mirror of
https://github.com/mail-in-a-box/mailinabox.git
synced 2024-11-24 02:37:05 +00:00
Fixed SIM102 (collapsible-if): Use a single if
statement instead of nested if
statements
This commit is contained in:
parent
67b9d0b279
commit
e8d1c037cb
@ -434,36 +434,35 @@ def scan_postfix_smtpd_line(date, log, collector):
|
|||||||
return
|
return
|
||||||
|
|
||||||
# only log mail to known recipients
|
# only log mail to known recipients
|
||||||
if user_match(user):
|
if user_match(user) and (collector["known_addresses"] is None or user in collector["known_addresses"]):
|
||||||
if collector["known_addresses"] is None or user in collector["known_addresses"]:
|
data = collector["rejected"].get(
|
||||||
data = collector["rejected"].get(
|
user,
|
||||||
user,
|
{
|
||||||
{
|
"blocked": [],
|
||||||
"blocked": [],
|
"earliest": None,
|
||||||
"earliest": None,
|
"latest": None,
|
||||||
"latest": None,
|
}
|
||||||
}
|
)
|
||||||
)
|
# simplify this one
|
||||||
# simplify this one
|
m = re.search(
|
||||||
|
r"Client host \[(.*?)\] blocked using zen.spamhaus.org; (.*)", message
|
||||||
|
)
|
||||||
|
if m:
|
||||||
|
message = "ip blocked: " + m.group(2)
|
||||||
|
else:
|
||||||
|
# simplify this one too
|
||||||
m = re.search(
|
m = re.search(
|
||||||
r"Client host \[(.*?)\] blocked using zen.spamhaus.org; (.*)", message
|
r"Sender address \[.*@(.*)\] blocked using dbl.spamhaus.org; (.*)", message
|
||||||
)
|
)
|
||||||
if m:
|
if m:
|
||||||
message = "ip blocked: " + m.group(2)
|
message = "domain blocked: " + m.group(2)
|
||||||
else:
|
|
||||||
# simplify this one too
|
|
||||||
m = re.search(
|
|
||||||
r"Sender address \[.*@(.*)\] blocked using dbl.spamhaus.org; (.*)", message
|
|
||||||
)
|
|
||||||
if m:
|
|
||||||
message = "domain blocked: " + m.group(2)
|
|
||||||
|
|
||||||
if data["earliest"] is None:
|
if data["earliest"] is None:
|
||||||
data["earliest"] = date
|
data["earliest"] = date
|
||||||
data["latest"] = date
|
data["latest"] = date
|
||||||
data["blocked"].append((date, sender, message))
|
data["blocked"].append((date, sender, message))
|
||||||
|
|
||||||
collector["rejected"][user] = data
|
collector["rejected"][user] = data
|
||||||
|
|
||||||
|
|
||||||
def scan_dovecot_login_line(date, log, collector, protocol_name):
|
def scan_dovecot_login_line(date, log, collector, protocol_name):
|
||||||
|
@ -82,9 +82,8 @@ def get_ssl_certificates(env):
|
|||||||
for domain in cert_domains:
|
for domain in cert_domains:
|
||||||
# The primary hostname can only use a certificate mapped
|
# The primary hostname can only use a certificate mapped
|
||||||
# to the system private key.
|
# to the system private key.
|
||||||
if domain == env['PRIMARY_HOSTNAME']:
|
if domain == env['PRIMARY_HOSTNAME'] and cert["private_key"]["filename"] != os.path.join(env['STORAGE_ROOT'], 'ssl', 'ssl_private_key.pem'):
|
||||||
if cert["private_key"]["filename"] != os.path.join(env['STORAGE_ROOT'], 'ssl', 'ssl_private_key.pem'):
|
continue
|
||||||
continue
|
|
||||||
|
|
||||||
domains.setdefault(domain, []).append(cert)
|
domains.setdefault(domain, []).append(cert)
|
||||||
|
|
||||||
@ -149,11 +148,10 @@ def get_domain_ssl_files(domain, ssl_certificates, env, allow_missing_cert=False
|
|||||||
"certificate_object": load_pem(load_cert_chain(ssl_certificate)[0]),
|
"certificate_object": load_pem(load_cert_chain(ssl_certificate)[0]),
|
||||||
}
|
}
|
||||||
|
|
||||||
if use_main_cert:
|
if use_main_cert and domain == env['PRIMARY_HOSTNAME']:
|
||||||
if domain == env['PRIMARY_HOSTNAME']:
|
# The primary domain must use the server certificate because
|
||||||
# The primary domain must use the server certificate because
|
# it is hard-coded in some service configuration files.
|
||||||
# it is hard-coded in some service configuration files.
|
return system_certificate
|
||||||
return system_certificate
|
|
||||||
|
|
||||||
wildcard_domain = re.sub(r"^[^\.]+", "*", domain)
|
wildcard_domain = re.sub(r"^[^\.]+", "*", domain)
|
||||||
if domain in ssl_certificates:
|
if domain in ssl_certificates:
|
||||||
|
@ -420,10 +420,9 @@ def check_primary_hostname_dns(domain, env, output, dns_domains, dns_zonefiles):
|
|||||||
# If a DS record is set on the zone containing this domain, check DNSSEC now.
|
# If a DS record is set on the zone containing this domain, check DNSSEC now.
|
||||||
has_dnssec = False
|
has_dnssec = False
|
||||||
for zone in dns_domains:
|
for zone in dns_domains:
|
||||||
if zone == domain or domain.endswith("." + zone):
|
if (zone == domain or domain.endswith("." + zone)) and query_dns(zone, "DS", nxdomain=None) is not None:
|
||||||
if query_dns(zone, "DS", nxdomain=None) is not None:
|
has_dnssec = True
|
||||||
has_dnssec = True
|
check_dnssec(zone, env, output, dns_zonefiles, is_checking_primary=True)
|
||||||
check_dnssec(zone, env, output, dns_zonefiles, is_checking_primary=True)
|
|
||||||
|
|
||||||
ip = query_dns(domain, "A")
|
ip = query_dns(domain, "A")
|
||||||
ns_ips = query_dns("ns1." + domain, "A") + '/' + query_dns("ns2." + domain, "A")
|
ns_ips = query_dns("ns1." + domain, "A") + '/' + query_dns("ns2." + domain, "A")
|
||||||
|
Loading…
Reference in New Issue
Block a user