
||||
dnskeyData.key,
|
||||
]);
|
||||
case 'SOA':
|
||||
// Implement SOA record serialization if needed
|
||||
// For now, return an empty buffer or handle as needed
|
||||
return Buffer.alloc(0);
|
||||
// Add cases for other record types as needed
|
||||
default:
|
||||
throw new Error(`Serialization for record type ${type} is not implemented.`);
|
||||
}
|
||||
}
|
||||
|
||||
private parseDNSKEYRecord(dnskeyRecord: string): DNSKEYData {
|
||||
// Parse the DNSKEY record string into dns-packet format
|
||||
const parts = dnskeyRecord.trim().split(/\s+/);
|
||||
const flags = parseInt(parts[3], 10);
|
||||
const algorithm = parseInt(parts[5], 10);
|
||||
const publicKeyBase64 = parts.slice(6).join('');
|
||||
const key = Buffer.from(publicKeyBase64, 'base64');
|
||||
|
||||
return {
|
||||
flags,
|
||||
algorithm,
|
||||
key,
|
||||
};
|
||||
}
|
||||
|
||||
private computeKeyTag(dnskeyRecord: DNSKEYData): number {
|
||||
// Compute key tag as per RFC 4034 Appendix B
|
||||
const flags = dnskeyRecord.flags;
|
||||
const algorithm = dnskeyRecord.algorithm;
|
||||
const key = dnskeyRecord.key;
|
||||
|
||||
const dnskeyRdata = Buffer.concat([
|
||||
Buffer.from([flags >> 8, flags & 0xff]),
|
||||
Buffer.from([3]), // Protocol field, always 3
|
||||
Buffer.from([algorithm]),
|
||||
key,
|
||||
]);
|
||||
|
||||
let acc = 0;
|
||||
for (let i = 0; i < dnskeyRdata.length; i++) {
|
||||
acc += (i & 1) ? dnskeyRdata[i] : dnskeyRdata[i] << 8;
|
||||
}
|
||||
acc += (acc >> 16) & 0xffff;
|
||||
return acc & 0xffff;
|
||||
}
|
||||
|
||||
private handleHttpsRequest(req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse): void {
|
||||
if (req.method === 'POST' && req.url === '/dns-query') {
|
||||
let body: Buffer[] = [];
|
||||
|
||||
req.on('data', chunk => {
|
||||
req.on('data', (chunk) => {
|
||||
body.push(chunk);
|
||||
}).on('end', () => {
|
||||
const msg = Buffer.concat(body);
|
||||
const request = plugins.dnsPacket.decode(msg);
|
||||
const request = dnsPacket.decode(msg);
|
||||
const response = this.processDnsRequest(request);
|
||||
const responseData = plugins.dnsPacket.encode(response);
|
||||
const responseData = dnsPacket.encode(response);
|
||||
res.writeHead(200, { 'Content-Type': 'application/dns-message' });
|
||||
res.end(responseData);
|
||||
});
|
||||
@ -95,9 +693,9 @@ export class DnsServer {
|
||||
|
||||
this.udpServer = plugins.dgram.createSocket('udp4');
|
||||
this.udpServer.on('message', (msg, rinfo) => {
|
||||
const request = plugins.dnsPacket.decode(msg);
|
||||
const request = dnsPacket.decode(msg);
|
||||
const response = this.processDnsRequest(request);
|
||||
const responseData = plugins.dnsPacket.encode(response);
|
||||
const responseData = dnsPacket.encode(response);
|
||||
this.udpServer.send(responseData, rinfo.port, rinfo.address);
|
||||
});
|
||||
|
||||
@ -108,6 +706,7 @@ export class DnsServer {
|
||||
|
||||
const udpListeningDeferred = plugins.smartpromise.defer<void>();
|
||||
const httpsListeningDeferred = plugins.smartpromise.defer<void>();
|
||||
|
||||
try {
|
||||
this.udpServer.bind(this.options.udpPort, '0.0.0.0', () => {
|
||||
console.log(`UDP DNS server running on port ${this.options.udpPort}`);
|
||||
@ -128,20 +727,78 @@ export class DnsServer {
|
||||
public async stop(): Promise<void> {
|
||||
const doneUdp = plugins.smartpromise.defer<void>();
|
||||
const doneHttps = plugins.smartpromise.defer<void>();
|
||||
|
||||
if (this.udpServer) {
|
||||
this.udpServer.close(() => {
|
||||
console.log('UDP DNS server stopped');
|
||||
if (this.udpServer) {
|
||||
this.udpServer.unref();
|
||||
this.udpServer = null;
|
||||
}
|
||||
doneUdp.resolve();
|
||||
});
|
||||
} else {
|
||||
doneUdp.resolve();
|
||||
}
|
||||
|
||||
if (this.httpsServer) {
|
||||
this.httpsServer.close(() => {
|
||||
console.log('HTTPS DNS server stopped');
|
||||
if (this.httpsServer) {
|
||||
this.httpsServer.unref();
|
||||
this.httpsServer = null;
|
||||
}
|
||||
doneHttps.resolve();
|
||||
});
|
||||
} else {
|
||||
doneHttps.resolve();
|
||||
}
|
||||
|
||||
await Promise.all([doneUdp.promise, doneHttps.promise]);
|
||||
}
|
||||
|
||||
// Helper methods
|
||||
|
||||
private qtypeToNumber(type: string): number {
|
||||
const QTYPE_NUMBERS: { [key: string]: number } = {
|
||||
'A': 1,
|
||||
'NS': 2,
|
||||
'CNAME': 5,
|
||||
'SOA': 6,
|
||||
'PTR': 12,
|
||||
'MX': 15,
|
||||
'TXT': 16,
|
||||
'AAAA': 28,
|
||||
'SRV': 33,
|
||||
'DNSKEY': 48,
|
||||
'RRSIG': 46,
|
||||
// Add more as needed
|
||||
};
|
||||
return QTYPE_NUMBERS[type.toUpperCase()] || 0;
|
||||
}
|
||||
|
||||
private classToNumber(cls: string | number): number {
|
||||
const CLASS_NUMBERS: { [key: string]: number } = {
|
||||
'IN': 1,
|
||||
'CH': 3,
|
||||
'HS': 4,
|
||||
// Add more as needed
|
||||
};
|
||||
if (typeof cls === 'number') {
|
||||
return cls;
|
||||
}
|
||||
return CLASS_NUMBERS[cls.toUpperCase()] || 1;
|
||||
}
|
||||
|
||||
private nameToBuffer(name: string): Buffer {
|
||||
const labels = name.split('.');
|
||||
const buffers = labels.map(label => {
|
||||
const len = Buffer.byteLength(label, 'utf8');
|
||||
const buf = Buffer.alloc(1 + len);
|
||||
buf.writeUInt8(len, 0);
|
||||
buf.write(label, 1);
|
||||
return buf;
|
||||
});
|
||||
return Buffer.concat([...buffers, Buffer.from([0])]); // Add root label
|
||||
}
|
||||
}
|
@ -1,9 +1,10 @@
|
||||
// node native
|
||||
import crypto from 'crypto';
|
||||
import dgram from 'dgram';
|
||||
import fs from 'fs';
|
||||
import http from 'http';
|
||||
import https from 'https';
|
||||
import dgram from 'dgram';
|
||||
import * as path from 'path';
|
||||
|
||||
export {
|
||||
crypto,
|
||||
@ -11,6 +12,7 @@ export {
|
||||
http,
|
||||
https,
|
||||
dgram,
|
||||
path,
|
||||
}
|
||||
|
||||
// @push.rocks scope
|
||||
@ -21,7 +23,7 @@ export {
|
||||
}
|
||||
|
||||
// third party
|
||||
import * as elliptic from 'elliptic';
|
||||
import elliptic from 'elliptic';
|
||||
import * as dnsPacket from 'dns-packet';
|
||||
import * as minimatch from 'minimatch';
|
||||
|
||||
|
3
ts_server/tspublish.json
Normal file
3
ts_server/tspublish.json
Normal file
@ -0,0 +1,3 @@
|
||||
{
|
||||
"order": 1
|
||||
}
|
Reference in New Issue
Block a user