From 85006d611fe55f554bf39a63a8a4e2a95be9eee1 Mon Sep 17 00:00:00 2001 From: Thomas Woerner <twoerner@redhat.com> Date: Tue, 14 Dec 2021 17:17:17 +0100 Subject: [PATCH] Fix ansible-test reported pep8 errors These are indent issues, one item per line for argument_specs items containing options dicts and missing or overflow spaces for comments and dict delimiters. --- plugins/modules/ipaautomember.py | 14 +++++++++----- plugins/modules/ipaconfig.py | 16 ++++++++-------- plugins/modules/ipadnsconfig.py | 29 ++++++++++++++--------------- plugins/modules/ipadnsrecord.py | 11 ++++++----- plugins/modules/ipadnszone.py | 8 ++++---- plugins/modules/ipagroup.py | 14 +++++++------- plugins/modules/iparole.py | 4 ++-- plugins/modules/ipaservice.py | 2 +- plugins/modules/ipauser.py | 7 +++++-- plugins/modules/ipavault.py | 2 +- utils/gen_module_docs.py | 10 +++++----- 11 files changed, 62 insertions(+), 55 deletions(-) diff --git a/plugins/modules/ipaautomember.py b/plugins/modules/ipaautomember.py index b99879af..c3b8e1a9 100644 --- a/plugins/modules/ipaautomember.py +++ b/plugins/modules/ipaautomember.py @@ -194,19 +194,23 @@ def main(): argument_spec=dict( # general inclusive=dict(type="list", - aliases=["automemberinclusiveregex"], default=None, + aliases=["automemberinclusiveregex"], + default=None, options=dict( key=dict(type="str", required=True), expression=dict(type="str", required=True) ), - elements="dict", required=False), - exclusive=dict(type="list", aliases=[ - "automemberexclusiveregex"], default=None, + elements="dict", + required=False), + exclusive=dict(type="list", + aliases=["automemberexclusiveregex"], + default=None, options=dict( key=dict(type="str", required=True), expression=dict(type="str", required=True) ), - elements="dict", required=False), + elements="dict", + required=False), name=dict(type="list", aliases=["cn"], default=None, required=True), description=dict(type="str", default=None), diff --git a/plugins/modules/ipaconfig.py b/plugins/modules/ipaconfig.py index 4b2df6a5..2a155bdf 100644 --- a/plugins/modules/ipaconfig.py +++ b/plugins/modules/ipaconfig.py @@ -299,7 +299,7 @@ def main(): "KDC:Disable Last Success", "KDC:Disable Lockout", "KDC:Disable Default Preauth for SPNs", - ""]), # noqa E128 + ""]), # noqa E128 selinuxusermaporder=dict(type="list", required=False, aliases=['ipaselinuxusermaporder']), selinuxusermapdefault=dict(type="str", required=False, @@ -365,15 +365,15 @@ def main(): if params.get("ipadomainresolutionorder", None): params["ipadomainresolutionorder"] = \ - ":".join(params["ipadomainresolutionorder"]) + ":".join(params["ipadomainresolutionorder"]) if params.get("ipausersearchfields", None): params["ipausersearchfields"] = \ - ",".join(params["ipausersearchfields"]) + ",".join(params["ipausersearchfields"]) if params.get("ipagroupsearchfields", None): params["ipagroupsearchfields"] = \ - ",".join(params["ipagroupsearchfields"]) + ",".join(params["ipagroupsearchfields"]) # verify limits on INT values. args_with_limits = [ @@ -418,12 +418,12 @@ def main(): if ansible_module.argument_spec.get(k): arg_type = ansible_module.argument_spec[k]['type'] if k in ( - 'ipaselinuxusermaporder', 'domain_resolution_order' - ): + 'ipaselinuxusermaporder', 'domain_resolution_order' + ): exit_args[k] = result.get(key)[0].split('$') elif k in ( - 'usersearch', 'groupsearch' - ): + 'usersearch', 'groupsearch' + ): exit_args[k] = result.get(key)[0].split(',') elif isinstance(value, str) and arg_type == "list": exit_args[k] = [value] diff --git a/plugins/modules/ipadnsconfig.py b/plugins/modules/ipadnsconfig.py index f6d4c468..7b82a076 100644 --- a/plugins/modules/ipadnsconfig.py +++ b/plugins/modules/ipadnsconfig.py @@ -165,24 +165,23 @@ def gen_args(module, state, dnsconfig, forwarders, forward_policy, def main(): forwarder_spec = dict( - ip_address=dict(type=str, required=True), - port=dict(type=int, required=False, default=None) + ip_address=dict(type=str, required=True), + port=dict(type=int, required=False, default=None) ) ansible_module = IPAAnsibleModule( - argument_spec=dict( - # dnsconfig - forwarders=dict(type='list', default=None, required=False, - options=dict(**forwarder_spec)), - forward_policy=dict(type='str', required=False, default=None, - choices=['only', 'first', 'none']), - allow_sync_ptr=dict(type='bool', required=False, default=None), - - # general - state=dict(type="str", default="present", - choices=["present", "absent"]), - - ) + argument_spec=dict( + # dnsconfig + forwarders=dict(type='list', default=None, required=False, + options=dict(**forwarder_spec)), + forward_policy=dict(type='str', required=False, default=None, + choices=['only', 'first', 'none']), + allow_sync_ptr=dict(type='bool', required=False, default=None), + + # general + state=dict(type="str", default="present", + choices=["present", "absent"]), + ) ) ansible_module._ansible_debug = True diff --git a/plugins/modules/ipadnsrecord.py b/plugins/modules/ipadnsrecord.py index dc728031..1f5e787e 100644 --- a/plugins/modules/ipadnsrecord.py +++ b/plugins/modules/ipadnsrecord.py @@ -1108,12 +1108,13 @@ def configure_module(): name=dict(type="list", aliases=["record_name"], default=None, required=False), - records=dict(type="list", default=None, + records=dict(type="list", + default=None, options=dict( - # Here name is a simple string - name=dict(type='str', required=True, - aliases=['record_name']), - **record_spec), + # Here name is a simple string + name=dict(type='str', required=True, + aliases=['record_name']), + **record_spec), ), # general diff --git a/plugins/modules/ipadnszone.py b/plugins/modules/ipadnszone.py index 38fdcefa..ae9b7516 100644 --- a/plugins/modules/ipadnszone.py +++ b/plugins/modules/ipadnszone.py @@ -550,10 +550,10 @@ def main(): ansible_module.check_ipa_params() ansible_module.define_ipa_commands() changed = ansible_module.execute_ipa_commands( - ansible_module.commands, - result_handler=DNSZoneModule.process_results, - exit_args=exit_args - ) + ansible_module.commands, + result_handler=DNSZoneModule.process_results, + exit_args=exit_args + ) ansible_module.exit_json(changed=changed, **exit_args) diff --git a/plugins/modules/ipagroup.py b/plugins/modules/ipagroup.py index 979bf623..55855f44 100644 --- a/plugins/modules/ipagroup.py +++ b/plugins/modules/ipagroup.py @@ -393,13 +393,13 @@ def main(): # If yes: modify # Also if it is a modification from nonposix to posix # or nonposix to external. - if not compare_args_ipa(ansible_module, args, - res_find) or \ - ( - not is_posix_group(res_find) and - not is_external_group(res_find) and - (posix or external) - ): + if not compare_args_ipa( + ansible_module, args, res_find + ) or ( + not is_posix_group(res_find) and + not is_external_group(res_find) and + (posix or external) + ): if posix: args['posix'] = True if external: diff --git a/plugins/modules/iparole.py b/plugins/modules/iparole.py index 912cfc1e..dc5b6922 100644 --- a/plugins/modules/iparole.py +++ b/plugins/modules/iparole.py @@ -199,7 +199,7 @@ def ensure_absent_state(module, name, action, res_find): member_args = {} for key in ['user', 'group', 'host', 'hostgroup']: items = member_intersect( - module, key, 'member_%s' % key, res_find) + module, key, 'member_%s' % key, res_find) if items: member_args[key] = items @@ -298,7 +298,7 @@ def ensure_members_are_present(module, name, res_find): member_args = {} for key in ['user', 'group', 'host', 'hostgroup']: items = member_difference( - module, key, 'member_%s' % key, res_find) + module, key, 'member_%s' % key, res_find) if items: member_args[key] = items diff --git a/plugins/modules/ipaservice.py b/plugins/modules/ipaservice.py index 9eb87548..706f6436 100644 --- a/plugins/modules/ipaservice.py +++ b/plugins/modules/ipaservice.py @@ -577,7 +577,7 @@ def main(): args.get("krbprincipalauthind", [""]) == res_find.get("krbprincipalauthind", [""]) ) - ): + ): del args["krbprincipalauthind"] if not compare_args_ipa(ansible_module, args, diff --git a/plugins/modules/ipauser.py b/plugins/modules/ipauser.py index b737f749..a1146fb6 100644 --- a/plugins/modules/ipauser.py +++ b/plugins/modules/ipauser.py @@ -824,14 +824,17 @@ def main(): # general name=dict(type="list", aliases=["login"], default=None, required=False), - users=dict(type="list", aliases=["login"], default=None, + users=dict(type="list", + aliases=["login"], + default=None, options=dict( # Here name is a simple string name=dict(type="str", required=True), # Add user specific parameters **user_spec ), - elements='dict', required=False), + elements='dict', + required=False), # deleted preserve=dict(required=False, type='bool', default=None), diff --git a/plugins/modules/ipavault.py b/plugins/modules/ipavault.py index 76d3ae2d..01574c7b 100644 --- a/plugins/modules/ipavault.py +++ b/plugins/modules/ipavault.py @@ -634,7 +634,7 @@ def main(): vault_password_file=dict(type="str", required=False, default=None, no_log=False, aliases=[ - 'password_file', "old_password_file" + 'password_file', "old_password_file" ]), new_password=dict(type="str", required=False, default=None, no_log=True), diff --git a/utils/gen_module_docs.py b/utils/gen_module_docs.py index 254a2734..e046f986 100644 --- a/utils/gen_module_docs.py +++ b/utils/gen_module_docs.py @@ -26,7 +26,7 @@ param_docs = { "sssd": "The installer sssd setting", "dnsok": "The installer dnsok setting", - "dm_password": "Directory Manager password", + "dm_password": "Directory Manager password", "password": "Admin user kerberos password", "ip_addresses": "List of Master Server IP Addresses", "domain": "Primary DNS domain of the IPA deployment", @@ -56,8 +56,8 @@ param_docs = { "no_ui_redirect": "Do not automatically redirect to the Web UI", "external_ca": "External ca setting", "external_cert_files": [ - "File containing the IPA CA certificate and the external CA certificate", - "chain" + "File containing the IPA CA certificate and the external CA " + "certificate chain" ], "reverse_zones": "The reverse DNS zones to use", "no_reverse": "Do not create new reverse DNS zone", @@ -131,8 +131,8 @@ param_docs = { "debug": "Turn on extra debugging", "basedn": "The basedn of the IPA server (of the form dc=example,dc=com)", "allow_repair": [ - "Allow repair of already joined hosts. Contrary to ipaclient_force_join", - "the host entry will not be changed on the server" + "Allow repair of already joined hosts. Contrary to " + "ipaclient_force_join the host entry will not be changed on the server" ], "backup": "File to backup", "fqdn": [ -- GitLab