X-Git-Url: http://xvm.mit.edu/gitweb/invirt/packages/invirt-dns.git/blobdiff_plain/f0fcc10d816f9bd3f04b1c51f09d9a60ecaebe77..3cf61db85b376c3b1cfab1cb57a0f954fdb41e59:/invirt-dns diff --git a/invirt-dns b/invirt-dns index 272fd6c..c9ce43e 100755 --- a/invirt-dns +++ b/invirt-dns @@ -11,6 +11,7 @@ from twisted.python import failure from invirt.common import InvirtConfigError from invirt.config import structs as config import invirt.database +from invirt.database import NIC import psycopg2 import sqlalchemy import time @@ -94,10 +95,12 @@ class DatabaseAuthority(common.ResolverBase): if name.endswith(".in-addr.arpa"): if type in (dns.PTR, dns.ALL_RECORDS): ip = '.'.join(reversed(name.split('.')[:-2])) - value = invirt.database.NIC.query.filter_by(ip=ip).first() + value = invirt.database.NIC.query.filter((NIC.ip == ip) | (NIC.other_ip == ip)).first() if value and value.hostname: hostname = value.hostname if '.' not in hostname: + if ip == value.other_ip: + hostname = hostname + ".other" hostname = hostname + "." + config.dns.domains[0] record = dns.Record_PTR(hostname, ttl) results.append(dns.RRHeader(name, dns.PTR, dns.IN, @@ -109,7 +112,7 @@ class DatabaseAuthority(common.ResolverBase): ttl, self.soa, auth=True)) # FIXME: Should only return success with no records if the name actually exists - elif name == domain or name == '.'+domain: + elif name == domain or name == '.'+domain or name == 'other.'+domain: if type in (dns.A, dns.ALL_RECORDS): record = dns.Record_A(config.dns.nameservers[0].ip, ttl) results.append(dns.RRHeader(name, dns.A, dns.IN, @@ -124,13 +127,25 @@ class DatabaseAuthority(common.ResolverBase): else: host = name[:-len(domain)-1] + other = False + if host.endswith(".other"): + host = host[:-len(".other")] + other = True value = invirt.database.NIC.query.filter_by(hostname=host).first() if value: - ip = value.ip + if other: + ip = value.other_ip + action = value.other_action + else: + ip = value.ip else: value = invirt.database.Machine.query.filter_by(name=host).first() if value: - ip = value.nics[0].ip + if other: + ip = value.nics[0].other_ip + action = value.nics[0].other_action + else: + ip = value.nics[0].ip else: return defer.fail(failure.Failure(dns.AuthoritativeDomainError(name))) if ip is None: @@ -139,7 +154,11 @@ class DatabaseAuthority(common.ResolverBase): record = dns.Record_A(ip, ttl) results.append(dns.RRHeader(name, dns.A, dns.IN, ttl, record, auth=True)) - elif type == dns.SOA: + if other and type in (dns.TXT, dns.ALL_RECORDS): + record = dns.Record_TXT(action if action else '', ttl=ttl) + results.append(dns.RRHeader(name, dns.TXT, dns.IN, + ttl, record, auth=True)) + if type == dns.SOA: results.append(dns.RRHeader(domain, dns.SOA, dns.IN, ttl, self.soa, auth=True)) @@ -195,20 +214,31 @@ class DelegatingQuotingBindAuthority(authority.BindAuthority): L.append(split_line) return filter(None, L) + # See https://twistedmatrix.com/documents/13.1.0/api/twisted.internet.defer.html#inlineCallbacks + @defer.inlineCallbacks def _lookup(self, name, cls, type, timeout = None): - maybeDelegate = False - deferredResult = authority.BindAuthority._lookup(self, name, cls, - type, timeout) - # If we didn't find an exact match for the name we were seeking, - # check if it's within a subdomain we're supposed to delegate to - # some other DNS server. - while (isinstance(deferredResult.result, failure.Failure) - and '.' in name): - maybeDelegate = True - name = name[name.find('.') + 1 :] - deferredResult = authority.BindAuthority._lookup(self, name, cls, - dns.NS, timeout) - return deferredResult + try: + result = yield authority.BindAuthority._lookup(self, name, cls, + type, timeout) + defer.returnValue(result) + except dns.AuthoritativeDomainError: + # If we didn't find an exact match for the name we were + # seeking, check if it's within a subdomain we're supposed + # to delegate to some other DNS server. + while '.' in name: + _, name = name.split('.', 1) + try: + # BindAuthority puts the NS in the authority + # section automatically for us, so just return + # it. We override the type to NS. + result = yield authority.BindAuthority._lookup(self, name, cls, + dns.NS, timeout) + defer.returnValue(result) + except (dns.DomainError, dns.AuthoritativeDomainError): + pass + # We didn't find a delegation, so return the original + # NXDOMAIN. + raise class TypeLenientResolverChain(resolve.ResolverChain): """