5 ### (c) 2005 Straylight/Edgeware
8 ###----- Licensing notice ---------------------------------------------------
10 ### This file is part of the Python interface to mLib.
12 ### mLib/Python is free software; you can redistribute it and/or modify
13 ### it under the terms of the GNU General Public License as published by
14 ### the Free Software Foundation; either version 2 of the License, or
15 ### (at your option) any later version.
17 ### mLib/Python is distributed in the hope that it will be useful,
18 ### but WITHOUT ANY WARRANTY; without even the implied warranty of
19 ### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 ### GNU General Public License for more details.
22 ### You should have received a copy of the GNU General Public License
23 ### along with mLib/Python; if not, write to the Free Software Foundation,
24 ### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
28 cdef _inaddr_frompy(sockaddr_in *sin, addr):
31 raise TypeError, 'want address/port pair'
33 if not inet_aton(a, &sin.sin_addr):
34 raise TypeError, 'bad IP address'
36 if not (0 <= port < 65536):
37 raise TypeError, 'port number out of range'
38 sin.sin_port = htons(port)
40 cdef _inaddr_topy(sockaddr_in *sin):
41 return inet_ntoa(sin.sin_addr), ntohs(sin.sin_port)
43 cdef class SelIdentify:
44 cdef ident_request irq
46 cdef readonly localaddr
47 cdef readonly remoteaddr
54 userproc = None, bogusproc = None,
55 badproc = None, errorproc = None, failedproc = None,
57 cdef sockaddr_in s_in, s_out
58 cdef socklen_t sz_in, sz_out
60 if PyObject_TypeCheck(sk, socket.SocketType):
62 sz_in = PSIZEOF(&s_in)
63 sz_out = PSIZEOF(&s_out)
64 if getsockname(fd, <sockaddr *>&s_in, &sz_in) or \
65 getpeername(fd, <sockaddr *>&s_out, &sz_out):
67 if s_in.sin_family != AF_INET or s_out.sin_family != AF_INET:
68 raise TypeError, 'must be internet socket'
70 raise TypeError, 'want pair of addresses'
72 _inaddr_frompy(&s_in, sk[0])
73 _inaddr_frompy(&s_out, sk[1])
74 ident(&me.irq, &_sel, &s_in, &s_out, _identfunc, <void *>me)
75 me.localaddr = _inaddr_topy(&s_in)
76 me.remoteaddr = _inaddr_topy(&s_out)
78 me._user = _checkcallable(userproc, 'user proc')
79 me._bad = _checkcallable(badproc, 'bad proc')
80 me._error = _checkcallable(errorproc, 'error proc')
81 me._failed = _checkcallable(failedproc, 'failed proc')
82 me._bogus = _checkcallable(bogusproc, 'bogus proc')
88 return _tobool(me._activep)
92 def __set__(me, proc):
93 me._user = _checkcallable(proc, 'user proc')
99 def __set__(me, proc):
100 me._eof = _checkcallable(proc, 'eof proc')
106 def __set__(me, proc):
107 me._bad = _checkcallable(proc, 'bad proc')
113 def __set__(me, proc):
114 me._error = _checkcallable(proc, 'error proc')
120 def __set__(me, proc):
121 me._failed = _checkcallable(proc, 'failed proc')
127 def __set__(me, proc):
128 me._bogus = _checkcallable(proc, 'bogus proc')
133 raise ValueError, 'already disabled'
141 def user(me, os, user):
142 return _maybecall(me._user, (os, user))
144 if me._bad is not None:
147 def error(me, error):
148 if me._error is not None:
149 return me._error(error)
151 def failed(me, errno, strerror):
152 if me._failed is not None:
153 return me._failed(errno, strerror)
156 return _maybecall(me._bogus, ())
158 cdef void _identfunc(ident_reply *i, void *arg):
160 id = <SelIdentify>arg
162 if i.type == IDENT_BAD:
164 elif i.type == IDENT_ERROR:
166 elif i.type == IDENT_USERID:
167 id.user(i.u.userid.os, i.u.userid.user)
169 ###----- That's all, folks --------------------------------------------------