Skip to content

Commit 1ec0f64

Browse files
committed
Rename error class name
1 parent f144e15 commit 1ec0f64

File tree

5 files changed

+15
-15
lines changed

5 files changed

+15
-15
lines changed

qingcloud/iaas/errors.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,9 @@ def __str__(self):
4242
self.err_code, self.err_msg)
4343

4444

45-
class RouterStaticError(StandardError):
45+
class InvalidRouterStatic(StandardError):
4646
pass
4747

4848

49-
class SecurityGroupRuleError(StandardError):
49+
class InvalidSecurityGroupRule(StandardError):
5050
pass

qingcloud/iaas/router_static.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
import json
1818

19-
from qingcloud.iaas.errors import RouterStaticError
19+
from qingcloud.iaas.errors import InvalidRouterStatic
2020

2121
class RouterStaticFactory(object):
2222

@@ -32,7 +32,7 @@ def create(cls, static_type, router_static_id='', **kw):
3232
""" Create router static.
3333
"""
3434
if static_type not in STATIC_MAPPER:
35-
raise RouterStaticError('invalid static type[%s]' % static_type)
35+
raise InvalidRouterStatic('invalid static type[%s]' % static_type)
3636

3737
clazz = STATIC_MAPPER[static_type]
3838
kw = clazz.extract(kw)
@@ -159,7 +159,7 @@ def __init__(self, vpn_type='', **kw):
159159
elif vpn_type == 'pptp':
160160
self.inst = _StaticForVPN.PPTP(**kw)
161161
else:
162-
raise RouterStaticError('unsupported vpn type[%s]' % vpn_type)
162+
raise InvalidRouterStatic('unsupported vpn type[%s]' % vpn_type)
163163

164164
@staticmethod
165165
def extract(kw):

qingcloud/iaas/sg_rule.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
import json
1818

19-
from qingcloud.iaas.errors import SecurityGroupRuleError
19+
from qingcloud.iaas.errors import InvalidSecurityGroupRule
2020

2121
class SecurityGroupRuleFactory(object):
2222

@@ -38,9 +38,9 @@ def create(cls, protocol, priority, direction=INBOUND, action='accept',
3838
@param priority: should be between 0 and 100.
3939
"""
4040
if protocol not in RULE_MAPPER:
41-
raise SecurityGroupRuleError("invalid protocol[%s]" % protocol)
41+
raise InvalidSecurityGroupRule("invalid protocol[%s]" % protocol)
4242
if not isinstance(priority, int) or priority < 0 or priority > 100:
43-
raise SecurityGroupRuleError("invalid priority[%s]" % priority)
43+
raise InvalidSecurityGroupRule("invalid priority[%s]" % priority)
4444

4545
clazz = RULE_MAPPER[protocol]
4646
inst = clazz(**kw)

tests/test_router_static.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
import unittest
1818

19-
from qingcloud.iaas.errors import RouterStaticError
19+
from qingcloud.iaas.errors import InvalidRouterStatic
2020
from qingcloud.iaas.router_static import (RouterStaticFactory, _StaticForTunnel,
2121
_StaticForFiltering, _StaticForVPN, _StaticForPortForwarding)
2222

@@ -102,7 +102,7 @@ def test_static_with_existing_id(self):
102102
self.assertEqual(json_data['router_static_id'], 'fakeid')
103103

104104
def test_unsupported_static_type(self):
105-
self.assertRaises(RouterStaticError, RouterStaticFactory.create, 'unsupported')
105+
self.assertRaises(InvalidRouterStatic, RouterStaticFactory.create, 'unsupported')
106106

107107
def test_create_from_string(self):
108108
string = '''

tests/test_sg_rule.py

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
import unittest
1818

19-
from qingcloud.iaas.errors import SecurityGroupRuleError
19+
from qingcloud.iaas.errors import InvalidSecurityGroupRule
2020
from qingcloud.iaas.sg_rule import SecurityGroupRuleFactory, _RuleForTCP, _RuleForGRE
2121

2222
class SecurityGroupRuleFactoryTestCase(unittest.TestCase):
@@ -78,14 +78,14 @@ def test_rule_with_existing_id(self):
7878
self.assertEqual(json_data['security_group_rule_id'], 'fakeid')
7979

8080
def test_unsupported_protocol(self):
81-
self.assertRaises(SecurityGroupRuleError, SecurityGroupRuleFactory.create, 'unsupported', 0)
81+
self.assertRaises(InvalidSecurityGroupRule, SecurityGroupRuleFactory.create, 'unsupported', 0)
8282

8383
def test_invalid_priority(self):
84-
self.assertRaises(SecurityGroupRuleError, SecurityGroupRuleFactory.create,
84+
self.assertRaises(InvalidSecurityGroupRule, SecurityGroupRuleFactory.create,
8585
SecurityGroupRuleFactory.PROTOCOL_UDP, -1)
86-
self.assertRaises(SecurityGroupRuleError, SecurityGroupRuleFactory.create,
86+
self.assertRaises(InvalidSecurityGroupRule, SecurityGroupRuleFactory.create,
8787
SecurityGroupRuleFactory.PROTOCOL_UDP, 101)
88-
self.assertRaises(SecurityGroupRuleError, SecurityGroupRuleFactory.create,
88+
self.assertRaises(InvalidSecurityGroupRule, SecurityGroupRuleFactory.create,
8989
SecurityGroupRuleFactory.PROTOCOL_UDP, '10')
9090

9191
rule = SecurityGroupRuleFactory.create(SecurityGroupRuleFactory.PROTOCOL_UDP, 0)

0 commit comments

Comments
 (0)