Home

Awesome

cloudflare-python

Installation

Two methods are provided to install this software. Use PyPi (see package details) or GitHub (see package details).

Via PyPI

	$ sudo pip install cloudflare
	$

Yes - that simple! (the sudo may not be needed in some cases).

Via github

	$ git clone https://github.com/cloudflare/python-cloudflare
	$ cd python-cloudflare
	$ ./setup.py build
	$ sudo ./setup.py install
	$

Or whatever variance of that you want to use.

CloudFlare API version 4

The CloudFlare API can be found here. Each API call is provided via a similarly named function within the CloudFlare class. A full list is provided below.

Getting Started

A very simple listing of zones within your account; including the IPv6 status of the zone.

import CloudFlare

def main():
	cf = CloudFlare.CloudFlare()
	zones = cf.zones.get(params = {'per_page':50})
	for zone in zones:
		zone_name = zone['name']
		zone_id = zone['id']
		settings_ipv6 = cf.zones.settings.ipv6.get(zone_id)
		ipv6_status = settings_ipv6['value']
		settings_ssl = cf.zones.settings.ssl.get(zone_id)
		ssl_status = settings_ssl['value']
		print zone_id, ssl_status, ipv6_status, zone_name

if __name__ == '__main__':
	main()

A more complex example follows.

import sys
import CloudFlare

def main():
	zone_name = 'example.com'

	cf = CloudFlare.CloudFlare()

	# query for the zone name and expect only one value back
	try:
		zones = cf.zones.get(params = {'name':zone_name,'per_page':1})
	except CloudFlare.CloudFlareAPIError as e:
		exit('/zones.get %d %s - api call failed' % (e, e))
	except Exception as e:
		exit('/zones.get - %s - api call failed' % (e))

	# extract the zone_id which is needed to process that zone
	zone = zones[0]
	zone_id = zone['id']

	# request the DNS records from that zone
	try:
		dns_records = cf.zones.dns_records.get(zone_id)
	except CloudFlare.CloudFlareAPIError as e:
		exit('/zones/dns_records.get %d %s - api call failed' % (e, e))

	# print the results - first the zone name
	print zone_id, zone_name

	# then all the DNS records for that zone
	for dns_record in dns_records:
		r_name = dns_record['name']
		r_type = dns_record['type']
		r_value = dns_record['content']
		r_id = dns_record['id']
		print '\t', r_id, r_name, r_type, r_value

	exit(0)

if __name__ == '__main__':
	main()

Providing CloudFlare Username and API Key

When you create a CloudFlare class you can pass up to three paramaters.

If the account email and API key are not passed when you create the class, then they are retreived from either the users exported shell environment variables or the .cloudflare.cfg or ~/.cloudflare.cfg or ~/.cloudflare/cloudflare.cfg files, in that order.

There is one call that presently doesn't need any email or token certification (the /ips call); hence you can test without any values saved away.

Using shell environment variables

$ export CF_API_EMAIL='user@example.com'
$ export CF_API_KEY='00000000000000000000000000000000'
$ export CF_API_CERTKEY='v1.0-...'
$

Using configuration file to store email and keys

$ cat ~/.cloudflare/cloudflare.cfg 
[CloudFlare]
email = user@example.com
token = 00000000000000000000000000000000
certoken = v1.0-...
$

The CF_API_CERTKEY or certtoken values are used for the Origin-CA /certificates API calls.

Included example code

The examples folder contains many examples in both simple and verbose formats.

A DNS zone code example

#!/usr/bin/env python

import sys
import CloudFlare

def main():
	zone_name = sys.argv[1]
	cf = CloudFlare.CloudFlare()
	zone_info = cf.zones.post(data={'jump_start':False, 'name': zone_name})
	zone_id = zone_info['id']

	dns_records = [
		{'name':'foo', 'type':'AAAA', 'content':'2001:d8b::1'},
		{'name':'foo', 'type':'A', 'content':'192.168.0.1'},
		{'name':'duh', 'type':'A', 'content':'10.0.0.1', 'ttl':120},
		{'name':'bar', 'type':'CNAME', 'content':'foo'},
		{'name':'shakespeare', 'type':'TXT', 'content':"What's in a name? That which we call a rose by any other name ..."}
	]

	for dns_record in dns_records:
		r = cf.zones.dns_records.post(zone_id, data=dns_record)
	exit(0)

if __name__ == '__main__':
	main()

CLI

All API calls can be called from the command line. The command will convert domain names on-the-fly into zone_identifier's.

$ cli4 [-h|--help] [-v|--verbose] [-q|--quiet] [--get|--patch|--post|-put|--delete] [item=value ...] /command...

For API calls that need a set of date or parameters passed there is a item=value format. If you want a numeric value passed, then == can be used to force the value to be treated as a numeric value.

The output from the CLI command is in json format (and human readable).

Simple CLI examples

More complex CLI examples

Here is the creation of a DNS entry, followed by a listing of that entry and then the deletion of that entry.

$ $ cli4 --post name="test" type="A" content="10.0.0.1" /zones/:example.com/dns_records
{
    "id": "94e028933c87b4bff3c70a42e6daac4f",
    "name": "test.example.com",
    "type": "A",
    "content": "10.0.0.1",
    ...
}
$

$ cli4 /zones/:example.com/dns_records/:test.example.com | jq '{"id":.id,"name":.name,"type":.type,"content":.content}'
{
  "id": "94e028933c87b4bff3c70a42e6daac4f",
  "name": "test.example.com",
  "type": "A",
  "content": "10.0.0.1"
}

$ cli4 --delete /zones/:example.com/dns_records/:test.example.com | jq -c .
{"id":"94e028933c87b4bff3c70a42e6daac4f"}
$

There's the ability to handle dns entries with multiple values. This produces more than one API call within the command.

$ cli4 /zones/:example.com/dns_records/:test.example.com | jq -c '.[]|{"id":.id,"name":.name,"type":.type,"content":.content}'
{"id":"bca0c4a5e3691e62841627e4dc3a19ed","name":"test.example.com","type":"A","content":"192.168.0.1"}
{"id":"d94f788e6bf72ba2a54145ad04b34f08","name":"test.example.com","type":"AAAA","content":"2001:d8b::1"}
$

Here are the cache purging commands.

$ cli4 --delete purge_everything=true /zones/:example.com/purge_cache | jq -c .
{"id":"d8afaec3dd2b7f8c1b470e594a21a01d"}
$

$ cli4 --delete files='[http://example.com/css/styles.css]' /zones/:example.com/purge_cache | jq -c .
{"id":"d8afaec3dd2b7f8c1b470e594a21a01d"}
$

$ cli4 --delete files='[http://example.com/css/styles.css,http://example.com/js/script.js]' /zones/:example.com/purge_cache | jq -c .
{"id":"d8afaec3dd2b7f8c1b470e594a21a01d"}
$

$ cli4 --delete tags='[tag1,tag2,tag3]' /zones/:example.com/purge_cache | jq -c .
cli4: /zones/:example.com/purge_cache - 1107 Only enterprise zones can purge by tag.
$

A somewhat useful listing of available plans for a specific zone.

$ cli4 /zones/:example.com/available_plans | jq -c '.[]|{"id":.id,"name":.name}'
{"id":"a577b510288e82b26486fd1df47000ec","name":"Pro Website"}
{"id":"1ac039f6c29b691475c3d74fe588d1ae","name":"Business Website"}
{"id":"94f3b7b768b0458b56d2cac4fe5ec0f9","name":"Enterprise Website"}
{"id":"0feeeeeeeeeeeeeeeeeeeeeeeeeeeeee","name":"Free Website"}
$ 

DNSSEC CLI examples

$ cli4 /zones/:example.com/dnssec | jq -c '{"status":.status}'
{"status":"disabled"}
$

$ cli4 --patch status=active /zones/:example.com/dnssec | jq -c '{"status":.status}'
{"status":"pending"}
$

$ cli4 /zones/:example.com/dnssec 
{
    "algorithm": "13", 
    "digest": "41600621c65065b09230ebc9556ced937eb7fd86e31635d0025326ccf09a7194", 
    "digest_algorithm": "SHA256", 
    "digest_type": "2", 
    "ds": "example.com. 3600 IN DS 2371 13 2 41600621c65065b09230ebc9556ced937eb7fd86e31635d0025326ccf09a7194", 
    "flags": 257, 
    "key_tag": 2371, 
    "key_type": "ECDSAP256SHA256", 
    "modified_on": "2016-05-01T22:42:15.591158Z", 
    "public_key": "mdsswUyr3DPW132mOi8V9xESWE8jTo0dxCjjnopKl+GqJxpVXckHAeF+KkxLbxILfDLUT0rAK9iUzy1L53eKGQ==", 
    "status": "pending"
}
$ 

Implemented API calls

GETPUTPOSTPATCHDELETEAPI call
GETPOSTDELETE/certificates
GET/ips
GETPATCH/organizations
GETPOSTPATCHDELETE/organizations/:identifier/firewall/access_rules/rules
PATCH/organizations/:identifier/invite
GETPOSTDELETE/organizations/:identifier/invites
GETPATCHDELETE/organizations/:identifier/members
GETPOSTPATCHDELETE/organizations/:identifier/railguns
GET/organizations/:identifier/railguns/:identifier/zones
GET/organizations/:identifier/roles
GETPOSTPATCHDELETE/organizations/:identifier/virtual_dns
GETPOSTPATCHDELETE/railguns
GET/railguns/:identifier/zones
GETPATCH/user
GET/user/billing/history
GET/user/billing/profile
GET/user/billing/subscriptions/apps
GET/user/billing/subscriptions/zones
GETPOSTPATCHDELETE/user/firewall/access_rules/rules
GETPATCH/user/invites
GETDELETE/user/organizations
GETPOSTPATCHDELETE/user/virtual_dns
GETPOSTPATCHDELETE/zones
PUT/zones/:identifier/activation_check
GET/zones/:identifier/analytics/colos
GET/zones/:identifier/analytics/dashboard
GET/zones/:identifier/available_plans
PUT/zones/:identifier/custom_certificates/prioritize
GETPOSTPATCHDELETE/zones/:identifier/custom_certificates
GETPUT/zones/:identifier/custom_pages
GETPUTPOSTDELETE/zones/:identifier/dns_records
GETPATCH/zones/:identifier/firewall/waf/packages/:identifier/groups
GETPATCH/zones/:identifier/firewall/waf/packages/:identifier/rules
GETPATCH/zones/:identifier/firewall/waf/packages
GETPOSTPATCHDELETE/zones/:identifier/firewall/access_rules/rules
GETPOSTPATCHDELETE/zones/:identifier/keyless_certificates
GETPUTPOSTPATCHDELETE/zones/:identifier/pagerules
DELETE/zones/:identifier/purge_cache
GET/zones/:identifier/railguns/:identifier/diagnose
GETPATCH/zones/:identifier/railguns
GETPATCH/zones/:identifier/settings
GET/zones/:identifier/settings/advanced_ddos
GETPATCH/zones/:identifier/settings/always_online
GETPATCH/zones/:identifier/settings/browser_cache_ttl
GETPATCH/zones/:identifier/settings/browser_check
GETPATCH/zones/:identifier/settings/cache_level
GETPATCH/zones/:identifier/settings/challenge_ttl
GETPATCH/zones/:identifier/settings/development_mode
GETPATCH/zones/:identifier/settings/email_obfuscation
GETPATCH/zones/:identifier/settings/hotlink_protection
GETPATCH/zones/:identifier/settings/ip_geolocation
GETPATCH/zones/:identifier/settings/ipv6
GETPATCH/zones/:identifier/settings/minify
GETPATCH/zones/:identifier/settings/mirage
GETPATCH/zones/:identifier/settings/mobile_redirect
GETPATCH/zones/:identifier/settings/origin_error_page_pass_thru
GETPATCH/zones/:identifier/settings/polish
GETPATCH/zones/:identifier/settings/prefetch_preload
GETPATCH/zones/:identifier/settings/response_buffering
GETPATCH/zones/:identifier/settings/rocket_loader
GETPATCH/zones/:identifier/settings/security_header
GETPATCH/zones/:identifier/settings/security_level
GETPATCH/zones/:identifier/settings/server_side_exclude
GETPATCH/zones/:identifier/settings/sort_query_string_for_cache
GETPATCH/zones/:identifier/settings/ssl
GETPATCH/zones/:identifier/settings/tls_1_2_only
GETPATCH/zones/:identifier/settings/tls_client_auth
GETPATCH/zones/:identifier/settings/true_client_ip_header
GETPATCH/zones/:identifier/settings/waf

Adding extra API calls manually

Extra API calls can be added via the configuration file

$ cat ~/.cloudflare/cloudflare.cfg 
[CloudFlare]
extras=
        /client/v4/command
        /client/v4/command/:command_identifier
        /client/v4/command/:command_identifier/settings
$

While it's easy to call anything within CloudFlare's API, it's not very useful to add items in here as they will simply return API URL errors. Technically, this is only useful for internal testing within CloudFlare.

Issues

The following error can be caused by an out of date SSL/TLS library and/or out of date Python.

/usr/local/lib/python2.7/dist-packages/requests/packages/urllib3/util/ssl_.py:318: SNIMissingWarning: An HTTPS request has been made, but the SNI (Subject Name Indication) extension to TLS is not available on this platform. This may cause the server to present an incorrect TLS certificate, which can cause validation failures. You can upgrade to a newer version of Python to solve this. For more information, see https://urllib3.readthedocs.org/en/latest/security.html#snimissingwarning.
  SNIMissingWarning
/usr/local/lib/python2.7/dist-packages/requests/packages/urllib3/util/ssl_.py:122: InsecurePlatformWarning: A true SSLContext object is not available. This prevents urllib3 from configuring SSL appropriately and may cause certain SSL connections to fail. You can upgrade to a newer version of Python to solve this. For more information, see https://urllib3.readthedocs.org/en/latest/security.html#insecureplatformwarning.
  InsecurePlatformWarning

The solution can be found here and/or here.

Credit

This is based on work by Felix Wong (gnowxilef) found here. It has been seriously expanded upon.

Copyright

Portions copyright Felix Wong (gnowxilef) 2015 and CloudFlare 2016.