Skip to content

Commit b87fb07

Browse files
author
BiffoBear
committed
Added a leading _ to top level constants in DNS.
1 parent f0e55dd commit b87fb07

File tree

1 file changed

+24
-24
lines changed

1 file changed

+24
-24
lines changed

adafruit_wiznet5k/adafruit_wiznet5k_dns.py

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -29,22 +29,22 @@
2929
import adafruit_wiznet5k.adafruit_wiznet5k_socket as socket
3030
from adafruit_wiznet5k.adafruit_wiznet5k_socket import htons
3131

32-
QUERY_FLAG = const(0x00)
33-
OPCODE_STANDARD_QUERY = const(0x00)
34-
RECURSION_DESIRED_FLAG = 1 << 8
32+
_QUERY_FLAG = const(0x00)
33+
_OPCODE_STANDARD_QUERY = const(0x00)
34+
_RECURSION_DESIRED_FLAG = 1 << 8
3535

36-
TYPE_A = const(0x0001)
37-
CLASS_IN = const(0x0001)
38-
DATA_LEN = const(0x0004)
36+
_TYPE_A = const(0x0001)
37+
_CLASS_IN = const(0x0001)
38+
_DATA_LEN = const(0x0004)
3939

4040
# Return codes for gethostbyname
41-
SUCCESS = const(1)
42-
TIMED_OUT = const(-1)
43-
INVALID_SERVER = const(-2)
44-
TRUNCATED = const(-3)
45-
INVALID_RESPONSE = const(-4)
41+
_SUCCESS = const(1)
42+
_TIMED_OUT = const(-1)
43+
_INVALID_SERVER = const(-2)
44+
_TRUNCATED = const(-3)
45+
_INVALID_RESPONSE = const(-4)
4646

47-
DNS_PORT = const(0x35) # port used for DNS request
47+
_DNS_PORT = const(0x35) # port used for DNS request
4848

4949

5050
class DNS:
@@ -81,15 +81,15 @@ def gethostbyname(self, hostname: bytes) -> Union[int, bytes]:
8181
:return Union[int, bytes] The IPv4 address if successful, -1 otherwise.
8282
"""
8383
if self._dns_server is None:
84-
return INVALID_SERVER
84+
return _INVALID_SERVER
8585
self._host = hostname
8686
# build DNS request packet
8787
self._build_dns_header()
8888
self._build_dns_question()
8989

9090
# Send DNS request packet
91-
self._sock.bind((None, DNS_PORT))
92-
self._sock.connect((self._dns_server, DNS_PORT))
91+
self._sock.bind((None, _DNS_PORT))
92+
self._sock.connect((self._dns_server, _DNS_PORT))
9393
if self._debug:
9494
print("* DNS: Sending request packet...")
9595
self._sock.send(self._pkt_buf)
@@ -176,15 +176,15 @@ def _parse_dns_response(
176176

177177
# Validate Query is Type A
178178
q_type = int.from_bytes(self._pkt_buf[ptr : ptr + 2], "big")
179-
if not q_type == TYPE_A:
179+
if not q_type == _TYPE_A:
180180
if self._debug:
181181
print("* DNS ERROR: Incorrect Query Type: ", q_type)
182182
return -1
183183
ptr += 2
184184

185185
# Validate Query is Type A
186186
q_class = int.from_bytes(self._pkt_buf[ptr : ptr + 2], "big")
187-
if not q_class == TYPE_A:
187+
if not q_class == _TYPE_A:
188188
if self._debug:
189189
print("* DNS ERROR: Incorrect Query Class: ", q_class)
190190
return -1
@@ -201,15 +201,15 @@ def _parse_dns_response(
201201

202202
# Validate Answer Type A
203203
ans_type = int.from_bytes(self._pkt_buf[ptr : ptr + 2], "big")
204-
if not ans_type == TYPE_A:
204+
if not ans_type == _TYPE_A:
205205
if self._debug:
206206
print("* DNS ERROR: Incorrect Answer Type: ", ans_type)
207207
return -1
208208
ptr += 2
209209

210210
# Validate Answer Class IN
211211
ans_class = int.from_bytes(self._pkt_buf[ptr : ptr + 2], "big")
212-
if not ans_class == TYPE_A:
212+
if not ans_class == _TYPE_A:
213213
if self._debug:
214214
print("* DNS ERROR: Incorrect Answer Class: ", ans_class)
215215
return -1
@@ -220,7 +220,7 @@ def _parse_dns_response(
220220

221221
# Validate addr is IPv4
222222
data_len = int.from_bytes(self._pkt_buf[ptr : ptr + 2], "big")
223-
if not data_len == DATA_LEN:
223+
if not data_len == _DATA_LEN:
224224
if self._debug:
225225
print("* DNS ERROR: Unexpected Data Length: ", data_len)
226226
return -1
@@ -267,8 +267,8 @@ def _build_dns_question(self) -> None:
267267
# end of the name
268268
self._pkt_buf.append(0x00)
269269
# Type A record
270-
self._pkt_buf.append(htons(TYPE_A) & 0xFF)
271-
self._pkt_buf.append(htons(TYPE_A) >> 8)
270+
self._pkt_buf.append(htons(_TYPE_A) & 0xFF)
271+
self._pkt_buf.append(htons(_TYPE_A) >> 8)
272272
# Class IN
273-
self._pkt_buf.append(htons(CLASS_IN) & 0xFF)
274-
self._pkt_buf.append(htons(CLASS_IN) >> 8)
273+
self._pkt_buf.append(htons(_CLASS_IN) & 0xFF)
274+
self._pkt_buf.append(htons(_CLASS_IN) >> 8)

0 commit comments

Comments
 (0)