summaryrefslogtreecommitdiffstats
path: root/ipapython
diff options
context:
space:
mode:
Diffstat (limited to 'ipapython')
-rw-r--r--ipapython/certdb.py8
-rw-r--r--ipapython/certmonger.py10
-rw-r--r--ipapython/config.py2
-rw-r--r--ipapython/cookie.py4
-rw-r--r--ipapython/dnsutil.py2
-rw-r--r--ipapython/dogtag.py4
-rw-r--r--ipapython/ipaldap.py14
-rw-r--r--ipapython/ipautil.py12
-rw-r--r--ipapython/log_manager.py4
-rw-r--r--ipapython/nsslib.py12
-rw-r--r--ipapython/sysrestore.py2
11 files changed, 37 insertions, 37 deletions
diff --git a/ipapython/certdb.py b/ipapython/certdb.py
index e3238c846..d6de01100 100644
--- a/ipapython/certdb.py
+++ b/ipapython/certdb.py
@@ -178,7 +178,7 @@ class NSSDatabase(object):
args = args + ["-w", paths.DEV_STDIN]
try:
ipautil.run(args, stdin=pkcs12_passwd)
- except ipautil.CalledProcessError, e:
+ except ipautil.CalledProcessError as e:
if e.returncode == 17:
raise RuntimeError("incorrect password for pkcs#12 file %s" %
pkcs12_filename)
@@ -390,7 +390,7 @@ class NSSDatabase(object):
try:
self.run_certutil(["-M", "-n", root_nickname,
"-t", trust_flags])
- except ipautil.CalledProcessError, e:
+ except ipautil.CalledProcessError as e:
raise RuntimeError(
"Setting trust on %s failed" % root_nickname)
@@ -470,7 +470,7 @@ class NSSDatabase(object):
intended_usage = nss.certificateUsageSSLServer
try:
approved_usage = cert.verify_now(certdb, True, intended_usage)
- except NSPRError, e:
+ except NSPRError as e:
if e.errno != -8102:
raise ValueError(e.strerror)
approved_usage = 0
@@ -504,7 +504,7 @@ class NSSDatabase(object):
intended_usage = nss.certificateUsageSSLCA
try:
approved_usage = cert.verify_now(certdb, True, intended_usage)
- except NSPRError, e:
+ except NSPRError as e:
if e.errno != -8102: # SEC_ERROR_INADEQUATE_KEY_USAGE
raise ValueError(e.strerror)
approved_usage = 0
diff --git a/ipapython/certmonger.py b/ipapython/certmonger.py
index 3a2907d83..1371c215d 100644
--- a/ipapython/certmonger.py
+++ b/ipapython/certmonger.py
@@ -212,7 +212,7 @@ def get_request_value(request_id, directive):
"""
try:
request = _get_request(dict(nickname=request_id))
- except RuntimeError, e:
+ except RuntimeError as e:
root_logger.error('Failed to get request: %s' % e)
raise
if request:
@@ -240,7 +240,7 @@ def get_request_id(criteria):
"""
try:
request = _get_request(criteria)
- except RuntimeError, e:
+ except RuntimeError as e:
root_logger.error('Failed to get request: %s' % e)
raise
if request:
@@ -270,7 +270,7 @@ def add_request_value(request_id, directive, value):
"""
try:
request = _get_request({'nickname': request_id})
- except RuntimeError, e:
+ except RuntimeError as e:
root_logger.error('Failed to get request: %s' % e)
raise
if request:
@@ -356,7 +356,7 @@ def start_tracking(nickname, secdir, password_file=None, command=None):
if result[0]:
request = _cm_dbus_object(cm.bus, cm, result[1], DBUS_CM_REQUEST_IF,
DBUS_CM_IF, True)
- except TypeError, e:
+ except TypeError as e:
root_logger.error('Failed to add new request.')
raise
return request.prop_if.Get(DBUS_CM_REQUEST_IF, 'nickname')
@@ -378,7 +378,7 @@ def stop_tracking(secdir, request_id=None, nickname=None):
criteria['cert-nickname'] = nickname
try:
request = _get_request(criteria)
- except RuntimeError, e:
+ except RuntimeError as e:
root_logger.error('Failed to get request: %s' % e)
raise
if request:
diff --git a/ipapython/config.py b/ipapython/config.py
index 60f556dc9..8b6b5ac93 100644
--- a/ipapython/config.py
+++ b/ipapython/config.py
@@ -64,7 +64,7 @@ def check_ip_option(option, opt, value):
def check_dn_option(option, opt, value):
try:
return DN(value)
- except Exception, e:
+ except Exception as e:
raise OptionValueError("option %s: invalid DN: %s" % (opt, e))
class IPAOption(Option):
diff --git a/ipapython/cookie.py b/ipapython/cookie.py
index aed312a3a..c12e0a127 100644
--- a/ipapython/cookie.py
+++ b/ipapython/cookie.py
@@ -185,7 +185,7 @@ class Cookie(object):
try:
dt = datetime.datetime(*email.utils.parsedate(s)[0:6])
- except Exception, e:
+ except Exception as e:
raise ValueError("unable to parse expires datetime '%s': %s" % (s, e))
return dt
@@ -594,7 +594,7 @@ class Cookie(object):
from ipalib.util import validate_domain_name
try:
validate_domain_name(url_domain)
- except Exception, e:
+ except Exception as e:
return False
if cookie_domain is None:
diff --git a/ipapython/dnsutil.py b/ipapython/dnsutil.py
index f08cddad9..228cb6629 100644
--- a/ipapython/dnsutil.py
+++ b/ipapython/dnsutil.py
@@ -37,7 +37,7 @@ class DNSName(dns.name.Name):
labels = labels.labels
super(DNSName, self).__init__(labels)
- except UnicodeError, e:
+ except UnicodeError as e:
# dnspython bug, an invalid domain name returns the UnicodeError
# instead of a dns.exception
raise dns.exception.SyntaxError(e)
diff --git a/ipapython/dogtag.py b/ipapython/dogtag.py
index 0782d360c..99bdf066d 100644
--- a/ipapython/dogtag.py
+++ b/ipapython/dogtag.py
@@ -163,7 +163,7 @@ def error_from_xml(doc, message_template):
item_node = doc.getElementsByTagName("Error")
reason = item_node[0].childNodes[0].data
return errors.RemoteRetrieveError(reason=reason)
- except Exception, e:
+ except Exception as e:
return errors.RemoteRetrieveError(reason=message_template % e)
@@ -332,7 +332,7 @@ def _httplib_request(
http_headers = res.msg.dict
http_body = res.read()
conn.close()
- except Exception, e:
+ except Exception as e:
raise NetworkError(uri=uri, error=str(e))
root_logger.debug('request status %d', http_status)
diff --git a/ipapython/ipaldap.py b/ipapython/ipaldap.py
index ef7c41a37..3d38d6050 100644
--- a/ipapython/ipaldap.py
+++ b/ipapython/ipaldap.py
@@ -168,7 +168,7 @@ class SchemaCache(object):
except ldap.SERVER_DOWN:
raise errors.NetworkError(uri=url,
error=u'LDAP Server Down, unable to retrieve LDAP schema')
- except ldap.LDAPError, e:
+ except ldap.LDAPError as e:
desc = e.args[0]['desc'].strip()
info = e.args[0].get('info', '').strip()
raise errors.DatabaseError(desc = u'uri=%s' % url,
@@ -865,7 +865,7 @@ class LDAPClient(object):
return datetime.datetime.strptime(val, LDAP_GENERALIZED_TIME_FORMAT)
else:
return target_type(val)
- except Exception, e:
+ except Exception as e:
msg = 'unable to convert the attribute %r value %r to type %s' % (attr, val, target_type)
self.log.error(msg)
raise ValueError(msg)
@@ -927,7 +927,7 @@ class LDAPClient(object):
yield
except ldap.TIMEOUT:
raise errors.DatabaseTimeout()
- except ldap.LDAPError, e:
+ except ldap.LDAPError as e:
desc = e.args[0]['desc'].strip()
info = e.args[0].get('info', '').strip()
if arg_desc is not None:
@@ -984,7 +984,7 @@ class LDAPClient(object):
raise errors.DatabaseError(desc=desc, info=info)
except ldap.AUTH_UNKNOWN:
raise errors.ACIError(info='%s (%s)' % (info,desc))
- except ldap.LDAPError, e:
+ except ldap.LDAPError as e:
if 'NOT_ALLOWED_TO_DELEGATE' in info:
raise errors.ACIError(
info="KDC returned NOT_ALLOWED_TO_DELEGATE")
@@ -1354,7 +1354,7 @@ class LDAPClient(object):
break
else:
cookie = ''
- except ldap.LDAPError, e:
+ except ldap.LDAPError as e:
# If paged search is in progress, try to cancel it
if paged_search and cookie:
sctrls = [SimplePagedResultsControl(0, 0, cookie)]
@@ -1363,7 +1363,7 @@ class LDAPClient(object):
str(base_dn), scope, filter, attrs_list,
serverctrls=sctrls, timeout=time_limit,
sizelimit=size_limit)
- except ldap.LDAPError, e:
+ except ldap.LDAPError as e:
self.log.warning(
"Error cancelling paged search: %s", e)
cookie = ''
@@ -1630,7 +1630,7 @@ class IPAdmin(LDAPClient):
pw_name = pwd.getpwuid(os.geteuid()).pw_name
self.do_external_bind(pw_name, timeout=timeout)
return
- except errors.NotFound, e:
+ except errors.NotFound as e:
if autobind == AUTOBIND_ENABLED:
# autobind was required and failed, raise
# exception that it failed
diff --git a/ipapython/ipautil.py b/ipapython/ipautil.py
index 05a7eebf0..280858ce7 100644
--- a/ipapython/ipautil.py
+++ b/ipapython/ipautil.py
@@ -803,7 +803,7 @@ def host_port_open(host, port, socket_type=socket.SOCK_STREAM, socket_timeout=No
s.recv(512)
return True
- except socket.error, e:
+ except socket.error as e:
pass
finally:
if s:
@@ -824,14 +824,14 @@ def bind_port_responder(port, socket_type=socket.SOCK_STREAM, socket_timeout=Non
try:
addr_infos = socket.getaddrinfo(host, port, family, socket_type, 0,
socket.AI_PASSIVE)
- except socket.error, e:
+ except socket.error as e:
last_socket_error = e
continue
for res in addr_infos:
af, socktype, proto, canonname, sa = res
try:
s = socket.socket(af, socktype, proto)
- except socket.error, e:
+ except socket.error as e:
last_socket_error = e
s = None
continue
@@ -870,7 +870,7 @@ def bind_port_responder(port, socket_type=socket.SOCK_STREAM, socket_timeout=Non
# Timeout is expectable as it was requested by caller, raise
# the exception back to him
raise
- except socket.error, e:
+ except socket.error as e:
last_socket_error = e
s.close()
s = None
@@ -1177,7 +1177,7 @@ def wait_for_open_socket(socket_name, timeout=0):
s.connect(socket_name)
s.close()
break
- except socket.error, e:
+ except socket.error as e:
if e.errno in (2,111): # 111: Connection refused, 2: File not found
if timeout and time.time() > op_timeout: # timeout exceeded
raise e
@@ -1298,7 +1298,7 @@ def restore_hostname(statestore):
if old_hostname is not None and old_hostname != system_hostname:
try:
run([paths.BIN_HOSTNAME, old_hostname])
- except CalledProcessError, e:
+ except CalledProcessError as e:
print >>sys.stderr, "Failed to set this machine hostname back to %s: %s" % (old_hostname, str(e))
diff --git a/ipapython/log_manager.py b/ipapython/log_manager.py
index 9625bdfb7..cf3611e0f 100644
--- a/ipapython/log_manager.py
+++ b/ipapython/log_manager.py
@@ -936,7 +936,7 @@ class LogManager(object):
if value is not None:
try:
level = parse_log_level(value)
- except Exception, e:
+ except Exception as e:
raise ValueError("could not set %s (%s)" % (attr, e))
setattr(self, attr, level)
@@ -1239,7 +1239,7 @@ class LogManager(object):
if level is not None:
try:
level = parse_log_level(level)
- except Exception, e:
+ except Exception as e:
print >>sys.stderr, 'could not set handler log level "%s" (%s)' % (level, e)
level = None
if level is None:
diff --git a/ipapython/nsslib.py b/ipapython/nsslib.py
index def6b104e..1fb69cbd1 100644
--- a/ipapython/nsslib.py
+++ b/ipapython/nsslib.py
@@ -59,7 +59,7 @@ def auth_certificate_callback(sock, check_sig, is_server, certdb):
# will be set to the error code matching the reason why the validation failed
# and the strerror attribute will contain a string describing the reason.
approved_usage = cert.verify_now(certdb, check_sig, intended_usage, *pin_args)
- except Exception, e:
+ except Exception as e:
root_logger.error('cert validation failed for "%s" (%s)', cert.subject, e.strerror)
cert_is_valid = False
return cert_is_valid
@@ -88,7 +88,7 @@ def auth_certificate_callback(sock, check_sig, is_server, certdb):
try:
# If the cert fails validation it will raise an exception
cert_is_valid = cert.verify_hostname(hostname)
- except Exception, e:
+ except Exception as e:
root_logger.error('failed verifying socket hostname "%s" matches cert subject "%s" (%s)',
hostname, cert.subject, e.strerror)
cert_is_valid = False
@@ -159,7 +159,7 @@ class NSSAddressFamilyFallback(object):
self._create_socket()
self.sock.connect(net_addr)
return
- except Exception, e:
+ except Exception as e:
root_logger.debug("Could not connect socket to %s, error: %s",
net_addr, str(e))
root_logger.debug("Try to continue with next family...")
@@ -199,7 +199,7 @@ class NSSConnection(httplib.HTTPConnection, NSSAddressFamilyFallback):
ssl.clear_session_cache()
try:
nss.nss_shutdown()
- except NSPRError, e:
+ except NSPRError as e:
if e.errno != error.SEC_ERROR_NOT_INITIALIZED:
raise e
@@ -236,7 +236,7 @@ class NSSConnection(httplib.HTTPConnection, NSSAddressFamilyFallback):
self.sock.set_ssl_option(ssl.SSL_HANDSHAKE_AS_CLIENT, True)
try:
self.sock.set_ssl_version_range(self.tls_version_min, self.tls_version_max)
- except NSPRError, e:
+ except NSPRError as e:
root_logger.error('Failed to set TLS range to %s, %s' % (self.tls_version_min, self.tls_version_max))
raise
self.sock.set_ssl_option(ssl_require_safe_negotiation, False)
@@ -289,7 +289,7 @@ class NSSConnection(httplib.HTTPConnection, NSSAddressFamilyFallback):
httplib.HTTPConnection.endheaders(self)
else:
httplib.HTTPConnection.endheaders(self, message)
- except NSPRError, e:
+ except NSPRError as e:
self.close()
raise e
diff --git a/ipapython/sysrestore.py b/ipapython/sysrestore.py
index 935e4c6ce..a542b28c9 100644
--- a/ipapython/sysrestore.py
+++ b/ipapython/sysrestore.py
@@ -276,7 +276,7 @@ class FileStore:
try:
os.unlink(backup_path)
- except Exception, e:
+ except Exception as e:
root_logger.error('Error removing %s: %s' % (backup_path, str(e)))
del self.files[filename]