happyDomain/services/dkim.go
Pierre-Olivier Mercier e571a629b7
All checks were successful
continuous-integration/drone/push Build is passing
services: move service registry to internal/service package
Analogous to internal/provider, extract the service registry (Svc,
RegisterService, FindService, ListServices, OrderedServices, FindSubService,
RegisterSubServices) and the zone analyzer (ServiceAnalyzer, Analyzer,
AnalyzeZone) from services/ into a new internal/service package.
2026-03-24 14:59:24 +07:00

259 lines
6.8 KiB
Go

// This file is part of the happyDomain (R) project.
// Copyright (c) 2020-2024 happyDomain
// Authors: Pierre-Olivier Mercier, et al.
//
// This program is offered under a commercial and under the AGPL license.
// For commercial licensing, contact us at <contact@happydomain.org>.
//
// For AGPL licensing:
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <https://www.gnu.org/licenses/>.
package svcs
import (
"encoding/base64"
"fmt"
"strconv"
"strings"
"github.com/miekg/dns"
"git.happydns.org/happyDomain/internal/helpers"
svc "git.happydns.org/happyDomain/internal/service"
"git.happydns.org/happyDomain/model"
)
type DKIM struct {
Version uint `json:"version" happydomain:"label=Version,placeholder=1,required,description=The version of DKIM to use.,default=1,hidden"`
AcceptableHash []string `json:"h" happydomain:"label=Hash Algorithms,choices=*;sha1;sha256"`
KeyType string `json:"k" happydomain:"label=Key Type,choices=rsa"`
Notes string `json:"n" happydomain:"label=Notes,description=Notes intended for a foreign postmaster"`
PublicKey []byte `json:"p" happydomain:"label=Public Key,placeholder=a0b1c2d3e4f5==,required"`
ServiceType []string `json:"s" happydomain:"label=Service Types,choices=*;email"`
Flags []string `json:"t" happydomain:"label=Flags,choices=y;s"`
}
func (t *DKIM) Analyze(txt string) error {
fields := analyseFields(txt)
if v, ok := fields["v"]; ok {
if !strings.HasPrefix(v, "DKIM") {
return fmt.Errorf("not a valid DKIM record: should begin with v=DKIMv1, seen v=%q", v)
}
version, err := strconv.ParseUint(v[4:], 10, 32)
if err != nil {
return fmt.Errorf("not a valid DKIM record: bad version number: %w", err)
}
t.Version = uint(version)
} else {
return fmt.Errorf("not a valid DKIM record: version not found")
}
if h, ok := fields["h"]; ok {
t.AcceptableHash = strings.Split(h, ":")
} else {
t.AcceptableHash = []string{"*"}
}
if k, ok := fields["k"]; ok {
t.KeyType = k
}
if n, ok := fields["n"]; ok {
t.Notes = n
}
if p, ok := fields["p"]; ok {
var err error
t.PublicKey, err = base64.StdEncoding.DecodeString(p)
if err != nil {
return fmt.Errorf("not a valid DKIM record: public key is not base64 valid: %w", err)
}
}
if s, ok := fields["s"]; ok {
t.ServiceType = strings.Split(s, ":")
} else {
t.ServiceType = []string{"*"}
}
if f, ok := fields["t"]; ok {
t.Flags = strings.Split(f, ":")
}
return nil
}
func (t *DKIM) String() string {
fields := []string{
fmt.Sprintf("v=DKIM%d", t.Version),
}
if len(t.AcceptableHash) > 1 || (len(t.AcceptableHash) > 0 && t.AcceptableHash[0] != "*") {
fields = append(fields, fmt.Sprintf("h=%s", strings.Join(t.AcceptableHash, ":")))
}
if t.KeyType != "" {
fields = append(fields, fmt.Sprintf("k=%s", t.KeyType))
}
if t.Notes != "" {
fields = append(fields, fmt.Sprintf("n=%s", t.Notes))
}
if len(t.PublicKey) > 0 {
fields = append(fields, fmt.Sprintf("p=%s", base64.StdEncoding.EncodeToString(t.PublicKey)))
}
if len(t.ServiceType) > 1 || (len(t.ServiceType) > 0 && t.ServiceType[0] != "*") {
fields = append(fields, fmt.Sprintf("s=%s", strings.Join(t.ServiceType, ":")))
}
if len(t.Flags) > 0 {
fields = append(fields, fmt.Sprintf("t=%s", strings.Join(t.Flags, ":")))
}
return strings.Join(fields, ";")
}
type DKIMRecord struct {
Record *happydns.TXT `json:"txt"`
}
func (s *DKIMRecord) Analyze() (*DKIM, error) {
dkim := &DKIM{}
err := dkim.Analyze(s.Record.Txt)
if err != nil {
return nil, err
}
return dkim, nil
}
func (s *DKIMRecord) GetNbResources() int {
return 1
}
func (s *DKIMRecord) GenComment() string {
return strings.SplitN(s.Record.Header().Name, ".", 2)[0]
}
func (s *DKIMRecord) GetRecords(domain string, ttl uint32, origin string) ([]happydns.Record, error) {
return []happydns.Record{s.Record}, nil
}
type DKIMRedirection struct {
Record *dns.CNAME `json:"cname"`
}
func (s *DKIMRedirection) GetNbResources() int {
return 1
}
func (s *DKIMRedirection) GenComment() string {
return strings.SplitN(s.Record.Header().Name, ".", 2)[0]
}
func (s *DKIMRedirection) GetRecords(domain string, ttl uint32, origin string) ([]happydns.Record, error) {
cname := *s.Record
cname.Target = helpers.DomainFQDN(cname.Target, origin)
return []happydns.Record{&cname}, nil
}
func dkim_analyze(a *svc.Analyzer) (err error) {
for _, record := range a.SearchRR(svc.AnalyzerRecordFilter{Type: dns.TypeTXT}) {
dkidx := strings.Index(record.Header().Name, "._domainkey.")
if dkidx <= 0 {
continue
}
domain := record.Header().Name[dkidx+12:]
service := &DKIMRecord{
Record: helpers.RRRelativeSubdomain(record, a.GetOrigin(), domain).(*happydns.TXT),
}
_, err = service.Analyze()
if err != nil {
return
}
err = a.UseRR(record, domain, service)
if err != nil {
return
}
}
return
}
func dkimcname_analyze(a *svc.Analyzer) (err error) {
for _, record := range a.SearchRR(svc.AnalyzerRecordFilter{Type: dns.TypeCNAME}) {
dkidx := strings.Index(record.Header().Name, "._domainkey.")
if dkidx <= 0 {
continue
}
if cname, ok := record.(*dns.CNAME); ok {
domain := record.Header().Name[dkidx+12:]
err = a.UseRR(record, domain, &DKIMRedirection{
Record: helpers.RRRelativeSubdomain(cname, a.GetOrigin(), domain).(*dns.CNAME),
})
if err != nil {
return
}
}
}
return
}
func init() {
svc.RegisterService(
func() happydns.ServiceBody {
return &DKIMRecord{}
},
dkim_analyze,
happydns.ServiceInfos{
Name: "DKIM",
Description: "DomainKeys Identified Mail, authenticate outgoing emails.",
Categories: []string{
"email",
},
RecordTypes: []uint16{
dns.TypeTXT,
},
Restrictions: happydns.ServiceRestrictions{
NearAlone: true,
NeedTypes: []uint16{
dns.TypeTXT,
},
},
},
1,
)
svc.RegisterService(
func() happydns.ServiceBody {
return &DKIMRedirection{}
},
dkimcname_analyze,
happydns.ServiceInfos{
Name: "DKIM external",
Description: "DKIM record redirected to another resource.",
Categories: []string{
"email",
},
RecordTypes: []uint16{
dns.TypeCNAME,
},
Restrictions: happydns.ServiceRestrictions{
NearAlone: true,
NeedTypes: []uint16{
dns.TypeCNAME,
},
},
},
1,
)
}