if not auth_record:
auth_record = SfaRecord(hrn=hrn, gid=auth_info.get_gid_object(), type="authority", pointer=-1)
auth_record['authority'] = get_authority(auth_record['hrn'])
- self.logger.info("Import: inserting authority record for " + hrn)
+ self.logger.info("Import: inserting authority record for %s"%hrn)
table.insert(auth_record)
if len(hrn) > 64:
hrn = hrn[:64]
- self.logger.info("Import: person " + hrn)
+ self.logger.info("Import: person %s"%hrn)
key_ids = []
if 'key_ids' in person and person['key_ids']:
key_ids = person["key_ids"]
slicename = _cleanup_string(slicename)
if not slicename:
- self.logger.error("Import: failed to parse slice name " + slice['name'])
+ self.logger.error("Import: failed to parse slice name %s" %slice['name'])
return
hrn = parent_hrn + "." + slicename
- self.logger.info("Import: slice " + hrn)
+ self.logger.info("Import: slice %s"%hrn)
pkey = Keypair(create=True)
urn = hrn_to_urn(hrn, 'slice')
nodename = _cleanup_string(nodename)
if not nodename:
- self.logger.error("Import: failed to parse node name " + node['hostname'])
+ self.logger.error("Import: failed to parse node %s" %node['hostname'])
return
hrn = parent_hrn + "." + nodename
hrn = ".".join([parent_hrn, "internet2", sitename])
urn = hrn_to_urn(hrn, 'authority')
- self.logger.info("Import: site " + hrn)
+ self.logger.info("Import: site %s"%hrn)
# create the authority
if not self.AuthHierarchy.auth_exists(urn):
except Exception, err:
# Log error in /var/log/httpd/(ssl_)?error_log
- sfa_logger().log_exc("%r"%e)
+ sfa_logger().log_exc("%r"%err)
return apache.HTTP_INTERNAL_SERVER_ERROR
else:
try:
# look for gid file
- sfa_logger().debug("generating server cert from gid: ", hrn)
+ sfa_logger().debug("generating server cert from gid: %s"% hrn)
hierarchy = Hierarchy()
auth_info = hierarchy.get_auth_info(hrn)
gid = GID(filename=auth_info.gid_filename)
valid.append(cred)
except:
cred_obj=Credential(string=cred)
- sfa_logger().debug("failed to validate credential - dump="+cred_obj.dump_string(dump_parents=True))
+ sfa_logger().debug("failed to validate credential - dump=%s"%cred_obj.dump_string(dump_parents=True))
error = sys.exc_info()[:2]
continue
return CertNotSignedByParent(self.get_subject())
# if the parent isn't verified...
- sfa_logger().debug("verify_chain: .. %s, -> verifying parent %s",self.get_subject(),self.parent.get_subject())
+ sfa_logger().debug("verify_chain: .. %s, -> verifying parent %s"%(self.get_subject(),self.parent.get_subject()))
self.parent.verify_chain(trusted_certs)
return
trusted_cert_objects.append(GID(filename=f))
ok_trusted_certs.append(f)
except Exception, exc:
- sfa_logger().error("Failed to load trusted cert from %s: %r", f, exc)
+ sfa_logger().error("Failed to load trusted cert from %s: %r"%( f, exc))
trusted_certs = ok_trusted_certs
# Use legacy verification if this is a legacy credential
def create_auth(self, xrn, create_parents=False):
hrn, type = urn_to_hrn(xrn)
- sfa_logger().debug("Hierarchy: creating authority: " + hrn)
+ sfa_logger().debug("Hierarchy: creating authority: %s"% hrn)
# create the parent authority if necessary
parent_hrn = get_authority(hrn)