diff --git a/nova/network/ldapdns.py b/nova/network/ldapdns.py index 27fb6bb3ef00..c2470e127c3b 100644 --- a/nova/network/ldapdns.py +++ b/nova/network/ldapdns.py @@ -95,7 +95,7 @@ class DNSEntry(object): @classmethod def _get_tuple_for_domain(cls, lobj, domain): entry = lobj.search_s(flags.FLAGS.ldap_dns_base_dn, ldap.SCOPE_SUBTREE, - "(associatedDomain=%s)" % utils.utf8(domain)) + '(associatedDomain=%s)' % utils.utf8(domain)) if not entry: return None if len(entry) > 1: @@ -106,7 +106,7 @@ class DNSEntry(object): @classmethod def _get_all_domains(cls, lobj): entries = lobj.search_s(flags.FLAGS.ldap_dns_base_dn, - ldap.SCOPE_SUBTREE, "(sOARecord=*)") + ldap.SCOPE_SUBTREE, '(sOARecord=*)') domains = [] for entry in entries: domain = entry[1].get('associatedDomain') @@ -118,15 +118,15 @@ class DNSEntry(object): self.ldap_tuple = tuple def _qualify(self, name): - return "%s.%s" % (name, self.qualified_domain) + return '%s.%s' % (name, self.qualified_domain) def _dequalify(self, name): z = ".%s" % self.qualified_domain if name.endswith(z): dequalified = name[0:name.rfind(z)] else: - LOG.warn("Unable to dequalify. %s is not in %s.\n" % (name, - self.qualified_domain)) + LOG.warn("Unable to dequalify. %s is not in %s.\n" % + (name, self.qualified_domain)) dequalified = None return dequalified @@ -144,8 +144,8 @@ class DomainEntry(DNSEntry): @classmethod def _soa(cls): - date = time.strftime("%Y%m%d%H%M%S") - soa = "%s %s %s %s %s %s %s" % ( + date = time.strftime('%Y%m%d%H%M%S') + soa = '%s %s %s %s %s %s %s' % ( flags.FLAGS.ldap_dns_servers[0], flags.FLAGS.ldap_dns_soa_hostmaster, date, @@ -160,9 +160,9 @@ class DomainEntry(DNSEntry): """Create a new domain entry, and return an object that wraps it.""" entry = cls._get_tuple_for_domain(lobj, domain) if entry: - raise exception.FloatingIpDNSExists(name=domain, domain="") + raise exception.FloatingIpDNSExists(name=domain, domain='') - newdn = "dc=%s,%s" % (domain, flags.FLAGS.ldap_dns_base_dn) + newdn = 'dc=%s,%s' % (domain, flags.FLAGS.ldap_dns_base_dn) attrs = {'objectClass': ['domainrelatedobject', 'dnsdomain', 'domain', 'dcobject', 'top'], 'sOARecord': [cls._soa()], @@ -196,9 +196,9 @@ class DomainEntry(DNSEntry): def subentry_with_name(self, name): entry = self.lobj.search_s(self.dn, ldap.SCOPE_SUBTREE, - "(associatedDomain=%s.%s)" % - (utils.utf8(name), - utils.utf8(self.qualified_domain))) + '(associatedDomain=%s.%s)' % + (utils.utf8(name), + utils.utf8(self.qualified_domain))) if entry: return HostEntry(self, entry[0]) else: @@ -206,7 +206,7 @@ class DomainEntry(DNSEntry): def subentries_with_ip(self, ip): entries = self.lobj.search_s(self.dn, ldap.SCOPE_SUBTREE, - "(aRecord=%s)" % utils.utf8(ip)) + '(aRecord=%s)' % utils.utf8(ip)) objs = [] for entry in entries: if 'associatedDomain' in entry[1]: @@ -231,7 +231,7 @@ class DomainEntry(DNSEntry): return self.subentry_with_name(name) else: # We need to create an entirely new entry. - newdn = "dc=%s,%s" % (name, self.dn) + newdn = 'dc=%s,%s' % (name, self.dn) attrs = {'objectClass': ['domainrelatedobject', 'dnsdomain', 'domain', 'dcobject', 'top'], 'aRecord': [address], @@ -268,7 +268,7 @@ class HostEntry(DNSEntry): if (self.rdn[1] == name): # We just removed the rdn, so we need to move this entry. names.remove(self._qualify(name)) - newrdn = "dc=%s" % self._dequalify(names[0]) + newrdn = 'dc=%s' % self._dequalify(names[0]) self.lobj.modrdn_s(self.dn, [newrdn]) else: # We should delete the entire record. diff --git a/nova/network/linux_net.py b/nova/network/linux_net.py index a1054bbd00c3..fc33ebdccff0 100755 --- a/nova/network/linux_net.py +++ b/nova/network/linux_net.py @@ -64,7 +64,7 @@ linux_net_opts = [ default='10.128.0.0/24', help='dmz range that should be accepted'), cfg.StrOpt('dnsmasq_config_file', - default="", + default='', help='Override the default dnsmasq settings with this file'), cfg.StrOpt('linuxnet_interface_driver', default='nova.network.linux_net.LinuxBridgeInterfaceDriver', @@ -163,8 +163,8 @@ class IptablesTable(object): chain_set = self.unwrapped_chains if name not in chain_set: - LOG.debug(_('Attempted to remove chain %s which does not exist'), - name) + LOG.warn(_('Attempted to remove chain %s which does not exist'), + name) return chain_set.remove(name) @@ -212,10 +212,10 @@ class IptablesTable(object): try: self.rules.remove(IptablesRule(chain, rule, wrap, top)) except ValueError: - LOG.debug(_('Tried to remove rule that was not there:' - ' %(chain)r %(rule)r %(wrap)r %(top)r'), - {'chain': chain, 'rule': rule, - 'top': top, 'wrap': wrap}) + LOG.warn(_('Tried to remove rule that was not there:' + ' %(chain)r %(rule)r %(wrap)r %(top)r'), + {'chain': chain, 'rule': rule, + 'top': top, 'wrap': wrap}) def empty_chain(self, chain, wrap=True): """Remove all rules from a chain.""" @@ -492,9 +492,9 @@ def ensure_vpn_forward(public_ip, port, private_ip): '-d %s -p udp ' '--dport %s -j DNAT --to %s:1194' % (public_ip, port, private_ip)) - iptables_manager.ipv4['nat'].add_rule("OUTPUT", - "-d %s -p udp " - "--dport %s -j DNAT --to %s:1194" % + iptables_manager.ipv4['nat'].add_rule('OUTPUT', + '-d %s -p udp ' + '--dport %s -j DNAT --to %s:1194' % (public_ip, port, private_ip)) iptables_manager.apply() @@ -551,21 +551,21 @@ def initialize_gateway_device(dev, network_ref): check_exit_code=[0, 7]) for ip_params in old_ip_params: _execute(*_ip_bridge_cmd('del', ip_params, dev), - run_as_root=True, check_exit_code=[0, 2, 254]) + run_as_root=True, check_exit_code=[0, 2, 254]) for ip_params in new_ip_params: _execute(*_ip_bridge_cmd('add', ip_params, dev), - run_as_root=True, check_exit_code=[0, 2, 254]) + run_as_root=True, check_exit_code=[0, 2, 254]) if gateway: _execute('route', 'add', 'default', 'gw', gateway, run_as_root=True, check_exit_code=[0, 7]) if FLAGS.send_arp_for_ha: _execute('arping', '-U', network_ref['dhcp_server'], - '-A', '-I', dev, - '-c', 1, run_as_root=True, check_exit_code=False) + '-A', '-I', dev, + '-c', 1, run_as_root=True, check_exit_code=False) if(FLAGS.use_ipv6): _execute('ip', '-f', 'inet6', 'addr', - 'change', network_ref['cidr_v6'], - 'dev', dev, run_as_root=True) + 'change', network_ref['cidr_v6'], + 'dev', dev, run_as_root=True) def get_dhcp_leases(context, network_ref): @@ -686,7 +686,7 @@ def restart_dhcp(context, dev, network_ref): check_exit_code=False) # Using symlinks can cause problems here so just compare the name # of the file itself - if conffile.split("/")[-1] in out: + if conffile.split('/')[-1] in out: try: _execute('kill', '-HUP', pid, run_as_root=True) return @@ -753,7 +753,7 @@ interface %s try: _execute('kill', pid, run_as_root=True) except Exception as exc: # pylint: disable=W0703 - LOG.debug(_('killing radvd threw %s'), exc) + LOG.error(_('killing radvd threw %s'), exc) else: LOG.debug(_('Pid %d is stale, relaunching radvd'), pid) @@ -790,7 +790,7 @@ def _host_dhcp(data): data['instance_hostname'], FLAGS.dhcp_domain, data['address'], - "net:" + _host_dhcp_network(data)) + 'net:' + _host_dhcp_network(data)) else: return '%s,%s.%s,%s' % (data['vif_address'], data['instance_hostname'], @@ -971,8 +971,8 @@ class LinuxBridgeInterfaceDriver(LinuxNetInterfaceDriver): # (danwent) the bridge will inherit this address, so we want to # make sure it is the value set from the NetworkManager if mac_address: - _execute('ip', 'link', 'set', interface, "address", - mac_address, run_as_root=True) + _execute('ip', 'link', 'set', interface, 'address', + mac_address, run_as_root=True) _execute('ip', 'link', 'set', interface, 'up', run_as_root=True) if FLAGS.network_device_mtu: _execute('ip', 'link', 'set', interface, 'mtu', @@ -1009,7 +1009,7 @@ class LinuxBridgeInterfaceDriver(LinuxNetInterfaceDriver): if interface: out, err = _execute('brctl', 'addif', bridge, interface, - check_exit_code=False, run_as_root=True) + check_exit_code=False, run_as_root=True) # NOTE(vish): This will break if there is already an ip on the # interface, so we move any ips to the bridge @@ -1030,9 +1030,9 @@ class LinuxBridgeInterfaceDriver(LinuxNetInterfaceDriver): if fields and fields[0] == 'inet': params = fields[1:-1] _execute(*_ip_bridge_cmd('del', params, fields[-1]), - run_as_root=True, check_exit_code=[0, 2, 254]) + run_as_root=True, check_exit_code=[0, 2, 254]) _execute(*_ip_bridge_cmd('add', params, bridge), - run_as_root=True, check_exit_code=[0, 2, 254]) + run_as_root=True, check_exit_code=[0, 2, 254]) if old_gateway: _execute('route', 'add', 'default', 'gw', old_gateway, run_as_root=True, check_exit_code=[0, 7]) @@ -1063,17 +1063,17 @@ class LinuxOVSInterfaceDriver(LinuxNetInterfaceDriver): if not _device_exists(dev): bridge = FLAGS.linuxnet_ovs_integration_bridge _execute('ovs-vsctl', - '--', '--may-exist', 'add-port', bridge, dev, - '--', 'set', 'Interface', dev, "type=internal", - '--', 'set', 'Interface', dev, - "external-ids:iface-id=%s" % dev, - '--', 'set', 'Interface', dev, - "external-ids:iface-status=active", - '--', 'set', 'Interface', dev, - "external-ids:attached-mac=%s" % mac_address, - run_as_root=True) - _execute('ip', 'link', 'set', dev, "address", mac_address, - run_as_root=True) + '--', '--may-exist', 'add-port', bridge, dev, + '--', 'set', 'Interface', dev, 'type=internal', + '--', 'set', 'Interface', dev, + 'external-ids:iface-id=%s' % dev, + '--', 'set', 'Interface', dev, + 'external-ids:iface-status=active', + '--', 'set', 'Interface', dev, + 'external-ids:attached-mac=%s' % mac_address, + run_as_root=True) + _execute('ip', 'link', 'set', dev, 'address', mac_address, + run_as_root=True) if FLAGS.network_device_mtu: _execute('ip', 'link', 'set', dev, 'mtu', FLAGS.network_device_mtu, run_as_root=True) @@ -1082,11 +1082,11 @@ class LinuxOVSInterfaceDriver(LinuxNetInterfaceDriver): # If we weren't instructed to act as a gateway then add the # appropriate flows to block all non-dhcp traffic. _execute('ovs-ofctl', - 'add-flow', bridge, "priority=1,actions=drop", - run_as_root=True) + 'add-flow', bridge, 'priority=1,actions=drop', + run_as_root=True) _execute('ovs-ofctl', 'add-flow', bridge, - "udp,tp_dst=67,dl_dst=%s,priority=2,actions=normal" % - mac_address, run_as_root=True) + 'udp,tp_dst=67,dl_dst=%s,priority=2,actions=normal' % + mac_address, run_as_root=True) # .. and make sure iptbles won't forward it as well. iptables_manager.ipv4['filter'].add_rule('FORWARD', '--in-interface %s -j DROP' % bridge) @@ -1104,19 +1104,19 @@ class LinuxOVSInterfaceDriver(LinuxNetInterfaceDriver): dev = self.get_dev(network) bridge = FLAGS.linuxnet_ovs_integration_bridge _execute('ovs-vsctl', '--', '--if-exists', 'del-port', - bridge, dev, run_as_root=True) + bridge, dev, run_as_root=True) return dev def get_dev(self, network): - dev = "gw-" + str(network['uuid'][0:11]) + dev = 'gw-' + str(network['uuid'][0:11]) return dev # plugs interfaces using Linux Bridge when using QuantumManager class QuantumLinuxBridgeInterfaceDriver(LinuxNetInterfaceDriver): - BRIDGE_NAME_PREFIX = "brq" - GATEWAY_INTERFACE_PREFIX = "gw-" + BRIDGE_NAME_PREFIX = 'brq' + GATEWAY_INTERFACE_PREFIX = 'gw-' def plug(self, network, mac_address, gateway=True): dev = self.get_dev(network) @@ -1143,7 +1143,7 @@ class QuantumLinuxBridgeInterfaceDriver(LinuxNetInterfaceDriver): utils.execute('brctl', 'addbr', bridge, run_as_root=True) utils.execute('brctl', 'setfd', bridge, str(0), run_as_root=True) utils.execute('brctl', 'stp', bridge, 'off', run_as_root=True) - utils.execute('ip', 'link', 'set', bridge, "address", mac_address, + utils.execute('ip', 'link', 'set', bridge, 'address', mac_address, run_as_root=True) utils.execute('ip', 'link', 'set', bridge, 'up', run_as_root=True) LOG.debug(_("Done starting bridge %s"), bridge) @@ -1151,7 +1151,7 @@ class QuantumLinuxBridgeInterfaceDriver(LinuxNetInterfaceDriver): full_ip = '%s/%s' % (network['dhcp_server'], network['cidr'].rpartition('/')[2]) utils.execute('ip', 'address', 'add', full_ip, 'dev', bridge, - run_as_root=True) + run_as_root=True) return dev @@ -1164,8 +1164,7 @@ class QuantumLinuxBridgeInterfaceDriver(LinuxNetInterfaceDriver): try: utils.execute('ip', 'link', 'delete', dev, run_as_root=True) except exception.ProcessExecutionError: - LOG.warning(_("Failed unplugging gateway interface '%s'"), - dev) + LOG.error(_("Failed unplugging gateway interface '%s'"), dev) raise LOG.debug(_("Unplugged gateway interface '%s'"), dev) return dev @@ -1176,12 +1175,12 @@ class QuantumLinuxBridgeInterfaceDriver(LinuxNetInterfaceDriver): try: # First, try with 'ip' utils.execute('ip', 'tuntap', 'add', dev, 'mode', 'tap', - run_as_root=True) + run_as_root=True) except exception.ProcessExecutionError: # Second option: tunctl utils.execute('tunctl', '-b', '-t', dev, run_as_root=True) if mac_address: - utils.execute('ip', 'link', 'set', dev, "address", mac_address, + utils.execute('ip', 'link', 'set', dev, 'address', mac_address, run_as_root=True) utils.execute('ip', 'link', 'set', dev, 'up', run_as_root=True)