Remove six
Remove six Replace the following items with Python 3 style code. - six.moves.urllib - six.iteritems - six.PY2 - six.assertCountEqual - six.next Change-Id: I75e52c74116517aeb9f6031a8734bb47c31aabca
This commit is contained in:
@@ -14,7 +14,6 @@
|
|||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
import netaddr
|
import netaddr
|
||||||
import six
|
|
||||||
|
|
||||||
from neutron_lib import constants as const
|
from neutron_lib import constants as const
|
||||||
from tempest.common import utils
|
from tempest.common import utils
|
||||||
@@ -123,8 +122,8 @@ class PortTestCasesResourceRequest(base.BaseAdminNetworkTest):
|
|||||||
self.assertIn('resource_request', port)
|
self.assertIn('resource_request', port)
|
||||||
vnic_trait = 'CUSTOM_VNIC_TYPE_%s' % vnic_type.upper()
|
vnic_trait = 'CUSTOM_VNIC_TYPE_%s' % vnic_type.upper()
|
||||||
physnet_trait = 'CUSTOM_PHYSNET_%s' % self.physnet_name.upper()
|
physnet_trait = 'CUSTOM_PHYSNET_%s' % self.physnet_name.upper()
|
||||||
six.assertCountEqual(self, [physnet_trait, vnic_trait],
|
self.assertCountEqual([physnet_trait, vnic_trait],
|
||||||
port['resource_request']['required'])
|
port['resource_request']['required'])
|
||||||
|
|
||||||
self.assertEqual(
|
self.assertEqual(
|
||||||
{'NET_BW_EGR_KILOBIT_PER_SEC': self.EGRESS_KBPS,
|
{'NET_BW_EGR_KILOBIT_PER_SEC': self.EGRESS_KBPS,
|
||||||
|
|||||||
@@ -13,7 +13,6 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
import six
|
|
||||||
from tempest.common import utils
|
from tempest.common import utils
|
||||||
from tempest.lib import decorators
|
from tempest.lib import decorators
|
||||||
from tempest.lib import exceptions as lib_exc
|
from tempest.lib import exceptions as lib_exc
|
||||||
@@ -145,7 +144,7 @@ class QuotasTest(QuotasTestBase):
|
|||||||
# as requested for tenant
|
# as requested for tenant
|
||||||
quota_set = self.admin_client.show_details_quota(tenant_id)
|
quota_set = self.admin_client.show_details_quota(tenant_id)
|
||||||
quota_set = quota_set['quota']
|
quota_set = quota_set['quota']
|
||||||
for key, value in six.iteritems(new_quotas):
|
for key, value in new_quotas.items():
|
||||||
self.assertEqual(new_quotas[key]['limit'],
|
self.assertEqual(new_quotas[key]['limit'],
|
||||||
quota_set[key]['limit'])
|
quota_set[key]['limit'])
|
||||||
self.assertEqual(new_quotas[key]['reserved'],
|
self.assertEqual(new_quotas[key]['reserved'],
|
||||||
@@ -155,5 +154,5 @@ class QuotasTest(QuotasTestBase):
|
|||||||
|
|
||||||
# validate 'default' action for old extension
|
# validate 'default' action for old extension
|
||||||
quota_limit = self.admin_client.show_quotas(tenant_id)['quota']
|
quota_limit = self.admin_client.show_quotas(tenant_id)['quota']
|
||||||
for key, value in six.iteritems(new_quotas):
|
for key, value in new_quotas.items():
|
||||||
self.assertEqual(new_quotas[key]['limit'], quota_limit[key])
|
self.assertEqual(new_quotas[key]['limit'], quota_limit[key])
|
||||||
|
|||||||
@@ -19,7 +19,6 @@ import time
|
|||||||
|
|
||||||
from oslo_log import log
|
from oslo_log import log
|
||||||
import paramiko
|
import paramiko
|
||||||
import six
|
|
||||||
from tempest.lib.common import ssh
|
from tempest.lib.common import ssh
|
||||||
from tempest.lib import exceptions
|
from tempest.lib import exceptions
|
||||||
import tenacity
|
import tenacity
|
||||||
@@ -33,13 +32,7 @@ LOG = log.getLogger(__name__)
|
|||||||
|
|
||||||
|
|
||||||
RETRY_EXCEPTIONS = (exceptions.TimeoutException, paramiko.SSHException,
|
RETRY_EXCEPTIONS = (exceptions.TimeoutException, paramiko.SSHException,
|
||||||
socket.error)
|
socket.error, TimeoutError)
|
||||||
if six.PY2:
|
|
||||||
# NOTE(ralonsoh): TimeoutError was added in 3.3 and corresponds to
|
|
||||||
# OSError(errno.ETIMEDOUT)
|
|
||||||
RETRY_EXCEPTIONS += (OSError, )
|
|
||||||
else:
|
|
||||||
RETRY_EXCEPTIONS += (TimeoutError, )
|
|
||||||
|
|
||||||
|
|
||||||
class Client(ssh.Client):
|
class Client(ssh.Client):
|
||||||
|
|||||||
@@ -13,7 +13,6 @@
|
|||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
import netaddr
|
import netaddr
|
||||||
import six
|
|
||||||
|
|
||||||
from tempest.common import utils
|
from tempest.common import utils
|
||||||
from tempest import config
|
from tempest import config
|
||||||
@@ -212,7 +211,7 @@ class FWaaSv2ExtensionTestJSON(v2_base.BaseFWaaSTest):
|
|||||||
# show a created firewall rule
|
# show a created firewall rule
|
||||||
fw_rule = self.firewall_rules_client.show_firewall_rule(
|
fw_rule = self.firewall_rules_client.show_firewall_rule(
|
||||||
self.fw_rule_1['id'])
|
self.fw_rule_1['id'])
|
||||||
for key, value in six.iteritems(fw_rule['firewall_rule']):
|
for key, value in fw_rule['firewall_rule'].items():
|
||||||
if key != 'firewall_policy_id':
|
if key != 'firewall_policy_id':
|
||||||
self.assertEqual(self.fw_rule_1[key], value)
|
self.assertEqual(self.fw_rule_1[key], value)
|
||||||
# This check is placed because we cannot modify policy during
|
# This check is placed because we cannot modify policy during
|
||||||
@@ -258,7 +257,7 @@ class FWaaSv2ExtensionTestJSON(v2_base.BaseFWaaSTest):
|
|||||||
fw_policy = self.firewall_policies_client.show_firewall_policy(
|
fw_policy = self.firewall_policies_client.show_firewall_policy(
|
||||||
self.fw_policy_1['id'])
|
self.fw_policy_1['id'])
|
||||||
fw_policy = fw_policy['firewall_policy']
|
fw_policy = fw_policy['firewall_policy']
|
||||||
for key, value in six.iteritems(fw_policy):
|
for key, value in fw_policy.items():
|
||||||
self.assertEqual(self.fw_policy_1[key], value)
|
self.assertEqual(self.fw_policy_1[key], value)
|
||||||
|
|
||||||
@decorators.idempotent_id('48dfcd75-3924-479d-bb65-b3ed33397663')
|
@decorators.idempotent_id('48dfcd75-3924-479d-bb65-b3ed33397663')
|
||||||
@@ -283,7 +282,7 @@ class FWaaSv2ExtensionTestJSON(v2_base.BaseFWaaSTest):
|
|||||||
fwg_id)
|
fwg_id)
|
||||||
fwg = firewall_group['firewall_group']
|
fwg = firewall_group['firewall_group']
|
||||||
|
|
||||||
for key, value in six.iteritems(fwg):
|
for key, value in fwg.items():
|
||||||
if key == 'status':
|
if key == 'status':
|
||||||
continue
|
continue
|
||||||
self.assertEqual(created_firewall_group[key], value)
|
self.assertEqual(created_firewall_group[key], value)
|
||||||
|
|||||||
@@ -19,7 +19,6 @@ import threading
|
|||||||
import time
|
import time
|
||||||
|
|
||||||
import netaddr
|
import netaddr
|
||||||
import six
|
|
||||||
|
|
||||||
from os_ken.tests.integrated.common import docker_base as ctn_base
|
from os_ken.tests.integrated.common import docker_base as ctn_base
|
||||||
from tempest.common import utils
|
from tempest.common import utils
|
||||||
@@ -125,10 +124,10 @@ class BgpSpeakerScenarioTestJSONBase(base.BaseAdminNetworkTest):
|
|||||||
while True:
|
while True:
|
||||||
with self.lock:
|
with self.lock:
|
||||||
try:
|
try:
|
||||||
yield (i, str(six.next(subnet_gen)))
|
yield (i, str(next(subnet_gen)))
|
||||||
except StopIteration:
|
except StopIteration:
|
||||||
subnet_gen = netaddr.iter_iprange(start, end, step=step)
|
subnet_gen = netaddr.iter_iprange(start, end, step=step)
|
||||||
yield (i, str(six.next(subnet_gen)))
|
yield (i, str(next(subnet_gen)))
|
||||||
i += 1
|
i += 1
|
||||||
|
|
||||||
def net_resource_cleanup(self):
|
def net_resource_cleanup(self):
|
||||||
|
|||||||
@@ -14,7 +14,6 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
import six
|
|
||||||
from tempest import config
|
from tempest import config
|
||||||
|
|
||||||
from neutron_tempest_plugin.neutron_dynamic_routing.scenario import base
|
from neutron_tempest_plugin.neutron_dynamic_routing.scenario import base
|
||||||
@@ -28,7 +27,7 @@ class BgpSpeakerProtoTestBase(base.BgpSpeakerScenarioTestJSONBase):
|
|||||||
|
|
||||||
def _test_check_neighbor_established(self, ip_version):
|
def _test_check_neighbor_established(self, ip_version):
|
||||||
self.bgp_peer_args[0]['peer_ip'] = self.r_as_ip[0].split('/')[0]
|
self.bgp_peer_args[0]['peer_ip'] = self.r_as_ip[0].split('/')[0]
|
||||||
num, subnet = six.next(self.tnet_gen)
|
num, subnet = next(self.tnet_gen)
|
||||||
mask = '/' + str(self.TPool.prefixlen)
|
mask = '/' + str(self.TPool.prefixlen)
|
||||||
TNet = base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
TNet = base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
||||||
cidr=subnet + mask, router=None)
|
cidr=subnet + mask, router=None)
|
||||||
@@ -47,7 +46,7 @@ class BgpSpeakerProtoTestBase(base.BgpSpeakerScenarioTestJSONBase):
|
|||||||
|
|
||||||
def _test_check_advertised_tenant_network(self, ip_version):
|
def _test_check_advertised_tenant_network(self, ip_version):
|
||||||
self.bgp_peer_args[0]['peer_ip'] = self.r_as_ip[0].split('/')[0]
|
self.bgp_peer_args[0]['peer_ip'] = self.r_as_ip[0].split('/')[0]
|
||||||
num, subnet = six.next(self.tnet_gen)
|
num, subnet = next(self.tnet_gen)
|
||||||
mask = '/' + str(self.TPool.prefixlen)
|
mask = '/' + str(self.TPool.prefixlen)
|
||||||
TNet = base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
TNet = base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
||||||
cidr=subnet + mask, router=None)
|
cidr=subnet + mask, router=None)
|
||||||
@@ -73,7 +72,7 @@ class BgpSpeakerProtoTestBase(base.BgpSpeakerScenarioTestJSONBase):
|
|||||||
tnets = []
|
tnets = []
|
||||||
tnets_cidr = []
|
tnets_cidr = []
|
||||||
for i in range(0, 3):
|
for i in range(0, 3):
|
||||||
num, subnet = six.next(self.tnet_gen)
|
num, subnet = next(self.tnet_gen)
|
||||||
mask = '/' + str(self.TPool.prefixlen)
|
mask = '/' + str(self.TPool.prefixlen)
|
||||||
TNet = base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
TNet = base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
||||||
cidr=subnet + mask, router=None)
|
cidr=subnet + mask, router=None)
|
||||||
@@ -102,7 +101,7 @@ class BgpSpeakerProtoTestBase(base.BgpSpeakerScenarioTestJSONBase):
|
|||||||
for (bgp_peer_args, r_as_ip) in zip(self.bgp_peer_args,
|
for (bgp_peer_args, r_as_ip) in zip(self.bgp_peer_args,
|
||||||
self.r_as_ip):
|
self.r_as_ip):
|
||||||
bgp_peer_args['peer_ip'] = r_as_ip.split('/')[0]
|
bgp_peer_args['peer_ip'] = r_as_ip.split('/')[0]
|
||||||
num, subnet = six.next(self.tnet_gen)
|
num, subnet = next(self.tnet_gen)
|
||||||
mask = '/' + str(self.TPool.prefixlen)
|
mask = '/' + str(self.TPool.prefixlen)
|
||||||
TNet = base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
TNet = base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
||||||
cidr=subnet + mask, router=None)
|
cidr=subnet + mask, router=None)
|
||||||
@@ -124,7 +123,7 @@ class BgpSpeakerProtoTestBase(base.BgpSpeakerScenarioTestJSONBase):
|
|||||||
for (bgp_peer_args, r_as_ip) in zip(self.bgp_peer_args,
|
for (bgp_peer_args, r_as_ip) in zip(self.bgp_peer_args,
|
||||||
self.r_as_ip):
|
self.r_as_ip):
|
||||||
bgp_peer_args['peer_ip'] = r_as_ip.split('/')[0]
|
bgp_peer_args['peer_ip'] = r_as_ip.split('/')[0]
|
||||||
num, subnet = six.next(self.tnet_gen)
|
num, subnet = next(self.tnet_gen)
|
||||||
mask = '/' + str(self.TPool.prefixlen)
|
mask = '/' + str(self.TPool.prefixlen)
|
||||||
TNet = base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
TNet = base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
||||||
cidr=subnet + mask, router=None)
|
cidr=subnet + mask, router=None)
|
||||||
|
|||||||
@@ -15,7 +15,6 @@
|
|||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
from os_ken.tests.integrated.common import docker_base as ctn_base
|
from os_ken.tests.integrated.common import docker_base as ctn_base
|
||||||
import six
|
|
||||||
from tempest import config
|
from tempest import config
|
||||||
from tempest.lib import decorators
|
from tempest.lib import decorators
|
||||||
|
|
||||||
@@ -31,7 +30,7 @@ class BgpSpeakerBasicTest(base.BgpSpeakerBasicTestJSONBase):
|
|||||||
@decorators.idempotent_id('cc615252-c6cb-4d75-a70e-608fb2c3736a')
|
@decorators.idempotent_id('cc615252-c6cb-4d75-a70e-608fb2c3736a')
|
||||||
def test_schedule_added_speaker(self):
|
def test_schedule_added_speaker(self):
|
||||||
self.bgp_peer_args[0]['peer_ip'] = self.r_as_ip[0].split('/')[0]
|
self.bgp_peer_args[0]['peer_ip'] = self.r_as_ip[0].split('/')[0]
|
||||||
num, subnet = six.next(self.tnet_gen)
|
num, subnet = next(self.tnet_gen)
|
||||||
mask = '/' + str(self.TPool.prefixlen)
|
mask = '/' + str(self.TPool.prefixlen)
|
||||||
TNet = s_base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
TNet = s_base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
||||||
cidr=subnet + mask, router=None)
|
cidr=subnet + mask, router=None)
|
||||||
@@ -51,7 +50,7 @@ class BgpSpeakerBasicTest(base.BgpSpeakerBasicTestJSONBase):
|
|||||||
@decorators.idempotent_id('ce98c33c-0ffa-49ae-b365-da836406793b')
|
@decorators.idempotent_id('ce98c33c-0ffa-49ae-b365-da836406793b')
|
||||||
def test_unschedule_deleted_speaker(self):
|
def test_unschedule_deleted_speaker(self):
|
||||||
self.bgp_peer_args[0]['peer_ip'] = self.r_as_ip[0].split('/')[0]
|
self.bgp_peer_args[0]['peer_ip'] = self.r_as_ip[0].split('/')[0]
|
||||||
num, subnet = six.next(self.tnet_gen)
|
num, subnet = next(self.tnet_gen)
|
||||||
mask = '/' + str(self.TPool.prefixlen)
|
mask = '/' + str(self.TPool.prefixlen)
|
||||||
TNet = s_base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
TNet = s_base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
||||||
cidr=subnet + mask, router=None)
|
cidr=subnet + mask, router=None)
|
||||||
@@ -77,7 +76,7 @@ class BgpSpeakerBasicTest(base.BgpSpeakerBasicTestJSONBase):
|
|||||||
@decorators.idempotent_id('aa6c565c-ded3-413b-8dc9-3928b3b0e38f')
|
@decorators.idempotent_id('aa6c565c-ded3-413b-8dc9-3928b3b0e38f')
|
||||||
def test_remove_add_speaker_agent(self):
|
def test_remove_add_speaker_agent(self):
|
||||||
self.bgp_peer_args[0]['peer_ip'] = self.r_as_ip[0].split('/')[0]
|
self.bgp_peer_args[0]['peer_ip'] = self.r_as_ip[0].split('/')[0]
|
||||||
num, subnet = six.next(self.tnet_gen)
|
num, subnet = next(self.tnet_gen)
|
||||||
mask = '/' + str(self.TPool.prefixlen)
|
mask = '/' + str(self.TPool.prefixlen)
|
||||||
TNet = s_base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
TNet = s_base.Net(name='', net=subnet, mask=self.TPool.prefixlen,
|
||||||
cidr=subnet + mask, router=None)
|
cidr=subnet + mask, router=None)
|
||||||
|
|||||||
@@ -11,9 +11,9 @@
|
|||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
import time
|
import time
|
||||||
|
from urllib import parse as urlparse
|
||||||
|
|
||||||
from oslo_serialization import jsonutils
|
from oslo_serialization import jsonutils
|
||||||
from six.moves.urllib import parse as urlparse
|
|
||||||
from tempest.lib.common import rest_client as service_client
|
from tempest.lib.common import rest_client as service_client
|
||||||
from tempest.lib import exceptions as lib_exc
|
from tempest.lib import exceptions as lib_exc
|
||||||
|
|
||||||
|
|||||||
@@ -11,7 +11,6 @@ oslo.log>=3.36.0 # Apache-2.0
|
|||||||
oslo.serialization!=2.19.1,>=2.18.0 # Apache-2.0
|
oslo.serialization!=2.19.1,>=2.18.0 # Apache-2.0
|
||||||
oslo.utils>=3.33.0 # Apache-2.0
|
oslo.utils>=3.33.0 # Apache-2.0
|
||||||
paramiko>=2.0.0 # LGPLv2.1+
|
paramiko>=2.0.0 # LGPLv2.1+
|
||||||
six>=1.10.0 # MIT
|
|
||||||
tempest>=17.1.0 # Apache-2.0
|
tempest>=17.1.0 # Apache-2.0
|
||||||
tenacity>=3.2.1 # Apache-2.0
|
tenacity>=3.2.1 # Apache-2.0
|
||||||
ddt>=1.0.1 # MIT
|
ddt>=1.0.1 # MIT
|
||||||
|
|||||||
Reference in New Issue
Block a user