9 Commits

Author SHA1 Message Date
07b0744c78 Clean up Dockerfile for rootless podman compatibility
Remove USER, VOLUME, and user creation — rootless podman runs as the
host user and bind-mounts /srv/mcns directly.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-28 15:55:03 -07:00
871b1fb8f4 Add record-level authorization for system accounts
Record mutations (create, update, delete) no longer require admin role.
Authorization rules:
  - admin: full access (unchanged)
  - system mcp-agent: create/delete any record
  - system account α: create/delete records named α only
  - human users: read-only (unchanged)

Zone mutations remain admin-only. Both REST and gRPC paths enforce the
same rules. Update checks authorization against both old and new names.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-28 15:52:43 -07:00
baa058d4a4 Standardize Makefile docker/push targets for MCR
Add MCR and VERSION variables. Tag images with full MCR registry URL
and version. Add push target that builds then pushes to MCR.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-27 14:32:01 -07:00
363c680530 Regenerate proto files for mc/ module path
Raw descriptor bytes in .pb.go files were corrupted by the sed-based
module path rename (string length changed, breaking protobuf binary
encoding). Regenerated with protoc to fix.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-27 02:54:35 -07:00
115802cbe2 Migrate module path from kyle/ to mc/ org
All import paths updated to git.wntrmute.dev/mc/. Bumps mcdsl to v1.2.0.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-27 02:06:00 -07:00
42fff97e17 Merge pull request 'Bump mcdsl for $PORT env var support' (#1) from feature/port-env-adoption into master 2026-03-27 08:16:24 +00:00
0fe2e90d9a Update mcdsl to v1.1.0 (tagged release)
Replace pseudo-version with the tagged v1.1.0 release.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-27 01:15:32 -07:00
94aa3a9002 Bump mcdsl to f94c4b1 for $PORT env var support
Update mcdsl from v1.0.0 to the port-env-support branch tip, which adds
$PORT environment variable support. Adapt grpcserver.New call to the new
Options parameter (nil for default chain).

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-27 01:07:19 -07:00
1455ce6e0f Add MCP deployment section to RUNBOOK and service definition
Document MCP-based container management for MCNS on rift, replacing
the docker-compose workflow. Add deploy/mcns-rift.toml as the reference
MCP service definition.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-26 22:09:40 -07:00
34 changed files with 221 additions and 90 deletions

View File

@@ -58,7 +58,7 @@ deploy/ Docker, systemd, install scripts, examples
## Shared Library ## Shared Library
MCNS uses `mcdsl` (git.wntrmute.dev/kyle/mcdsl) for shared platform packages: MCNS uses `mcdsl` (git.wntrmute.dev/mc/mcdsl) for shared platform packages:
auth, db, config, httpserver, grpcserver. These provide MCIAS authentication, auth, db, config, httpserver, grpcserver. These provide MCIAS authentication,
SQLite database helpers, TOML config loading, and TLS-configured HTTP/gRPC SQLite database helpers, TOML config loading, and TLS-configured HTTP/gRPC
server scaffolding. server scaffolding.

View File

@@ -13,26 +13,14 @@ RUN CGO_ENABLED=0 go build -trimpath -ldflags="-s -w -X main.version=${VERSION}"
FROM alpine:3.21 FROM alpine:3.21
RUN apk add --no-cache ca-certificates tzdata \ RUN apk add --no-cache ca-certificates tzdata
&& addgroup -S mcns \
&& adduser -S -G mcns -h /srv/mcns -s /sbin/nologin mcns \
&& mkdir -p /srv/mcns && chown mcns:mcns /srv/mcns
COPY --from=builder /build/mcns /usr/local/bin/mcns COPY --from=builder /build/mcns /usr/local/bin/mcns
# /srv/mcns is the single volume mount point.
# It must contain:
# mcns.toml — configuration file
# certs/ — TLS certificate and key
# mcns.db — created automatically on first run
VOLUME /srv/mcns
WORKDIR /srv/mcns WORKDIR /srv/mcns
EXPOSE 53/udp 53/tcp EXPOSE 53/udp 53/tcp
EXPOSE 8443 EXPOSE 8443
EXPOSE 9443 EXPOSE 9443
USER mcns
ENTRYPOINT ["mcns"] ENTRYPOINT ["mcns"]
CMD ["server", "--config", "/srv/mcns/mcns.toml"] CMD ["server", "--config", "/srv/mcns/mcns.toml"]

View File

@@ -1,6 +1,8 @@
.PHONY: build test vet lint proto proto-lint clean docker all devserver .PHONY: build test vet lint proto proto-lint clean docker push all devserver
LDFLAGS := -trimpath -ldflags="-s -w -X main.version=$(shell git describe --tags --always --dirty)" MCR := mcr.svc.mcp.metacircular.net:8443
VERSION := $(shell git describe --tags --always --dirty)
LDFLAGS := -trimpath -ldflags="-s -w -X main.version=$(VERSION)"
mcns: mcns:
CGO_ENABLED=0 go build $(LDFLAGS) -o mcns ./cmd/mcns CGO_ENABLED=0 go build $(LDFLAGS) -o mcns ./cmd/mcns
@@ -18,8 +20,8 @@ lint:
golangci-lint run ./... golangci-lint run ./...
proto: proto:
protoc --go_out=. --go_opt=module=git.wntrmute.dev/kyle/mcns \ protoc --go_out=. --go_opt=module=git.wntrmute.dev/mc/mcns \
--go-grpc_out=. --go-grpc_opt=module=git.wntrmute.dev/kyle/mcns \ --go-grpc_out=. --go-grpc_opt=module=git.wntrmute.dev/mc/mcns \
proto/mcns/v1/*.proto proto/mcns/v1/*.proto
proto-lint: proto-lint:
@@ -30,7 +32,10 @@ clean:
rm -f mcns rm -f mcns
docker: docker:
docker build --build-arg VERSION=$(shell git describe --tags --always --dirty) -t mcns -f Dockerfile . docker build --build-arg VERSION=$(VERSION) -t $(MCR)/mcns:$(VERSION) -f Dockerfile .
push: docker
docker push $(MCR)/mcns:$(VERSION)
devserver: mcns devserver: mcns
@mkdir -p srv @mkdir -p srv

View File

@@ -230,6 +230,28 @@ Symptoms: MCNS fails to start with "address already in use" on port 53.
`[dns] listen_addr` in `mcns.toml` to a different address. `[dns] listen_addr` in `mcns.toml` to a different address.
4. Restart MCNS and verify DNS is responding. 4. Restart MCNS and verify DNS is responding.
## Deployment with MCP
MCNS runs on rift as a single container managed by MCP. The service
definition lives at `~/.config/mcp/services/mcns.toml` on the operator's
machine. A reference copy is maintained at `deploy/mcns-rift.toml` in
this repository.
The container image is pulled from MCR. The container mounts `/srv/mcns`
and runs as `--user 0:0`. DNS listens on port 53 (UDP+TCP) on both
192.168.88.181 and 100.95.252.120, with the management API on 8443/9443.
Note: the operator's `~/.config/mcp/services/mcns.toml` may still
reference the old CoreDNS image and needs updating to the new MCNS image.
### Key Operations
1. Deploy or update: `mcp deploy mcns`
2. Restart: `mcp restart mcns`
3. Stop: `mcp stop mcns` (WARNING: stops DNS for all internal zones)
4. Check status: `mcp ps` or `mcp status mcns`
5. View logs: `ssh rift 'doas su - mcp -s /bin/sh -c "podman logs mcns"'`
## Escalation ## Escalation
Escalate when: Escalate when:

View File

@@ -16,14 +16,14 @@ import (
"github.com/spf13/cobra" "github.com/spf13/cobra"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
mcdsldb "git.wntrmute.dev/kyle/mcdsl/db" mcdsldb "git.wntrmute.dev/mc/mcdsl/db"
"git.wntrmute.dev/kyle/mcns/internal/config" "git.wntrmute.dev/mc/mcns/internal/config"
"git.wntrmute.dev/kyle/mcns/internal/db" "git.wntrmute.dev/mc/mcns/internal/db"
mcnsdns "git.wntrmute.dev/kyle/mcns/internal/dns" mcnsdns "git.wntrmute.dev/mc/mcns/internal/dns"
"git.wntrmute.dev/kyle/mcns/internal/grpcserver" "git.wntrmute.dev/mc/mcns/internal/grpcserver"
"git.wntrmute.dev/kyle/mcns/internal/server" "git.wntrmute.dev/mc/mcns/internal/server"
) )
var version = "dev" var version = "dev"

17
deploy/mcns-rift.toml Normal file
View File

@@ -0,0 +1,17 @@
name = "mcns"
node = "rift"
active = true
[[components]]
name = "dns"
image = "mcr.svc.mcp.metacircular.net:8443/mcns:latest"
user = "0:0"
restart = "unless-stopped"
ports = [
"192.168.88.181:53:53/tcp",
"192.168.88.181:53:53/udp",
"100.95.252.120:53:53/tcp",
"100.95.252.120:53:53/udp",
]
volumes = ["/srv/mcns:/srv/mcns"]
cmd = ["server", "--config", "/srv/mcns/mcns.toml"]

View File

@@ -110,7 +110,7 @@ const file_proto_mcns_v1_admin_proto_rawDesc = "" +
"\x0eHealthResponse\x12\x16\n" + "\x0eHealthResponse\x12\x16\n" +
"\x06status\x18\x01 \x01(\tR\x06status2I\n" + "\x06status\x18\x01 \x01(\tR\x06status2I\n" +
"\fAdminService\x129\n" + "\fAdminService\x129\n" +
"\x06Health\x12\x16.mcns.v1.HealthRequest\x1a\x17.mcns.v1.HealthResponseB/Z-git.wntrmute.dev/kyle/mcns/gen/mcns/v1;mcnsv1b\x06proto3" "\x06Health\x12\x16.mcns.v1.HealthRequest\x1a\x17.mcns.v1.HealthResponseB-Z+git.wntrmute.dev/mc/mcns/gen/mcns/v1;mcnsv1b\x06proto3"
var ( var (
file_proto_mcns_v1_admin_proto_rawDescOnce sync.Once file_proto_mcns_v1_admin_proto_rawDescOnce sync.Once

View File

@@ -222,7 +222,7 @@ const file_proto_mcns_v1_auth_proto_rawDesc = "" +
"\x0eLogoutResponse2\x80\x01\n" + "\x0eLogoutResponse2\x80\x01\n" +
"\vAuthService\x126\n" + "\vAuthService\x126\n" +
"\x05Login\x12\x15.mcns.v1.LoginRequest\x1a\x16.mcns.v1.LoginResponse\x129\n" + "\x05Login\x12\x15.mcns.v1.LoginRequest\x1a\x16.mcns.v1.LoginResponse\x129\n" +
"\x06Logout\x12\x16.mcns.v1.LogoutRequest\x1a\x17.mcns.v1.LogoutResponseB/Z-git.wntrmute.dev/kyle/mcns/gen/mcns/v1;mcnsv1b\x06proto3" "\x06Logout\x12\x16.mcns.v1.LogoutRequest\x1a\x17.mcns.v1.LogoutResponseB-Z+git.wntrmute.dev/mc/mcns/gen/mcns/v1;mcnsv1b\x06proto3"
var ( var (
file_proto_mcns_v1_auth_proto_rawDescOnce sync.Once file_proto_mcns_v1_auth_proto_rawDescOnce sync.Once

View File

@@ -551,7 +551,7 @@ const file_proto_mcns_v1_record_proto_rawDesc = "" +
"\fCreateRecord\x12\x1c.mcns.v1.CreateRecordRequest\x1a\x0f.mcns.v1.Record\x127\n" + "\fCreateRecord\x12\x1c.mcns.v1.CreateRecordRequest\x1a\x0f.mcns.v1.Record\x127\n" +
"\tGetRecord\x12\x19.mcns.v1.GetRecordRequest\x1a\x0f.mcns.v1.Record\x12=\n" + "\tGetRecord\x12\x19.mcns.v1.GetRecordRequest\x1a\x0f.mcns.v1.Record\x12=\n" +
"\fUpdateRecord\x12\x1c.mcns.v1.UpdateRecordRequest\x1a\x0f.mcns.v1.Record\x12K\n" + "\fUpdateRecord\x12\x1c.mcns.v1.UpdateRecordRequest\x1a\x0f.mcns.v1.Record\x12K\n" +
"\fDeleteRecord\x12\x1c.mcns.v1.DeleteRecordRequest\x1a\x1d.mcns.v1.DeleteRecordResponseB/Z-git.wntrmute.dev/kyle/mcns/gen/mcns/v1;mcnsv1b\x06proto3" "\fDeleteRecord\x12\x1c.mcns.v1.DeleteRecordRequest\x1a\x1d.mcns.v1.DeleteRecordResponseB-Z+git.wntrmute.dev/mc/mcns/gen/mcns/v1;mcnsv1b\x06proto3"
var ( var (
file_proto_mcns_v1_record_proto_rawDescOnce sync.Once file_proto_mcns_v1_record_proto_rawDescOnce sync.Once

View File

@@ -595,7 +595,7 @@ const file_proto_mcns_v1_zone_proto_rawDesc = "" +
"\n" + "\n" +
"UpdateZone\x12\x1a.mcns.v1.UpdateZoneRequest\x1a\r.mcns.v1.Zone\x12E\n" + "UpdateZone\x12\x1a.mcns.v1.UpdateZoneRequest\x1a\r.mcns.v1.Zone\x12E\n" +
"\n" + "\n" +
"DeleteZone\x12\x1a.mcns.v1.DeleteZoneRequest\x1a\x1b.mcns.v1.DeleteZoneResponseB/Z-git.wntrmute.dev/kyle/mcns/gen/mcns/v1;mcnsv1b\x06proto3" "DeleteZone\x12\x1a.mcns.v1.DeleteZoneRequest\x1a\x1b.mcns.v1.DeleteZoneResponseB-Z+git.wntrmute.dev/mc/mcns/gen/mcns/v1;mcnsv1b\x06proto3"
var ( var (
file_proto_mcns_v1_zone_proto_rawDescOnce sync.Once file_proto_mcns_v1_zone_proto_rawDescOnce sync.Once

4
go.mod
View File

@@ -1,9 +1,9 @@
module git.wntrmute.dev/kyle/mcns module git.wntrmute.dev/mc/mcns
go 1.25.7 go 1.25.7
require ( require (
git.wntrmute.dev/kyle/mcdsl v1.0.0 git.wntrmute.dev/mc/mcdsl v1.2.0
github.com/go-chi/chi/v5 v5.2.5 github.com/go-chi/chi/v5 v5.2.5
github.com/miekg/dns v1.1.66 github.com/miekg/dns v1.1.66
github.com/spf13/cobra v1.10.2 github.com/spf13/cobra v1.10.2

4
go.sum
View File

@@ -1,5 +1,5 @@
git.wntrmute.dev/kyle/mcdsl v1.0.0 h1:YB7dx4gdNYKKcVySpL6UkwHqdCJ9Nl1yS0+eHk0hNtk= git.wntrmute.dev/mc/mcdsl v1.2.0 h1:41hep7/PNZJfN0SN/nM+rQpyF1GSZcvNNjyVG81DI7U=
git.wntrmute.dev/kyle/mcdsl v1.0.0/go.mod h1:wo0tGfUAxci3XnOe4/rFmR0RjUElKdYUazc+Np986sg= git.wntrmute.dev/mc/mcdsl v1.2.0/go.mod h1:lXYrAt74ZUix6rx9oVN8d2zH1YJoyp4uxPVKQ+SSxuM=
github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs= github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs= github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g= github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g=

View File

@@ -3,7 +3,7 @@ package config
import ( import (
"fmt" "fmt"
mcdslconfig "git.wntrmute.dev/kyle/mcdsl/config" mcdslconfig "git.wntrmute.dev/mc/mcdsl/config"
) )
// Config is the top-level MCNS configuration. // Config is the top-level MCNS configuration.

View File

@@ -4,7 +4,7 @@ import (
"database/sql" "database/sql"
"fmt" "fmt"
mcdsldb "git.wntrmute.dev/kyle/mcdsl/db" mcdsldb "git.wntrmute.dev/mc/mcdsl/db"
) )
// DB wraps a SQLite database connection. // DB wraps a SQLite database connection.

View File

@@ -1,7 +1,7 @@
package db package db
import ( import (
mcdsldb "git.wntrmute.dev/kyle/mcdsl/db" mcdsldb "git.wntrmute.dev/mc/mcdsl/db"
) )
// Migrations is the ordered list of MCNS schema migrations. // Migrations is the ordered list of MCNS schema migrations.

View File

@@ -10,7 +10,7 @@ import (
"github.com/miekg/dns" "github.com/miekg/dns"
"git.wntrmute.dev/kyle/mcns/internal/db" "git.wntrmute.dev/mc/mcns/internal/db"
) )
// Server is the MCNS DNS server. It listens on both UDP and TCP. // Server is the MCNS DNS server. It listens on both UDP and TCP.

View File

@@ -6,7 +6,7 @@ import (
"github.com/miekg/dns" "github.com/miekg/dns"
"git.wntrmute.dev/kyle/mcns/internal/db" "git.wntrmute.dev/mc/mcns/internal/db"
"log/slog" "log/slog"
) )

View File

@@ -3,8 +3,8 @@ package grpcserver
import ( import (
"context" "context"
pb "git.wntrmute.dev/kyle/mcns/gen/mcns/v1" pb "git.wntrmute.dev/mc/mcns/gen/mcns/v1"
"git.wntrmute.dev/kyle/mcns/internal/db" "git.wntrmute.dev/mc/mcns/internal/db"
) )
type adminService struct { type adminService struct {

View File

@@ -4,11 +4,11 @@ import (
"context" "context"
"errors" "errors"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
pb "git.wntrmute.dev/kyle/mcns/gen/mcns/v1" pb "git.wntrmute.dev/mc/mcns/gen/mcns/v1"
) )
type authService struct { type authService struct {

View File

@@ -16,10 +16,10 @@ import (
"google.golang.org/grpc/metadata" "google.golang.org/grpc/metadata"
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
pb "git.wntrmute.dev/kyle/mcns/gen/mcns/v1" pb "git.wntrmute.dev/mc/mcns/gen/mcns/v1"
"git.wntrmute.dev/kyle/mcns/internal/db" "git.wntrmute.dev/mc/mcns/internal/db"
) )
// mockMCIAS starts a fake MCIAS HTTP server for token validation. // mockMCIAS starts a fake MCIAS HTTP server for token validation.
@@ -769,6 +769,9 @@ func TestMethodMapCompleteness(t *testing.T) {
"/mcns.v1.ZoneService/GetZone", "/mcns.v1.ZoneService/GetZone",
"/mcns.v1.RecordService/ListRecords", "/mcns.v1.RecordService/ListRecords",
"/mcns.v1.RecordService/GetRecord", "/mcns.v1.RecordService/GetRecord",
"/mcns.v1.RecordService/CreateRecord",
"/mcns.v1.RecordService/UpdateRecord",
"/mcns.v1.RecordService/DeleteRecord",
} }
for _, method := range expectedAuth { for _, method := range expectedAuth {
if !mm.AuthRequired[method] { if !mm.AuthRequired[method] {
@@ -783,9 +786,6 @@ func TestMethodMapCompleteness(t *testing.T) {
"/mcns.v1.ZoneService/CreateZone", "/mcns.v1.ZoneService/CreateZone",
"/mcns.v1.ZoneService/UpdateZone", "/mcns.v1.ZoneService/UpdateZone",
"/mcns.v1.ZoneService/DeleteZone", "/mcns.v1.ZoneService/DeleteZone",
"/mcns.v1.RecordService/CreateRecord",
"/mcns.v1.RecordService/UpdateRecord",
"/mcns.v1.RecordService/DeleteRecord",
} }
for _, method := range expectedAdmin { for _, method := range expectedAdmin {
if !mm.AdminRequired[method] { if !mm.AdminRequired[method] {

View File

@@ -1,7 +1,7 @@
package grpcserver package grpcserver
import ( import (
mcdslgrpc "git.wntrmute.dev/kyle/mcdsl/grpcserver" mcdslgrpc "git.wntrmute.dev/mc/mcdsl/grpcserver"
) )
// methodMap builds the mcdsl grpcserver.MethodMap for MCNS. // methodMap builds the mcdsl grpcserver.MethodMap for MCNS.
@@ -25,11 +25,14 @@ func publicMethods() map[string]bool {
func authRequiredMethods() map[string]bool { func authRequiredMethods() map[string]bool {
return map[string]bool{ return map[string]bool{
"/mcns.v1.AuthService/Logout": true, "/mcns.v1.AuthService/Logout": true,
"/mcns.v1.ZoneService/ListZones": true, "/mcns.v1.ZoneService/ListZones": true,
"/mcns.v1.ZoneService/GetZone": true, "/mcns.v1.ZoneService/GetZone": true,
"/mcns.v1.RecordService/ListRecords": true, "/mcns.v1.RecordService/ListRecords": true,
"/mcns.v1.RecordService/GetRecord": true, "/mcns.v1.RecordService/GetRecord": true,
"/mcns.v1.RecordService/CreateRecord": true,
"/mcns.v1.RecordService/UpdateRecord": true,
"/mcns.v1.RecordService/DeleteRecord": true,
} }
} }
@@ -38,8 +41,5 @@ func adminRequiredMethods() map[string]bool {
"/mcns.v1.ZoneService/CreateZone": true, "/mcns.v1.ZoneService/CreateZone": true,
"/mcns.v1.ZoneService/UpdateZone": true, "/mcns.v1.ZoneService/UpdateZone": true,
"/mcns.v1.ZoneService/DeleteZone": true, "/mcns.v1.ZoneService/DeleteZone": true,
"/mcns.v1.RecordService/CreateRecord": true,
"/mcns.v1.RecordService/UpdateRecord": true,
"/mcns.v1.RecordService/DeleteRecord": true,
} }
} }

View File

@@ -10,10 +10,36 @@ import (
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
"google.golang.org/protobuf/types/known/timestamppb" "google.golang.org/protobuf/types/known/timestamppb"
pb "git.wntrmute.dev/kyle/mcns/gen/mcns/v1" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
"git.wntrmute.dev/kyle/mcns/internal/db" mcdslgrpc "git.wntrmute.dev/mc/mcdsl/grpcserver"
pb "git.wntrmute.dev/mc/mcns/gen/mcns/v1"
"git.wntrmute.dev/mc/mcns/internal/db"
) )
// authorizeRecordMutation checks whether the caller may create, update,
// or delete a DNS record with the given name. The rules are:
//
// - admin role: always allowed
// - system account "mcp-agent": allowed for any record name
// - system account α: allowed only when recordName == α
// - all others: denied
func authorizeRecordMutation(info *mcdslauth.TokenInfo, recordName string) bool {
if info == nil {
return false
}
if info.IsAdmin {
return true
}
if info.AccountType != "system" {
return false
}
if info.Username == "mcp-agent" {
return true
}
return recordName == info.Username
}
type recordService struct { type recordService struct {
pb.UnimplementedRecordServiceServer pb.UnimplementedRecordServiceServer
db *db.DB db *db.DB
@@ -55,7 +81,7 @@ func (s *recordService) GetRecord(_ context.Context, req *pb.GetRecordRequest) (
return s.recordToProto(*record), nil return s.recordToProto(*record), nil
} }
func (s *recordService) CreateRecord(_ context.Context, req *pb.CreateRecordRequest) (*pb.Record, error) { func (s *recordService) CreateRecord(ctx context.Context, req *pb.CreateRecordRequest) (*pb.Record, error) {
if req.Zone == "" { if req.Zone == "" {
return nil, status.Error(codes.InvalidArgument, "zone is required") return nil, status.Error(codes.InvalidArgument, "zone is required")
} }
@@ -69,6 +95,10 @@ func (s *recordService) CreateRecord(_ context.Context, req *pb.CreateRecordRequ
return nil, status.Error(codes.InvalidArgument, "value is required") return nil, status.Error(codes.InvalidArgument, "value is required")
} }
if !authorizeRecordMutation(mcdslgrpc.TokenInfoFromContext(ctx), req.Name) {
return nil, status.Error(codes.PermissionDenied, "not authorized for record name")
}
record, err := s.db.CreateRecord(req.Zone, req.Name, req.Type, req.Value, int(req.Ttl)) record, err := s.db.CreateRecord(req.Zone, req.Name, req.Type, req.Value, int(req.Ttl))
if errors.Is(err, db.ErrNotFound) { if errors.Is(err, db.ErrNotFound) {
return nil, status.Error(codes.NotFound, "zone not found") return nil, status.Error(codes.NotFound, "zone not found")
@@ -82,7 +112,7 @@ func (s *recordService) CreateRecord(_ context.Context, req *pb.CreateRecordRequ
return s.recordToProto(*record), nil return s.recordToProto(*record), nil
} }
func (s *recordService) UpdateRecord(_ context.Context, req *pb.UpdateRecordRequest) (*pb.Record, error) { func (s *recordService) UpdateRecord(ctx context.Context, req *pb.UpdateRecordRequest) (*pb.Record, error) {
if req.Id <= 0 { if req.Id <= 0 {
return nil, status.Error(codes.InvalidArgument, "id must be positive") return nil, status.Error(codes.InvalidArgument, "id must be positive")
} }
@@ -96,6 +126,15 @@ func (s *recordService) UpdateRecord(_ context.Context, req *pb.UpdateRecordRequ
return nil, status.Error(codes.InvalidArgument, "value is required") return nil, status.Error(codes.InvalidArgument, "value is required")
} }
info := mcdslgrpc.TokenInfoFromContext(ctx)
existing, lookupErr := s.db.GetRecord(req.Id)
if lookupErr == nil && !authorizeRecordMutation(info, existing.Name) {
return nil, status.Error(codes.PermissionDenied, "not authorized for record name")
}
if !authorizeRecordMutation(info, req.Name) {
return nil, status.Error(codes.PermissionDenied, "not authorized for record name")
}
record, err := s.db.UpdateRecord(req.Id, req.Name, req.Type, req.Value, int(req.Ttl)) record, err := s.db.UpdateRecord(req.Id, req.Name, req.Type, req.Value, int(req.Ttl))
if errors.Is(err, db.ErrNotFound) { if errors.Is(err, db.ErrNotFound) {
return nil, status.Error(codes.NotFound, "record not found") return nil, status.Error(codes.NotFound, "record not found")
@@ -109,11 +148,16 @@ func (s *recordService) UpdateRecord(_ context.Context, req *pb.UpdateRecordRequ
return s.recordToProto(*record), nil return s.recordToProto(*record), nil
} }
func (s *recordService) DeleteRecord(_ context.Context, req *pb.DeleteRecordRequest) (*pb.DeleteRecordResponse, error) { func (s *recordService) DeleteRecord(ctx context.Context, req *pb.DeleteRecordRequest) (*pb.DeleteRecordResponse, error) {
if req.Id <= 0 { if req.Id <= 0 {
return nil, status.Error(codes.InvalidArgument, "id must be positive") return nil, status.Error(codes.InvalidArgument, "id must be positive")
} }
existing, lookupErr := s.db.GetRecord(req.Id)
if lookupErr == nil && !authorizeRecordMutation(mcdslgrpc.TokenInfoFromContext(ctx), existing.Name) {
return nil, status.Error(codes.PermissionDenied, "not authorized for record name")
}
err := s.db.DeleteRecord(req.Id) err := s.db.DeleteRecord(req.Id)
if errors.Is(err, db.ErrNotFound) { if errors.Is(err, db.ErrNotFound) {
return nil, status.Error(codes.NotFound, "record not found") return nil, status.Error(codes.NotFound, "record not found")

View File

@@ -4,11 +4,11 @@ import (
"log/slog" "log/slog"
"net" "net"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
mcdslgrpc "git.wntrmute.dev/kyle/mcdsl/grpcserver" mcdslgrpc "git.wntrmute.dev/mc/mcdsl/grpcserver"
pb "git.wntrmute.dev/kyle/mcns/gen/mcns/v1" pb "git.wntrmute.dev/mc/mcns/gen/mcns/v1"
"git.wntrmute.dev/kyle/mcns/internal/db" "git.wntrmute.dev/mc/mcns/internal/db"
) )
// Deps holds the dependencies injected into the gRPC server. // Deps holds the dependencies injected into the gRPC server.
@@ -24,7 +24,7 @@ type Server struct {
// New creates a configured gRPC server with MCNS services registered. // New creates a configured gRPC server with MCNS services registered.
func New(certFile, keyFile string, deps Deps, logger *slog.Logger) (*Server, error) { func New(certFile, keyFile string, deps Deps, logger *slog.Logger) (*Server, error) {
srv, err := mcdslgrpc.New(certFile, keyFile, deps.Authenticator, methodMap(), logger) srv, err := mcdslgrpc.New(certFile, keyFile, deps.Authenticator, methodMap(), logger, nil)
if err != nil { if err != nil {
return nil, err return nil, err
} }

View File

@@ -9,8 +9,8 @@ import (
"google.golang.org/grpc/status" "google.golang.org/grpc/status"
"google.golang.org/protobuf/types/known/timestamppb" "google.golang.org/protobuf/types/known/timestamppb"
pb "git.wntrmute.dev/kyle/mcns/gen/mcns/v1" pb "git.wntrmute.dev/mc/mcns/gen/mcns/v1"
"git.wntrmute.dev/kyle/mcns/internal/db" "git.wntrmute.dev/mc/mcns/internal/db"
) )
type zoneService struct { type zoneService struct {

View File

@@ -5,7 +5,7 @@ import (
"errors" "errors"
"net/http" "net/http"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
) )
type loginRequest struct { type loginRequest struct {

View File

@@ -12,8 +12,8 @@ import (
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
"git.wntrmute.dev/kyle/mcns/internal/db" "git.wntrmute.dev/mc/mcns/internal/db"
) )
// openTestDB creates a temporary SQLite database with all migrations applied. // openTestDB creates a temporary SQLite database with all migrations applied.
@@ -42,6 +42,7 @@ func createTestZone(t *testing.T, database *db.DB) *db.Zone {
} }
// newChiRequest builds a request with chi URL params injected into the context. // newChiRequest builds a request with chi URL params injected into the context.
// An admin TokenInfo is added so that handler-level authorization passes.
func newChiRequest(method, target string, body string, params map[string]string) *http.Request { func newChiRequest(method, target string, body string, params map[string]string) *http.Request {
var r *http.Request var r *http.Request
if body != "" { if body != "" {
@@ -51,14 +52,21 @@ func newChiRequest(method, target string, body string, params map[string]string)
} }
r.Header.Set("Content-Type", "application/json") r.Header.Set("Content-Type", "application/json")
ctx := r.Context()
if len(params) > 0 { if len(params) > 0 {
rctx := chi.NewRouteContext() rctx := chi.NewRouteContext()
for k, v := range params { for k, v := range params {
rctx.URLParams.Add(k, v) rctx.URLParams.Add(k, v)
} }
r = r.WithContext(context.WithValue(r.Context(), chi.RouteCtxKey, rctx)) ctx = context.WithValue(ctx, chi.RouteCtxKey, rctx)
} }
return r
// Inject admin TokenInfo for handler-level authorization.
ctx = context.WithValue(ctx, tokenInfoKey, &mcdslauth.TokenInfo{
Username: "testadmin",
IsAdmin: true,
})
return r.WithContext(ctx)
} }
// decodeJSON decodes the response body into v. // decodeJSON decodes the response body into v.

View File

@@ -7,7 +7,7 @@ import (
"strings" "strings"
"time" "time"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
) )
type contextKey string type contextKey string
@@ -48,6 +48,29 @@ func requireAdmin(next http.Handler) http.Handler {
}) })
} }
// authorizeRecordMutation checks whether the caller may create, update,
// or delete a DNS record with the given name. The rules are:
//
// - admin role: always allowed
// - system account "mcp-agent": allowed for any record name
// - system account α: allowed only when recordName == α
// - all others: denied
func authorizeRecordMutation(info *mcdslauth.TokenInfo, recordName string) bool {
if info == nil {
return false
}
if info.IsAdmin {
return true
}
if info.AccountType != "system" {
return false
}
if info.Username == "mcp-agent" {
return true
}
return recordName == info.Username
}
// tokenInfoFromContext extracts the TokenInfo from the request context. // tokenInfoFromContext extracts the TokenInfo from the request context.
func tokenInfoFromContext(ctx context.Context) *mcdslauth.TokenInfo { func tokenInfoFromContext(ctx context.Context) *mcdslauth.TokenInfo {
info, _ := ctx.Value(tokenInfoKey).(*mcdslauth.TokenInfo) info, _ := ctx.Value(tokenInfoKey).(*mcdslauth.TokenInfo)

View File

@@ -8,7 +8,7 @@ import (
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
"git.wntrmute.dev/kyle/mcns/internal/db" "git.wntrmute.dev/mc/mcns/internal/db"
) )
type createRecordRequest struct { type createRecordRequest struct {
@@ -86,6 +86,11 @@ func createRecordHandler(database *db.DB) http.HandlerFunc {
return return
} }
if !authorizeRecordMutation(tokenInfoFromContext(r.Context()), req.Name) {
writeError(w, http.StatusForbidden, "not authorized for record name")
return
}
record, err := database.CreateRecord(zoneName, req.Name, req.Type, req.Value, req.TTL) record, err := database.CreateRecord(zoneName, req.Name, req.Type, req.Value, req.TTL)
if errors.Is(err, db.ErrNotFound) { if errors.Is(err, db.ErrNotFound) {
writeError(w, http.StatusNotFound, "zone not found") writeError(w, http.StatusNotFound, "zone not found")
@@ -132,6 +137,18 @@ func updateRecordHandler(database *db.DB) http.HandlerFunc {
return return
} }
// Authorize against both old and new record names.
info := tokenInfoFromContext(r.Context())
existing, lookupErr := database.GetRecord(id)
if lookupErr == nil && !authorizeRecordMutation(info, existing.Name) {
writeError(w, http.StatusForbidden, "not authorized for record name")
return
}
if !authorizeRecordMutation(info, req.Name) {
writeError(w, http.StatusForbidden, "not authorized for record name")
return
}
record, err := database.UpdateRecord(id, req.Name, req.Type, req.Value, req.TTL) record, err := database.UpdateRecord(id, req.Name, req.Type, req.Value, req.TTL)
if errors.Is(err, db.ErrNotFound) { if errors.Is(err, db.ErrNotFound) {
writeError(w, http.StatusNotFound, "record not found") writeError(w, http.StatusNotFound, "record not found")
@@ -159,6 +176,13 @@ func deleteRecordHandler(database *db.DB) http.HandlerFunc {
return return
} }
// Look up the record to authorize by name.
existing, lookupErr := database.GetRecord(id)
if lookupErr == nil && !authorizeRecordMutation(tokenInfoFromContext(r.Context()), existing.Name) {
writeError(w, http.StatusForbidden, "not authorized for record name")
return
}
err = database.DeleteRecord(id) err = database.DeleteRecord(id)
if errors.Is(err, db.ErrNotFound) { if errors.Is(err, db.ErrNotFound) {
writeError(w, http.StatusNotFound, "record not found") writeError(w, http.StatusNotFound, "record not found")

View File

@@ -7,10 +7,10 @@ import (
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
mcdslauth "git.wntrmute.dev/kyle/mcdsl/auth" mcdslauth "git.wntrmute.dev/mc/mcdsl/auth"
"git.wntrmute.dev/kyle/mcdsl/health" "git.wntrmute.dev/mc/mcdsl/health"
"git.wntrmute.dev/kyle/mcns/internal/db" "git.wntrmute.dev/mc/mcns/internal/db"
) )
// Deps holds dependencies injected into the REST handlers. // Deps holds dependencies injected into the REST handlers.
@@ -44,14 +44,14 @@ func NewRouter(deps Deps) *chi.Mux {
r.With(requireAdmin).Put("/v1/zones/{zone}", updateZoneHandler(deps.DB)) r.With(requireAdmin).Put("/v1/zones/{zone}", updateZoneHandler(deps.DB))
r.With(requireAdmin).Delete("/v1/zones/{zone}", deleteZoneHandler(deps.DB)) r.With(requireAdmin).Delete("/v1/zones/{zone}", deleteZoneHandler(deps.DB))
// Record endpoints — reads for all authenticated users, writes for admin. // Record endpoints — reads for all authenticated users.
r.Get("/v1/zones/{zone}/records", listRecordsHandler(deps.DB)) r.Get("/v1/zones/{zone}/records", listRecordsHandler(deps.DB))
r.Get("/v1/zones/{zone}/records/{id}", getRecordHandler(deps.DB)) r.Get("/v1/zones/{zone}/records/{id}", getRecordHandler(deps.DB))
// Admin-only record mutations. // Record mutations — admin, mcp-agent (any name), or system account (own name).
r.With(requireAdmin).Post("/v1/zones/{zone}/records", createRecordHandler(deps.DB)) r.Post("/v1/zones/{zone}/records", createRecordHandler(deps.DB))
r.With(requireAdmin).Put("/v1/zones/{zone}/records/{id}", updateRecordHandler(deps.DB)) r.Put("/v1/zones/{zone}/records/{id}", updateRecordHandler(deps.DB))
r.With(requireAdmin).Delete("/v1/zones/{zone}/records/{id}", deleteRecordHandler(deps.DB)) r.Delete("/v1/zones/{zone}/records/{id}", deleteRecordHandler(deps.DB))
}) })
return r return r

View File

@@ -7,7 +7,7 @@ import (
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
"git.wntrmute.dev/kyle/mcns/internal/db" "git.wntrmute.dev/mc/mcns/internal/db"
) )
type createZoneRequest struct { type createZoneRequest struct {

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package mcns.v1; package mcns.v1;
option go_package = "git.wntrmute.dev/kyle/mcns/gen/mcns/v1;mcnsv1"; option go_package = "git.wntrmute.dev/mc/mcns/gen/mcns/v1;mcnsv1";
// AdminService exposes server health and administrative operations. // AdminService exposes server health and administrative operations.
service AdminService { service AdminService {

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package mcns.v1; package mcns.v1;
option go_package = "git.wntrmute.dev/kyle/mcns/gen/mcns/v1;mcnsv1"; option go_package = "git.wntrmute.dev/mc/mcns/gen/mcns/v1;mcnsv1";
// AuthService handles authentication by delegating to MCIAS. // AuthService handles authentication by delegating to MCIAS.
service AuthService { service AuthService {

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package mcns.v1; package mcns.v1;
option go_package = "git.wntrmute.dev/kyle/mcns/gen/mcns/v1;mcnsv1"; option go_package = "git.wntrmute.dev/mc/mcns/gen/mcns/v1;mcnsv1";
import "google/protobuf/timestamp.proto"; import "google/protobuf/timestamp.proto";

View File

@@ -2,7 +2,7 @@ syntax = "proto3";
package mcns.v1; package mcns.v1;
option go_package = "git.wntrmute.dev/kyle/mcns/gen/mcns/v1;mcnsv1"; option go_package = "git.wntrmute.dev/mc/mcns/gen/mcns/v1;mcnsv1";
import "google/protobuf/timestamp.proto"; import "google/protobuf/timestamp.proto";