Perl Hacker, Python Initiate
pavlovevidence at gmail.com
Wed Feb 2 17:11:28 EST 2011
On Feb 2, 8:00 am, Gary Chambers <gwch... at gwcmail.com> wrote:
> > Insight will be easier to provide once we see your Python code.
> Thanks to all of you who replied to my original request for assistance. All
> points are valid and well-taken.
> I'm afraid that I can no longer locate the original Python code where I was
> encountering the problem I described in my request. Unfortunately, I chose
> to teach myself Python by first porting that script directly (for better or
> worse, just trying to make it work). Time constraints, a bit of
> frustration, and simply being comfortable and efficient in Perl have
> relegated the task to a far back burner.
So use Perl then, if that's what you're familiar with and you don't
have time to learn Python.
> Since then, I've forwarded the
> Perl code to a few others to see if they could provide a solution, but have
> heard nothing in reply -- which is why I presented it to a world of real
> Python experts.
How much money did you offer them to translate your script for you?
Maybe they were unsatisfied with your offer.
> If you can't make heads or tails of the Perl code, all I'm trying to do is
> loop through some dig output of a DNS zone transfer. There are two
> conditions I need to test: whether it's an A or CNAME record. Ultimately, I
> need to assemble the data into a single line listing first the canonical
> hostname (A), followed by the aliases (CNAME), and finally the IP address.
I'll do it for US$150.
More information about the Python-list