2 from twisted.internet import reactor
3 from twisted.names import server
4 from twisted.names import dns
5 from twisted.names import common
6 from twisted.internet import defer
7 from twisted.python import failure
9 from invirt.config import structs as config
10 import invirt.database
15 class DatabaseAuthority(common.ResolverBase):
16 """An Authority that is loaded from a file."""
20 def __init__(self, domains=None, database=None):
21 common.ResolverBase.__init__(self)
22 if database is not None:
23 invirt.database.connect(database)
25 invirt.database.connect()
26 if domains is not None:
27 self.domains = domains
29 self.domains = config.dns.domains
30 ns = config.dns.nameservers[0]
31 self.soa = dns.Record_SOA(mname=ns.hostname,
32 rname=config.dns.contact.replace('@','.',1),
33 serial=1, refresh=3600, retry=900,
34 expire=3600000, minimum=21600, ttl=3600)
35 self.ns = dns.Record_NS(name=ns.hostname, ttl=3600)
36 record = dns.Record_A(address=ns.ip, ttl=3600)
37 self.ns1 = dns.RRHeader(ns.hostname, dns.A, dns.IN,
38 3600, record, auth=True)
41 def _lookup(self, name, cls, type, timeout = None):
44 value = self._lookup_unsafe(name, cls, type, timeout = None)
45 except (psycopg2.OperationalError, sqlalchemy.exceptions.SQLError):
48 print "Reloading database"
54 def _lookup_unsafe(self, name, cls, type, timeout):
55 invirt.database.clear_cache()
59 if name in self.domains:
62 # This works because domain will remain bound after breaking out of the loop
63 for domain in self.domains:
64 if name.endswith('.'+domain):
67 return defer.fail(failure.Failure(dns.DomainError(name)))
70 additional = [self.ns1]
71 authority.append(dns.RRHeader(domain, dns.NS, dns.IN,
72 3600, self.ns, auth=True))
74 host = name[:-len(domain)-1]
76 if type in (dns.A, dns.ALL_RECORDS):
77 record = dns.Record_A(config.dns.nameservers[0].ip, ttl)
78 results.append(dns.RRHeader(name, dns.A, dns.IN,
79 ttl, record, auth=True))
81 results.append(dns.RRHeader(domain, dns.NS, dns.IN,
82 ttl, self.ns, auth=True))
85 results.append(dns.RRHeader(domain, dns.SOA, dns.IN,
86 ttl, self.soa, auth=True))
88 if 'passup' in dir(config.dns) and host in config.dns.passup:
89 record = dns.Record_CNAME('%s.%s' % (host, config.dns.parent), ttl)
90 return defer.succeed((
91 [dns.RRHeader(name, dns.CNAME, dns.IN, ttl, record, auth=True)],
95 value = invirt.database.Machine.get_by(name=host)
96 if value is None or not value.nics:
97 return defer.fail(failure.Failure(dns.AuthoritativeDomainError(name)))
99 if ip is None: #Deactivated?
100 return defer.fail(failure.Failure(dns.AuthoritativeDomainError(name)))
101 if type in (dns.A, dns.ALL_RECORDS):
102 record = dns.Record_A(ip, ttl)
103 results.append(dns.RRHeader(name, dns.A, dns.IN,
104 ttl, record, auth=True))
105 elif type == dns.SOA:
106 results.append(dns.RRHeader(domain, dns.SOA, dns.IN,
107 ttl, self.soa, auth=True))
108 if len(results) == 0:
111 return defer.succeed((results, authority, additional))
114 return defer.fail(failure.Failure(dns.AuthoritativeDomainError(name)))
116 if '__main__' == __name__:
117 resolver = DatabaseAuthority()
120 f = server.DNSServerFactory(authorities=[resolver], verbose=verbosity)
121 p = dns.DNSDatagramProtocol(f)
122 f.noisy = p.noisy = verbosity
124 reactor.listenUDP(53, p)
125 reactor.listenTCP(53, f)