# Connection to the core of the program.
self.core = core
+ # Find out on which distribution we are running.
+ self.distro = self._get_distro_identifier()
+ logger.debug(_("Running on distribution: %s") % self.distro)
+
@property
def proxy(self):
proxy = self.core.settings.get("proxy")
return proxy
+ def get_local_ipv6_address(self):
+ return # XXX TODO
+
+ def get_local_ipv4_address(self):
+ if self.distro == "ipfire-2":
+ try:
+ with open("/var/ipfire/red/local-ipaddress") as f:
+ return f.readline()
+
+ except IOError, e:
+ # File not found
+ if e.errno == 2:
+ return
+
+ raise
+
+ return # XXX TODO
+
def _guess_external_ip_address(self, url, timeout=10):
"""
Sends a request to an external web server
query_args = self._format_query_args(data)
data = None
- url = "%s?%s" % (url, query_args)
+ if "?" in url:
+ url = "%s&%s" % (url, query_args)
+ else:
+ url = "%s?%s" % (url, query_args)
logger.debug("Sending request (%s): %s" % (method, url))
if data:
if username and password:
basic_auth_header = self._make_basic_auth_header(username, password)
- print repr(basic_auth_header)
req.add_header("Authorization", "Basic %s" % basic_auth_header)
# Set the user agent.
resp = urllib2.urlopen(req, timeout=timeout)
# Log response header.
- logger.debug(_("Response header:"))
+ logger.debug(_("Response header (Status Code %s):") % resp.code)
for k, v in resp.info().items():
logger.debug(" %s: %s" % (k, v))
def get_address(self, proto):
assert proto in ("ipv6", "ipv4")
+ # IPFire 2 does not support IPv6.
+ if self.distro == "ipfire-2" and proto == "ipv6":
+ return
+
# Check if the external IP address should be guessed from
# a remote server.
guess_ip = self.core.settings.get("guess_external_ip", "true")
elif proto == "ipv4":
return self.guess_external_ipv4_address()
- # XXX TODO
- assert False
+ # Get the local IP addresses.
+ else:
+ if proto == "ipv6":
+ return self.get_local_ipv6_address()
+ elif proto == "ipv4":
+ return self.get_local_ipv4_address()
def resolve(self, hostname, proto=None):
addresses = []
if e.errno == -2:
return []
+ # No record for requested family available (e.g. no AAAA)
+ elif e.errno == -5:
+ return []
+
raise
# Handle responses.
addresses.append(address)
return addresses
+
+ def _get_distro_identifier(self):
+ """
+ Returns a unique identifier for the distribution
+ we are running on.
+ """
+ os_release = self.__parse_os_release()
+ if os_release:
+ return os_release
+
+ system_release = self.__parse_system_release()
+ if system_release:
+ return system_release
+
+ # If nothing else could be found, we return
+ # just "unknown".
+ return "unknown"
+
+ def __parse_os_release(self):
+ """
+ Tries to parse /etc/os-release and
+ returns a unique distribution identifier
+ if the file exists.
+ """
+ try:
+ f = open("/etc/os-release", "r")
+ except IOError, e:
+ # File not found
+ if e.errno == 2:
+ return
+
+ raise
+
+ os_release = {}
+ with f:
+ for line in f.readlines():
+ m = re.match(r"^([A-Z\_]+)=(.*)$", line)
+ if m is None:
+ continue
+
+ os_release[m.group(1)] = m.group(2)
+
+ try:
+ return "%(ID)s-%(VERSION_ID)s" % os_release
+ except KeyError:
+ return
+
+ def __parse_system_release(self):
+ """
+ Tries to parse /etc/system-release and
+ returns a unique distribution identifier
+ if the file exists.
+ """
+ try:
+ f = open("/etc/system-release", "r")
+ except IOError, e:
+ # File not found
+ if e.errno == 2:
+ return
+
+ raise
+
+ with f:
+ # Read first line
+ line = f.readline()
+
+ # Check for IPFire systems
+ m = re.match(r"^IPFire (\d).(\d+)", line)
+ if m:
+ return "ipfire-%s" % m.group(1)