Merge pull request 'dns: refs #8552 - Main approche - before final named.conf' (!79) from 8552_DNS_server into main

Reviewed-on: #79
Reviewed-by: Juan Ferrer <juan@verdnatura.es>
This commit is contained in:
Xavi Lleó 2025-03-27 09:50:51 +00:00
commit 45bf706f93
20 changed files with 374 additions and 0 deletions

6
playbooks/ns.yml Normal file
View File

@ -0,0 +1,6 @@
- name: Configure bind9 name server
hosts: all
tasks:
- name: Configure services to install in the server
import_role:
name: ns

View File

@ -0,0 +1,29 @@
bind_packages:
- bind9
- bind9-dnsutils
- bind9-host
- bind9-libs
- bind9-utils
- dnsutils
- python3-pycurl
bind_config_templates:
- { src: 'named.conf.j2', dest: '/etc/bind/named.conf', mode: 'u=rw,g=r,o=r' }
- { src: 'named.conf.master.j2', dest: '/etc/bind/named.conf.master', mode: 'u=rw,g=r,o=r' }
- { src: 'named.conf.local.j2', dest: '/etc/bind/named.conf.local', mode: 'u=rw,g=r,o=r' }
- { src: 'named.conf.slave.j2', dest: '/etc/bind/named.conf.slave', mode: 'u=rw,g=r,o=r' }
- { src: 'certbot.key', dest: '/etc/bind/keys/certbot.key', mode: 'u=rw,g=r,o=' }
- { src: 'lan.key', dest: '/etc/bind/keys/lan.key', mode: 'u=rw,g=r,o=' }
- { src: 'wan.key', dest: '/etc/bind/keys/wan.key', mode: 'u=rw,g=r,o=' }
- { src: 'rndc.key', dest: '/etc/bind/rndc.key', mode: 'u=rw,g=r,o=' }
- { src: 'dhcp.key', dest: '/etc/bind/keys/dhcp.key', mode: 'u=rw,g=r,o=' }
- { src: 'isp1.ns', dest: '/root/scripts/switch-isp', mode: 'u=rw,g=rw,o=r' }
- { src: 'isp2.ns', dest: '/root/scripts/switch-isp', mode: 'u=rw,g=rw,o=r' }
directory:
- { path: '/root/scripts', owner: 'root', group: 'root', mode: 'u=rwx,g=rx,o=rx' }
- { path: '/etc/bind/keys', owner: 'root', group: 'bind', mode: 'u=rwx,g=rxs,o=rx' }
- { path: '/root/scripts/switch-isp', owner: 'root', group: 'bind', mode: 'u=rwx,g=rxs,o=rx' }
required_files:
- { src: 'delete.ns', dest: '/root/scripts/switch-isp', owner: 'root', group: 'bind', mode: 'u=rw,g=rw,o=r' }
- { src: 'switch-isp.sh', dest: '/root/scripts', owner: 'root', group: 'root', mode: 'u=rwx,g=rx,o=rx' }
- { src: 'sync-conf', dest: '/root/scripts', owner: 'root', group: 'root', mode: 'u=rwx,g=rx,o=rx' }
- { src: 'gen-key.sh', dest: '/root/scripts', owner: 'root', group: 'bind', mode: 'u=rwx,g=rx,o=rx' }

14
roles/ns/files/delete.ns Normal file
View File

@ -0,0 +1,14 @@
update delete verdnatura.es A
update delete kube-proxy.verdnatura.es A
update delete smtp.verdnatura.es A
update delete imap.verdnatura.es A
update delete autodiscover.verdnatura.es A
update delete time1.verdnatura.es A
update delete time2.verdnatura.es A
update delete dc-ip01.verdnatura.es A
update delete dc-ip02.verdnatura.es A
update delete dc-ip03.verdnatura.es A
update delete dc-ip04.verdnatura.es A
update delete mailgw1.verdnatura.es A
update delete mailgw2.verdnatura.es A
send

10
roles/ns/files/gen-key.sh Normal file
View File

@ -0,0 +1,10 @@
#!/bin/bash
KEYNAME=$1
if [ -z "$KEYNAME" ]; then
echo "Usage: $0 <key_name>"
exit 1
fi
tsig-keygen -a hmac-sha512 "$KEYNAME"

View File

@ -0,0 +1,23 @@
#!/bin/bash
ISP=$1
if [ -z "$ISP" ]; then
echo "Usage: $0 <isp_name>"
exit 1
fi
KEY_FILE="/etc/bind/keys/wan.key"
NS_DIR="/root/scripts/switch-isp"
ISP_FILE="$NS_DIR/$ISP.ns"
if [ ! -f "$ISP_FILE" ]; then
echo "ISP file for nsupdate not found: $ISP_FILE"
exit 2
fi
echo "Deleting ISP dependent DNS records."
nsupdate -k "$KEY_FILE" "$NS_DIR/delete.ns"
echo "Registering $ISP DNS records."
nsupdate -k "$KEY_FILE" "$ISP_FILE"

27
roles/ns/files/sync-conf Normal file
View File

@ -0,0 +1,27 @@
#!/bin/bash
if [ "$(hostname)" = "ns1" ]; then
partner=root@ns2.servers.dc.verdnatura.es
else
partner=root@ns1.servers.dc.verdnatura.es
fi
confDir=/etc/bind
echo "Restarting service."
service bind9 restart
if [ $? -eq "0" ]; then
echo "Synchronizing partner configuration."
scp "$confDir/named.conf.local" $partner:$confDir
scp "$confDir/named.conf.master" $partner:$confDir
scp "$confDir/named.conf.slave" $partner:$confDir
ssh "$partner" rm -rf "$confDir/keys"
ssh "$partner" mkdir "$confDir/keys"
scp -r "$confDir/keys/"* $partner:"$confDir/keys"
echo "Restarting partner service."
ssh $partner service bind9 restart
fi

View File

@ -0,0 +1,4 @@
- name: restart-dns
systemd:
name: bind9
state: restarted

2
roles/ns/tasks/main.yml Normal file
View File

@ -0,0 +1,2 @@
- import_tasks: ns.yml
tags: ns

34
roles/ns/tasks/ns.yml Normal file
View File

@ -0,0 +1,34 @@
- name: Update apt cache
apt:
update_cache: yes
- name: Install bind package requirements
apt:
name: "{{ bind_packages }}"
state: present
install_recommends: no
- name: Create directory
file:
path: "{{ item.path }}"
state: directory
owner: "{{ item.group }}"
group: "{{ item.group }}"
mode: "{{ item.mode }}"
loop: "{{ directory }}"
- name: Copy required files and scripts
copy:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
owner: "{{ item.group }}"
group: "{{ item.group }}"
mode: "{{ item.mode }}"
loop: "{{ required_files }}"
- name: Deploy BIND config templates
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
owner: root
group: bind
mode: "{{ item.mode }}"
loop: "{{ bind_config_templates }}"
notify: restart-dns

View File

@ -0,0 +1,4 @@
key "certbot" {
algorithm hmac-sha512;
secret "{{ lookup(passbolt, 'certbot', folder_parent_id=passbolt_folder).password }}";
};

View File

@ -0,0 +1,4 @@
key "dhcp" {
algorithm hmac-sha512;
secret "{{ lookup(passbolt, 'dhcpkey', folder_parent_id=passbolt_folder).password }}";
};

View File

@ -0,0 +1,4 @@
{% for record in dns_records_main %}
update add {{ record.name.ljust(30) }} {{ record.ttl }} A {{ record.ip }}
{% endfor %}
send

View File

@ -0,0 +1,4 @@
{% for record in dns_records_secondary %}
update add {{ record.name.ljust(30) }} {{ record.ttl }} A {{ record.ip }}
{% endfor %}
send

View File

@ -0,0 +1,4 @@
key "lan" {
algorithm hmac-sha512;
secret "{{ lookup(passbolt, 'lankey', folder_parent_id=passbolt_folder).password }}";
};

View File

@ -0,0 +1,16 @@
// This is the primary configuration file for the BIND DNS server named.
//
// Please read /usr/share/doc/bind9/README.Debian.gz for information on the
// structure of BIND configuration files in Debian, *BEFORE* you customize
// this configuration file.
//
// If you are just adding zones, please do that in /etc/bind/named.conf.local
#include "/etc/bind/named.conf.options";
include "/etc/bind/named.conf.local";
{% if bind_is_master %}
include "/etc/bind/named.conf.master";
{% else %}
include "/etc/bind/named.conf.slave";
{% endif %}
#include "/etc/bind/named.conf.default-zones";

View File

@ -0,0 +1,30 @@
include "/etc/bind/rndc.key";
include "/etc/bind/keys/wan.key";
include "/etc/bind/keys/lan.key";
include "/etc/bind/keys/certbot.key";
include "/etc/bind/keys/dhcp.key";
server fe80::/16 { bogus yes; };
acl lan {
10.0.0.0/8;
172.16.0.0/12;
192.168.0.0/16;
};
acl rfc5735 {
0.0.0.0/8;
169.254.0.0/16;
192.0.0.0/24;
192.0.2.0/24;
192.88.99.0/24;
198.18.0.0/15;
198.51.100.0/24;
203.0.113.0/24;
224.0.0.0/4;
240.0.0.0/4;
};
controls {
inet * allow { localhost; lan; } keys { "rndc-key"; };
};

View File

@ -0,0 +1,78 @@
options {
directory "/var/cache/bind";
max-cache-size 500m;
auth-nxdomain no;
listen-on-v6 { none; };
version "DNS";
allow-update { none; };
blackhole { rfc5735; };
allow-transfer {
{% for ip in bind_allow_transfer %}
{{ ip }};
{% endfor %}
};
};
view "lan" {
match-clients {
{% for item in key_match_clients_lan_master if item.startswith("!key") %}
{{ item }};
{% endfor %}
{% for item in acl_match_clients %}
{{ item }};
{% endfor %}
{% for item in key_match_clients_lan_master if not item.startswith("!key") %}
{{ item }};
{% endfor %}
};
recursion yes;
allow-recursion { any; };
empty-zones-enable yes;
notify yes;
include "/etc/bind/named.conf.default-zones";
{% for zone in bind_zones.lan %}
zone "{{ zone.name }}" {
type master;
forwarders {};
allow-update { key {{ zone.key }}; };
file "{{ zone.file }}";
};
{% endfor %}
};
view "wan" {
match-clients { any; };
recursion no;
allow-query-cache { none; };
empty-zones-enable no;
notify explicit;
also-notify {
{% for entry in bind_also_notify %}
{{ entry.ip }} key {{ entry.key }};
{% endfor %}
};
{% for zone in bind_zones.wan %}
{% if zone.in_view is defined %}
{% for z in zone.in_view %}
zone "{{ z }}" {
in-view "lan";
};
{% endfor %}
{% else %}
zone "{{ zone.name }}" {
type master;
forwarders {};
allow-update { key {{ zone.key }}; };
file "{{ zone.file }}";
};
{% endif %}
{% endfor %}
};

View File

@ -0,0 +1,73 @@
options {
directory "/var/cache/bind";
max-cache-size 500m;
auth-nxdomain no;
listen-on-v6 { none; };
version "DNS";
allow-update { none; };
blackhole { rfc5735; };
notify no;
allow-transfer { none; };
masterfile-format text;
};
masters master-ips {
{% for ip in bind_slave_masters %}
{{ ip }};
{% endfor %}
};
view "lan" {
match-clients {
{% for item in key_match_clients_lan_master if item.startswith("!key") %}
{{ item }};
{% endfor %}
{% for item in acl_match_clients %}
{{ item }};
{% endfor %}
{% for item in key_match_clients_lan_slave if not item.startswith("!key") %}
{{ item }};
{% endfor %}
};
recursion yes;
allow-recursion { any; };
empty-zones-enable yes;
include "/etc/bind/named.conf.default-zones";
{% for zone in bind_zones.lan %}
zone "{{ zone.name }}" {
type slave;
masters { master-ips; };
forwarders {};
file "{{ zone.file }}";
};
{% endfor %}
};
view "wan" {
match-clients { any; };
recursion no;
allow-query-cache { none; };
empty-zones-enable no;
{% for zone in bind_zones.wan %}
{% if zone.in_view is defined %}
{% for z in zone.in_view %}
zone "{{ z }}" {
in-view "lan";
};
{% endfor %}
{% else %}
zone "{{ zone.name }}" {
type slave;
masters { {{ bind_slave_masters | join('; ') }} key {{ zone.key }}; };
forwarders {};
file "{{ zone.file }}";
};
{% endif %}
{% endfor %}
};

View File

@ -0,0 +1,4 @@
key "rndc-key" {
algorithm hmac-md5;
secret "{{ lookup(passbolt, 'rndc-key', folder_parent_id=passbolt_folder).password }}";
};

View File

@ -0,0 +1,4 @@
key "wan-key" {
algorithm hmac-md5;
secret "{{ lookup(passbolt, 'wan-key', folder_parent_id=passbolt_folder).password }}";
};