Network check fixes
- Proper network mapping
- Proper reclass lookup
- VIP detection
- Simple error gathering
- IP shown as 'exploded', i.e. in CIDR format
- MTU matching and detection
- Errors class for handling errors, including codes and indices
- Summary and detailed errors view
- Flake8 refactoring
Change-Id: I8ee37d345bdc21c7ad930bf8305acd28f8c121c8
Related-PROD: PROD-28199
diff --git a/scripts/ifs_data.py b/scripts/ifs_data.py
index 7fbba28..e182fb1 100644
--- a/scripts/ifs_data.py
+++ b/scripts/ifs_data.py
@@ -1,7 +1,7 @@
-import re
-import sys
-import subprocess
import json
+import re
+import subprocess
+import sys
def shell(command):
@@ -116,7 +116,7 @@
_ifs[_if_name]['ipv4'][_ip] = {}
_ifs[_if_name]['ipv4'][_ip]['brd'] = _brd
_ifs[_if_name]['ipv4'][_ip]['other'] = _options
-
+
# Collect routes data and try to match it with network
# Compile regexp for detecting default route
_routes = {
diff --git a/scripts/pkg_versions.py b/scripts/pkg_versions.py
index be02aa8..66a46aa 100644
--- a/scripts/pkg_versions.py
+++ b/scripts/pkg_versions.py
@@ -1,7 +1,6 @@
-import sys
-import subprocess
import json
-
+import subprocess
+import sys
from multiprocessing.dummy import Pool
diff --git a/scripts/sniffer.py b/scripts/sniffer.py
index a9f9901..de18eb2 100644
--- a/scripts/sniffer.py
+++ b/scripts/sniffer.py
@@ -1,4 +1,4 @@
# This will be the basic sniffer script
# Its purpose is to sniff for a specific packet and return its headers-n-data
-pass
\ No newline at end of file
+pass