diff --git a/plugins/modules/ipadnsrecord.py b/plugins/modules/ipadnsrecord.py index 9fba3f70c0a45e443b0a2b267d5fc353d56541fc..75ae4492f4a9c01d067f607c4799a2c38e2dbf23 100644 --- a/plugins/modules/ipadnsrecord.py +++ b/plugins/modules/ipadnsrecord.py @@ -1394,15 +1394,16 @@ def gen_args(entry): if record_value is not None: record_type = entry['record_type'] - rec = "{}record".format(record_type.lower()) + rec = "{0}record".format(record_type.lower()) args[rec] = ensure_data_is_list(record_value) else: for field in _RECORD_FIELDS: record_value = entry.get(field) or entry.get("%sord" % field) if record_value is not None: + # pylint: disable=use-maxsplit-arg record_type = field.split('_')[0] - rec = "{}record".format(record_type.lower()) + rec = "{0}record".format(record_type.lower()) args[rec] = ensure_data_is_list(record_value) records = { diff --git a/roles/ipaclient/library/ipaclient_api.py b/roles/ipaclient/library/ipaclient_api.py index 9193f603b02e42f50e16b4c551e13a75a477f7dd..db5929757b16aeb7e6d45cfb0f238fb98fd33e91 100644 --- a/roles/ipaclient/library/ipaclient_api.py +++ b/roles/ipaclient/library/ipaclient_api.py @@ -236,7 +236,8 @@ def main(): except Exception as e: logger.debug("config_show failed %s", e, exc_info=True) module.fail_json( - "Failed to retrieve CA certificate subject base: {}".format(e), + "Failed to retrieve CA certificate subject base: " + "{0}".format(e), rval=CLIENT_INSTALL_ERROR) else: subject_base = str(DN(config['ipacertificatesubjectbase'][0])) diff --git a/roles/ipaclient/library/ipaclient_join.py b/roles/ipaclient/library/ipaclient_join.py index 68379ea70fc885e9b28c7ab16f007cb0ff1a3ef1..afa722f62b9e38e4bd79fe8621b275bc04f0cefa 100644 --- a/roles/ipaclient/library/ipaclient_join.py +++ b/roles/ipaclient/library/ipaclient_join.py @@ -241,7 +241,7 @@ def main(): config=krb_name) except RuntimeError as e: module.fail_json( - msg="Kerberos authentication failed: {}".format(e)) + msg="Kerberos authentication failed: {0}".format(e)) elif keytab: join_args.append("-f") @@ -254,10 +254,10 @@ def main(): attempts=kinit_attempts) except GSSError as e: module.fail_json( - msg="Kerberos authentication failed: {}".format(e)) + msg="Kerberos authentication failed: {0}".format(e)) else: module.fail_json( - msg="Keytab file could not be found: {}".format(keytab)) + msg="Keytab file could not be found: {0}".format(keytab)) elif password: join_args.append("-w") diff --git a/roles/ipaclient/library/ipaclient_test.py b/roles/ipaclient/library/ipaclient_test.py index 449460a7cd2b9e056ee049b7f69bae041daca870..66dbf0923253f7ef963b97454789bdab2eef6aff 100644 --- a/roles/ipaclient/library/ipaclient_test.py +++ b/roles/ipaclient/library/ipaclient_test.py @@ -432,7 +432,7 @@ def main(): if options.ca_cert_files is not None: for value in options.ca_cert_files: if not isinstance(value, list): - raise ValueError("Expected list, got {!r}".format(value)) + raise ValueError("Expected list, got {0!r}".format(value)) # this is what init() does value = value[-1] if not os.path.exists(value): @@ -575,13 +575,13 @@ def main(): hostname_source = "Machine's FQDN" if hostname != hostname.lower(): raise ScriptError( - "Invalid hostname '{}', must be lower-case.".format(hostname), + "Invalid hostname '{0}', must be lower-case.".format(hostname), rval=CLIENT_INSTALL_ERROR ) if hostname in ('localhost', 'localhost.localdomain'): raise ScriptError( - "Invalid hostname, '{}' must not be used.".format(hostname), + "Invalid hostname, '{0}' must not be used.".format(hostname), rval=CLIENT_INSTALL_ERROR) if hasattr(constants, "MAXHOSTNAMELEN"): @@ -589,7 +589,7 @@ def main(): validate_hostname(hostname, maxlen=constants.MAXHOSTNAMELEN) except ValueError as e: raise ScriptError( - 'invalid hostname: {}'.format(e), + 'invalid hostname: {0}'.format(e), rval=CLIENT_INSTALL_ERROR) if hasattr(tasks, "is_nosssd_supported"): @@ -695,7 +695,7 @@ def main(): rval=CLIENT_INSTALL_ERROR) if ret == ipadiscovery.NOT_FQDN: raise ScriptError( - "{} is not a fully-qualified hostname".format(hostname), + "{0} is not a fully-qualified hostname".format(hostname), rval=CLIENT_INSTALL_ERROR) if ret in (ipadiscovery.NO_LDAP_SERVER, ipadiscovery.NOT_IPA_SERVER) \ or not ds.domain: diff --git a/roles/ipareplica/library/ipareplica_enable_ipa.py b/roles/ipareplica/library/ipareplica_enable_ipa.py index 2b4fee53f4464ad8a92d15cb066d85cb131b0a0f..a974165e25b46e994cbd6da35b70d428ddc1e904 100644 --- a/roles/ipareplica/library/ipareplica_enable_ipa.py +++ b/roles/ipareplica/library/ipareplica_enable_ipa.py @@ -171,7 +171,7 @@ def main(): # Print a warning if CA role is only installed on one server if len(ca_servers) == 1: msg = u''' - WARNING: The CA service is only installed on one server ({}). + WARNING: The CA service is only installed on one server ({0}). It is strongly recommended to install it on another server. Run ipa-ca-install(1) on another master to accomplish this. '''.format(ca_servers[0]) diff --git a/roles/ipareplica/library/ipareplica_prepare.py b/roles/ipareplica/library/ipareplica_prepare.py index bd28b9e21f919d3a54cc78f7b79b04370e543da3..9ab59b2247b3bb1d274f7fb7b0b1afae1db304c3 100644 --- a/roles/ipareplica/library/ipareplica_prepare.py +++ b/roles/ipareplica/library/ipareplica_prepare.py @@ -469,7 +469,7 @@ def main(): env._finalize_core(**dict(constants.DEFAULT_CONFIG)) # pylint: disable=no-member - xmlrpc_uri = 'https://{}/ipa/xml'.format(ipautil.format_netloc(env.host)) + xmlrpc_uri = 'https://{0}/ipa/xml'.format(ipautil.format_netloc(env.host)) if hasattr(ipaldap, "realm_to_ldapi_uri"): realm_to_ldapi_uri = ipaldap.realm_to_ldapi_uri else: @@ -609,7 +609,7 @@ def main(): ansible_log.debug("-- REMOTE_API --") ldapuri = 'ldaps://%s' % ipautil.format_netloc(config.master_host_name) - xmlrpc_uri = 'https://{}/ipa/xml'.format( + xmlrpc_uri = 'https://{0}/ipa/xml'.format( ipautil.format_netloc(config.master_host_name)) remote_api = create_api(mode=None) remote_api.bootstrap(in_server=True, diff --git a/roles/ipareplica/library/ipareplica_test.py b/roles/ipareplica/library/ipareplica_test.py index 690d6fa726052382b53eeb7235ba75119ebafa0d..de491f2fec0cf59b5c706711e3ea4e1e05a78485 100644 --- a/roles/ipareplica/library/ipareplica_test.py +++ b/roles/ipareplica/library/ipareplica_test.py @@ -450,7 +450,7 @@ def main(): if installer.ca_cert_files is not None: if not isinstance(installer.ca_cert_files, list): ansible_module.fail_json( - msg="Expected list, got {!r}".format(installer.ca_cert_files)) + msg="Expected list, got {0!r}".format(installer.ca_cert_files)) for cert in installer.ca_cert_files: if not os.path.exists(cert): ansible_module.fail_json(msg="'%s' does not exist" % cert) diff --git a/roles/ipareplica/module_utils/ansible_ipa_replica.py b/roles/ipareplica/module_utils/ansible_ipa_replica.py index b56ae86136948f05c462baab720be397824bd235..fb168010307de9828d3b6c63842f5aa52d60192f 100644 --- a/roles/ipareplica/module_utils/ansible_ipa_replica.py +++ b/roles/ipareplica/module_utils/ansible_ipa_replica.py @@ -334,7 +334,7 @@ def gen_env_boostrap_finalize_core(etc_ipa, default_config): def api_bootstrap_finalize(env): # pylint: disable=no-member xmlrpc_uri = \ - 'https://{}/ipa/xml'.format(ipautil.format_netloc(env.host)) + 'https://{0}/ipa/xml'.format(ipautil.format_netloc(env.host)) api.bootstrap(in_server=True, context='installer', confdir=paths.ETC_IPA, @@ -479,7 +479,7 @@ def ansible_module_get_parsed_ip_addresses(ansible_module, def gen_remote_api(master_host_name, etc_ipa): ldapuri = 'ldaps://%s' % ipautil.format_netloc(master_host_name) - xmlrpc_uri = 'https://{}/ipa/xml'.format( + xmlrpc_uri = 'https://{0}/ipa/xml'.format( ipautil.format_netloc(master_host_name)) remote_api = create_api(mode=None) remote_api.bootstrap(in_server=True, diff --git a/roles/ipaserver/library/ipaserver_test.py b/roles/ipaserver/library/ipaserver_test.py index 45f65a2be1b4bec3eae8d76ff7f13615e05e79d3..92e703cd18cf7d813733dbef823246ebad5e2516 100644 --- a/roles/ipaserver/library/ipaserver_test.py +++ b/roles/ipaserver/library/ipaserver_test.py @@ -1067,7 +1067,7 @@ def main(): try: validate_domain_name(realm_name, entity="realm") except ValueError as e: - raise ScriptError("Invalid realm name: {}".format(unicode(e))) + raise ScriptError("Invalid realm name: {0}".format(unicode(e))) if not options.setup_adtrust: # If domain name and realm does not match, IPA server will not be able diff --git a/tests/pytests/conftest.py b/tests/pytests/conftest.py index 97e5e534781dc1881878de45aec3b1f09da767d9..e42d5f4ce8197c1749cf2e828b64169330243fb4 100644 --- a/tests/pytests/conftest.py +++ b/tests/pytests/conftest.py @@ -40,7 +40,7 @@ def pytest_configure(config): if os.path.exists(config_dir): inventory_path = os.path.join(config_dir, "test.inventory.yml") inventory = get_inventory(inventory_path) - print("Configuring execution using {}".format(inventory_path)) + print("Configuring execution using {0}".format(inventory_path)) ipaservers = inventory["all"]["children"]["ipaserver"]["hosts"] ipaserver = list(ipaservers.values())[0] private_key = os.path.join(config_dir, "id_rsa") diff --git a/tests/utils.py b/tests/utils.py index eb64bef582a1f1b520dfc4f6799becb87a23d7e2..9e3d5e83be0d7a1858fea9b29a58ef9b9ec5209b 100644 --- a/tests/utils.py +++ b/tests/utils.py @@ -180,7 +180,7 @@ def run_playbook(playbook, allow_failures=False): if allow_failures: return result - status_code_msg = "ansible-playbook return code: {}".format( + status_code_msg = "ansible-playbook return code: {0}".format( result.returncode ) assert_msg = "\n".join(