729 lines
22 KiB
Python
Raw Normal View History

2010-05-27 23:05:26 -07:00
# vim: tabstop=4 shiftwidth=4 softtabstop=4
2010-06-23 22:04:16 -07:00
# Copyright 2010 United States Government as represented by the
# Administrator of the National Aeronautics and Space Administration.
# Copyright 2011 Justin Santa Barbara
2010-06-23 22:04:16 -07:00
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
2010-05-27 23:05:26 -07:00
# Unless required by applicable law or agreed to in writing, software
2010-06-23 22:04:16 -07:00
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
2010-05-27 23:05:26 -07:00
2011-04-20 12:08:22 -07:00
"""Utilities and helper functions."""
2010-05-27 23:05:26 -07:00
import base64
2010-08-16 14:16:21 +02:00
import datetime
import functools
import inspect
import json
import lockfile
import netaddr
2010-07-07 12:24:24 -07:00
import os
2010-05-27 23:05:26 -07:00
import random
import re
import socket
import string
2010-11-23 21:48:32 +00:00
import struct
import sys
import time
import types
from xml.sax import saxutils
2010-05-27 23:05:26 -07:00
from eventlet import event
from eventlet import greenthread
from eventlet import semaphore
from eventlet.green import subprocess
2011-04-20 12:08:22 -07:00
from nova import exception
2011-02-28 23:31:09 +01:00
from nova import flags
from nova import log as logging
2010-06-10 18:39:07 +01:00
2010-08-16 14:16:21 +02:00
LOG = logging.getLogger("nova.utils")
2010-07-26 17:00:50 -04:00
TIME_FORMAT = "%Y-%m-%dT%H:%M:%SZ"
2011-02-28 23:31:09 +01:00
FLAGS = flags.FLAGS
2010-06-10 18:39:07 +01:00
def import_class(import_str):
2011-04-20 12:08:22 -07:00
"""Returns a class from a string including module and class."""
mod_str, _sep, class_str = import_str.rpartition('.')
try:
__import__(mod_str)
return getattr(sys.modules[mod_str], class_str)
except (ImportError, ValueError, AttributeError), exc:
LOG.debug(_('Inner Exception: %s'), exc)
raise exception.ClassNotFound(class_name=class_str)
2010-06-10 18:39:07 +01:00
def import_object(import_str):
2011-04-20 12:08:22 -07:00
"""Returns an object including a module or module and class."""
try:
2010-08-30 00:55:19 -07:00
__import__(import_str)
return sys.modules[import_str]
except ImportError:
cls = import_class(import_str)
return cls()
2010-08-16 14:16:21 +02:00
2010-11-23 21:48:32 +00:00
def vpn_ping(address, port, timeout=0.05, session_id=None):
"""Sends a vpn negotiation packet and returns the server session.
Returns False on a failure. Basic packet structure is below.
Client packet (14 bytes)::
0 1 8 9 13
+-+--------+-----+
|x| cli_id |?????|
+-+--------+-----+
x = packet identifier 0x38
cli_id = 64 bit identifier
? = unknown, probably flags/padding
Server packet (26 bytes)::
0 1 8 9 13 14 21 2225
+-+--------+-----+--------+----+
|x| srv_id |?????| cli_id |????|
+-+--------+-----+--------+----+
x = packet identifier 0x40
cli_id = 64 bit identifier
? = unknown, probably flags/padding
bit 9 was 1 and the rest were 0 in testing
2011-04-20 12:08:22 -07:00
2010-11-23 21:48:32 +00:00
"""
if session_id is None:
session_id = random.randint(0, 0xffffffffffffffff)
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
2011-04-20 12:08:22 -07:00
data = struct.pack('!BQxxxxxx', 0x38, session_id)
2010-11-23 21:48:32 +00:00
sock.sendto(data, (address, port))
sock.settimeout(timeout)
try:
received = sock.recv(2048)
except socket.timeout:
return False
finally:
sock.close()
2011-04-20 12:08:22 -07:00
fmt = '!BQxxxxxQxxxx'
2010-11-23 21:48:32 +00:00
if len(received) != struct.calcsize(fmt):
print struct.calcsize(fmt)
return False
(identifier, server_sess, client_sess) = struct.unpack(fmt, received)
if identifier == 0x40 and client_sess == session_id:
return server_sess
2010-05-27 23:05:26 -07:00
def fetchfile(url, target):
2011-04-20 12:08:22 -07:00
LOG.debug(_('Fetching %s') % url)
execute('curl', '--fail', url, '-o', target)
2010-05-27 23:05:26 -07:00
2011-03-09 00:30:05 -05:00
def execute(*cmd, **kwargs):
process_input = kwargs.pop('process_input', None)
addl_env = kwargs.pop('addl_env', None)
check_exit_code = kwargs.pop('check_exit_code', 0)
delay_on_retry = kwargs.pop('delay_on_retry', True)
attempts = kwargs.pop('attempts', 1)
if len(kwargs):
raise exception.Error(_('Got unknown keyword args '
'to utils.execute: %r') % kwargs)
2011-03-09 15:33:20 -05:00
cmd = map(str, cmd)
while attempts > 0:
attempts -= 1
try:
2011-04-20 12:08:22 -07:00
LOG.debug(_('Running cmd (subprocess): %s'), ' '.join(cmd))
env = os.environ.copy()
if addl_env:
env.update(addl_env)
2011-06-07 15:17:34 -04:00
_PIPE = subprocess.PIPE # pylint: disable=E1101
obj = subprocess.Popen(cmd,
stdin=_PIPE,
stdout=_PIPE,
stderr=_PIPE,
env=env)
result = None
2011-04-18 15:53:09 -05:00
if process_input is not None:
result = obj.communicate(process_input)
else:
result = obj.communicate()
2011-06-07 15:17:34 -04:00
obj.stdin.close() # pylint: disable=E1101
_returncode = obj.returncode # pylint: disable=E1101
if _returncode:
LOG.debug(_('Result was %s') % _returncode)
2011-03-09 23:39:12 +01:00
if type(check_exit_code) == types.IntType \
and _returncode != check_exit_code:
(stdout, stderr) = result
2011-04-20 12:08:22 -07:00
raise exception.ProcessExecutionError(
exit_code=_returncode,
2011-04-20 12:08:22 -07:00
stdout=stdout,
stderr=stderr,
cmd=' '.join(cmd))
return result
2011-04-20 12:08:22 -07:00
except exception.ProcessExecutionError:
if not attempts:
raise
else:
2011-04-20 12:08:22 -07:00
LOG.debug(_('%r failed. Retrying.'), cmd)
if delay_on_retry:
greenthread.sleep(random.randint(20, 200) / 100.0)
finally:
# NOTE(termie): this appears to be necessary to let the subprocess
# call clean something up in between calls, without
# it two execute calls in a row hangs the second one
greenthread.sleep(0)
2010-05-27 23:05:26 -07:00
2010-06-10 18:39:07 +01:00
2011-02-04 13:07:17 -06:00
def ssh_execute(ssh, cmd, process_input=None,
addl_env=None, check_exit_code=True):
2011-04-20 12:08:22 -07:00
LOG.debug(_('Running cmd (SSH): %s'), ' '.join(cmd))
2011-02-04 13:07:17 -06:00
if addl_env:
2011-04-20 12:08:24 -07:00
raise exception.Error(_('Environment not supported over SSH'))
2011-02-04 13:07:17 -06:00
if process_input:
# This is (probably) fixable if we need it...
2011-04-20 12:08:24 -07:00
raise exception.Error(_('process_input not supported over SSH'))
2011-02-04 13:07:17 -06:00
stdin_stream, stdout_stream, stderr_stream = ssh.exec_command(cmd)
channel = stdout_stream.channel
#stdin.write('process_input would go here')
#stdin.flush()
# NOTE(justinsb): This seems suspicious...
# ...other SSH clients have buffering issues with this approach
stdout = stdout_stream.read()
stderr = stderr_stream.read()
stdin_stream.close()
exit_status = channel.recv_exit_status()
# exit_status == -1 if no exit code was returned
if exit_status != -1:
2011-04-20 12:08:22 -07:00
LOG.debug(_('Result was %s') % exit_status)
2011-02-04 13:07:17 -06:00
if check_exit_code and exit_status != 0:
raise exception.ProcessExecutionError(exit_code=exit_status,
stdout=stdout,
stderr=stderr,
2011-03-08 01:01:41 -05:00
cmd=' '.join(cmd))
2011-02-04 13:07:17 -06:00
return (stdout, stderr)
2011-02-09 11:18:48 -08:00
2010-05-27 23:05:26 -07:00
def abspath(s):
return os.path.join(os.path.dirname(__file__), s)
2010-06-10 18:39:07 +01:00
def novadir():
import nova
return os.path.abspath(nova.__file__).split('nova/__init__.pyc')[0]
2010-05-27 23:05:26 -07:00
def default_flagfile(filename='nova.conf'):
for arg in sys.argv:
if arg.find('flagfile') != -1:
break
else:
if not os.path.isabs(filename):
# turn relative filename into an absolute path
script_dir = os.path.dirname(inspect.stack()[-1][1])
filename = os.path.abspath(os.path.join(script_dir, filename))
2011-05-03 21:16:03 +04:00
if not os.path.exists(filename):
filename = "./nova.conf"
if not os.path.exists(filename):
filename = '/etc/nova/nova.conf'
flagfile = ['--flagfile=%s' % filename]
sys.argv = sys.argv[:1] + flagfile + sys.argv[1:]
2010-05-27 23:05:26 -07:00
2010-06-10 18:39:07 +01:00
2010-05-27 23:05:26 -07:00
def debug(arg):
LOG.debug(_('debug in callback: %s'), arg)
2010-05-27 23:05:26 -07:00
return arg
2010-06-10 18:39:07 +01:00
2011-03-09 00:30:05 -05:00
def runthis(prompt, *cmd, **kwargs):
2011-04-20 12:08:22 -07:00
LOG.debug(_('Running %s'), (' '.join(cmd)))
2011-03-09 00:30:05 -05:00
rv, err = execute(*cmd, **kwargs)
2010-05-27 23:05:26 -07:00
def generate_uid(topic, size=8):
2010-10-25 17:20:10 -07:00
characters = '01234567890abcdefghijklmnopqrstuvwxyz'
choices = [random.choice(characters) for x in xrange(size)]
return '%s-%s' % (topic, ''.join(choices))
2010-05-27 23:05:26 -07:00
2010-06-10 18:39:07 +01:00
2010-05-27 23:05:26 -07:00
def generate_mac():
mac = [0x02, 0x16, 0x3e,
random.randint(0x00, 0x7f),
random.randint(0x00, 0xff),
random.randint(0x00, 0xff)]
2011-04-20 12:08:22 -07:00
return ':'.join(map(lambda x: '%02x' % x, mac))
2010-05-27 23:05:26 -07:00
2010-06-10 18:39:07 +01:00
# Default symbols to use for passwords. Avoids visually confusing characters.
# ~6 bits per symbol
2011-04-20 12:08:22 -07:00
DEFAULT_PASSWORD_SYMBOLS = ('23456789' # Removed: 0,1
'ABCDEFGHJKLMNPQRSTUVWXYZ' # Removed: I, O
'abcdefghijkmnopqrstuvwxyz') # Removed: l
# ~5 bits per symbol
2011-04-20 12:08:22 -07:00
EASIER_PASSWORD_SYMBOLS = ('23456789' # Removed: 0, 1
'ABCDEFGHJKLMNPQRSTUVWXYZ') # Removed: I, O
def generate_password(length=20, symbols=DEFAULT_PASSWORD_SYMBOLS):
"""Generate a random password from the supplied symbols.
Believed to be reasonably secure (with a reasonable password length!)
2011-04-20 12:08:22 -07:00
"""
r = random.SystemRandom()
2011-04-20 12:08:22 -07:00
return ''.join([r.choice(symbols) for _i in xrange(length)])
2010-05-27 23:05:26 -07:00
def last_octet(address):
2011-04-20 12:08:22 -07:00
return int(address.split('.')[-1])
2010-05-27 23:05:26 -07:00
2010-06-10 18:39:07 +01:00
2010-12-24 20:38:49 +09:00
def get_my_linklocal(interface):
try:
2011-04-20 12:08:22 -07:00
if_str = execute('ip', '-f', 'inet6', '-o', 'addr', 'show', interface)
condition = '\s+inet6\s+([0-9a-f:]+)/\d+\s+scope\s+link'
2010-12-24 20:38:49 +09:00
links = [re.search(condition, x) for x in if_str[0].split('\n')]
address = [w.group(1) for w in links if w is not None]
if address[0] is not None:
return address[0]
else:
2011-04-20 12:08:22 -07:00
raise exception.Error(_('Link Local address is not found.:%s')
2011-01-19 11:13:33 +09:00
% if_str)
except Exception as ex:
raise exception.Error(_("Couldn't get Link Local IP of %(interface)s"
2011-04-20 12:08:22 -07:00
" :%(ex)s") % locals())
2010-12-24 20:38:49 +09:00
def utcnow():
"""Overridable version of utils.utcnow."""
if utcnow.override_time:
return utcnow.override_time
return datetime.datetime.utcnow()
utcnow.override_time = None
2011-03-23 17:15:41 -05:00
def is_older_than(before, seconds):
2011-04-20 12:08:22 -07:00
"""Return True if before is older than seconds."""
2011-03-24 10:30:09 -05:00
return utcnow() - before > datetime.timedelta(seconds=seconds)
def utcnow_ts():
"""Timestamp version of our utcnow function."""
return time.mktime(utcnow().timetuple())
def set_time_override(override_time=datetime.datetime.utcnow()):
"""Override utils.utcnow to return a constant time."""
utcnow.override_time = override_time
def advance_time_delta(timedelta):
"""Advance overriden time using a datetime.timedelta."""
assert(not utcnow.override_time is None)
utcnow.override_time += timedelta
def advance_time_seconds(seconds):
"""Advance overriden time by seconds."""
advance_time_delta(datetime.timedelta(0, seconds))
def clear_time_override():
"""Remove the overridden time."""
utcnow.override_time = None
def isotime(at=None):
"""Returns iso formatted utcnow."""
if not at:
at = utcnow()
2010-07-26 17:00:50 -04:00
return at.strftime(TIME_FORMAT)
2010-08-16 14:16:21 +02:00
2010-07-26 17:00:50 -04:00
def parse_isotime(timestr):
2011-04-20 12:08:22 -07:00
"""Turn an iso formatted time back into a datetime."""
2010-08-16 14:16:21 +02:00
return datetime.datetime.strptime(timestr, TIME_FORMAT)
2010-08-19 12:28:45 +02:00
def parse_mailmap(mailmap='.mailmap'):
mapping = {}
if os.path.exists(mailmap):
fp = open(mailmap, 'r')
for l in fp:
l = l.strip()
if not l.startswith('#') and ' ' in l:
canonical_email, alias = l.split(' ')
mapping[alias] = canonical_email
return mapping
2010-11-23 21:58:46 +01:00
def str_dict_replace(s, mapping):
for s1, s2 in mapping.iteritems():
s = s.replace(s1, s2)
return s
2010-08-19 12:28:45 +02:00
class LazyPluggable(object):
"""A pluggable backend loaded lazily based on some value."""
2010-08-19 12:28:45 +02:00
def __init__(self, pivot, **backends):
self.__backends = backends
self.__pivot = pivot
self.__backend = None
2010-08-19 12:28:45 +02:00
def __get_backend(self):
if not self.__backend:
backend_name = self.__pivot.value
if backend_name not in self.__backends:
raise exception.Error(_('Invalid backend: %s') % backend_name)
2010-08-19 12:28:45 +02:00
backend = self.__backends[backend_name]
if type(backend) == type(tuple()):
name = backend[0]
fromlist = backend[1]
else:
name = backend
fromlist = backend
2010-08-19 12:28:45 +02:00
self.__backend = __import__(name, None, None, fromlist)
LOG.debug(_('backend %s'), self.__backend)
2010-08-19 12:28:45 +02:00
return self.__backend
2010-08-19 12:28:45 +02:00
def __getattr__(self, key):
backend = self.__get_backend()
return getattr(backend, key)
2011-01-06 21:37:33 -06:00
class LoopingCallDone(Exception):
2011-04-20 12:08:22 -07:00
"""Exception to break out and stop a LoopingCall.
The poll-function passed to LoopingCall can raise this exception to
2011-01-06 23:38:01 -06:00
break out of the loop normally. This is somewhat analogous to
StopIteration.
2011-01-06 21:37:33 -06:00
An optional return-value can be included as the argument to the exception;
this return-value will be returned by LoopingCall.wait()
2011-04-20 12:08:22 -07:00
2011-01-06 21:37:33 -06:00
"""
def __init__(self, retvalue=True):
2011-04-20 12:08:22 -07:00
""":param retvalue: Value that LoopingCall.wait() should return."""
2011-01-06 21:37:33 -06:00
self.retvalue = retvalue
class LoopingCall(object):
def __init__(self, f=None, *args, **kw):
self.args = args
self.kw = kw
self.f = f
self._running = False
def start(self, interval, now=True):
self._running = True
done = event.Event()
2010-12-16 10:52:30 -08:00
def _inner():
if not now:
greenthread.sleep(interval)
try:
while self._running:
self.f(*self.args, **self.kw)
if not self._running:
break
greenthread.sleep(interval)
2011-01-06 21:37:33 -06:00
except LoopingCallDone, e:
self.stop()
done.send(e.retvalue)
except Exception:
2010-12-14 16:05:39 -08:00
logging.exception('in looping call')
done.send_exception(*sys.exc_info())
return
2011-01-06 21:37:33 -06:00
else:
done.send(True)
2010-12-09 15:19:56 -08:00
self.done = done
2010-12-16 10:52:30 -08:00
greenthread.spawn(_inner)
2010-12-09 15:19:56 -08:00
return self.done
2010-12-16 10:52:30 -08:00
def stop(self):
self._running = False
2010-12-09 15:19:56 -08:00
def wait(self):
return self.done.wait()
def xhtml_escape(value):
"""Escapes a string so it is valid within XML or XHTML.
Code is directly from the utf8 function in
http://github.com/facebook/tornado/blob/master/tornado/escape.py
"""
2011-04-20 12:08:22 -07:00
return saxutils.escape(value, {'"': '"'})
def utf8(value):
"""Try to turn a string into utf-8 if possible.
Code is directly from the utf8 function in
http://github.com/facebook/tornado/blob/master/tornado/escape.py
"""
if isinstance(value, unicode):
2011-04-20 12:08:22 -07:00
return value.encode('utf-8')
assert isinstance(value, str)
return value
def to_primitive(value):
if type(value) is type([]) or type(value) is type((None,)):
o = []
for v in value:
o.append(to_primitive(v))
return o
elif type(value) is type({}):
o = {}
for k, v in value.iteritems():
o[k] = to_primitive(v)
return o
elif isinstance(value, datetime.datetime):
return str(value)
elif hasattr(value, 'iteritems'):
return to_primitive(dict(value.iteritems()))
elif hasattr(value, '__iter__'):
return to_primitive(list(value))
else:
return value
def dumps(value):
try:
return json.dumps(value)
except TypeError:
pass
return json.dumps(to_primitive(value))
def loads(s):
return json.loads(s)
_semaphores = {}
class _NoopContextManager(object):
def __enter__(self):
pass
def __exit__(self, exc_type, exc_val, exc_tb):
pass
def synchronized(name, external=False):
2011-04-20 12:08:22 -07:00
"""Synchronization decorator.
Decorating a method like so:
@synchronized('mylock')
def foo(self, *args):
...
ensures that only one thread will execute the bar method at a time.
Different methods can share the same lock:
@synchronized('mylock')
def foo(self, *args):
...
@synchronized('mylock')
def bar(self, *args):
...
This way only one of either foo or bar can be executing at a time.
The external keyword argument denotes whether this lock should work across
multiple processes. This means that if two different workers both run a
a method decorated with @synchronized('mylock', external=True), only one
of them will execute at a time.
2011-04-20 12:08:22 -07:00
"""
def wrap(f):
@functools.wraps(f)
def inner(*args, **kwargs):
# NOTE(soren): If we ever go natively threaded, this will be racy.
# See http://stackoverflow.com/questions/5390569/dyn\
# amically-allocating-and-destroying-mutexes
if name not in _semaphores:
_semaphores[name] = semaphore.Semaphore()
sem = _semaphores[name]
LOG.debug(_('Attempting to grab semaphore "%(lock)s" for method '
2011-04-20 12:08:22 -07:00
'"%(method)s"...' % {'lock': name,
'method': f.__name__}))
with sem:
if external:
LOG.debug(_('Attempting to grab file lock "%(lock)s" for '
'method "%(method)s"...' %
2011-04-20 12:08:22 -07:00
{'lock': name, 'method': f.__name__}))
lock_file_path = os.path.join(FLAGS.lock_path,
'nova-%s.lock' % name)
lock = lockfile.FileLock(lock_file_path)
else:
lock = _NoopContextManager()
with lock:
retval = f(*args, **kwargs)
# If no-one else is waiting for it, delete it.
# See note about possible raciness above.
if not sem.balance < 1:
del _semaphores[name]
return retval
return inner
return wrap
def get_from_path(items, path):
2011-04-20 12:08:22 -07:00
"""Returns a list of items matching the specified path.
Takes an XPath-like expression e.g. prop1/prop2/prop3, and for each item
in items, looks up items[prop1][prop2][prop3]. Like XPath, if any of the
intermediate results are lists it will treat each list item individually.
A 'None' in items or any child expressions will be ignored, this function
will not throw because of None (anywhere) in items. The returned list
2011-04-20 12:08:22 -07:00
will contain no None values.
2011-04-20 12:08:22 -07:00
"""
if path is None:
2011-04-20 12:08:22 -07:00
raise exception.Error('Invalid mini_xpath')
2011-04-20 12:08:22 -07:00
(first_token, sep, remainder) = path.partition('/')
2011-04-20 12:08:22 -07:00
if first_token == '':
raise exception.Error('Invalid mini_xpath')
results = []
if items is None:
return results
if not isinstance(items, types.ListType):
# Wrap single objects in a list
items = [items]
for item in items:
if item is None:
continue
2011-04-20 12:08:22 -07:00
get_method = getattr(item, 'get', None)
if get_method is None:
continue
child = get_method(first_token)
if child is None:
continue
if isinstance(child, types.ListType):
# Flatten intermediate lists
for x in child:
results.append(x)
else:
results.append(child)
if not sep:
# No more tokens
return results
else:
return get_from_path(results, remainder)
def flatten_dict(dict_, flattened=None):
2011-04-20 12:08:22 -07:00
"""Recursively flatten a nested dictionary."""
flattened = flattened or {}
for key, value in dict_.iteritems():
if hasattr(value, 'iteritems'):
flatten_dict(value, flattened)
else:
flattened[key] = value
return flattened
def partition_dict(dict_, keys):
2011-04-20 12:08:22 -07:00
"""Return two dicts, one with `keys` the other with everything else."""
intersection = {}
difference = {}
for key, value in dict_.iteritems():
if key in keys:
intersection[key] = value
else:
difference[key] = value
return intersection, difference
def map_dict_keys(dict_, key_map):
2011-04-20 12:08:22 -07:00
"""Return a dict in which the dictionaries keys are mapped to new keys."""
mapped = {}
for key, value in dict_.iteritems():
mapped_key = key_map[key] if key in key_map else key
mapped[mapped_key] = value
return mapped
2011-03-23 05:50:53 +00:00
def subset_dict(dict_, keys):
2011-04-20 12:08:22 -07:00
"""Return a dict that only contains a subset of keys."""
2011-03-23 05:50:53 +00:00
subset = partition_dict(dict_, keys)[0]
return subset
2011-03-24 21:13:55 +00:00
def check_isinstance(obj, cls):
2011-04-20 12:08:22 -07:00
"""Checks that obj is of type cls, and lets PyLint infer types."""
if isinstance(obj, cls):
return obj
2011-04-20 12:08:22 -07:00
raise Exception(_('Expected object of type: %s') % (str(cls)))
# TODO(justinsb): Can we make this better??
return cls() # Ugly PyLint hack
def parse_server_string(server_str):
"""
Parses the given server_string and returns a list of host and port.
If it's not a combination of host part and port, the port element
is a null string. If the input is invalid expression, return a null
list.
"""
try:
# First of all, exclude pure IPv6 address (w/o port).
if netaddr.valid_ipv6(server_str):
return (server_str, '')
# Next, check if this is IPv6 address with a port number combination.
if server_str.find("]:") != -1:
(address, port) = server_str.replace('[', '', 1).split(']:')
return (address, port)
# Third, check if this is a combination of an address and a port
if server_str.find(':') == -1:
return (server_str, '')
# This must be a combination of an address and a port
(address, port) = server_str.split(':')
return (address, port)
except:
LOG.debug(_('Invalid server_string: %s' % server_str))
return ('', '')