summaryrefslogtreecommitdiffstats
path: root/ipaserver/install/plugins
diff options
context:
space:
mode:
authorMartin Basti <mbasti@redhat.com>2015-06-08 17:33:11 +0200
committerJan Cholasta <jcholast@redhat.com>2015-07-03 07:47:59 +0000
commit884afb5d38480e23c91ec14876bcf39151a2c2ed (patch)
tree15a4d06ec3e2634946987133aa762a25c3fa9eaa /ipaserver/install/plugins
parent66ea322e7e01266cc916156860b684adb21c618d (diff)
downloadfreeipa-884afb5d38480e23c91ec14876bcf39151a2c2ed.tar.gz
freeipa-884afb5d38480e23c91ec14876bcf39151a2c2ed.tar.xz
freeipa-884afb5d38480e23c91ec14876bcf39151a2c2ed.zip
Server Upgrade: use debug log level for upgrade instead of info
Upgrade contains too many unnecessary info logs. Reviewed-By: Jan Cholasta <jcholast@redhat.com>
Diffstat (limited to 'ipaserver/install/plugins')
-rw-r--r--ipaserver/install/plugins/adtrust.py4
-rw-r--r--ipaserver/install/plugins/dns.py8
-rw-r--r--ipaserver/install/plugins/update_idranges.py2
-rw-r--r--ipaserver/install/plugins/update_managed_permissions.py22
-rw-r--r--ipaserver/install/plugins/update_referint.py2
5 files changed, 19 insertions, 19 deletions
diff --git a/ipaserver/install/plugins/adtrust.py b/ipaserver/install/plugins/adtrust.py
index 941bb6329..d96bfe83e 100644
--- a/ipaserver/install/plugins/adtrust.py
+++ b/ipaserver/install/plugins/adtrust.py
@@ -139,7 +139,7 @@ class update_default_trust_view(Updater):
# First, see if trusts are enabled on the server
if not self.api.Command.adtrust_is_enabled()['result']:
- self.log.info('AD Trusts are not enabled on this server')
+ self.log.debug('AD Trusts are not enabled on this server')
return False, []
# Second, make sure the Default Trust View does not exist yet
@@ -148,7 +148,7 @@ class update_default_trust_view(Updater):
except errors.NotFound:
pass
else:
- self.log.info('Default Trust View already present on this server')
+ self.log.debug('Default Trust View already present on this server')
return False, []
# We have a server with AD trust support without Default Trust View.
diff --git a/ipaserver/install/plugins/dns.py b/ipaserver/install/plugins/dns.py
index aafea4462..3d40e0e3a 100644
--- a/ipaserver/install/plugins/dns.py
+++ b/ipaserver/install/plugins/dns.py
@@ -64,7 +64,7 @@ class update_dnszones(Updater):
try:
zones = self.api.Command.dnszone_find(all=True)['result']
except errors.NotFound:
- self.log.info('No DNS zone to update found')
+ self.log.debug('No DNS zone to update found')
return False, []
for zone in zones:
@@ -173,7 +173,7 @@ class update_master_to_dnsforwardzones(Updater):
# no upgrade is required
return False, []
- self.log.info('Updating forward zones')
+ self.log.debug('Updating forward zones')
# update the DNSVersion, following upgrade can be executed only once
container_entry.setdefault(
'ipaConfigString', []).append(u"DNSVersion 1")
@@ -202,7 +202,7 @@ class update_master_to_dnsforwardzones(Updater):
pass
if not zones:
- self.log.info('No DNS zone to update found')
+ self.log.debug('No DNS zone to update found')
return False, []
zones_to_transform = []
@@ -346,7 +346,7 @@ class update_master_to_dnsforwardzones(Updater):
zone['idnsname'][0])
continue
- self.log.info('Zone %s was sucessfully transformed to forward zone',
+ self.log.debug('Zone %s was sucessfully transformed to forward zone',
zone['idnsname'][0])
return False, []
diff --git a/ipaserver/install/plugins/update_idranges.py b/ipaserver/install/plugins/update_idranges.py
index 3181e9ec5..badde9453 100644
--- a/ipaserver/install/plugins/update_idranges.py
+++ b/ipaserver/install/plugins/update_idranges.py
@@ -152,7 +152,7 @@ class update_idrange_baserid(Updater):
for entry in entries:
entry['ipabaserid'] = 0
try:
- root_logger.info("Updating existing idrange: %s" % (entry.dn))
+ root_logger.debug("Updating existing idrange: %s" % (entry.dn))
ldap.update_entry(entry)
root_logger.info("Done")
except (errors.EmptyModlist, errors.NotFound):
diff --git a/ipaserver/install/plugins/update_managed_permissions.py b/ipaserver/install/plugins/update_managed_permissions.py
index a2f289f83..563dbb0d6 100644
--- a/ipaserver/install/plugins/update_managed_permissions.py
+++ b/ipaserver/install/plugins/update_managed_permissions.py
@@ -383,7 +383,7 @@ class update_managed_permissions(Updater):
for acistr in acistrs:
if ACI(acistr).isequal(anonymous_read_aci):
- self.log.info('Removing anonymous ACI: %s', acistr)
+ self.log.debug('Removing anonymous ACI: %s', acistr)
acistrs.remove(acistr)
break
else:
@@ -412,18 +412,18 @@ class update_managed_permissions(Updater):
anonymous_read_aci = self.get_anonymous_read_aci(ldap)
if anonymous_read_aci:
- self.log.info('Anonymous read ACI: %s', anonymous_read_aci)
+ self.log.debug('Anonymous read ACI: %s', anonymous_read_aci)
else:
- self.log.info('Anonymous ACI not found')
+ self.log.debug('Anonymous ACI not found')
current_obj = () # initially distinct from any obj value, even None
for name, template, obj in self.get_templates():
if current_obj != obj:
if obj:
- self.log.info('Updating managed permissions for %s',
+ self.log.debug('Updating managed permissions for %s',
obj.name)
else:
- self.log.info('Updating non-object managed permissions')
+ self.log.debug('Updating non-object managed permissions')
current_obj = obj
self.update_permission(ldap,
@@ -444,7 +444,7 @@ class update_managed_permissions(Updater):
except errors.NotFound:
self.log.debug('Obsolete permission not found')
else:
- self.log.info('Obsolete permission deleted: %s', obsolete_name)
+ self.log.debug('Obsolete permission deleted: %s', obsolete_name)
return False, ()
@@ -536,7 +536,7 @@ class update_managed_permissions(Updater):
permission_plugin.update_aci(entry)
if remove_legacy:
- self.log.info("Removing legacy permission '%s'", legacy_name)
+ self.log.debug("Removing legacy permission '%s'", legacy_name)
self.api.Command[permission_del](unicode(legacy_name))
for name in template.get('replaces_system', ()):
@@ -545,14 +545,14 @@ class update_managed_permissions(Updater):
entry = ldap.get_entry(permission_plugin.get_dn(name),
['ipapermissiontype'])
except errors.NotFound:
- self.log.info("Legacy permission '%s' not found", name)
+ self.log.debug("Legacy permission '%s' not found", name)
else:
flags = entry.get('ipapermissiontype', [])
if list(flags) == ['SYSTEM']:
- self.log.info("Removing legacy permission '%s'", name)
+ self.log.debug("Removing legacy permission '%s'", name)
self.api.Command[permission_del](name, force=True)
else:
- self.log.info("Ignoring V2 permission '%s'", name)
+ self.log.debug("Ignoring V2 permission '%s'", name)
def get_upgrade_attr_lists(self, current_acistring, default_acistrings):
"""Compute included and excluded attributes for a new permission
@@ -715,7 +715,7 @@ class update_managed_permissions(Updater):
anonymous_read_aci.target['targetattr']['expression'])
read_blacklist &= attributes
if read_blacklist:
- self.log.info('Excluded attributes for %s: %s',
+ self.log.debug('Excluded attributes for %s: %s',
name, ', '.join(read_blacklist))
entry['ipapermexcludedattr'] = list(read_blacklist)
diff --git a/ipaserver/install/plugins/update_referint.py b/ipaserver/install/plugins/update_referint.py
index 960a5ad1a..c5c80359e 100644
--- a/ipaserver/install/plugins/update_referint.py
+++ b/ipaserver/install/plugins/update_referint.py
@@ -45,7 +45,7 @@ class update_referint(Updater):
entry['referint-update-delay'] = update_delay
entry['nsslapd-pluginArg0'] = None
else:
- root_logger.info("Plugin already uses new style, skipping")
+ root_logger.debug("Plugin already uses new style, skipping")
return False, []
# nsslapd-pluginArg1 -> referint-logfile