Source code for dns_sprockets_lib.loaders.xfr

'''
xfr - Zone loader: Xfr

.. Copyright (c) 2015 Neustar, Inc. All rights reserved.
.. See COPYRIGHT.txt for full notice.  See LICENSE.txt for terms and conditions.
'''


import dns.rdatatype
import dns.inet
import dns.tsig
import dns.tsigkeyring
import dns.query
import dns.zone

import dns_sprockets_lib.loaders as loaders


_KEYALGORITHMS = {
    str(dns.tsig.HMAC_MD5): dns.tsig.HMAC_MD5,
    str(dns.tsig.HMAC_SHA1): dns.tsig.HMAC_SHA1,
    str(dns.tsig.HMAC_SHA224): dns.tsig.HMAC_SHA224,
    str(dns.tsig.HMAC_SHA256): dns.tsig.HMAC_SHA256,
    str(dns.tsig.HMAC_SHA384): dns.tsig.HMAC_SHA384,
    str(dns.tsig.HMAC_SHA512): dns.tsig.HMAC_SHA512}


[docs]class Xfr(loaders.ZoneLoader): # pylint: disable=too-few-public-methods # pylint: disable=too-many-instance-attributes ''' Loads a zone by XFR from a name server. ''' LOADER_OPTARGS = { 'rdtype': ('AXFR', 'Type of XFR to perform, AXFR or IXFR'), 'rdclass': ('IN', 'Class of records to pull'), 'timeout': ('5.0', 'Seconds to wait for each response message'), 'keyring': (None, "The TSIG keyring to use, a text dict of name->base64_secret" " e.g. \"{'n1':'H477A900','n2':'K845CL21'}\""), 'keyname': (None, 'The name of the TSIG to use'), 'af': (None, 'The address family to use, AF_INET or AF_INET6'), 'lifetime': (None, 'Total seconds to wait for complete transfer'), 'source': (None, 'Source address for the transfer'), 'source_port': ('0', 'Source port for the transfer'), 'serial': ('0', 'SOA serial number to use as base for IXFR diff'), 'use_udp': ('0', 'Use UDP for IXFRing'), 'keyalgorithm': (str(dns.tsig.default_algorithm), 'The TSIG algorithm to use, one of: %s' % ( ' '.join(sorted(_KEYALGORITHMS.keys()))))} DEFAULT_PORT = 53
[docs] def __init__(self, args): ''' Ctor. ''' self.rdtype = None self.rdclass = None self.timeout = None self.keyring = None self.keyname = None # pylint: disable=invalid-name self.af = None self.lifetime = None self.source = None self.source_port = None self.serial = None self.use_udp = None self.keyalgorithm = None super(Xfr, self).__init__(args)
[docs] def run(self): ''' @return A dns.zone.Zone instance. ''' afs = {'AF_INET': dns.inet.AF_INET, 'AF_INET6': dns.inet.AF_INET6} (where, port) = ('#' in self.args.source and self.args.source.split('#')[:2] or (self.args.source, self.DEFAULT_PORT)) other_args = { 'port': int(port), 'relativize': False, 'rdtype': self.rdtype, 'rdclass': self.rdclass, 'timeout': self.timeout and float(self.timeout) or None, # pylint: disable=eval-used 'keyring': self.keyring and dns.tsigkeyring.from_text(eval(self.keyring)) or None, 'keyname': self.keyname, 'af': self.af and afs[self.af] or None, 'lifetime': self.lifetime and float(self.lifetime) or None, 'source': self.source, 'source_port': int(self.source_port), 'serial': int(self.serial), 'use_udp': bool(int(self.use_udp)), 'keyalgorithm': _KEYALGORITHMS[self.keyalgorithm]} msg_gen = dns.query.xfr(where, self.args.zone, **other_args) try: return dns.zone.from_xfr(msg_gen, relativize=False, check_origin=False) except dns.rdatatype.UnknownRdatatype: print 'ERROR: Unable to XFR from %s - Permission to XFR from here?' % ( self.args.source) return None # end of file