Check NSEC3 names for validity
Casey Deccio
8 years ago
888 | 888 | else: |
889 | 889 | self.nsec_set_info = nsec_set_info.project(*list(nsec_set_info.rrsets)) |
890 | 890 | |
891 | # Report errors with NSEC3 owner names | |
892 | for name in self.nsec_set_info.invalid_nsec3_owner: | |
893 | self.errors.append(Errors.InvalidNSE3OwnerName(name=name)) | |
894 | ||
891 | 895 | def serialize(self, rrset_info_serializer=None, consolidate_clients=True, loglevel=logging.DEBUG, html_format=False): |
892 | 896 | d = collections.OrderedDict() |
893 | 897 | |
1031 | 1035 | self.nsec_set_info = nsec_set_info.project(*filter(lambda x: x is not None, covering_names)) |
1032 | 1036 | else: |
1033 | 1037 | self.nsec_set_info = nsec_set_info.project(*list(nsec_set_info.rrsets)) |
1038 | ||
1039 | # Report errors with NSEC3 owner names | |
1040 | for name in self.nsec_set_info.invalid_nsec3_owner: | |
1041 | self.errors.append(Errors.InvalidNSE3Owner(name=name)) | |
1034 | 1042 | |
1035 | 1043 | def serialize(self, rrset_info_serializer=None, consolidate_clients=True, loglevel=logging.DEBUG, html_format=False): |
1036 | 1044 | d = super(NSEC3StatusWildcard, self).serialize(rrset_info_serializer, consolidate_clients=consolidate_clients, loglevel=loglevel, html_format=html_format) |
1200 | 1208 | else: |
1201 | 1209 | self.nsec_set_info = nsec_set_info.project(*list(nsec_set_info.rrsets)) |
1202 | 1210 | |
1211 | # Report errors with NSEC3 owner names | |
1212 | for name in self.nsec_set_info.invalid_nsec3_owner: | |
1213 | self.errors.append(Errors.InvalidNSE3Owner(name=name)) | |
1214 | ||
1203 | 1215 | def serialize(self, rrset_info_serializer=None, consolidate_clients=True, loglevel=logging.DEBUG, html_format=False): |
1204 | 1216 | d = collections.OrderedDict() |
1205 | 1217 |