2
0
mirror of https://gitlab.isc.org/isc-projects/kea synced 2025-08-29 04:57:52 +00:00
kea/src/lib/dns/tests/testdata/gen-wiredata.py.in

310 lines
12 KiB
Python
Raw Normal View History

#!@PYTHON@
import configparser, re, time, sys
from datetime import datetime
from optparse import OptionParser
re_hex = re.compile('0x[0-9a-fA-F]+')
re_decimal = re.compile('\d+$')
re_string = re.compile("\'(.+)\'$")
dnssec_timefmt = '%Y%m%d%H%M%S'
dict_qr = { 'query' : 0, 'response' : 1 }
dict_opcode = { 'query' : 0, 'iquery' : 1, 'status' : 2, 'notify' : 4,
'update' : 5 }
rdict_opcode = dict([(dict_opcode[k], k.upper()) for k in dict_opcode.keys()])
dict_rcode = { 'noerror' : 0, 'formerr' : 1, 'servfail' : 2, 'nxdomain' : 3,
'notimp' : 4, 'refused' : 5, 'yxdomain' : 6, 'yxrrset' : 7,
'nxrrset' : 8, 'notauth' : 9, 'notzone' : 10 }
rdict_rcode = dict([(dict_rcode[k], k.upper()) for k in dict_rcode.keys()])
dict_rrtype = { 'none' : 0, 'a' : 1, 'ns' : 2, 'md' : 3, 'mf' : 4, 'cname' : 5,
'soa' : 6, 'mb' : 7, 'mg' : 8, 'mr' : 9, 'null' : 10,
'wks' : 11, 'ptr' : 12, 'hinfo' : 13, 'minfo' : 14, 'mx' : 15,
'txt' : 16, 'rp' : 17, 'afsdb' : 18, 'x25' : 19, 'isdn' : 20,
'rt' : 21, 'nsap' : 22, 'nsap_tr' : 23, 'sig' : 24, 'key' : 25,
'px' : 26, 'gpos' : 27, 'aaaa' : 28, 'loc' : 29, 'nxt' : 30,
'srv' : 33, 'naptr' : 35, 'kx' : 36, 'cert' : 37, 'a6' : 38,
'dname' : 39, 'opt' : 41, 'apl' : 42, 'ds' : 43, 'sshfp' : 44,
'ipseckey' : 45, 'rrsig' : 46, 'nsec' : 47, 'dnskey' : 48,
'dhcid' : 49, 'nsec3' : 50, 'nsec3param' : 51, 'hip' : 55,
'spf' : 99, 'unspec' : 103, 'tkey' : 249, 'tsig' : 250,
'dlv' : 32769, 'ixfr' : 251, 'axfr' : 252, 'mailb' : 253,
'maila' : 254, 'any' : 255 }
rdict_rrtype = dict([(dict_rrtype[k], k.upper()) for k in dict_rrtype.keys()])
dict_rrclass = { 'in' : 1, 'ch' : 3, 'hs' : 4, 'any' : 255 }
rdict_rrclass = dict([(dict_rrclass[k], k.upper()) for k in dict_rrclass.keys()])
dict_algorithm = { 'rsamd5' : 1, 'dh' : 2, 'dsa' : 3, 'ecc' : 4, 'rsasha1' : 5 }
rdict_algorithm = dict([(dict_algorithm[k], k.upper()) for k in dict_algorithm.keys()])
header_xtables = { 'qr' : dict_qr, 'opcode' : dict_opcode,
'rcode' : dict_rcode }
question_xtables = { 'rrtype' : dict_rrtype, 'rrclass' : dict_rrclass }
rrsig_xtables = { 'algorithm' : dict_algorithm }
def parse_value(value, xtable = {}):
if re.search(re_hex, value):
return int(value, 16)
if re.search(re_decimal, value):
return int(value)
m = re.match(re_string, value)
if m:
return m.group(1)
lovalue = value.lower()
if lovalue in xtable:
return xtable[lovalue]
return value
def code_totext(code, dict):
if code in dict.keys():
return dict[code] + '(' + str(code) + ')'
return str(code)
def encode_name(name):
# make sure the name is dot-terminated. duplicate dots will be ignored
# below.
name += '.'
labels = name.split('.')
wire = ''
for l in labels:
wire += '%02x' % len(l)
wire += ''.join(['%02x' % ord(ch) for ch in l])
if len(l) == 0:
break
return wire
def count_namelabels(name):
if name == '.': # special case
return 0
m = re.match('^(.*)\.$', name)
if m:
name = m.group(1)
return len(name.split('.'))
def get_config(config, section, configobj, xtables = {}):
try:
for field in config.options(section):
value = config.get(section, field)
if field in xtables.keys():
xtable = xtables[field]
else:
xtable = {}
configobj.__dict__[field] = parse_value(value, xtable)
except configparser.NoSectionError:
return False
return True
def print_header(f, input_file):
f.write('''###
### This data file was auto-generated from ''' + input_file + '''
###
''')
class DNSHeader:
id = 0x1035
(qr, aa, tc, rd, ra, ad, cd) = 0, 0, 0, 0, 0, 0, 0
mbz = 0
rcode = 0 # noerror
opcode = 0 # query
(qdcount, ancount, nscount, arcount) = 1, 0, 0, 0
def dump(self, f):
f.write('\n# Header Section\n')
f.write('# ID=' + str(self.id))
f.write(' QR=' + ('Response' if self.qr else 'Query'))
f.write(' Opcode=' + code_totext(self.opcode, rdict_opcode))
f.write(' Rcode=' + code_totext(self.rcode, rdict_rcode))
f.write('%s' % (' AA' if self.aa else ''))
f.write('%s' % (' TC' if self.tc else ''))
f.write('%s' % (' RD' if self.rd else ''))
f.write('%s' % (' AD' if self.ad else ''))
f.write('%s' % (' CD' if self.cd else ''))
f.write('\n')
f.write('%04x ' % self.id)
flag_and_code = 0
flag_and_code |= (self.qr << 15 | self.opcode << 14 | self.aa << 10 |
self.tc << 9 | self.rd << 8 | self.ra << 7 |
self.mbz << 6 | self.ad << 5 | self.cd << 4 |
self.rcode)
f.write('%04x\n' % flag_and_code)
f.write('# QDCNT=%d, ANCNT=%d, NSCNT=%d, ARCNT=%d\n' %
(self.qdcount, self.ancount, self.nscount, self.arcount))
f.write('%04x %04x %04x %04x\n' % (self.qdcount, self.ancount,
self.nscount, self.arcount))
class DNSQuestion:
name = 'example.com.'
rrtype = parse_value('A', dict_rrtype)
rrclass = parse_value('IN', dict_rrclass)
def dump(self, f):
f.write('\n# Question Section\n')
f.write('# QNAME=%s QTYPE=%s QCLASS=%s\n' %
(self.name,
code_totext(self.rrtype, rdict_rrtype),
code_totext(self.rrclass, rdict_rrclass)))
f.write(encode_name(self.name))
f.write(' %04x %04x\n' % (self.rrtype, self.rrclass))
class EDNS:
name = '.'
udpsize = 4096
extrcode = 0
version = 0
do = 0
mbz = 0
rdlen = 0
def dump(self, f):
f.write('\n# EDNS OPT RR\n')
f.write('# NAME=%s TYPE=%s UDPSize=%d ExtRcode=%s Version=%s DO=%d\n' %
(self.name, code_totext(dict_rrtype['opt'], rdict_rrtype),
self.udpsize, self.extrcode, self.version,
1 if self.do else 0))
code_vers = (self.extrcode << 8) | (self.version & 0x00ff)
extflags = (self.do << 15) | (self.mbz & 0x8000)
f.write('%s %04x %04x %04x %04x\n' %
(encode_name(self.name), dict_rrtype['opt'], self.udpsize,
code_vers, extflags))
f.write('# RDLEN=%d\n' % self.rdlen)
f.write('%04x\n' % self.rdlen)
class SOA:
# this currently doesn't support name compression within the RDATA.
rdlen = -1 # auto-calculate
mname = 'ns.example.com'
rname = 'root.example.com'
serial = 2010012601
refresh = 3600
retry = 300
expire = 3600000
minimum = 1200
def dump(self, f):
mname_wire = encode_name(self.mname)
rname_wire = encode_name(self.rname)
rdlen = self.rdlen
if rdlen < 0:
rdlen = int(20 + len(mname_wire) / 2 + len(str(rname_wire)) / 2)
f.write('\n# SOA RDATA (RDLEN=%d)\n' % rdlen)
f.write('%04x\n' % rdlen);
f.write('# NNAME=%s RNAME=%s\n' % (self.mname, self.rname))
f.write('%s %s\n' % (mname_wire, rname_wire))
f.write('# SERIAL(%d) REFRESH(%d) RETRY(%d) EXPIRE(%d) MINIMUM(%d)\n' %
(self.serial, self.refresh, self.retry, self.expire,
self.minimum))
f.write('%08x %08x %08x %08x %08x\n' % (self.serial, self.refresh,
self.retry, self.expire,
self.minimum))
class NSEC:
rdlen = -1 # auto-calculate
nextname = 'next.example.com'
block = 0
maplen = -1 # auto-calculate
bitmap = '040000000003'
def dump(self, f):
name_wire = encode_name(self.nextname)
rdlen = self.rdlen
maplen = self.maplen
if maplen < 0:
maplen = int(len(self.bitmap) / 2)
# if rdlen needs to be calculated, it must be based on the bitmap
# length, because the configured maplen can be fake.
if rdlen < 0:
rdlen = int(len(name_wire) / 2) + 2 + int(len(self.bitmap) / 2)
f.write('\n# NSEC RDATA (RDLEN=%d)\n' % rdlen)
f.write('%04x\n' % rdlen);
f.write('# Next Name=%s\n' % self.nextname)
f.write('%s\n' % name_wire)
f.write('# Bitmap: Block=%d, Length=%d\n' % (self.block, maplen))
f.write('%02x %02x %s\n' % (self.block, maplen, self.bitmap))
class RRSIG:
rdlen = -1 # auto-calculate
covered = 1 # A
algorithm = 5 # RSA-SHA1
labels = -1 # auto-calculate (#labels of signer)
originalttl = 3600
expiration = int(time.mktime(datetime.strptime('20100131120000',
dnssec_timefmt).timetuple()))
inception = int(time.mktime(datetime.strptime('20100101120000',
dnssec_timefmt).timetuple()))
tag = 0x1035
signer = 'example.com'
signature = 0x123456789abcdef123456789abcdef
def dump(self, f):
name_wire = encode_name(self.signer)
sig_wire = '%x' % self.signature
rdlen = self.rdlen
if rdlen < 0:
rdlen = int(18 + len(name_wire) / 2 + len(str(sig_wire)) / 2)
labels = self.labels
if labels < 0:
labels = count_namelabels(self.signer)
f.write('\n# RRSIG RDATA (RDLEN=%d)\n' % rdlen)
f.write('%04x\n' % rdlen);
f.write('# Covered=%s Algorithm=%s Labels=%d OrigTTL=%d\n' %
(code_totext(self.covered, rdict_rrtype),
code_totext(self.algorithm, rdict_algorithm), labels,
self.originalttl))
f.write('%04x %02x %02x %08x\n' % (self.covered, self.algorithm, labels,
self.originalttl))
f.write('# Expiration=%s, Inception=%s\n' %
(str(self.expiration), str(self.inception)))
f.write('%08x %08x\n' % (self.expiration, self.inception))
f.write('# Tag=%d Signer=%s and Signature\n' % (self.tag, self.signer))
f.write('%04x %s %s\n' % (self.tag, name_wire, sig_wire))
def get_config_param(section):
config_param = {'header' : (DNSHeader, header_xtables),
'question' : (DNSQuestion, question_xtables),
'edns' : (EDNS, {}), 'soa' : (SOA, {}),
'rrsig' : (RRSIG, {}), 'nsec' : (NSEC, {})}
s = section
m = re.match('^([^:]+)/\d+$', section)
if m:
s = m.group(1)
return config_param[s]
usage = '''usage: %prog [options] input_file'''
if __name__ == "__main__":
parser = OptionParser(usage=usage)
parser.add_option('-o', '--output', action='store', dest='output',
default=None, metavar='FILE',
help='output file name [default: prefix of input_file]')
parser.add_option('-m', '--mode', action='store', dest='mode',
default='message', metavar='[message|custom]',
help='specify dump mode [default: %default]')
(options, args) = parser.parse_args()
if len(args) == 0:
parser.error('input file is missing')
configfile = args[0]
outputfile = options.output
if not outputfile:
m = re.match('(.*)\.[^.]+$', configfile)
if m:
outputfile = m.group(1)
else:
raise ValueError('output file is not specified and input file is not in the form of "output_file.suffix"')
config = configparser.SafeConfigParser()
config.read(configfile)
output = open(outputfile, 'w')
print_header(output, configfile)
if options.mode == 'custom':
sections = config.get('custom', 'sections').split(':')
else:
sections = ['header', 'question', 'edns']
for s in sections:
section_param = get_config_param(s)
(obj, xtables) = (section_param[0](), section_param[1])
if get_config(config, s, obj, xtables):
obj.dump(output)
output.close()