Sync your DNS host with your DNS zone file, making it easy to version your zone file and sync changes.
Configuration management is important, and switched-on technical types now agree that "configuration is code". This means that your DNS configuration should be treated with the same degree of respect you would give to any other code you would write.
In order to live up to this standard, there needs to be an easy way to manage your DNS host file in a SCM tool like Git, allowing you to feed it into a continuous integration pipeline. This library enables this very ideal, making DNS management no different to source code management.
Add zonesync to your Gemfile:
source 'https://rubygems.org'
gem 'zonesync'or run:
gem install zonesync
The following is an example DNS zone file for example.com:
$ORIGIN example.com.
$TTL 1h
example.com. IN SOA ns.example.com. username.example.com. (2007120710; 1d; 2h; 4w; 1h)
example.com. NS ns
example.com. NS ns.somewhere.example.
example.com. MX 10 mail.example.com.
@ MX 20 mail2.example.com.
@ MX 50 mail3
example.com. A 192.0.2.1
AAAA 2001:db8:10::1
ns A 192.0.2.2
AAAA 2001:db8:10::2
www CNAME example.com.
wwwtest CNAME www
mail A 192.0.2.3
mail2 A 192.0.2.4
mail3 A 192.0.2.5
Zonesync reads DNS provider credentials from Rails encrypted credentials (config/credentials.yml.enc). Edit them with:
$ bin/rails credentials:edit
Add a key (by default zonesync) with your provider configuration:
Cloudflare
zonesync:
provider: Cloudflare
zone_id: <CLOUDFLARE_DOMAIN_ZONE_ID>
token: <CLOUDFLARE_API_TOKEN>
# or instead of token you can auth with:
# email: <CLOUDFLARE_EMAIL>
# key: <CLOUDFLARE_API_KEY>Route 53
zonesync:
provider: Route53
aws_access_key_id: <AWS_ACCESS_KEY_ID>
aws_secret_access_key: <AWS_SECRET_ACCESS_KEY>
hosted_zone_id: <HOSTED_ZONE_ID>The encryption key is read from config/master.key or the RAILS_MASTER_KEY environment variable.
$ bundle exec zonesync # sync Zonefile to DNS provider
$ bundle exec zonesync --dry-run # log to STDOUT but don't actually perform the sync
$ bundle exec zonesync generate # generate a Zonefile from the configured provider
By default, zonesync reads from Zonefile and uses the zonesync key in credentials. You can override these:
$ bundle exec zonesync --source=Zonefile --destination=zonesync
$ bundle exec zonesync generate --source=zonesync --destination=Zonefile
require "zonesync"
Zonesync.call # uses defaults
Zonesync.call(source: "Zonefile", destination: "zonesync", dry_run: true)
Zonesync.generate(source: "zonesync", destination: "Zonefile")Zonesync writes two additional TXT records: zonesync_manifest and zonesync_checksum. These two records together try to handle the situation where someone else makes edits directly to the DNS records managed by zonesync.
zonesync_manifest: a short list of all the records that zonesync is aware of and managing. If a record appears in the DNS records that is not in the manifest, zonesync will simply ignore it. This makes it possible to coexist with other editors, provided they don't touch the records managed by zonesync. If they do, we have azonesync_checksumto detect that.zonesync_checksum: a fingerprint of the state of the managed records upon last save. If the checksum doesn't match the current state of the managed records, zonesync will refuse to save the new state. This is a safety measure to avoid overwriting changes made by other editors, and also to alert the user that the records have been changed outside of zonesync.