Skip to main content

Python wrapper for the CloudFlare v4 API

Project description

Installation

Two methods are provided to install this software. Use PyPi (see package details) or GitHub (see package details).

Via PyPI

$ sudo pip install cloudflare
$

Yes - that simple! (the sudo may not be needed in some cases).

Via github

$ git clone https://github.com/cloudflare/python-cloudflare
$ cd python-cloudflare
$ ./setup.py build
$ sudo ./setup.py install
$

Or whatever variance of that you want to use.

CloudFlare API version 4

The CloudFlare API can be found here. Each API call is provided via a similarly named function within the CloudFlare class. A full list is provided below.

Getting Started

A very simple listing of zones within your account; including the IPv6 status of the zone.

import CloudFlare

def main():
    cf = CloudFlare.CloudFlare()
    zones = cf.zones.get(params = {'per_page':50})
    for zone in zones:
        zone_name = zone['name']
        zone_id = zone['id']
        settings_ipv6 = cf.zones.settings.ipv6.get(zone_id)
        ipv6_status = settings_ipv6['value']
        settings_ssl = cf.zones.settings.ssl.get(zone_id)
        ssl_status = settings_ssl['value']
        print zone_id, ssl_status, ipv6_status, zone_name

if __name__ == '__main__':
    main()

A more complex example follows.

import sys
import CloudFlare

def main():
    zone_name = 'example.com'

    cf = CloudFlare.CloudFlare()

    # query for the zone name and expect only one value back
    try:
        zones = cf.zones.get(params = {'name':zone_name,'per_page':1})
    except CloudFlare.CloudFlareAPIError as e:
        exit('/zones.get %d %s - api call failed' % (e, e))
    except Exception as e:
        exit('/zones.get - %s - api call failed' % (e))

    # extract the zone_id which is needed to process that zone
    zone = zones[0]
    zone_id = zone['id']

    # request the DNS records from that zone
    try:
        dns_records = cf.zones.dns_records.get(zone_id)
    except CloudFlare.CloudFlareAPIError as e:
        exit('/zones/dns_records.get %d %s - api call failed' % (e, e))

    # print the results - first the zone name
    print zone_id, zone_name

    # then all the DNS records for that zone
    for dns_record in dns_records:
        r_name = dns_record['name']
        r_type = dns_record['type']
        r_value = dns_record['content']
        r_id = dns_record['id']
        print '\t', r_id, r_name, r_type, r_value

    exit(0)

if __name__ == '__main__':
    main()

Providing CloudFlare Username and API Key

When you create a CloudFlare class you can pass up to three paramaters.

  • Account email

  • Account API key

  • Optional Debug flag (True/False)

If the account email and API key are not passed when you create the class, then they are retreived from either the users exported shell environment variables or the .cloudflare.cfg or ~/.cloudflare.cfg or ~/.cloudflare/cloudflare.cfg files, in that order.

There is one call that presently doesn’t need any email or token certification (the /ips call); hence you can test without any values saved away.

Using shell environment variables

$ export CF_API_EMAIL='user@example.com'
$ export CF_API_KEY='00000000000000000000000000000000'
$ export CF_API_CERTKEY='v1.0-...'
$

Using configuration file to store email and keys

$ cat ~/.cloudflare/cloudflare.cfg
[CloudFlare]
email = user@example.com
token = 00000000000000000000000000000000
certoken = v1.0-...
$

The CF_API_CERTKEY or certtoken values are used for the Origin-CA /certificates API calls.

Included example code

The examples folder contains many examples in both simple and verbose formats.

A DNS zone code example

#!/usr/bin/env python

import sys
import CloudFlare

def main():
    zone_name = sys.argv[1]
    cf = CloudFlare.CloudFlare()
    zone_info = cf.zones.post(data={'jump_start':False, 'name': zone_name})
    zone_id = zone_info['id']

    dns_records = [
        {'name':'foo', 'type':'AAAA', 'content':'2001:d8b::1'},
        {'name':'foo', 'type':'A', 'content':'192.168.0.1'},
        {'name':'duh', 'type':'A', 'content':'10.0.0.1', 'ttl':120},
        {'name':'bar', 'type':'CNAME', 'content':'foo'},
        {'name':'shakespeare', 'type':'TXT', 'content':"What's in a name? That which we call a rose by any other name ..."}
    ]

    for dns_record in dns_records:
        r = cf.zones.dns_records.post(zone_id, data=dns_record)
    exit(0)

if __name__ == '__main__':
    main()

CLI

All API calls can be called from the command line. The command will convert domain names on-the-fly into zone_identifier’s.

$ cli4 [-h|--help] [-v|--verbose] [-q|--quiet] [--get|--patch|--post|-put|--delete] [item=value ...] /command...

For API calls that need a set of date or parameters passed there is a item=value format. If you want a numeric value passed, then == can be used to force the value to be treated as a numeric value.

The output from the CLI command is in json format (and human readable).

Simple CLI examples

  • cli4 /user/billing/profile

  • cli4 /user/invites

  • cli4 /zones/:example.com

  • cli4 /zones/:example.com/dnssec

  • cli4 /zones/:example.com/settings/ipv6

  • cli4 --put /zones/:example.com/activation_check

  • cli4 /zones/:example.com/keyless_certificates

  • cli4 /zones/:example.com/analytics/dashboard

More complex CLI examples

Here is the creation of a DNS entry, followed by a listing of that entry and then the deletion of that entry.

$ $ cli4 --post name="test" type="A" content="10.0.0.1" /zones/:example.com/dns_records
{
    "id": "94e028933c87b4bff3c70a42e6daac4f",
    "name": "test.example.com",
    "type": "A",
    "content": "10.0.0.1",
    ...
}
$

$ cli4 /zones/:example.com/dns_records/:test.example.com | jq '{"id":.id,"name":.name,"type":.type,"content":.content}'
{
  "id": "94e028933c87b4bff3c70a42e6daac4f",
  "name": "test.example.com",
  "type": "A",
  "content": "10.0.0.1"
}

$ cli4 --delete /zones/:example.com/dns_records/:test.example.com | jq -c .
{"id":"94e028933c87b4bff3c70a42e6daac4f"}
$

There’s the ability to handle dns entries with multiple values. This produces more than one API call within the command.

$ cli4 /zones/:example.com/dns_records/:test.example.com | jq -c '.[]|{"id":.id,"name":.name,"type":.type,"content":.content}'
{"id":"bca0c4a5e3691e62841627e4dc3a19ed","name":"test.example.com","type":"A","content":"192.168.0.1"}
{"id":"d94f788e6bf72ba2a54145ad04b34f08","name":"test.example.com","type":"AAAA","content":"2001:d8b::1"}
$

Here are the cache purging commands.

$ cli4 --delete purge_everything=true /zones/:example.com/purge_cache | jq -c .
{"id":"d8afaec3dd2b7f8c1b470e594a21a01d"}
$

$ cli4 --delete files='[http://example.com/css/styles.css]' /zones/:example.com/purge_cache | jq -c .
{"id":"d8afaec3dd2b7f8c1b470e594a21a01d"}
$

$ cli4 --delete files='[http://example.com/css/styles.css,http://example.com/js/script.js] /zones/:example.com/purge_cache | jq -c .
{"id":"d8afaec3dd2b7f8c1b470e594a21a01d"}
$

$ cli4 --delete tags='[tag1,tag2,tag3]' /zones/:example.com/purge_cache | jq -c .
cli4: /zones/:example.com/purge_cache - 1107 Only enterprise zones can purge by tag.
$

A somewhat useful listing of available plans for a specific zone.

$ cli4 /zones/:example.com/available_plans | jq -c '.[]|{"id":.id,"name":.name}'
{"id":"a577b510288e82b26486fd1df47000ec","name":"Pro Website"}
{"id":"1ac039f6c29b691475c3d74fe588d1ae","name":"Business Website"}
{"id":"94f3b7b768b0458b56d2cac4fe5ec0f9","name":"Enterprise Website"}
{"id":"0feeeeeeeeeeeeeeeeeeeeeeeeeeeeee","name":"Free Website"}
$

DNSSEC CLI examples

$ cli4 /zones/:example.com/dnssec | jq -c '{"status":.status}'
{"status":"disabled"}
$

$ cli4 --patch status=active /zones/:example.com/dnssec | jq -c '{"status":.status}'
{"status":"pending"}
$

$ cli4 /zones/:example.com/dnssec
{
    "algorithm": "13",
    "digest": "41600621c65065b09230ebc9556ced937eb7fd86e31635d0025326ccf09a7194",
    "digest_algorithm": "SHA256",
    "digest_type": "2",
    "ds": "example.com. 3600 IN DS 2371 13 2 41600621c65065b09230ebc9556ced937eb7fd86e31635d0025326ccf09a7194",
    "flags": 257,
    "key_tag": 2371,
    "key_type": "ECDSAP256SHA256",
    "modified_on": "2016-05-01T22:42:15.591158Z",
    "public_key": "mdsswUyr3DPW132mOi8V9xESWE8jTo0dxCjjnopKl+GqJxpVXckHAeF+KkxLbxILfDLUT0rAK9iUzy1L53eKGQ==",
    "status": "pending"
}
$

Implemented API calls

GET

PUT

POST

PATCH

DELETE

API call

GET

POST

DELETE

/certificates

GET

/ips

GET

PATCH

/organizations

GET

POST

PATCH

DELETE

/organizations/:identifier/firewall/access_rules/rules

PATCH

/organizations/:identifier/invite

GET

POST

DELETE

/organizations/:identifier/invites

GET

PATCH

DELETE

/organizations/:identifier/members

GET

POST

PATCH

DELETE

/organizations/:identifier/railguns

GET

/organizations/:identifier/railguns/:identifier/zones

GET

/organizations/:identifier/roles

GET

POST

PATCH

DELETE

/organizations/:identifier/virtual_dns

GET

POST

PATCH

DELETE

/railguns

GET

/railguns/:identifier/zones

GET

PATCH

/user

GET

/user/billing/history

GET

/user/billing/profile

GET

/user/billing/subscriptions/apps

GET

/user/billing/subscriptions/zones

GET

POST

PATCH

DELETE

/user/firewall/access_rules/rules

GET

PATCH

/user/invites

GET

DELETE

/user/organizations

GET

POST

PATCH

DELETE

/user/virtual_dns

GET

POST

PATCH

DELETE

/zones

PUT

/zones/:identifier/activation_check

GET

/zones/:identifier/analytics/colos

GET

/zones/:identifier/analytics/dashboard

GET

/zones/:identifier/available_plans

PUT

/zones/:identifier/custom_certificates/prioritize

GET

POST

PATCH

DELETE

/zones/:identifier/custom_certificates

GET

PUT

/zones/:identifier/custom_pages

GET

PUT

POST

DELETE

/zones/:identifier/dns_records

GET

PATCH

/zones/:identifier/firewall/waf/packages/:identifier/groups

GET

PATCH

/zones/:identifier/firewall/waf/packages/:identifier/rules

GET

PATCH

/zones/:identifier/firewall/waf/packages

GET

POST

PATCH

DELETE

/zones/:identifier/firewall/access_rules/rules

GET

POST

PATCH

DELETE

/zones/:identifier/keyless_certificates

GET

PUT

POST

PATCH

DELETE

/zones/:identifier/pagerules

DELETE

/zones/:identifier/purge_cache

GET

/zones/:identifier/railguns/:identifier/diagnose

GET

PATCH

/zones/:identifier/railguns

GET

PATCH

/zones/:identifier/settings

GET

/zones/:identifier/settings/advanced_ddos

GET

PATCH

/zones/:identifier/settings/always_online

GET

PATCH

/zones/:identifier/settings/browser_cache_ttl

GET

PATCH

/zones/:identifier/settings/browser_check

GET

PATCH

/zones/:identifier/settings/cache_level

GET

PATCH

/zones/:identifier/settings/challenge_ttl

GET

PATCH

/zones/:identifier/settings/development_mode

GET

PATCH

/zones/:identifier/settings/email_obfuscation

GET

PATCH

/zones/:identifier/settings/hotlink_protection

GET

PATCH

/zones/:identifier/settings/ip_geolocation

GET

PATCH

/zones/:identifier/settings/ipv6

GET

PATCH

/zones/:identifier/settings/minify

GET

PATCH

/zones/:identifier/settings/mirage

GET

PATCH

/zones/:identifier/settings/mobile_redirect

GET

PATCH

/zones/:identifier/settings/origin_error_page_pass_thru

GET

PATCH

/zones/:identifier/settings/polish

GET

PATCH

/zones/:identifier/settings/prefetch_preload

GET

PATCH

/zones/:identifier/settings/response_buffering

GET

PATCH

/zones/:identifier/settings/rocket_loader

GET

PATCH

/zones/:identifier/settings/security_header

GET

PATCH

/zones/:identifier/settings/security_level

GET

PATCH

/zones/:identifier/settings/server_side_exclude

GET

PATCH

/zones/:identifier/settings/sort_query_string_for_cache

GET

PATCH

/zones/:identifier/settings/ssl

GET

PATCH

/zones/:identifier/settings/tls_1_2_only

GET

PATCH

/zones/:identifier/settings/tls_client_auth

GET

PATCH

/zones/:identifier/settings/true_client_ip_header

GET

PATCH

/zones/:identifier/settings/waf

Adding extra API calls manually

Extra API calls can be added via the configuration file

$ cat ~/.cloudflare/cloudflare.cfg
[CloudFlare]
extras=
        /client/v4/command
        /client/v4/command/:command_identifier
        /client/v4/command/:command_identifier/settings
$

While it’s easy to call anything within CloudFlare’s API, it’s not very useful to add items in here as they will simply return API URL errors. Technically, this is only useful for internal testing within CloudFlare.

Issues

The following error can be caused by an out of date SSL/TLS library and/or out of date Python.

/usr/local/lib/python2.7/dist-packages/requests/packages/urllib3/util/ssl_.py:318: SNIMissingWarning: An HTTPS request has been made, but the SNI (Subject Name Indication) extension to TLS is not available on this platform. This may cause the server to present an incorrect TLS certificate, which can cause validation failures. You can upgrade to a newer version of Python to solve this. For more information, see https://urllib3.readthedocs.org/en/latest/security.html#snimissingwarning.
  SNIMissingWarning
/usr/local/lib/python2.7/dist-packages/requests/packages/urllib3/util/ssl_.py:122: InsecurePlatformWarning: A true SSLContext object is not available. This prevents urllib3 from configuring SSL appropriately and may cause certain SSL connections to fail. You can upgrade to a newer version of Python to solve this. For more information, see https://urllib3.readthedocs.org/en/latest/security.html#insecureplatformwarning.
  InsecurePlatformWarning

The solution can be found here and/or here.

Credit

This is based on work by Felix Wong (gnowxilef) found here. It has been seriously expanded upon.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cloudflare-1.0.6.tar.gz (22.6 kB view hashes)

Uploaded Source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page