refactor code, pylint 10/10

This commit is contained in:
2021-08-30 02:23:58 +02:00
parent 4c98f1576a
commit 0aec746eb3
3 changed files with 122 additions and 263 deletions

View File

@@ -9,6 +9,7 @@
import sys
import yaml
import dns
from dns import resolver
@@ -24,49 +25,90 @@ pitc_nameservers = [
]
# list of puzzle managed zone files
pitc_domains = [ 'puzzle.ch.yaml', 'puzzle.yaml', 'nonpuzzle.yaml' ]
pitc_domains = [
'puzzle.ch.yaml',
'puzzle.yaml',
'nonpuzzle.yaml'
]
# configure opendns resolver
resolver = resolver.Resolver()
resolver.nameservers = ['208.67.222.222','208.67.220.220']
def get_authoritative_ns(domains, verbose=False):
def do_check(domains, nameservers, verbose=False):
'''
dsc: Query the domains and return the authoritative name server.
arg: [list], domain to query
ret: [str], nameserver
dsc: Implementatin of the check loop which writes output if verbose is set.
Checks if the authoritative ns returned for domain x is in the list
of nameservers provided as argument.
arg: [list], domains to check
arg: [list], verified nameservers
arg: [boolean], verbose printing or not
ret: [boolean], true if all checked nameservers are ok, false otherwise
'''
for domain in domains:
answers = resolver.resolve(domain,'NS')
for server in answers:
if not verify_authoritative_ns(str(server)):
print("ERROR: {} got answer from {}, not managed by puzzle".format(domain, server), file=sys.stderr)
returned_nameservers = get_authoritative_ns(domain)
for ret_ns in returned_nameservers:
try:
if verify_authoritative_ns(ret_ns, nameservers):
if verbose:
print("NS for domain {} is {}".format(domain, ret_ns))
else:
print("ERROR: NS for {} is {}, not managed by Puzzle!".format(domain, ret_ns),
file=sys.stderr)
return False
except TypeError:
print("List of domains or nameservers contains errors.")
return False
elif verbose:
print("{} got answer from {}".format(domain, server))
return True
def get_domains(filenames):
def get_authoritative_ns(domain):
'''
dsc: Query the domain and return the authoritative name servers.
arg: [str], domain to query
ret: [list], list of nameservers or empty list on error.
'''
try:
answer = resolver.resolve(domain,'NS')
servers = [ str(server) for server in answer ]
except dns.resolver.NXDOMAIN as err:
print(err)
return []
else:
return servers
def get_domains_from_yaml(filenames):
'''
dsc: Loads domain names from a list of yaml files.
arg: [list], filenames
ret: [list], arbitrary list of domain names
ret: [list], arbitrary list of domain names, emptylist on err
'''
domains = []
for file in filenames:
with open(file, 'r') as zone_file:
yaml_data = yaml.safe_load(zone_file)
yaml_list = list(yaml_data.get('zones'))
domains.extend(yaml_list)
return domains
try:
for file in filenames:
with open(file, 'r', encoding="ascii") as zone_file:
yaml_data = yaml.safe_load(zone_file)
yaml_list = list(yaml_data.get('zones'))
domains.extend(yaml_list)
except FileNotFoundError as err:
print(err)
return []
else:
return domains
def verify_authoritative_ns(nameserver):
def verify_authoritative_ns(nameserver, verified_nameservers):
'''
dsc: Verifies if the authoritative NS belongs to the puzzle managed NS.
arg: [str], nameserver
arg: [str], nameserver to test
arg: [list], a list of verified nameservers
ret: [boolean], true if ok; false if nok.
'''
if nameserver in pitc_nameservers:
if not isinstance(nameserver, str):
print("Type of nameserver must be string!")
raise TypeError
if not isinstance(verified_nameservers, list):
print("Type of nameservers must be list!")
raise TypeError
if nameserver in verified_nameservers:
return True
return False
@@ -74,7 +116,8 @@ if __name__ == '__main__':
VERBOSE = False
if '-v' in sys.argv:
VERBOSE = True
dns = get_domains(pitc_domains)
if not get_authoritative_ns(dns, VERBOSE):
puzzle_domains = get_domains_from_yaml(pitc_domains)
if do_check(puzzle_domains, pitc_nameservers, VERBOSE):
sys.exit(0)
else:
sys.exit(1)
sys.exit(0)