mirror of
https://github.com/freedombox/FreedomBox.git
synced 2026-01-21 07:55:00 +00:00
This includes list of packages for which conffile prompts will be shown. For each package current version of the package, new version of the package and list of configuration files that were modified. Signed-off-by: Sunil Mohan Adapa <sunil@medhas.org> Reviewed-by: James Valleroy <jvalleroy@mailbox.org>
196 lines
5.5 KiB
Python
196 lines
5.5 KiB
Python
#
|
|
# This file is part of FreedomBox.
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Affero General Public License as
|
|
# published by the Free Software Foundation, either version 3 of the
|
|
# License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Affero General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU Affero General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
#
|
|
"""
|
|
FreedomBox app to configure BIND server.
|
|
"""
|
|
|
|
import re
|
|
|
|
from django.utils.translation import ugettext_lazy as _
|
|
|
|
from plinth import actions
|
|
from plinth import action_utils
|
|
from plinth import cfg
|
|
from plinth import service as service_module
|
|
from plinth.menu import main_menu
|
|
from plinth.utils import format_lazy
|
|
|
|
from .manifest import backup
|
|
|
|
version = 1
|
|
|
|
name = _('BIND')
|
|
|
|
short_description = _('Domain Name Server')
|
|
|
|
service = None
|
|
|
|
managed_services = ['bind9']
|
|
|
|
managed_packages = ['bind9']
|
|
|
|
description = [
|
|
_('BIND enables you to publish your Domain Name System (DNS) information '
|
|
'on the Internet, and to resolve DNS queries for your user devices on '
|
|
'your network.'),
|
|
format_lazy(
|
|
_('Currently, on {box_name}, BIND is only used to resolve DNS queries '
|
|
'for other machines on local network. It is also incompatible with '
|
|
'sharing Internet connection from {box_name}.'),
|
|
box_name=_(cfg.box_name)),
|
|
]
|
|
|
|
CONFIG_FILE = '/etc/bind/named.conf.options'
|
|
|
|
DEFAULT_CONFIG = '''
|
|
acl goodclients {
|
|
localnets;
|
|
};
|
|
options {
|
|
directory "/var/cache/bind";
|
|
|
|
recursion yes;
|
|
allow-query { goodclients; };
|
|
|
|
forwarders {
|
|
|
|
};
|
|
forward first;
|
|
|
|
dnssec-enable yes;
|
|
dnssec-validation auto;
|
|
|
|
auth-nxdomain no; # conform to RFC1035
|
|
listen-on-v6 { any; };
|
|
};
|
|
'''
|
|
|
|
|
|
def init():
|
|
"""Intialize the BIND module."""
|
|
menu = main_menu.get('system')
|
|
menu.add_urlname(name, 'fa-globe-w', 'bind:index', short_description)
|
|
|
|
global service
|
|
setup_helper = globals()['setup_helper']
|
|
if setup_helper.get_state() != 'needs-setup':
|
|
service = service_module.Service(managed_services[0], name,
|
|
ports=['dns'], is_external=False)
|
|
|
|
|
|
def setup(helper, old_version=None):
|
|
"""Install and configure the module."""
|
|
helper.install(managed_packages)
|
|
global service
|
|
if service is None:
|
|
service = service_module.Service(managed_services[0], name,
|
|
ports=['dns'], is_external=True,
|
|
enable=enable, disable=disable)
|
|
helper.call('post', service.notify_enabled, None, True)
|
|
helper.call('post', actions.superuser_run, 'bind', ['setup'])
|
|
|
|
|
|
def force_upgrade(helper, _packages):
|
|
"""Force upgrade the managed packages to resolve conffile prompt."""
|
|
helper.install(managed_packages, force_configuration='old')
|
|
|
|
|
|
def enable():
|
|
"""Enable the module."""
|
|
actions.superuser_run('service', ['enable', managed_services[0]])
|
|
|
|
|
|
def disable():
|
|
"""Disable the module."""
|
|
actions.superuser_run('service', ['disable', managed_services[0]])
|
|
|
|
|
|
def diagnose():
|
|
"""Run diagnostics and return the results."""
|
|
results = []
|
|
|
|
results.append(action_utils.diagnose_port_listening(53, 'tcp6'))
|
|
results.append(action_utils.diagnose_port_listening(53, 'udp6'))
|
|
results.append(action_utils.diagnose_port_listening(53, 'tcp4'))
|
|
results.append(action_utils.diagnose_port_listening(53, 'udp4'))
|
|
|
|
return results
|
|
|
|
|
|
def get_config():
|
|
"""Get current configuration"""
|
|
data = [line.strip() for line in open(CONFIG_FILE, 'r')]
|
|
|
|
forwarders = ''
|
|
dnssec_enabled = False
|
|
flag = False
|
|
for line in data:
|
|
if re.match(r'^\s*forwarders\s+{', line):
|
|
flag = True
|
|
elif re.match(r'^\s*dnssec-enable\s+yes;', line):
|
|
dnssec_enabled = True
|
|
elif flag and '//' not in line:
|
|
forwarders = re.sub('[;]', '', line)
|
|
flag = False
|
|
|
|
conf = {
|
|
'forwarders': forwarders,
|
|
'enable_dnssec': dnssec_enabled,
|
|
}
|
|
return conf
|
|
|
|
|
|
def set_forwarders(forwarders):
|
|
"""Set DNS forwarders."""
|
|
flag = 0
|
|
data = [line.strip() for line in open(CONFIG_FILE, 'r')]
|
|
conf_file = open(CONFIG_FILE, 'w')
|
|
for line in data:
|
|
if re.match(r'^\s*forwarders\s+{', line):
|
|
conf_file.write(line + '\n')
|
|
for dns in forwarders.split():
|
|
conf_file.write(dns + '; ')
|
|
conf_file.write('\n')
|
|
flag = 1
|
|
elif '};' in line and flag == 1:
|
|
conf_file.write(line + '\n')
|
|
flag = 0
|
|
elif flag == 0:
|
|
conf_file.write(line + '\n')
|
|
conf_file.close()
|
|
|
|
|
|
def set_dnssec(choice):
|
|
"""Enable or disable DNSSEC."""
|
|
data = [line.strip() for line in open(CONFIG_FILE, 'r')]
|
|
|
|
if choice == 'enable':
|
|
conf_file = open(CONFIG_FILE, 'w')
|
|
for line in data:
|
|
if re.match(r'//\s*dnssec-enable\s+yes;', line):
|
|
line = line.lstrip('/')
|
|
conf_file.write(line + '\n')
|
|
conf_file.close()
|
|
|
|
if choice == 'disable':
|
|
conf_file = open(CONFIG_FILE, 'w')
|
|
for line in data:
|
|
if re.match(r'^\s*dnssec-enable\s+yes;', line):
|
|
line = '//' + line
|
|
conf_file.write(line + '\n')
|
|
conf_file.close()
|