return data
raise Exception(data+" is not valid hex data")
+def check_base64(data: str) -> str:
+ data = str(data)
+ if re.match('^[a-zA-Z0-9+/=]+$', data):
+ return data
+ raise Exception(data+" is not valid hex data")
+
+
def check_ipv4(address: str) -> str:
address = str(address)
if re.match(REGEX_ipv4, address):
class TXT:
- def __init__(self, name: str, text: str) -> None:
+ def __init__(self, text: str) -> None:
# test for bad characters
for c in ('\n', '\r', '\t'):
if c in text:
- raise Exception("TXT record {0} containts invalid character")
+ raise Exception("TXT record {0} contains invalid character")
# escape text
for c in ('\\', '\"'):
text = text.replace(c, '\\'+c)
return zone.RR(owner, 'TXT', '"{0}"'.format(self._text))
+class DKIM(TXT): # helper class to treat DKIM more antively
+ class Version:
+ DKIM1 = "DKIM1"
+
+ class Algorithm:
+ RSA = "rsa"
+
+ def __init__(self, selector, version, alg, key):
+ self._selector = check_label(selector)
+ version = check_label(version)
+ alg = check_label(alg)
+ key = check_base64(key)
+ super().__init__("v={0}; k={1}; p={2}".format(version, alg, key))
+
+ def generate_rr(self, owner, zone):
+ return super().generate_rr('{0}._domainkey.{1}'.format(self._selector, zone.abs_hostname(owner)), zone)
+
+
class SRV:
def __init__(self, protocol: str, service: str, name: str, port: int, prio: int, weight: int) -> None:
self._service = check_label(service)