]> git.ipfire.org Git - thirdparty/knot-resolver.git/commitdiff
naming: added 'Schema' suffix to all classes derived from 'SchemaNode'
authorAleš <ales.mrazek@nic.cz>
Wed, 22 Sep 2021 14:42:16 +0000 (16:42 +0200)
committerAleš Mrázek <ales.mrazek@nic.cz>
Fri, 8 Apr 2022 14:17:53 +0000 (16:17 +0200)
manager/knot_resolver_manager/datamodel/config.py
manager/knot_resolver_manager/datamodel/dns64_config.py
manager/knot_resolver_manager/datamodel/dnssec_config.py
manager/knot_resolver_manager/datamodel/lua_config.py
manager/knot_resolver_manager/datamodel/network_config.py
manager/knot_resolver_manager/datamodel/options_config.py
manager/knot_resolver_manager/datamodel/server_config.py
manager/tests/datamodel/test_dnssec_config.py
manager/tests/datamodel/test_lua_config.py
manager/tests/datamodel/test_network_config.py
manager/tests/datamodel/test_options_config.py

index d6d847c6d2f86b661d75d95f6e38431ed9e999d2..a7febfaeb516aeb604dd7abed0bc96b3d776d4d3 100644 (file)
@@ -4,12 +4,12 @@ from typing import Text, Union
 from jinja2 import Environment, Template
 from typing_extensions import Literal
 
-from knot_resolver_manager.datamodel.dns64_config import Dns64
-from knot_resolver_manager.datamodel.dnssec_config import Dnssec
-from knot_resolver_manager.datamodel.lua_config import Lua
-from knot_resolver_manager.datamodel.network_config import Network
-from knot_resolver_manager.datamodel.options_config import Options
-from knot_resolver_manager.datamodel.server_config import Server
+from knot_resolver_manager.datamodel.dns64_config import Dns64Schema
+from knot_resolver_manager.datamodel.dnssec_config import DnssecSchema
+from knot_resolver_manager.datamodel.lua_config import LuaSchema
+from knot_resolver_manager.datamodel.network_config import NetworkSchema
+from knot_resolver_manager.datamodel.options_config import OptionsSchema
+from knot_resolver_manager.datamodel.server_config import ServerSchema
 from knot_resolver_manager.utils import SchemaNode
 
 
@@ -26,30 +26,30 @@ _LUA_TEMPLATE = _import_lua_template()
 
 class KresConfig(SchemaNode):
     class Raw(SchemaNode):
-        server: Server = Server()
-        options: Options = Options()
-        network: Network = Network()
-        dnssec: Union[bool, Dnssec] = True
-        dns64: Union[bool, Dns64] = False
-        lua: Lua = Lua()
+        server: ServerSchema = ServerSchema()
+        options: OptionsSchema = OptionsSchema()
+        network: NetworkSchema = NetworkSchema()
+        dnssec: Union[bool, DnssecSchema] = True
+        dns64: Union[bool, Dns64Schema] = False
+        lua: LuaSchema = LuaSchema()
 
     _PREVIOUS_SCHEMA = Raw
 
-    server: Server
-    options: Options
-    network: Network
-    dnssec: Union[Literal[False], Dnssec]
-    dns64: Union[Literal[False], Dns64]
-    lua: Lua
+    server: ServerSchema
+    options: OptionsSchema
+    network: NetworkSchema
+    dnssec: Union[Literal[False], DnssecSchema]
+    dns64: Union[Literal[False], Dns64Schema]
+    lua: LuaSchema
 
-    def _dnssec(self, obj: Raw) -> Union[Literal[False], Dnssec]:
+    def _dnssec(self, obj: Raw) -> Union[Literal[False], DnssecSchema]:
         if obj.dnssec is True:
-            return Dnssec()
+            return DnssecSchema()
         return obj.dnssec
 
-    def _dns64(self, obj: Raw) -> Union[Literal[False], Dns64]:
+    def _dns64(self, obj: Raw) -> Union[Literal[False], Dns64Schema]:
         if obj.dns64 is True:
-            return Dns64()
+            return Dns64Schema()
         return obj.dns64
 
     def render_lua(self) -> Text:
index ac4a5770c64b8f56d1af3b16891bc238f941b13b..36b25aba5ca9d56d8918367bbcf0ad9d16832fe6 100644 (file)
@@ -2,5 +2,5 @@ from knot_resolver_manager.datamodel.types import IPv6Network96
 from knot_resolver_manager.utils import SchemaNode
 
 
-class Dns64(SchemaNode):
+class Dns64Schema(SchemaNode):
     prefix: IPv6Network96 = IPv6Network96("64:ff9b::/96")
index 5f85f37f9898a8b24ae3300ab42f7188e3c69f42..8c2f57645b500048343cf01d8481af1ac04d9a52 100644 (file)
@@ -4,12 +4,12 @@ from knot_resolver_manager.datamodel.types import TimeUnit
 from knot_resolver_manager.utils import SchemaNode
 
 
-class TrustAnchorFile(SchemaNode):
+class TrustAnchorFileSchema(SchemaNode):
     file: str
     read_only: bool = False
 
 
-class Dnssec(SchemaNode):
+class DnssecSchema(SchemaNode):
     trust_anchor_sentinel: bool = True
     trust_anchor_signal_query: bool = True
     time_skew_detection: bool = True
@@ -19,4 +19,4 @@ class Dnssec(SchemaNode):
 
     trust_anchors: Optional[List[str]] = None
     negative_trust_anchors: Optional[List[str]] = None
-    trust_anchors_files: Optional[List[TrustAnchorFile]] = None
+    trust_anchors_files: Optional[List[TrustAnchorFileSchema]] = None
index 6e225eda75880d19c9b7149883ff55b02102c443..e443e70fac3bc6af3f6d4bec7ca056a1a462b863 100644 (file)
@@ -3,7 +3,7 @@ from typing import Optional
 from knot_resolver_manager.utils import SchemaNode
 
 
-class Lua(SchemaNode):
+class LuaSchema(SchemaNode):
     script_only: bool = False
     script: Optional[str] = None
     script_file: Optional[str] = None
index 1f88ff7a5b793be3b1ba2089df6b933271600006..34d45903ac89e507e0ca064dec19dae2a19a162f 100644 (file)
@@ -7,14 +7,14 @@ from knot_resolver_manager.utils.types import LiteralEnum
 KindEnum = LiteralEnum["dns", "xdp", "dot", "doh"]
 
 
-class Interface(SchemaNode):
+class InterfaceSchema(SchemaNode):
     listen: Listen
     kind: KindEnum = "dns"
     freebind: bool = False
 
 
-class Network(SchemaNode):
-    interfaces: List[Interface] = [
-        Interface({"listen": {"ip": "127.0.0.1", "port": 53}}),
-        Interface({"listen": {"ip": "::1", "port": 53}, "freebind": True}),
+class NetworkSchema(SchemaNode):
+    interfaces: List[InterfaceSchema] = [
+        InterfaceSchema({"listen": {"ip": "127.0.0.1", "port": 53}}),
+        InterfaceSchema({"listen": {"ip": "::1", "port": 53}, "freebind": True}),
     ]
index d717afcd51b55f97efda77b8b9b04d261026cc5c..48cecfa428458682555d25425b49d45f8abd0bff 100644 (file)
@@ -10,12 +10,12 @@ from .types import TimeUnit
 GlueCheckingEnum = LiteralEnum["normal", "strict", "permissive"]
 
 
-class Prediction(SchemaNode):
+class PredictionSchema(SchemaNode):
     window: TimeUnit = TimeUnit("15m")
     period: int = 24
 
 
-class Options(SchemaNode):
+class OptionsSchema(SchemaNode):
     class Raw(SchemaNode):
         glue_checking: GlueCheckingEnum = "normal"
         qname_minimisation: bool = True
@@ -28,7 +28,7 @@ class Options(SchemaNode):
         time_jump_detection: bool = True
         violators_workarounds: bool = False
         serve_stale: bool = False
-        prediction: Union[bool, Prediction] = False
+        prediction: Union[bool, PredictionSchema] = False
 
     _PREVIOUS_SCHEMA = Raw
 
@@ -43,9 +43,9 @@ class Options(SchemaNode):
     time_jump_detection: bool
     violators_workarounds: bool
     serve_stale: bool
-    prediction: Union[Literal[False], Prediction]
+    prediction: Union[Literal[False], PredictionSchema]
 
     def _prediction(self, obj: Raw) -> Any:
         if obj.prediction is True:
-            return Prediction()
+            return PredictionSchema()
         return obj.prediction
index 287566d4469b505a38f3489fd825b817782cf022..f27876430c13d8d88e7b8ee36fce0c539c05d1c8 100644 (file)
@@ -34,28 +34,28 @@ def _cpu_count() -> int:
 BackendEnum = LiteralEnum["auto", "systemd", "supervisord"]
 
 
-class Management(SchemaNode):
+class ManagementSchema(SchemaNode):
     listen: Listen = Listen({"unix-socket": "/tmp/manager.sock"})
     backend: BackendEnum = "auto"
     rundir: AnyPath = AnyPath(".")
 
 
-class Webmgmt(SchemaNode):
+class WebmgmtSchema(SchemaNode):
     listen: Listen
     tls: bool = False
     cert_file: Optional[AnyPath] = None
     key_file: Optional[AnyPath] = None
 
 
-class Server(SchemaNode):
+class ServerSchema(SchemaNode):
     class Raw(SchemaNode):
         hostname: Optional[str] = None
         groupid: Optional[str] = None
         nsid: Optional[str] = None
         workers: Union[Literal["auto"], int] = 1
         use_cache_gc: bool = True
-        management: Management = Management()
-        webmgmt: Optional[Webmgmt] = None
+        management: ManagementSchema = ManagementSchema()
+        webmgmt: Optional[WebmgmtSchema] = None
 
     _PREVIOUS_SCHEMA = Raw
 
@@ -64,8 +64,8 @@ class Server(SchemaNode):
     nsid: Optional[str]
     workers: int
     use_cache_gc: bool
-    management: Management
-    webmgmt: Optional[Webmgmt]
+    management: ManagementSchema
+    webmgmt: Optional[WebmgmtSchema]
 
     def _hostname(self, obj: Raw) -> Any:
         if obj.hostname is None:
index 2271a1410c382b17e2f5b273a6602fee06cc2a3d..dfe9b980d86f5dd946d8fc43c05d7e9d8806ae69 100644 (file)
@@ -1,4 +1,4 @@
-from knot_resolver_manager.datamodel.dnssec_config import Dnssec
+from knot_resolver_manager.datamodel.dnssec_config import DnssecSchema
 from knot_resolver_manager.datamodel.types import TimeUnit
 
 tree = {
@@ -13,7 +13,7 @@ tree = {
     "trust-anchors-files": [{"file": "root.key", "read-only": True}],
 }
 
-strict = Dnssec(tree)
+strict = DnssecSchema(tree)
 
 
 def test_validating():
index bdb18021ec3b2b909dfc7d6648682b06f0016b3d..5da0ca49667b9e62f9ebde63079fc3d2f88c3299 100644 (file)
@@ -1,10 +1,10 @@
 from pytest import raises
 
-from knot_resolver_manager.datamodel.lua_config import Lua
+from knot_resolver_manager.datamodel.lua_config import LuaSchema
 from knot_resolver_manager.exceptions import KresdManagerException
 
 tree = {"script-only": True, "script": "-- lua script"}
-strict = Lua(tree)
+strict = LuaSchema(tree)
 
 
 def test_validating():
@@ -14,4 +14,4 @@ def test_validating():
 
 def test_exception_raises():
     with raises(KresdManagerException):
-        Lua({"script": "-- lua script", "script-file": "path/to/file"})
+        LuaSchema({"script": "-- lua script", "script-file": "path/to/file"})
index bf818efd962fcda30bea44f041eeca2a1b4ff7af..63fc1f93c0ded098b61ba6f4615c83f8b9551839 100644 (file)
@@ -1,10 +1,10 @@
 import ipaddress
 
-from knot_resolver_manager.datamodel.network_config import Network
+from knot_resolver_manager.datamodel.network_config import NetworkSchema
 
 
 def test_interfaces_default():
-    o = Network()
+    o = NetworkSchema()
 
     assert len(o.interfaces) == 2
     # {"listen": {"ip": "127.0.0.1", "port": 53}}
index 66b6535ec3cf1b91136ce530a1df3eec3f56130b..ad81af81bc1e14b9764e72f336dbb8819597c969 100644 (file)
@@ -1,4 +1,4 @@
-from knot_resolver_manager.datamodel.options_config import Options
+from knot_resolver_manager.datamodel.options_config import OptionsSchema
 from knot_resolver_manager.datamodel.types import TimeUnit
 
 tree = {
@@ -16,7 +16,7 @@ tree = {
     "prediction": {"window": "10m", "period": 20},
 }
 
-strict = Options(tree)
+strict = OptionsSchema(tree)
 
 
 def test_validating():
@@ -37,7 +37,7 @@ def test_validating():
 
 
 def test_prediction_true_defaults():
-    y = Options({"prediction": True})
+    y = OptionsSchema({"prediction": True})
 
     assert y.prediction.window == TimeUnit("15m")
     assert y.prediction.period == 24