summaryrefslogtreecommitdiffstats
path: root/lib/puppet/network/http
diff options
context:
space:
mode:
Diffstat (limited to 'lib/puppet/network/http')
-rw-r--r--lib/puppet/network/http/api/v1.rb10
-rw-r--r--lib/puppet/network/http/handler.rb14
-rw-r--r--lib/puppet/network/http/rack.rb2
-rw-r--r--lib/puppet/network/http/rack/xmlrpc.rb6
-rw-r--r--lib/puppet/network/http/webrick.rb4
5 files changed, 18 insertions, 18 deletions
diff --git a/lib/puppet/network/http/api/v1.rb b/lib/puppet/network/http/api/v1.rb
index 6a5ff156a..25e27c486 100644
--- a/lib/puppet/network/http/api/v1.rb
+++ b/lib/puppet/network/http/api/v1.rb
@@ -19,14 +19,14 @@ module Puppet::Network::HTTP::API::V1
def uri2indirection(http_method, uri, params)
environment, indirection, key = uri.split("/", 4)[1..-1] # the first field is always nil because of the leading slash
- raise ArgumentError, "The environment must be purely alphanumeric, not '%s'" % environment unless environment =~ /^\w+$/
- raise ArgumentError, "The indirection name must be purely alphanumeric, not '%s'" % indirection unless indirection =~ /^\w+$/
+ raise ArgumentError, "The environment must be purely alphanumeric, not '#{environment}'" unless environment =~ /^\w+$/
+ raise ArgumentError, "The indirection name must be purely alphanumeric, not '#{indirection}'" unless indirection =~ /^\w+$/
method = indirection_method(http_method, indirection)
params[:environment] = environment
- raise ArgumentError, "No request key specified in %s" % uri if key == "" or key.nil?
+ raise ArgumentError, "No request key specified in #{uri}" if key == "" or key.nil?
key = URI.unescape(key)
@@ -40,11 +40,11 @@ module Puppet::Network::HTTP::API::V1
def indirection_method(http_method, indirection)
unless METHOD_MAP[http_method]
- raise ArgumentError, "No support for http method %s" % http_method
+ raise ArgumentError, "No support for http method #{http_method}"
end
unless method = METHOD_MAP[http_method][plurality(indirection)]
- raise ArgumentError, "No support for plural %s operations" % http_method
+ raise ArgumentError, "No support for plural #{http_method} operations"
end
return method
diff --git a/lib/puppet/network/http/handler.rb b/lib/puppet/network/http/handler.rb
index a76fefdcc..66e0c720e 100644
--- a/lib/puppet/network/http/handler.rb
+++ b/lib/puppet/network/http/handler.rb
@@ -37,14 +37,14 @@ module Puppet::Network::HTTP::Handler
return format
end
- raise "No specified acceptable formats (%s) are functional on this machine" % header
+ raise "No specified acceptable formats (#{header}) are functional on this machine"
end
def request_format(request)
if header = content_type_header(request)
header.gsub!(/\s*;.*$/,'') # strip any charset
format = Puppet::Network::FormatHandler.mime(header)
- raise "Client sent a mime-type (%s) that doesn't correspond to a format we support" % header if format.nil?
+ raise "Client sent a mime-type (#{header}) that doesn't correspond to a format we support" if format.nil?
return format.name.to_s if format.suitable?
end
@@ -65,7 +65,7 @@ module Puppet::Network::HTTP::Handler
check_authorization(indirection_request)
- send("do_%s" % indirection_request.method, indirection_request, request, response)
+ send("do_#{indirection_request.method}", indirection_request, request, response)
rescue SystemExit,NoMemoryError
raise
rescue Exception => e
@@ -99,8 +99,8 @@ module Puppet::Network::HTTP::Handler
# Execute our find.
def do_find(indirection_request, request, response)
unless result = indirection_request.model.find(indirection_request.key, indirection_request.to_hash)
- Puppet.info("Could not find %s for '%s'" % [indirection_request.indirection_name, indirection_request.key])
- return do_exception(response, "Could not find %s %s" % [indirection_request.indirection_name, indirection_request.key], 404)
+ Puppet.info("Could not find #{indirection_request.indirection_name} for '#{indirection_request.key}'")
+ return do_exception(response, "Could not find #{indirection_request.indirection_name} #{indirection_request.key}", 404)
end
# The encoding of the result must include the format to use,
@@ -117,7 +117,7 @@ module Puppet::Network::HTTP::Handler
result = indirection_request.model.search(indirection_request.key, indirection_request.to_hash)
if result.nil? or (result.is_a?(Array) and result.empty?)
- return do_exception(response, "Could not find instances in %s with '%s'" % [indirection_request.indirection_name, indirection_request.to_hash.inspect], 404)
+ return do_exception(response, "Could not find instances in #{indirection_request.indirection_name} with '#{indirection_request.to_hash.inspect}'", 404)
end
format = format_to_use(request)
@@ -150,7 +150,7 @@ module Puppet::Network::HTTP::Handler
begin
return Resolv.getname(result[:ip])
rescue => detail
- Puppet.err "Could not resolve %s: %s" % [result[:ip], detail]
+ Puppet.err "Could not resolve #{result[:ip]}: #{detail}"
end
return result[:ip]
end
diff --git a/lib/puppet/network/http/rack.rb b/lib/puppet/network/http/rack.rb
index 756b66814..a5f69612d 100644
--- a/lib/puppet/network/http/rack.rb
+++ b/lib/puppet/network/http/rack.rb
@@ -54,7 +54,7 @@ class Puppet::Network::HTTP::Rack
# log what happened
Puppet.err "Puppet Server (Rack): Internal Server Error: Unhandled Exception: \"%s\"" % detail.message
Puppet.err "Backtrace:"
- detail.backtrace.each { |line| Puppet.err " > %s" % line }
+ detail.backtrace.each { |line| Puppet.err " > #{line}" }
end
response.finish()
end
diff --git a/lib/puppet/network/http/rack/xmlrpc.rb b/lib/puppet/network/http/rack/xmlrpc.rb
index 4fc9e82fc..49eb6fe49 100644
--- a/lib/puppet/network/http/rack/xmlrpc.rb
+++ b/lib/puppet/network/http/rack/xmlrpc.rb
@@ -6,9 +6,9 @@ class Puppet::Network::HTTP::RackXMLRPC < Puppet::Network::HTTP::RackHttpHandler
def initialize(handlers)
@xmlrpc_server = Puppet::Network::XMLRPCServer.new
handlers.each do |name|
- Puppet.debug " -> register xmlrpc namespace %s" % name
+ Puppet.debug " -> register xmlrpc namespace #{name}"
unless handler = Puppet::Network::Handler.handler(name)
- raise ArgumentError, "Invalid XMLRPC handler %s" % name
+ raise ArgumentError, "Invalid XMLRPC handler #{name}"
end
@xmlrpc_server.add_handler(handler.interface, handler.new({}))
end
@@ -52,7 +52,7 @@ class Puppet::Network::HTTP::RackXMLRPC < Puppet::Network::HTTP::RackHttpHandler
begin
node = Resolv.getname(ip)
rescue => detail
- Puppet.err "Could not resolve %s: %s" % [ip, detail]
+ Puppet.err "Could not resolve #{ip}: #{detail}"
node = "unknown"
end
authenticated = false
diff --git a/lib/puppet/network/http/webrick.rb b/lib/puppet/network/http/webrick.rb
index effe92434..d0533f7ff 100644
--- a/lib/puppet/network/http/webrick.rb
+++ b/lib/puppet/network/http/webrick.rb
@@ -98,7 +98,7 @@ class Puppet::Network::HTTP::WEBrick
# Get the cached copy. We know it's been generated, too.
host = Puppet::SSL::Host.localhost
- raise Puppet::Error, "Could not retrieve certificate for %s and not running on a valid certificate authority" % host.name unless host.certificate
+ raise Puppet::Error, "Could not retrieve certificate for #{host.name} and not running on a valid certificate authority" unless host.certificate
results[:SSLPrivateKey] = host.key.content
results[:SSLCertificate] = host.certificate.content
@@ -134,7 +134,7 @@ class Puppet::Network::HTTP::WEBrick
def xmlrpc_servlet
handlers = @xmlrpc_handlers.collect { |handler|
unless hclass = Puppet::Network::Handler.handler(handler)
- raise "Invalid xmlrpc handler %s" % handler
+ raise "Invalid xmlrpc handler #{handler}"
end
hclass.new({})
}