diff options
| author | Martin Basti <mbasti@redhat.com> | 2015-06-08 17:33:11 +0200 |
|---|---|---|
| committer | Jan Cholasta <jcholast@redhat.com> | 2015-07-03 07:47:59 +0000 |
| commit | 884afb5d38480e23c91ec14876bcf39151a2c2ed (patch) | |
| tree | 15a4d06ec3e2634946987133aa762a25c3fa9eaa /ipaserver/install/plugins | |
| parent | 66ea322e7e01266cc916156860b684adb21c618d (diff) | |
| download | freeipa-884afb5d38480e23c91ec14876bcf39151a2c2ed.tar.gz freeipa-884afb5d38480e23c91ec14876bcf39151a2c2ed.tar.xz freeipa-884afb5d38480e23c91ec14876bcf39151a2c2ed.zip | |
Server Upgrade: use debug log level for upgrade instead of info
Upgrade contains too many unnecessary info logs.
Reviewed-By: Jan Cholasta <jcholast@redhat.com>
Diffstat (limited to 'ipaserver/install/plugins')
| -rw-r--r-- | ipaserver/install/plugins/adtrust.py | 4 | ||||
| -rw-r--r-- | ipaserver/install/plugins/dns.py | 8 | ||||
| -rw-r--r-- | ipaserver/install/plugins/update_idranges.py | 2 | ||||
| -rw-r--r-- | ipaserver/install/plugins/update_managed_permissions.py | 22 | ||||
| -rw-r--r-- | ipaserver/install/plugins/update_referint.py | 2 |
5 files changed, 19 insertions, 19 deletions
diff --git a/ipaserver/install/plugins/adtrust.py b/ipaserver/install/plugins/adtrust.py index 941bb6329..d96bfe83e 100644 --- a/ipaserver/install/plugins/adtrust.py +++ b/ipaserver/install/plugins/adtrust.py @@ -139,7 +139,7 @@ class update_default_trust_view(Updater): # First, see if trusts are enabled on the server if not self.api.Command.adtrust_is_enabled()['result']: - self.log.info('AD Trusts are not enabled on this server') + self.log.debug('AD Trusts are not enabled on this server') return False, [] # Second, make sure the Default Trust View does not exist yet @@ -148,7 +148,7 @@ class update_default_trust_view(Updater): except errors.NotFound: pass else: - self.log.info('Default Trust View already present on this server') + self.log.debug('Default Trust View already present on this server') return False, [] # We have a server with AD trust support without Default Trust View. diff --git a/ipaserver/install/plugins/dns.py b/ipaserver/install/plugins/dns.py index aafea4462..3d40e0e3a 100644 --- a/ipaserver/install/plugins/dns.py +++ b/ipaserver/install/plugins/dns.py @@ -64,7 +64,7 @@ class update_dnszones(Updater): try: zones = self.api.Command.dnszone_find(all=True)['result'] except errors.NotFound: - self.log.info('No DNS zone to update found') + self.log.debug('No DNS zone to update found') return False, [] for zone in zones: @@ -173,7 +173,7 @@ class update_master_to_dnsforwardzones(Updater): # no upgrade is required return False, [] - self.log.info('Updating forward zones') + self.log.debug('Updating forward zones') # update the DNSVersion, following upgrade can be executed only once container_entry.setdefault( 'ipaConfigString', []).append(u"DNSVersion 1") @@ -202,7 +202,7 @@ class update_master_to_dnsforwardzones(Updater): pass if not zones: - self.log.info('No DNS zone to update found') + self.log.debug('No DNS zone to update found') return False, [] zones_to_transform = [] @@ -346,7 +346,7 @@ class update_master_to_dnsforwardzones(Updater): zone['idnsname'][0]) continue - self.log.info('Zone %s was sucessfully transformed to forward zone', + self.log.debug('Zone %s was sucessfully transformed to forward zone', zone['idnsname'][0]) return False, [] diff --git a/ipaserver/install/plugins/update_idranges.py b/ipaserver/install/plugins/update_idranges.py index 3181e9ec5..badde9453 100644 --- a/ipaserver/install/plugins/update_idranges.py +++ b/ipaserver/install/plugins/update_idranges.py @@ -152,7 +152,7 @@ class update_idrange_baserid(Updater): for entry in entries: entry['ipabaserid'] = 0 try: - root_logger.info("Updating existing idrange: %s" % (entry.dn)) + root_logger.debug("Updating existing idrange: %s" % (entry.dn)) ldap.update_entry(entry) root_logger.info("Done") except (errors.EmptyModlist, errors.NotFound): diff --git a/ipaserver/install/plugins/update_managed_permissions.py b/ipaserver/install/plugins/update_managed_permissions.py index a2f289f83..563dbb0d6 100644 --- a/ipaserver/install/plugins/update_managed_permissions.py +++ b/ipaserver/install/plugins/update_managed_permissions.py @@ -383,7 +383,7 @@ class update_managed_permissions(Updater): for acistr in acistrs: if ACI(acistr).isequal(anonymous_read_aci): - self.log.info('Removing anonymous ACI: %s', acistr) + self.log.debug('Removing anonymous ACI: %s', acistr) acistrs.remove(acistr) break else: @@ -412,18 +412,18 @@ class update_managed_permissions(Updater): anonymous_read_aci = self.get_anonymous_read_aci(ldap) if anonymous_read_aci: - self.log.info('Anonymous read ACI: %s', anonymous_read_aci) + self.log.debug('Anonymous read ACI: %s', anonymous_read_aci) else: - self.log.info('Anonymous ACI not found') + self.log.debug('Anonymous ACI not found') current_obj = () # initially distinct from any obj value, even None for name, template, obj in self.get_templates(): if current_obj != obj: if obj: - self.log.info('Updating managed permissions for %s', + self.log.debug('Updating managed permissions for %s', obj.name) else: - self.log.info('Updating non-object managed permissions') + self.log.debug('Updating non-object managed permissions') current_obj = obj self.update_permission(ldap, @@ -444,7 +444,7 @@ class update_managed_permissions(Updater): except errors.NotFound: self.log.debug('Obsolete permission not found') else: - self.log.info('Obsolete permission deleted: %s', obsolete_name) + self.log.debug('Obsolete permission deleted: %s', obsolete_name) return False, () @@ -536,7 +536,7 @@ class update_managed_permissions(Updater): permission_plugin.update_aci(entry) if remove_legacy: - self.log.info("Removing legacy permission '%s'", legacy_name) + self.log.debug("Removing legacy permission '%s'", legacy_name) self.api.Command[permission_del](unicode(legacy_name)) for name in template.get('replaces_system', ()): @@ -545,14 +545,14 @@ class update_managed_permissions(Updater): entry = ldap.get_entry(permission_plugin.get_dn(name), ['ipapermissiontype']) except errors.NotFound: - self.log.info("Legacy permission '%s' not found", name) + self.log.debug("Legacy permission '%s' not found", name) else: flags = entry.get('ipapermissiontype', []) if list(flags) == ['SYSTEM']: - self.log.info("Removing legacy permission '%s'", name) + self.log.debug("Removing legacy permission '%s'", name) self.api.Command[permission_del](name, force=True) else: - self.log.info("Ignoring V2 permission '%s'", name) + self.log.debug("Ignoring V2 permission '%s'", name) def get_upgrade_attr_lists(self, current_acistring, default_acistrings): """Compute included and excluded attributes for a new permission @@ -715,7 +715,7 @@ class update_managed_permissions(Updater): anonymous_read_aci.target['targetattr']['expression']) read_blacklist &= attributes if read_blacklist: - self.log.info('Excluded attributes for %s: %s', + self.log.debug('Excluded attributes for %s: %s', name, ', '.join(read_blacklist)) entry['ipapermexcludedattr'] = list(read_blacklist) diff --git a/ipaserver/install/plugins/update_referint.py b/ipaserver/install/plugins/update_referint.py index 960a5ad1a..c5c80359e 100644 --- a/ipaserver/install/plugins/update_referint.py +++ b/ipaserver/install/plugins/update_referint.py @@ -45,7 +45,7 @@ class update_referint(Updater): entry['referint-update-delay'] = update_delay entry['nsslapd-pluginArg0'] = None else: - root_logger.info("Plugin already uses new style, skipping") + root_logger.debug("Plugin already uses new style, skipping") return False, [] # nsslapd-pluginArg1 -> referint-logfile |
