| Index: third_party/twisted_8_1/twisted/names/authority.py
|
| diff --git a/third_party/twisted_8_1/twisted/names/authority.py b/third_party/twisted_8_1/twisted/names/authority.py
|
| deleted file mode 100644
|
| index 991bdb64794a95dc3d80123dc764d49fc86a713b..0000000000000000000000000000000000000000
|
| --- a/third_party/twisted_8_1/twisted/names/authority.py
|
| +++ /dev/null
|
| @@ -1,322 +0,0 @@
|
| -# -*- test-case-name: twisted.names.test.test_names -*-
|
| -# Copyright (c) 2001-2004 Twisted Matrix Laboratories.
|
| -# See LICENSE for details.
|
| -
|
| -
|
| -from __future__ import nested_scopes
|
| -
|
| -import os
|
| -import time
|
| -
|
| -from twisted.names import dns
|
| -from twisted.internet import defer
|
| -from twisted.python import failure
|
| -
|
| -import common
|
| -
|
| -def getSerial(filename = '/tmp/twisted-names.serial'):
|
| - """Return a monotonically increasing (across program runs) integer.
|
| -
|
| - State is stored in the given file. If it does not exist, it is
|
| - created with rw-/---/--- permissions.
|
| - """
|
| - serial = time.strftime('%Y%m%d')
|
| -
|
| - o = os.umask(0177)
|
| - try:
|
| - if not os.path.exists(filename):
|
| - f = file(filename, 'w')
|
| - f.write(serial + ' 0')
|
| - f.close()
|
| - finally:
|
| - os.umask(o)
|
| -
|
| - serialFile = file(filename, 'r')
|
| - lastSerial, ID = serialFile.readline().split()
|
| - ID = (lastSerial == serial) and (int(ID) + 1) or 0
|
| - serialFile.close()
|
| - serialFile = file(filename, 'w')
|
| - serialFile.write('%s %d' % (serial, ID))
|
| - serialFile.close()
|
| - serial = serial + ('%02d' % (ID,))
|
| - return serial
|
| -
|
| -
|
| -#class LookupCacherMixin(object):
|
| -# _cache = None
|
| -#
|
| -# def _lookup(self, name, cls, type, timeout = 10):
|
| -# if not self._cache:
|
| -# self._cache = {}
|
| -# self._meth = super(LookupCacherMixin, self)._lookup
|
| -#
|
| -# if self._cache.has_key((name, cls, type)):
|
| -# return self._cache[(name, cls, type)]
|
| -# else:
|
| -# r = self._meth(name, cls, type, timeout)
|
| -# self._cache[(name, cls, type)] = r
|
| -# return r
|
| -
|
| -
|
| -class FileAuthority(common.ResolverBase):
|
| - """An Authority that is loaded from a file."""
|
| -
|
| - soa = None
|
| - records = None
|
| -
|
| - def __init__(self, filename):
|
| - common.ResolverBase.__init__(self)
|
| - self.loadFile(filename)
|
| - self._cache = {}
|
| -
|
| -
|
| - def __setstate__(self, state):
|
| - self.__dict__ = state
|
| -# print 'setstate ', self.soa
|
| -
|
| - def _lookup(self, name, cls, type, timeout = None):
|
| - cnames = []
|
| - results = []
|
| - authority = []
|
| - additional = []
|
| - default_ttl = max(self.soa[1].minimum, self.soa[1].expire)
|
| -
|
| - domain_records = self.records.get(name.lower())
|
| -
|
| - if domain_records:
|
| - for record in domain_records:
|
| - if record.ttl is not None:
|
| - ttl = record.ttl
|
| - else:
|
| - ttl = default_ttl
|
| -
|
| - if record.TYPE == type or type == dns.ALL_RECORDS:
|
| - results.append(
|
| - dns.RRHeader(name, record.TYPE, dns.IN, ttl, record, auth=True)
|
| - )
|
| - elif record.TYPE == dns.NS and type != dns.ALL_RECORDS:
|
| - authority.append(
|
| - dns.RRHeader(name, record.TYPE, dns.IN, ttl, record, auth=True)
|
| - )
|
| - if record.TYPE == dns.CNAME:
|
| - cnames.append(
|
| - dns.RRHeader(name, record.TYPE, dns.IN, ttl, record, auth=True)
|
| - )
|
| - if not results:
|
| - results = cnames
|
| -
|
| - for record in results + authority:
|
| - section = {dns.NS: additional, dns.CNAME: results, dns.MX: additional}.get(record.type)
|
| - if section is not None:
|
| - n = str(record.payload.name)
|
| - for rec in self.records.get(n.lower(), ()):
|
| - if rec.TYPE == dns.A:
|
| - section.append(
|
| - dns.RRHeader(n, dns.A, dns.IN, rec.ttl or default_ttl, rec, auth=True)
|
| - )
|
| -
|
| - return defer.succeed((results, authority, additional))
|
| - else:
|
| - if name.lower().endswith(self.soa[0].lower()):
|
| - # We are the authority and we didn't find it. Goodbye.
|
| - return defer.fail(failure.Failure(dns.AuthoritativeDomainError(name)))
|
| - return defer.fail(failure.Failure(dns.DomainError(name)))
|
| -
|
| -
|
| - def lookupZone(self, name, timeout = 10):
|
| - if self.soa[0].lower() == name.lower():
|
| - # Wee hee hee hooo yea
|
| - default_ttl = max(self.soa[1].minimum, self.soa[1].expire)
|
| - if self.soa[1].ttl is not None:
|
| - soa_ttl = self.soa[1].ttl
|
| - else:
|
| - soa_ttl = default_ttl
|
| - results = [dns.RRHeader(self.soa[0], dns.SOA, dns.IN, soa_ttl, self.soa[1], auth=True)]
|
| - for (k, r) in self.records.items():
|
| - for rec in r:
|
| - if rec.ttl is not None:
|
| - ttl = rec.ttl
|
| - else:
|
| - ttl = default_ttl
|
| - if rec.TYPE != dns.SOA:
|
| - results.append(dns.RRHeader(k, rec.TYPE, dns.IN, ttl, rec, auth=True))
|
| - results.append(results[0])
|
| - return defer.succeed((results, (), ()))
|
| - return defer.fail(failure.Failure(dns.DomainError(name)))
|
| -
|
| - def _cbAllRecords(self, results):
|
| - ans, auth, add = [], [], []
|
| - for res in results:
|
| - if res[0]:
|
| - ans.extend(res[1][0])
|
| - auth.extend(res[1][1])
|
| - add.extend(res[1][2])
|
| - return ans, auth, add
|
| -
|
| -
|
| -class PySourceAuthority(FileAuthority):
|
| - """A FileAuthority that is built up from Python source code."""
|
| -
|
| - def loadFile(self, filename):
|
| - g, l = self.setupConfigNamespace(), {}
|
| - execfile(filename, g, l)
|
| - if not l.has_key('zone'):
|
| - raise ValueError, "No zone defined in " + filename
|
| -
|
| - self.records = {}
|
| - for rr in l['zone']:
|
| - if isinstance(rr[1], dns.Record_SOA):
|
| - self.soa = rr
|
| - self.records.setdefault(rr[0].lower(), []).append(rr[1])
|
| -
|
| -
|
| - def wrapRecord(self, type):
|
| - return lambda name, *arg, **kw: (name, type(*arg, **kw))
|
| -
|
| -
|
| - def setupConfigNamespace(self):
|
| - r = {}
|
| - items = dns.__dict__.iterkeys()
|
| - for record in [x for x in items if x.startswith('Record_')]:
|
| - type = getattr(dns, record)
|
| - f = self.wrapRecord(type)
|
| - r[record[len('Record_'):]] = f
|
| - return r
|
| -
|
| -
|
| -class BindAuthority(FileAuthority):
|
| - """An Authority that loads BIND configuration files"""
|
| -
|
| - def loadFile(self, filename):
|
| - self.origin = os.path.basename(filename) + '.' # XXX - this might suck
|
| - lines = open(filename).readlines()
|
| - lines = self.stripComments(lines)
|
| - lines = self.collapseContinuations(lines)
|
| - self.parseLines(lines)
|
| -
|
| -
|
| - def stripComments(self, lines):
|
| - return [
|
| - a.find(';') == -1 and a or a[:a.find(';')] for a in [
|
| - b.strip() for b in lines
|
| - ]
|
| - ]
|
| -
|
| -
|
| - def collapseContinuations(self, lines):
|
| - L = []
|
| - state = 0
|
| - for line in lines:
|
| - if state == 0:
|
| - if line.find('(') == -1:
|
| - L.append(line)
|
| - else:
|
| - L.append(line[:line.find('(')])
|
| - state = 1
|
| - else:
|
| - if line.find(')') != -1:
|
| - L[-1] += ' ' + line[:line.find(')')]
|
| - state = 0
|
| - else:
|
| - L[-1] += ' ' + line
|
| - lines = L
|
| - L = []
|
| - for line in lines:
|
| - L.append(line.split())
|
| - return filter(None, L)
|
| -
|
| -
|
| - def parseLines(self, lines):
|
| - TTL = 60 * 60 * 3
|
| - ORIGIN = self.origin
|
| -
|
| - self.records = {}
|
| -
|
| - for (line, index) in zip(lines, range(len(lines))):
|
| - if line[0] == '$TTL':
|
| - TTL = dns.str2time(line[1])
|
| - elif line[0] == '$ORIGIN':
|
| - ORIGIN = line[1]
|
| - elif line[0] == '$INCLUDE': # XXX - oh, fuck me
|
| - raise NotImplementedError('$INCLUDE directive not implemented')
|
| - elif line[0] == '$GENERATE':
|
| - raise NotImplementedError('$GENERATE directive not implemented')
|
| - else:
|
| - self.parseRecordLine(ORIGIN, TTL, line)
|
| -
|
| -
|
| - def addRecord(self, owner, ttl, type, domain, cls, rdata):
|
| - if not domain.endswith('.'):
|
| - domain = domain + '.' + owner
|
| - else:
|
| - domain = domain[:-1]
|
| - f = getattr(self, 'class_%s' % cls, None)
|
| - if f:
|
| - f(ttl, type, domain, rdata)
|
| - else:
|
| - raise NotImplementedError, "Record class %r not supported" % cls
|
| -
|
| -
|
| - def class_IN(self, ttl, type, domain, rdata):
|
| - record = getattr(dns, 'Record_%s' % type, None)
|
| - if record:
|
| - r = record(*rdata)
|
| - r.ttl = ttl
|
| - self.records.setdefault(domain.lower(), []).append(r)
|
| -
|
| - print 'Adding IN Record', domain, ttl, r
|
| - if type == 'SOA':
|
| - self.soa = (domain, r)
|
| - else:
|
| - raise NotImplementedError, "Record type %r not supported" % type
|
| -
|
| -
|
| - #
|
| - # This file ends here. Read no further.
|
| - #
|
| - def parseRecordLine(self, origin, ttl, line):
|
| - MARKERS = dns.QUERY_CLASSES.values() + dns.QUERY_TYPES.values()
|
| - cls = 'IN'
|
| - owner = origin
|
| -
|
| - if line[0] == '@':
|
| - line = line[1:]
|
| - owner = origin
|
| -# print 'default owner'
|
| - elif not line[0].isdigit() and line[0] not in MARKERS:
|
| - owner = line[0]
|
| - line = line[1:]
|
| -# print 'owner is ', owner
|
| -
|
| - if line[0].isdigit() or line[0] in MARKERS:
|
| - domain = owner
|
| - owner = origin
|
| -# print 'woops, owner is ', owner, ' domain is ', domain
|
| - else:
|
| - domain = line[0]
|
| - line = line[1:]
|
| -# print 'domain is ', domain
|
| -
|
| - if line[0] in dns.QUERY_CLASSES.values():
|
| - cls = line[0]
|
| - line = line[1:]
|
| -# print 'cls is ', cls
|
| - if line[0].isdigit():
|
| - ttl = int(line[0])
|
| - line = line[1:]
|
| -# print 'ttl is ', ttl
|
| - elif line[0].isdigit():
|
| - ttl = int(line[0])
|
| - line = line[1:]
|
| -# print 'ttl is ', ttl
|
| - if line[0] in dns.QUERY_CLASSES.values():
|
| - cls = line[0]
|
| - line = line[1:]
|
| -# print 'cls is ', cls
|
| -
|
| - type = line[0]
|
| -# print 'type is ', type
|
| - rdata = line[1:]
|
| -# print 'rdata is ', rdata
|
| -
|
| - self.addRecord(owner, ttl, type, domain, cls, rdata)
|
|
|