mirror of
https://github.com/ansible-collections/community.general.git
synced 2026-05-07 22:02:50 +00:00
PEP 8 whitespace cleanup. (#20783)
* PEP 8 E271 whitespace cleanup. * PEP 8 W293 whitespace cleanup. * Fix whitespace issue from recent PR.
This commit is contained in:
@@ -644,7 +644,7 @@ def replace(connection, module):
|
||||
instances = props['instances']
|
||||
if replace_instances:
|
||||
instances = replace_instances
|
||||
|
||||
|
||||
#check if min_size/max_size/desired capacity have been specified and if not use ASG values
|
||||
if min_size is None:
|
||||
min_size = as_group.min_size
|
||||
@@ -674,7 +674,7 @@ def replace(connection, module):
|
||||
if not old_instances:
|
||||
changed = False
|
||||
return(changed, props)
|
||||
|
||||
|
||||
# set temporary settings and wait for them to be reached
|
||||
# This should get overwritten if the number of instances left is less than the batch size.
|
||||
|
||||
@@ -827,7 +827,7 @@ def wait_for_term_inst(connection, module, term_instances):
|
||||
lifecycle = instance_facts[i]['lifecycle_state']
|
||||
health = instance_facts[i]['health_status']
|
||||
log.debug("Instance {0} has state of {1},{2}".format(i,lifecycle,health ))
|
||||
if lifecycle == 'Terminating' or health == 'Unhealthy':
|
||||
if lifecycle == 'Terminating' or health == 'Unhealthy':
|
||||
count += 1
|
||||
time.sleep(10)
|
||||
|
||||
|
||||
@@ -148,7 +148,7 @@ class Ec2CustomerGatewayManager:
|
||||
CustomerGatewayId=gw_id
|
||||
)
|
||||
return response
|
||||
|
||||
|
||||
def ensure_cgw_present(self, bgp_asn, ip_address):
|
||||
response = self.ec2.create_customer_gateway(
|
||||
DryRun=False,
|
||||
|
||||
@@ -215,7 +215,7 @@ class ElbInformation(object):
|
||||
elb_array.append(existing_lb)
|
||||
else:
|
||||
elb_array = all_elbs
|
||||
|
||||
|
||||
return list(map(self._get_elb_info, elb_array))
|
||||
|
||||
def main():
|
||||
|
||||
@@ -143,14 +143,14 @@ def main():
|
||||
resource = module.params.get('resource')
|
||||
tags = module.params.get('tags')
|
||||
state = module.params.get('state')
|
||||
|
||||
|
||||
ec2 = ec2_connect(module)
|
||||
|
||||
|
||||
# We need a comparison here so that we can accurately report back changed status.
|
||||
# Need to expand the gettags return format and compare with "tags" and then tag or detag as appropriate.
|
||||
filters = {'resource-id' : resource}
|
||||
gettags = ec2.get_all_tags(filters=filters)
|
||||
|
||||
|
||||
dictadd = {}
|
||||
dictremove = {}
|
||||
baddict = {}
|
||||
@@ -170,7 +170,7 @@ def main():
|
||||
tagger = ec2.create_tags(resource, dictadd)
|
||||
gettags = ec2.get_all_tags(filters=filters)
|
||||
module.exit_json(msg="Tags %s created for resource %s." % (dictadd,resource), changed=True)
|
||||
|
||||
|
||||
if state == 'absent':
|
||||
if not tags:
|
||||
module.fail_json(msg="tags argument is required when state is absent")
|
||||
|
||||
@@ -97,7 +97,7 @@ def get_volume_info(volume):
|
||||
},
|
||||
'tags': volume.tags
|
||||
}
|
||||
|
||||
|
||||
return volume_info
|
||||
|
||||
def list_ec2_volumes(connection, module):
|
||||
|
||||
@@ -289,7 +289,7 @@ def main():
|
||||
changed = False
|
||||
new_options = collections.defaultdict(lambda: None)
|
||||
|
||||
|
||||
|
||||
region, ec2_url, boto_params = get_aws_connection_info(module)
|
||||
connection = connect_to_aws(boto.vpc, region, **boto_params)
|
||||
|
||||
@@ -378,9 +378,9 @@ def main():
|
||||
# and remove old ones if that was requested
|
||||
if params['delete_old'] and existing_options:
|
||||
remove_dhcp_options_by_id(connection, existing_options.id)
|
||||
|
||||
|
||||
module.exit_json(changed=changed, new_options=new_options, dhcp_options_id=dhcp_option.id)
|
||||
|
||||
|
||||
|
||||
from ansible.module_utils.basic import *
|
||||
from ansible.module_utils.ec2 import *
|
||||
|
||||
@@ -72,7 +72,7 @@ def get_vpc_info(vpc):
|
||||
classic_link = vpc.classic_link_enabled
|
||||
except AttributeError:
|
||||
classic_link = False
|
||||
|
||||
|
||||
vpc_info = { 'id': vpc.id,
|
||||
'instance_tenancy': vpc.instance_tenancy,
|
||||
'classic_link_enabled': classic_link,
|
||||
|
||||
@@ -133,7 +133,7 @@ def list_virtual_gateways(client, module):
|
||||
|
||||
snaked_vgws = [camel_dict_to_snake_dict(get_virtual_gateway_info(vgw))
|
||||
for vgw in all_virtual_gateways['VpnGateways']]
|
||||
|
||||
|
||||
module.exit_json(virtual_gateways=snaked_vgws)
|
||||
|
||||
|
||||
|
||||
@@ -457,7 +457,7 @@ def delete_group(module=None, iam=None, name=None):
|
||||
iam.delete_group_policy(name, policy)
|
||||
try:
|
||||
iam.delete_group(name)
|
||||
except boto.exception.BotoServerError as err:
|
||||
except boto.exception.BotoServerError as err:
|
||||
error_msg = boto_exception(err)
|
||||
if ('must detach all policies first') in error_msg:
|
||||
module.fail_json(changed=changed, msg="All inline polices have been removed. Though it appears"
|
||||
|
||||
@@ -280,7 +280,7 @@ EXAMPLES = '''
|
||||
command: reboot
|
||||
instance_name: database
|
||||
wait: yes
|
||||
|
||||
|
||||
# Restore a Postgres db instance from a snapshot, wait for it to become available again, and
|
||||
# then modify it to add your security group. Also, display the new endpoint.
|
||||
# Note that the "publicly_accessible" option is allowed here just as it is in the AWS CLI
|
||||
@@ -298,7 +298,7 @@ EXAMPLES = '''
|
||||
tags:
|
||||
Name: pg1_test_name_tag
|
||||
register: rds
|
||||
|
||||
|
||||
- local_action:
|
||||
module: rds
|
||||
command: modify
|
||||
@@ -844,7 +844,7 @@ def promote_db_instance(module, conn):
|
||||
valid_vars = ['backup_retention', 'backup_window']
|
||||
params = validate_parameters(required_vars, valid_vars, module)
|
||||
instance_name = module.params.get('instance_name')
|
||||
|
||||
|
||||
result = conn.get_db_instance(instance_name)
|
||||
if not result:
|
||||
module.fail_json(msg="DB Instance %s does not exist" % instance_name)
|
||||
|
||||
@@ -130,7 +130,7 @@ def main():
|
||||
except BotoServerError as e:
|
||||
if e.error_code != 'DBSubnetGroupNotFoundFault':
|
||||
module.fail_json(msg = e.error_message)
|
||||
|
||||
|
||||
if state == 'absent':
|
||||
if exists:
|
||||
conn.delete_db_subnet_group(group_name)
|
||||
|
||||
@@ -470,7 +470,7 @@ def main():
|
||||
if command_in == 'create':
|
||||
if ( weight_in!=None or region_in!=None or failover_in!=None ) and identifier_in==None:
|
||||
module.fail_json(msg= "If you specify failover, region or weight you must also specify identifier")
|
||||
elif ( weight_in==None and region_in==None and failover_in==None ) and identifier_in!=None:
|
||||
elif ( weight_in==None and region_in==None and failover_in==None ) and identifier_in!=None:
|
||||
module.fail_json(msg= "You have specified identifier which makes sense only if you specify one of: weight, region or failover.")
|
||||
|
||||
|
||||
|
||||
@@ -57,7 +57,7 @@ options:
|
||||
- "Suffix that is appended to a request that is for a directory on the website endpoint (e.g. if the suffix is index.html and you make a request to samplebucket/images/ the data that is returned will be for the object with the key name images/index.html). The suffix must not include a slash character."
|
||||
required: false
|
||||
default: index.html
|
||||
|
||||
|
||||
extends_documentation_fragment:
|
||||
- aws
|
||||
- ec2
|
||||
@@ -76,14 +76,14 @@ EXAMPLES = '''
|
||||
- s3_website:
|
||||
name: mybucket.com
|
||||
state: absent
|
||||
|
||||
|
||||
# Configure an s3 bucket as a website with index and error pages
|
||||
- s3_website:
|
||||
name: mybucket.com
|
||||
suffix: home.htm
|
||||
error_key: errors/404.htm
|
||||
state: present
|
||||
|
||||
|
||||
'''
|
||||
|
||||
RETURN = '''
|
||||
@@ -170,7 +170,7 @@ def _create_website_configuration(suffix, error_key, redirect_all_requests):
|
||||
|
||||
|
||||
def enable_or_update_bucket_as_website(client_connection, resource_connection, module):
|
||||
|
||||
|
||||
bucket_name = module.params.get("name")
|
||||
redirect_all_requests = module.params.get("redirect_all_requests")
|
||||
# If redirect_all_requests is set then don't use the default suffix that has been set
|
||||
@@ -263,7 +263,7 @@ def main():
|
||||
redirect_all_requests=dict(type='str', required=False)
|
||||
)
|
||||
)
|
||||
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=argument_spec,
|
||||
mutually_exclusive = [
|
||||
@@ -273,7 +273,7 @@ def main():
|
||||
|
||||
if not HAS_BOTO3:
|
||||
module.fail_json(msg='boto3 required for this module')
|
||||
|
||||
|
||||
region, ec2_url, aws_connect_params = get_aws_connection_info(module, boto3=True)
|
||||
|
||||
if region:
|
||||
@@ -288,7 +288,7 @@ def main():
|
||||
enable_or_update_bucket_as_website(client_connection, resource_connection, module)
|
||||
elif state == 'absent':
|
||||
disable_bucket_as_website(client_connection, module)
|
||||
|
||||
|
||||
|
||||
from ansible.module_utils.basic import *
|
||||
from ansible.module_utils.ec2 import *
|
||||
|
||||
@@ -187,7 +187,7 @@ def create_or_update_sqs_queue(connection, module):
|
||||
queue = connection.create_queue(queue_name)
|
||||
update_sqs_queue(queue, **queue_attributes)
|
||||
result['changed'] = True
|
||||
|
||||
|
||||
if not module.check_mode:
|
||||
result['queue_arn'] = queue.get_attributes('QueueArn')['QueueArn']
|
||||
result['default_visibility_timeout'] = queue.get_attributes('VisibilityTimeout')['VisibilityTimeout']
|
||||
@@ -195,7 +195,7 @@ def create_or_update_sqs_queue(connection, module):
|
||||
result['maximum_message_size'] = queue.get_attributes('MaximumMessageSize')['MaximumMessageSize']
|
||||
result['delivery_delay'] = queue.get_attributes('DelaySeconds')['DelaySeconds']
|
||||
result['receive_message_wait_time'] = queue.get_attributes('ReceiveMessageWaitTimeSeconds')['ReceiveMessageWaitTimeSeconds']
|
||||
|
||||
|
||||
except BotoServerError:
|
||||
result['msg'] = 'Failed to create/update sqs queue due to error: ' + traceback.format_exc()
|
||||
module.fail_json(**result)
|
||||
|
||||
Reference in New Issue
Block a user