diff options
Diffstat (limited to 'lib/python2.7/site-packages/Twisted-12.2.0-py2.7-linux-x86_64.egg/twisted/names/authority.py')
-rwxr-xr-x | lib/python2.7/site-packages/Twisted-12.2.0-py2.7-linux-x86_64.egg/twisted/names/authority.py | 334 |
1 files changed, 0 insertions, 334 deletions
diff --git a/lib/python2.7/site-packages/Twisted-12.2.0-py2.7-linux-x86_64.egg/twisted/names/authority.py b/lib/python2.7/site-packages/Twisted-12.2.0-py2.7-linux-x86_64.egg/twisted/names/authority.py deleted file mode 100755 index 0dc7c1c2..00000000 --- a/lib/python2.7/site-packages/Twisted-12.2.0-py2.7-linux-x86_64.egg/twisted/names/authority.py +++ /dev/null @@ -1,334 +0,0 @@ -# -*- test-case-name: twisted.names.test.test_names -*- -# Copyright (c) Twisted Matrix Laboratories. -# See LICENSE for details. - -""" -Authoritative resolvers. -""" - -import os -import time - -from twisted.names import dns -from twisted.internet import defer -from twisted.python import failure -from twisted.python.compat import execfile - -import common - -def getSerial(filename = '/tmp/twisted-names.serial'): - """Return a monotonically increasing (across program runs) integer. - - State is stored in the given file. If it does not exist, it is - created with rw-/---/--- permissions. - """ - serial = time.strftime('%Y%m%d') - - o = os.umask(0177) - try: - if not os.path.exists(filename): - f = file(filename, 'w') - f.write(serial + ' 0') - f.close() - finally: - os.umask(o) - - serialFile = file(filename, 'r') - lastSerial, ID = serialFile.readline().split() - ID = (lastSerial == serial) and (int(ID) + 1) or 0 - serialFile.close() - serialFile = file(filename, 'w') - serialFile.write('%s %d' % (serial, ID)) - serialFile.close() - serial = serial + ('%02d' % (ID,)) - return serial - - -#class LookupCacherMixin(object): -# _cache = None -# -# def _lookup(self, name, cls, type, timeout = 10): -# if not self._cache: -# self._cache = {} -# self._meth = super(LookupCacherMixin, self)._lookup -# -# if self._cache.has_key((name, cls, type)): -# return self._cache[(name, cls, type)] -# else: -# r = self._meth(name, cls, type, timeout) -# self._cache[(name, cls, type)] = r -# return r - - -class FileAuthority(common.ResolverBase): - """An Authority that is loaded from a file.""" - - soa = None - records = None - - def __init__(self, filename): - common.ResolverBase.__init__(self) - self.loadFile(filename) - self._cache = {} - - - def __setstate__(self, state): - self.__dict__ = state -# print 'setstate ', self.soa - - def _lookup(self, name, cls, type, timeout = None): - cnames = [] - results = [] - authority = [] - additional = [] - default_ttl = max(self.soa[1].minimum, self.soa[1].expire) - - domain_records = self.records.get(name.lower()) - - if domain_records: - for record in domain_records: - if record.ttl is not None: - ttl = record.ttl - else: - ttl = default_ttl - - if record.TYPE == dns.NS and name.lower() != self.soa[0].lower(): - # NS record belong to a child zone: this is a referral. As - # NS records are authoritative in the child zone, ours here - # are not. RFC 2181, section 6.1. - authority.append( - dns.RRHeader(name, record.TYPE, dns.IN, ttl, record, auth=False) - ) - elif record.TYPE == type or type == dns.ALL_RECORDS: - results.append( - dns.RRHeader(name, record.TYPE, dns.IN, ttl, record, auth=True) - ) - if record.TYPE == dns.CNAME: - cnames.append( - dns.RRHeader(name, record.TYPE, dns.IN, ttl, record, auth=True) - ) - if not results: - results = cnames - - for record in results + authority: - section = {dns.NS: additional, dns.CNAME: results, dns.MX: additional}.get(record.type) - if section is not None: - n = str(record.payload.name) - for rec in self.records.get(n.lower(), ()): - if rec.TYPE == dns.A: - section.append( - dns.RRHeader(n, dns.A, dns.IN, rec.ttl or default_ttl, rec, auth=True) - ) - - if not results and not authority: - # Empty response. Include SOA record to allow clients to cache - # this response. RFC 1034, sections 3.7 and 4.3.4, and RFC 2181 - # section 7.1. - authority.append( - dns.RRHeader(self.soa[0], dns.SOA, dns.IN, ttl, self.soa[1], auth=True) - ) - return defer.succeed((results, authority, additional)) - else: - if name.lower().endswith(self.soa[0].lower()): - # We are the authority and we didn't find it. Goodbye. - return defer.fail(failure.Failure(dns.AuthoritativeDomainError(name))) - return defer.fail(failure.Failure(dns.DomainError(name))) - - - def lookupZone(self, name, timeout = 10): - if self.soa[0].lower() == name.lower(): - # Wee hee hee hooo yea - default_ttl = max(self.soa[1].minimum, self.soa[1].expire) - if self.soa[1].ttl is not None: - soa_ttl = self.soa[1].ttl - else: - soa_ttl = default_ttl - results = [dns.RRHeader(self.soa[0], dns.SOA, dns.IN, soa_ttl, self.soa[1], auth=True)] - for (k, r) in self.records.items(): - for rec in r: - if rec.ttl is not None: - ttl = rec.ttl - else: - ttl = default_ttl - if rec.TYPE != dns.SOA: - results.append(dns.RRHeader(k, rec.TYPE, dns.IN, ttl, rec, auth=True)) - results.append(results[0]) - return defer.succeed((results, (), ())) - return defer.fail(failure.Failure(dns.DomainError(name))) - - def _cbAllRecords(self, results): - ans, auth, add = [], [], [] - for res in results: - if res[0]: - ans.extend(res[1][0]) - auth.extend(res[1][1]) - add.extend(res[1][2]) - return ans, auth, add - - -class PySourceAuthority(FileAuthority): - """A FileAuthority that is built up from Python source code.""" - - def loadFile(self, filename): - g, l = self.setupConfigNamespace(), {} - execfile(filename, g, l) - if not l.has_key('zone'): - raise ValueError, "No zone defined in " + filename - - self.records = {} - for rr in l['zone']: - if isinstance(rr[1], dns.Record_SOA): - self.soa = rr - self.records.setdefault(rr[0].lower(), []).append(rr[1]) - - - def wrapRecord(self, type): - return lambda name, *arg, **kw: (name, type(*arg, **kw)) - - - def setupConfigNamespace(self): - r = {} - items = dns.__dict__.iterkeys() - for record in [x for x in items if x.startswith('Record_')]: - type = getattr(dns, record) - f = self.wrapRecord(type) - r[record[len('Record_'):]] = f - return r - - -class BindAuthority(FileAuthority): - """An Authority that loads BIND configuration files""" - - def loadFile(self, filename): - self.origin = os.path.basename(filename) + '.' # XXX - this might suck - lines = open(filename).readlines() - lines = self.stripComments(lines) - lines = self.collapseContinuations(lines) - self.parseLines(lines) - - - def stripComments(self, lines): - return [ - a.find(';') == -1 and a or a[:a.find(';')] for a in [ - b.strip() for b in lines - ] - ] - - - def collapseContinuations(self, lines): - L = [] - state = 0 - for line in lines: - if state == 0: - if line.find('(') == -1: - L.append(line) - else: - L.append(line[:line.find('(')]) - state = 1 - else: - if line.find(')') != -1: - L[-1] += ' ' + line[:line.find(')')] - state = 0 - else: - L[-1] += ' ' + line - lines = L - L = [] - for line in lines: - L.append(line.split()) - return filter(None, L) - - - def parseLines(self, lines): - TTL = 60 * 60 * 3 - ORIGIN = self.origin - - self.records = {} - - for (line, index) in zip(lines, range(len(lines))): - if line[0] == '$TTL': - TTL = dns.str2time(line[1]) - elif line[0] == '$ORIGIN': - ORIGIN = line[1] - elif line[0] == '$INCLUDE': # XXX - oh, fuck me - raise NotImplementedError('$INCLUDE directive not implemented') - elif line[0] == '$GENERATE': - raise NotImplementedError('$GENERATE directive not implemented') - else: - self.parseRecordLine(ORIGIN, TTL, line) - - - def addRecord(self, owner, ttl, type, domain, cls, rdata): - if not domain.endswith('.'): - domain = domain + '.' + owner - else: - domain = domain[:-1] - f = getattr(self, 'class_%s' % cls, None) - if f: - f(ttl, type, domain, rdata) - else: - raise NotImplementedError, "Record class %r not supported" % cls - - - def class_IN(self, ttl, type, domain, rdata): - record = getattr(dns, 'Record_%s' % type, None) - if record: - r = record(*rdata) - r.ttl = ttl - self.records.setdefault(domain.lower(), []).append(r) - - print 'Adding IN Record', domain, ttl, r - if type == 'SOA': - self.soa = (domain, r) - else: - raise NotImplementedError, "Record type %r not supported" % type - - - # - # This file ends here. Read no further. - # - def parseRecordLine(self, origin, ttl, line): - MARKERS = dns.QUERY_CLASSES.values() + dns.QUERY_TYPES.values() - cls = 'IN' - owner = origin - - if line[0] == '@': - line = line[1:] - owner = origin -# print 'default owner' - elif not line[0].isdigit() and line[0] not in MARKERS: - owner = line[0] - line = line[1:] -# print 'owner is ', owner - - if line[0].isdigit() or line[0] in MARKERS: - domain = owner - owner = origin -# print 'woops, owner is ', owner, ' domain is ', domain - else: - domain = line[0] - line = line[1:] -# print 'domain is ', domain - - if line[0] in dns.QUERY_CLASSES.values(): - cls = line[0] - line = line[1:] -# print 'cls is ', cls - if line[0].isdigit(): - ttl = int(line[0]) - line = line[1:] -# print 'ttl is ', ttl - elif line[0].isdigit(): - ttl = int(line[0]) - line = line[1:] -# print 'ttl is ', ttl - if line[0] in dns.QUERY_CLASSES.values(): - cls = line[0] - line = line[1:] -# print 'cls is ', cls - - type = line[0] -# print 'type is ', type - rdata = line[1:] -# print 'rdata is ', rdata - - self.addRecord(owner, ttl, type, domain, cls, rdata) |