This project has no connection whatsoever with PowerDNS.COM BV, Open-Xchange Inc - or any other third party.
It is an independently funded & maintained development effort.
If this doesn't meet your needs, you might want to try some of these.
If you find this code useful, I would absolutely appreciate it if you could make a donation, no matter how small.
- Donate by PayPal
- Donate by BTC - 357ynBdTQiVKybo93bP2cYbrkLbpGmQCj6
- Donate by ETH - 0x20fbf9555F09a8579540970488dcB8245244b683 (Etherium Network ONLY)
Donations are paid into a UK Limited Company, so if you want a trade invoice / recipt, just ask.
Or you can sponsor me through GitHub - Also see Sponsor this project
Github now has a discussions
feature, so I have enabled it on this project. Please use this to leave
any ad-hoc feedback or raise minor issues / enhancement requests etc
Or just stop by to say hello
or thanks
.
htdocs/index.html
is a complete self-contained, single-file, single page HTML, CSS & Javascript webapp
which allows you to browse and edit DNS data held in a PowerDNS Database using only the PowerDNS RestAPI.
You can clone the project, if you want, but this is the only file you need in order to add a complete WebUI to your PowerDNS Server.
Punycode to IDN decoding & encoding is done by a very slightly modified version of the
module by Mathias Bynens
which has been appended to the index.html
file.
It is primarily aimed at those who are using PowerDNS as a DNS Master, as this is what I do, but it should handle native / slave zones OK. If you are using this webapp for slave / native, please let me know if there are features it needs.
When minified, using python -m jsmin index.html > min.html
, the savings are not great (~10%), so I've chosen to no longer provide this minified file.
This is probably largely because I use TAB indents (see CONTRIBUTING.md).
Because of the security limitations of the PowerDNS Rest/API, this is intended as a SysAdmin tool only - see the Security Section below.
A critical design goal was to ensure that the data you see has come live from the server, and you have a single click button in the navigation bar that will reload the data you are seeing.
The only exception to this is occasionally when the NSEC3PARAM
value is displayed on the DNSSEC page.
This is a summary of the features this WebUI provides to PowerDNS
- Servers - contact PowerDNS Servers directly using the API-Key, or indirectly though a web proxy, HTTP or HTTPS (see
Browser Security Restrictions
below) - Zones - Add, View, Remove, Sign, Unsign, Force NOTIFY, Rectify, Download in RFC format, force update (slave only), Change type/kind
- Metadata - Add, Edit, Remove Metadata items or individual values, with some clientside validation, including picking drop-downs where specific metadata items have a limited range of values
- Hosts/names - Master or Native only - Add, Edit, Remove RRs / RR-Sets with some clientside validation, Change the TTL of an RR-Set. Copy records, including between zones, by renaming the RR-Set
- TSIG Keys - Add, Regenerate, Remove, click to copy name or digest to clipboard. NOTE: Adding multiple TSIG keys, of different algorythms, does not work in PowerDNS v4.2.0
- Search - quick access to native search facility, with click-through to records / zones
- Navigation - fully functional BACK button, link to open any page in a new tab (or link you can email etc)
- DNSSEC
- Sign an unsigned zone - NSEC or NSEC3, KSK+ZSK or CSK, any algorythm & key lengths
- Unsign a signed zone - NOTE: removing the NSEC3 param record using the Rest/API does not work in PowerDNS v4.2.0
- Step-by-Step one-button CSK, KSK or ZSK key roll-over
- Add, Remove, Activate / Deactivate individual keys
- DS digest, click to copy digest to clipboard
- Convert NSEC to NSEC3 or vice versa. NOTE: removing the NSEC3 param record using the Rest/API does not work in PowerDNS v4.2.0
- NSEC3PARAM roll-over - Yeah, some people like to do it. What can you say.
- Punycode - where record or zone names are punycode encoded, they will be decoded and the IDN version will be displayed (look out for tooltips!). When zones or records are created or renamed, the name can be entered as UTF-8 and it will be automatically encoded to punycode.
- Basic Theme Support - comes with four hardcoded colour schemes
- Stats - ability to view all server stats data, including breaking out data presented in lists
- Ability to maintain a bind-9.11 catalog zone, for RFC/XFR (not native) slaves.
Fast Zone Listing
allows you to view the full list of zones considerably faster, at the cost of slightly reduced information.
Where you have 1000s of zones, or a server a long way away, this can significantly reduce time to load the zone list.
When reporting an issue, please also include any messages in your browser console (in Chrome press F12, in FireFox Ctrl-Shift-J).
There are five built-in colour schemes, called themes, plus one called "Custom", which ships as the same as "Dark". The app should remember which theme you chose and return to that one. This means you can customise the "Custom" theme, if you want, & it will then return to your custom colour scheme without affecting the default themes.
This webapp is super simple to use, but does require a little setting up to ensure your browser is happy with stuff. These issues are generic browser security restrictions, and not specifically to do with this code.
-
If your browser received the
index.html
(this webapp) over HTTPS, then the RestAPI must be accessed over HTTPS - this is where using an HTTP/HTTPS proxy is useful. As of v4.2.0, PowerDNS does not natively support HTTPS, and sending all your data (and maybe your API Key) over HTTP is probably not what you want. -
You must be CORS compliant - in this context it means the web server that gave your browser
index.html
must list (in the header of the response) all the other HTTP/S servers you are allowed to access via the webapp.
NOTE: For CORS, by default, you are allowed to access the Rest/API on the server that sent you the webapp, regardless of the port number. So this requires no special extra consideration.
So, for exmaple, you could obtain the index.html
page from port 80 (HTTP) but, on the same server, still be OK to access the PowerDNS API directly (port 8081, and not HTTPS).
But, I strongly recommend you simply use a HTTPS
proxy.
We have provided a fully working example set-up in the example
directory.
Because this webapp accesses the PowerDNS RestAPI directly from your desktop's browser, to prevent you having to give everybody the api-key
,
we would recommend you use a web proxy (e.g. Apache or nginx) and (for exmaple) enforce per-user authentication in the proxy.
This means you will need to configure the proxy to add the api-key
to each request (see below).
You can also use the web proxy to provide an HTTP->HTTPS service, transparently adding HTTPS
support to the RestAPI.
I used both Apache & nginx. Here's a snip of my setup. It assumes your PowerDNS WebUI is listening on IP Address 127.1.0.1 and your Apache Server can listen on port 443 (HTTPS). The PowerDNS IP Address will probably work for you.
I haven't included the SSL, or per-user authentication, config lines, you will need to add whatever you prefer,
but all the SSL & Basic Authentication configuration is included in example/httpd.conf
and exmaple/nginx.conf
.
<VirtualHost *:443>
DocumentRoot /opt/websites/pdns/powerdns-webui/htdocs
<Proxy http://127.1.0.1:8081/*>
Allow from all
</Proxy>
<location /stats/>
ProxyPass http://admin,Dev-Key@127.1.0.1:8081/
ProxyPassReverse http://admin,Dev-Key@127.1.0.1:8081/
</location>
<location /api>
Header add X-API-Key "Dev-Key"
RequestHeader set X-API-Key "Dev-Key"
ProxyPass http://127.1.0.1:8081/api
ProxyPassReverse http://127.1.0.1:8081/api
</location>
</VirtualHost>
Becuase I want the webapp to live in the ROOT directory of the website, this overloads the PowerDNS stats page (which also lives at the root),
so I have put in a rule that makes the stats page available from https://<server-ip-address>/stats/
. Although, of course, this webapp
also gives you access to the stats that are available from the Rest/API.
You will need to ensure you have loaded the Apache proxy modules, I used this code
LoadModule proxy_module modules/mod_proxy.so
LoadModule proxy_connect_module modules/mod_proxy_connect.so
LoadModule proxy_http_module modules/mod_proxy_http.so
LoadModule rewrite_module modules/mod_rewrite.so
Here's the corresponding PowerDNS pdns.conf
settings for the WebUI & Rest-API
...
webserver=yes
webserver-address=127.1.0.1
webserver-allow-from=127.0.0.0/8
webserver-password=Dev-Key
api=yes
api-key=Dev-Key
...
Clone this project as the directory /opt/websites/pdns/powerdns-webui
,
or whatever you chose in the Apache conf, and request the URL https://<server-ip-address>/
If it worked correctly, you should see a screen like this.
Because it prompts you for a server name, you can use one copy of this webapp to access any PowerDNS RestAPI you can reach, subject to the browser restrictions described above.
A fully working example configuration, and instructions, are provided in the example
directory.
A less secure configuration, that is easier to get working, is to set up PowerDNS to listen on the same IP Address
as a standard HTTP web server, then load the webapp's index.html
from the web server and tell the webapp to connect directly
to the PowerDNS API on port 8081, by adding :8081
after the server name / ip address. You will also need to enter the
web-api
key and untick the HTTPS
tick box.
This should satisfy your browser's security checks. I have tested this in both Chrome and Firefox.
However, it means all your data, and your API key, will be sent in plain text.
For those who want the extra security provided by HTTPS and per-user authentication, but are troubled by
the effort of setting it up yourself, don't worry there's a Docker container called jamesstevens/pdns-webui
.
There are a few caveats, and things you'll probably want to change, so there's also a README in the container
directory.
Using an SSH tunnel allows encryption and authentication to be handled by SSH. This provides a simple alternative to configuring a web server.
It is vital that the PowerDNS API is only available on the local loopback interface and not any public network interface. This restricts access only to users who are allowed to log in to the remote machine. They can then use SSH to tunnel the loopback interface to their local machine and use the web interface there.
An example section of a pdns.conf
file would be:
webserver=yes
webserver-address = ::1
webserver-port = 8068
api=yes
api-key=Dev-Key
This will make PowerDNS provide the API over the local IPv6 loopback interface, [::1]
, and listen on port 8068
. Port 8068 was chosen because the ASCII for 'P' is 80 and for 'D' it is 68.
PowerDNS WebUI can then be run using three commands in a terminal on a typical Unix box, e.g. Linux, running a desktop:
curl -sS https://raw.githubusercontent.com/james-stevens/powerdns-webui/master/htdocs/index.html --output powerdns-webui.html
xdg-open powerdns-webui.html
ssh user@myserver -L 8000:[::1]:8068 -N
The first and second commands download the user interface file and open it in the desktop's default browser respectively.
The third command creates an SSH tunnel on local port 8000, which connects to the IPv6 loopback interface, [::1]
, on port 8068
of the remote machine. The -N
switch stops a remote shell being opened for user input.
To connect PowerDNS WebUI use [::1]:8000
for the server address and then enter the relevant API-Key.
This is all that is required to create a remote connection using SSH for encryption and authentication.
To close the connection use CTRL + C to terminate SSH in the terminal.
NOTE: ssh
tunnelling will also work on non-Linux desktops, but you will need to use slightly different commands.
I've tested this with the latest Chrome & Firefox running on Xubuntu (Ubuntu + XFCE) talking to a 95% idle PowerDNS server running v4.2.2 over an 18ms latency link and the response time, for all actions, including viewing a zone with 1000 records (500 names, 2 records per name), is virtually instant.
Apart from some minor aesthetic differences, the behaviour in Chrome and Firefox was identical. As far as I know, any ES6 compliant browser should work, but I might be wrong.
nginx performed the same as Apache - virtually instant.
This webapp is intended as a SysAdmin aid, and not to be given directly to end-users without the addition of more serverside security. Especially, this webapp is not recommended in the situation where you have multiple users owning different domains.
There are deliberatly NO security options in this webapp, e.g. who can edit/delete zones/names/records etc.
As a general principal, when you have a JavaScript+RestAPI webapp the place to put the security is in the serverside RestAPI. Any security put into the Javascript can probably be trivially circumvented and is therefore of extremely limited value. In fact, in security circles, this is considered worse than having no security, as less experienced sysadmins may be left thinking they are safe, when this is not the case.
In various web proxies, there are options to block certain METHODs
. For example, by blocking all METHODs
except GET
,
you can stop a user from being able to make changes. For more information, please ask Google.
In general, therefore, as it is provided, this webapp is probably not going to be that useful for giving to end users. However, as an sysadmin tool, it can be very useful.