Fix E127 errors in remaining openstack_dashboard/
E127 continuation line over-indented for visual indent Also fixes E127 introduces by other reviews after other E127 fixes were merged. Closes-Bug: #1375931 Change-Id: I0a09f1c2f74c707fc8a347f0ea5975bf2679976e
This commit is contained in:
parent
393642fd02
commit
26da6ed48c
|
@ -845,7 +845,7 @@ class Meters(object):
|
|||
meter_names = only_meters
|
||||
else:
|
||||
meter_names = [meter_name for meter_name
|
||||
in self._all_meters_info.keys()]
|
||||
in self._all_meters_info.keys()]
|
||||
|
||||
meter_names = diff_lists(meter_names, except_meters)
|
||||
# Collect meters for wanted meter names.
|
||||
|
|
|
@ -162,7 +162,7 @@ class Namespace(BaseGlanceMetadefAPIResourceWrapper):
|
|||
@property
|
||||
def resource_type_associations(self):
|
||||
result = [resource_type['name'] for resource_type in
|
||||
getattr(self._apiresource, 'resource_type_associations')]
|
||||
getattr(self._apiresource, 'resource_type_associations')]
|
||||
return result
|
||||
|
||||
@property
|
||||
|
|
|
@ -270,14 +270,14 @@ class SecurityGroupManager(network_base.SecurityGroupManager):
|
|||
ip_protocol = None
|
||||
|
||||
body = {'security_group_rule':
|
||||
{'security_group_id': parent_group_id,
|
||||
'direction': direction,
|
||||
'ethertype': ethertype,
|
||||
'protocol': ip_protocol,
|
||||
'port_range_min': from_port,
|
||||
'port_range_max': to_port,
|
||||
'remote_ip_prefix': cidr,
|
||||
'remote_group_id': group_id}}
|
||||
{'security_group_id': parent_group_id,
|
||||
'direction': direction,
|
||||
'ethertype': ethertype,
|
||||
'protocol': ip_protocol,
|
||||
'port_range_min': from_port,
|
||||
'port_range_max': to_port,
|
||||
'remote_ip_prefix': cidr,
|
||||
'remote_group_id': group_id}}
|
||||
rule = self.client.create_security_group_rule(body)
|
||||
rule = rule.get('security_group_rule')
|
||||
sg_dict = self._sg_name_dict(parent_group_id, [rule])
|
||||
|
@ -612,9 +612,9 @@ def subnet_create(request, network_id, cidr, ip_version, **kwargs):
|
|||
LOG.debug("subnet_create(): netid=%s, cidr=%s, ipver=%d, kwargs=%s"
|
||||
% (network_id, cidr, ip_version, kwargs))
|
||||
body = {'subnet':
|
||||
{'network_id': network_id,
|
||||
'ip_version': ip_version,
|
||||
'cidr': cidr}}
|
||||
{'network_id': network_id,
|
||||
'ip_version': ip_version,
|
||||
'cidr': cidr}}
|
||||
body['subnet'].update(kwargs)
|
||||
subnet = neutronclient(request).create_subnet(body=body).get('subnet')
|
||||
return Subnet(subnet)
|
||||
|
|
|
@ -575,7 +575,7 @@ def server_list(request, search_opts=None, all_tenants=False):
|
|||
else:
|
||||
search_opts['project_id'] = request.user.tenant_id
|
||||
servers = [Server(s, request)
|
||||
for s in c.servers.list(True, search_opts)]
|
||||
for s in c.servers.list(True, search_opts)]
|
||||
|
||||
has_more_data = False
|
||||
if paginate and len(servers) > page_size:
|
||||
|
@ -701,13 +701,13 @@ def get_password(request, instance_id, private_key=None):
|
|||
|
||||
def instance_volume_attach(request, volume_id, instance_id, device):
|
||||
return novaclient(request).volumes.create_server_volume(instance_id,
|
||||
volume_id,
|
||||
device)
|
||||
volume_id,
|
||||
device)
|
||||
|
||||
|
||||
def instance_volume_detach(request, instance_id, att_id):
|
||||
return novaclient(request).volumes.delete_server_volume(instance_id,
|
||||
att_id)
|
||||
att_id)
|
||||
|
||||
|
||||
def instance_volumes_list(request, instance_id):
|
||||
|
|
|
@ -219,7 +219,7 @@ def swift_get_objects(request, container_name, prefix=None, marker=None,
|
|||
delimiter=FOLDER_DELIMITER,
|
||||
full_listing=True)
|
||||
headers, objects = swift_api(request).get_container(container_name,
|
||||
**kwargs)
|
||||
**kwargs)
|
||||
object_objs = _objectify(objects, container_name)
|
||||
|
||||
if(len(object_objs) > limit):
|
||||
|
|
|
@ -66,11 +66,11 @@ def vpnservice_create(request, **kwargs):
|
|||
:param subnet_id: subnet id for subnet of VPNService
|
||||
"""
|
||||
body = {'vpnservice':
|
||||
{'admin_state_up': kwargs['admin_state_up'],
|
||||
'name': kwargs['name'],
|
||||
'description': kwargs['description'],
|
||||
'router_id': kwargs['router_id'],
|
||||
'subnet_id': kwargs['subnet_id']}
|
||||
{'admin_state_up': kwargs['admin_state_up'],
|
||||
'name': kwargs['name'],
|
||||
'description': kwargs['description'],
|
||||
'router_id': kwargs['router_id'],
|
||||
'subnet_id': kwargs['subnet_id']}
|
||||
}
|
||||
vpnservice = neutronclient(request).create_vpnservice(body).get(
|
||||
'vpnservice')
|
||||
|
@ -150,14 +150,14 @@ def ikepolicy_create(request, **kwargs):
|
|||
:param phase1_negotiation_mode: IKE Phase1 negotiation mode for IKEPolicy
|
||||
"""
|
||||
body = {'ikepolicy':
|
||||
{'name': kwargs['name'],
|
||||
'description': kwargs['description'],
|
||||
'auth_algorithm': kwargs['auth_algorithm'],
|
||||
'encryption_algorithm': kwargs['encryption_algorithm'],
|
||||
'ike_version': kwargs['ike_version'],
|
||||
'lifetime': kwargs['lifetime'],
|
||||
'pfs': kwargs['pfs'],
|
||||
'phase1_negotiation_mode': kwargs['phase1_negotiation_mode']}
|
||||
{'name': kwargs['name'],
|
||||
'description': kwargs['description'],
|
||||
'auth_algorithm': kwargs['auth_algorithm'],
|
||||
'encryption_algorithm': kwargs['encryption_algorithm'],
|
||||
'ike_version': kwargs['ike_version'],
|
||||
'lifetime': kwargs['lifetime'],
|
||||
'pfs': kwargs['pfs'],
|
||||
'phase1_negotiation_mode': kwargs['phase1_negotiation_mode']}
|
||||
}
|
||||
ikepolicy = neutronclient(request).create_ikepolicy(body).get(
|
||||
'ikepolicy')
|
||||
|
@ -217,14 +217,14 @@ def ipsecpolicy_create(request, **kwargs):
|
|||
:param transform_protocol: Transform Protocol for IPSecPolicy
|
||||
"""
|
||||
body = {'ipsecpolicy':
|
||||
{'name': kwargs['name'],
|
||||
'description': kwargs['description'],
|
||||
'auth_algorithm': kwargs['auth_algorithm'],
|
||||
'encapsulation_mode': kwargs['encapsulation_mode'],
|
||||
'encryption_algorithm': kwargs['encryption_algorithm'],
|
||||
'lifetime': kwargs['lifetime'],
|
||||
'pfs': kwargs['pfs'],
|
||||
'transform_protocol': kwargs['transform_protocol']}
|
||||
{'name': kwargs['name'],
|
||||
'description': kwargs['description'],
|
||||
'auth_algorithm': kwargs['auth_algorithm'],
|
||||
'encapsulation_mode': kwargs['encapsulation_mode'],
|
||||
'encryption_algorithm': kwargs['encryption_algorithm'],
|
||||
'lifetime': kwargs['lifetime'],
|
||||
'pfs': kwargs['pfs'],
|
||||
'transform_protocol': kwargs['transform_protocol']}
|
||||
}
|
||||
ipsecpolicy = neutronclient(request).create_ipsecpolicy(body).get(
|
||||
'ipsecpolicy')
|
||||
|
@ -289,19 +289,19 @@ def ipsecsiteconnection_create(request, **kwargs):
|
|||
:param admin_state_up: admin state (default on)
|
||||
"""
|
||||
body = {'ipsec_site_connection':
|
||||
{'name': kwargs['name'],
|
||||
'description': kwargs['description'],
|
||||
'dpd': kwargs['dpd'],
|
||||
'ikepolicy_id': kwargs['ikepolicy_id'],
|
||||
'initiator': kwargs['initiator'],
|
||||
'ipsecpolicy_id': kwargs['ipsecpolicy_id'],
|
||||
'mtu': kwargs['mtu'],
|
||||
'peer_address': kwargs['peer_address'],
|
||||
'peer_cidrs': kwargs['peer_cidrs'],
|
||||
'peer_id': kwargs['peer_id'],
|
||||
'psk': kwargs['psk'],
|
||||
'vpnservice_id': kwargs['vpnservice_id'],
|
||||
'admin_state_up': kwargs['admin_state_up']}
|
||||
{'name': kwargs['name'],
|
||||
'description': kwargs['description'],
|
||||
'dpd': kwargs['dpd'],
|
||||
'ikepolicy_id': kwargs['ikepolicy_id'],
|
||||
'initiator': kwargs['initiator'],
|
||||
'ipsecpolicy_id': kwargs['ipsecpolicy_id'],
|
||||
'mtu': kwargs['mtu'],
|
||||
'peer_address': kwargs['peer_address'],
|
||||
'peer_cidrs': kwargs['peer_cidrs'],
|
||||
'peer_id': kwargs['peer_id'],
|
||||
'psk': kwargs['psk'],
|
||||
'vpnservice_id': kwargs['vpnservice_id'],
|
||||
'admin_state_up': kwargs['admin_state_up']}
|
||||
}
|
||||
ipsecsiteconnection = neutronclient(request).create_ipsec_site_connection(
|
||||
body).get('ipsec_site_connection')
|
||||
|
|
|
@ -249,14 +249,15 @@ class FloatingIpViewTests(test.TestCase):
|
|||
|
||||
allocate_link = tables.AllocateIP()
|
||||
url = allocate_link.get_link_url()
|
||||
classes = list(allocate_link.get_default_classes())\
|
||||
+ list(allocate_link.classes)
|
||||
classes = (list(allocate_link.get_default_classes())
|
||||
+ list(allocate_link.classes))
|
||||
link_name = "%s (%s)" % (unicode(allocate_link.verbose_name),
|
||||
"Quota exceeded")
|
||||
expected_string = "<a href='%s' title='%s' class='%s disabled' " \
|
||||
"id='floating_ips__action_allocate'>" \
|
||||
"<span class='glyphicon glyphicon-download-alt'></span>%s</a>" \
|
||||
% (url, link_name, " ".join(classes), link_name)
|
||||
expected_string = ("<a href='%s' title='%s' class='%s disabled' "
|
||||
"id='floating_ips__action_allocate'>"
|
||||
"<span class='glyphicon glyphicon-download-alt'>"
|
||||
"</span>%s</a>"
|
||||
% (url, link_name, " ".join(classes), link_name))
|
||||
self.assertContains(res, expected_string, html=True,
|
||||
msg_prefix="The create button is not disabled")
|
||||
|
||||
|
|
|
@ -2796,9 +2796,9 @@ class InstanceTests(helpers.TestCase):
|
|||
cinder.volume_snapshot_list(IsA(http.HttpRequest)).AndReturn([])
|
||||
|
||||
api.nova.flavor_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.flavors.list())
|
||||
.AndReturn(self.flavors.list())
|
||||
quotas.tenant_quota_usages(IsA(http.HttpRequest)) \
|
||||
.AndReturn(quota_usages)
|
||||
.AndReturn(quota_usages)
|
||||
|
||||
api.nova.server_create(IsA(http.HttpRequest),
|
||||
server.name,
|
||||
|
|
|
@ -517,31 +517,37 @@ class StackTests(test.TestCase):
|
|||
self.assertTemplateUsed(res, 'project/stacks/create.html')
|
||||
|
||||
# ensure the fields were rendered correctly
|
||||
self.assertContains(res, '<input class="form-control" '
|
||||
'id="id___param_param1" '
|
||||
'name="__param_param1" '
|
||||
'type="text" />', html=True)
|
||||
self.assertContains(res,
|
||||
'<input class="form-control" '
|
||||
'id="id___param_param1" '
|
||||
'name="__param_param1" '
|
||||
'type="text" />', html=True)
|
||||
if django.VERSION >= (1, 6):
|
||||
self.assertContains(res, '<input class="form-control" '
|
||||
'id="id___param_param2" '
|
||||
'name="__param_param2" '
|
||||
'type="number" />', html=True)
|
||||
self.assertContains(res,
|
||||
'<input class="form-control" '
|
||||
'id="id___param_param2" '
|
||||
'name="__param_param2" '
|
||||
'type="number" />', html=True)
|
||||
else:
|
||||
self.assertContains(res, '<input class="form-control" '
|
||||
'id="id___param_param2" '
|
||||
'name="__param_param2" '
|
||||
'type="text" />', html=True)
|
||||
self.assertContains(res, '<input class="form-control" '
|
||||
'id="id___param_param3" '
|
||||
'name="__param_param3" '
|
||||
'type="text" />', html=True)
|
||||
self.assertContains(res, '<input class="form-control" '
|
||||
'id="id___param_param4" '
|
||||
'name="__param_param4" '
|
||||
'type="text" />', html=True)
|
||||
self.assertContains(res, '<input id="id___param_param5" '
|
||||
'name="__param_param5" '
|
||||
'type="checkbox" />', html=True)
|
||||
self.assertContains(res,
|
||||
'<input class="form-control" '
|
||||
'id="id___param_param2" '
|
||||
'name="__param_param2" '
|
||||
'type="text" />', html=True)
|
||||
self.assertContains(res,
|
||||
'<input class="form-control" '
|
||||
'id="id___param_param3" '
|
||||
'name="__param_param3" '
|
||||
'type="text" />', html=True)
|
||||
self.assertContains(res,
|
||||
'<input class="form-control" '
|
||||
'id="id___param_param4" '
|
||||
'name="__param_param4" '
|
||||
'type="text" />', html=True)
|
||||
self.assertContains(res,
|
||||
'<input id="id___param_param5" '
|
||||
'name="__param_param5" '
|
||||
'type="checkbox" />', html=True)
|
||||
|
||||
# post some sample data and make sure it validates
|
||||
url = reverse('horizon:project:stacks:launch')
|
||||
|
|
|
@ -40,7 +40,7 @@ def show_overview(context):
|
|||
'domain_name': request.user.user_domain_name,
|
||||
'project_name': request.user.project_name,
|
||||
'multi_region':
|
||||
len(request.user.available_services_regions) > 1,
|
||||
len(request.user.available_services_regions) > 1,
|
||||
'region_name': request.user.services_region,
|
||||
'request': request}
|
||||
|
||||
|
@ -80,7 +80,7 @@ def show_region_list(context):
|
|||
return {}
|
||||
request = context['request']
|
||||
context = {'multi_region':
|
||||
len(request.user.available_services_regions) > 1,
|
||||
len(request.user.available_services_regions) > 1,
|
||||
'region_name': request.user.services_region,
|
||||
'regions': sorted(request.user.available_services_regions),
|
||||
'request': request}
|
||||
|
|
|
@ -192,9 +192,9 @@ class CeilometerApiTests(test.APITestCase):
|
|||
AndReturn(statistics)
|
||||
|
||||
api.ceilometer.CeilometerUsage\
|
||||
.get_user(IsA(str)).AndReturn(user)
|
||||
.get_user(IsA(str)).AndReturn(user)
|
||||
api.ceilometer.CeilometerUsage\
|
||||
.get_tenant(IsA(str)).AndReturn(tenant)
|
||||
.get_tenant(IsA(str)).AndReturn(tenant)
|
||||
|
||||
self.mox.ReplayAll()
|
||||
|
||||
|
@ -238,9 +238,9 @@ class CeilometerApiTests(test.APITestCase):
|
|||
ceilometerclient.resources.list(q=IsA(list)).AndReturn(resources)
|
||||
|
||||
api.ceilometer.CeilometerUsage\
|
||||
.get_user(IsA(str)).MultipleTimes().AndReturn(user)
|
||||
.get_user(IsA(str)).MultipleTimes().AndReturn(user)
|
||||
api.ceilometer.CeilometerUsage\
|
||||
.get_tenant(IsA(str)).MultipleTimes().AndReturn(tenant)
|
||||
.get_tenant(IsA(str)).MultipleTimes().AndReturn(tenant)
|
||||
|
||||
self.mox.ReplayAll()
|
||||
|
||||
|
@ -291,9 +291,9 @@ class CeilometerApiTests(test.APITestCase):
|
|||
AndReturn(statistics)
|
||||
|
||||
api.ceilometer.CeilometerUsage\
|
||||
.get_user(IsA(str)).MultipleTimes().AndReturn(user)
|
||||
.get_user(IsA(str)).MultipleTimes().AndReturn(user)
|
||||
api.ceilometer.CeilometerUsage\
|
||||
.get_tenant(IsA(str)).MultipleTimes().AndReturn(tenant)
|
||||
.get_tenant(IsA(str)).MultipleTimes().AndReturn(tenant)
|
||||
|
||||
self.mox.ReplayAll()
|
||||
|
||||
|
|
|
@ -406,8 +406,8 @@ class NetworkApiNeutronSecurityGroupTests(NetworkApiNeutronTestBase):
|
|||
def test_security_group_create(self):
|
||||
secgroup = self.api_q_secgroups.list()[1]
|
||||
body = {'security_group':
|
||||
{'name': secgroup['name'],
|
||||
'description': secgroup['description']}}
|
||||
{'name': secgroup['name'],
|
||||
'description': secgroup['description']}}
|
||||
self.qclient.create_security_group(body) \
|
||||
.AndReturn({'security_group': copy.deepcopy(secgroup)})
|
||||
self.mox.ReplayAll()
|
||||
|
@ -421,8 +421,8 @@ class NetworkApiNeutronSecurityGroupTests(NetworkApiNeutronTestBase):
|
|||
secgroup['name'] = 'newname'
|
||||
secgroup['description'] = 'new description'
|
||||
body = {'security_group':
|
||||
{'name': secgroup['name'],
|
||||
'description': secgroup['description']}}
|
||||
{'name': secgroup['name'],
|
||||
'description': secgroup['description']}}
|
||||
self.qclient.update_security_group(secgroup['id'], body) \
|
||||
.AndReturn({'security_group': secgroup})
|
||||
self.mox.ReplayAll()
|
||||
|
|
|
@ -114,12 +114,12 @@ class ComputeApiTests(test.APITestCase):
|
|||
novaclient = self.stub_novaclient()
|
||||
novaclient.servers = self.mox.CreateMockAnything()
|
||||
novaclient.servers.get_rdp_console(server.id,
|
||||
console_type).AndReturn(console)
|
||||
console_type).AndReturn(console)
|
||||
self.mox.ReplayAll()
|
||||
|
||||
ret_val = api.nova.server_rdp_console(self.request,
|
||||
server.id,
|
||||
console_type)
|
||||
server.id,
|
||||
console_type)
|
||||
self.assertIsInstance(ret_val, api.nova.RDPConsole)
|
||||
|
||||
def test_server_list(self):
|
||||
|
|
|
@ -272,7 +272,7 @@ class VPNaasApiTests(test.APITestCase):
|
|||
def test_ipsecsiteconnection_get(self):
|
||||
ipsecsiteconnection = self.ipsecsiteconnections.first()
|
||||
connection_dict = {'ipsec_site_connection':
|
||||
self.api_ipsecsiteconnections.first()}
|
||||
self.api_ipsecsiteconnections.first()}
|
||||
ikepolicy_dict = {'ikepolicy': self.api_ikepolicies.first()}
|
||||
ipsecpolicy_dict = {'ipsecpolicy': self.api_ipsecpolicies.first()}
|
||||
vpnservice_dict = {'vpnservice': self.api_vpnservices.first()}
|
||||
|
|
|
@ -99,7 +99,7 @@ class RequestFactoryWithMessages(RequestFactory):
|
|||
|
||||
|
||||
@unittest.skipIf(os.environ.get('SKIP_UNITTESTS', False),
|
||||
"The SKIP_UNITTESTS env variable is set.")
|
||||
"The SKIP_UNITTESTS env variable is set.")
|
||||
class TestCase(horizon_helpers.TestCase):
|
||||
"""Specialized base test case class for Horizon.
|
||||
|
||||
|
@ -160,8 +160,8 @@ class TestCase(horizon_helpers.TestCase):
|
|||
del os.environ["HORIZON_TEST_RUN"]
|
||||
|
||||
def setActiveUser(self, id=None, token=None, username=None, tenant_id=None,
|
||||
service_catalog=None, tenant_name=None, roles=None,
|
||||
authorized_tenants=None, enabled=True, domain_id=None):
|
||||
service_catalog=None, tenant_name=None, roles=None,
|
||||
authorized_tenants=None, enabled=True, domain_id=None):
|
||||
def get_user(request):
|
||||
return user.User(id=id,
|
||||
token=token,
|
||||
|
@ -198,7 +198,7 @@ class TestCase(horizon_helpers.TestCase):
|
|||
return True
|
||||
errors = response.context[context_name]._errors
|
||||
assert len(errors) == 0, \
|
||||
"Unexpected errors were found on the form: %s" % errors
|
||||
"Unexpected errors were found on the form: %s" % errors
|
||||
|
||||
def assertFormErrors(self, response, count=0, message=None,
|
||||
context_name="form"):
|
||||
|
@ -405,8 +405,8 @@ class SeleniumTestCase(horizon_helpers.SeleniumTestCase):
|
|||
del os.environ["HORIZON_TEST_RUN"]
|
||||
|
||||
def setActiveUser(self, id=None, token=None, username=None, tenant_id=None,
|
||||
service_catalog=None, tenant_name=None, roles=None,
|
||||
authorized_tenants=None, enabled=True):
|
||||
service_catalog=None, tenant_name=None, roles=None,
|
||||
authorized_tenants=None, enabled=True):
|
||||
def get_user(request):
|
||||
return user.User(id=id,
|
||||
token=token,
|
||||
|
|
|
@ -542,7 +542,7 @@ def data(TEST):
|
|||
"flavor_disk": flavor_1.disk,
|
||||
"flavor_ram": flavor_1.ram}
|
||||
usage_obj_2 = usage.Usage(usage.UsageManager(None),
|
||||
json.loads(USAGE_DATA % usage_2_vals))
|
||||
json.loads(USAGE_DATA % usage_2_vals))
|
||||
TEST.usages.add(usage_obj_2)
|
||||
|
||||
volume_snapshot = vol_snaps.Snapshot(vol_snaps.SnapshotManager(None),
|
||||
|
|
|
@ -167,10 +167,10 @@ def data(TEST):
|
|||
|
||||
version1 = datastores.\
|
||||
DatastoreVersion(datastores.DatastoreVersions(None),
|
||||
VERSION_ONE)
|
||||
VERSION_ONE)
|
||||
version2 = datastores.\
|
||||
DatastoreVersion(datastores.DatastoreVersions(None),
|
||||
VERSION_TWO)
|
||||
VERSION_TWO)
|
||||
|
||||
TEST.databases = utils.TestDataContainer()
|
||||
TEST.database_backups = utils.TestDataContainer()
|
||||
|
|
|
@ -66,19 +66,19 @@ class QuotaTests(test.APITestCase):
|
|||
api.base.is_service_enabled(IsA(http.HttpRequest),
|
||||
'network').AndReturn(False)
|
||||
api.nova.flavor_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.flavors.list())
|
||||
.AndReturn(self.flavors.list())
|
||||
api.nova.tenant_quota_get(IsA(http.HttpRequest), '1') \
|
||||
.AndReturn(self.quotas.first())
|
||||
.AndReturn(self.quotas.first())
|
||||
api.network.floating_ip_supported(IsA(http.HttpRequest)) \
|
||||
.AndReturn(True)
|
||||
.AndReturn(True)
|
||||
api.network.tenant_floating_ip_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.floating_ips.list())
|
||||
.AndReturn(self.floating_ips.list())
|
||||
api.nova.server_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn([servers, False])
|
||||
.AndReturn([servers, False])
|
||||
cinder.volume_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.volumes.list())
|
||||
.AndReturn(self.volumes.list())
|
||||
cinder.volume_snapshot_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.snapshots.list())
|
||||
.AndReturn(self.snapshots.list())
|
||||
cinder.tenant_quota_get(IsA(http.HttpRequest), '1') \
|
||||
.AndReturn(self.cinder_quotas.first())
|
||||
|
||||
|
@ -105,15 +105,15 @@ class QuotaTests(test.APITestCase):
|
|||
api.base.is_service_enabled(IsA(http.HttpRequest),
|
||||
'network').AndReturn(False)
|
||||
api.nova.flavor_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.flavors.list())
|
||||
.AndReturn(self.flavors.list())
|
||||
api.nova.tenant_quota_get(IsA(http.HttpRequest), '1') \
|
||||
.AndReturn(self.quotas.first())
|
||||
.AndReturn(self.quotas.first())
|
||||
api.network.floating_ip_supported(IsA(http.HttpRequest)) \
|
||||
.AndReturn(True)
|
||||
.AndReturn(True)
|
||||
api.network.tenant_floating_ip_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.floating_ips.list())
|
||||
.AndReturn(self.floating_ips.list())
|
||||
api.nova.server_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn([servers, False])
|
||||
.AndReturn([servers, False])
|
||||
|
||||
self.mox.ReplayAll()
|
||||
|
||||
|
@ -140,13 +140,13 @@ class QuotaTests(test.APITestCase):
|
|||
api.base.is_service_enabled(IsA(http.HttpRequest),
|
||||
'network').AndReturn(False)
|
||||
api.nova.flavor_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.flavors.list())
|
||||
.AndReturn(self.flavors.list())
|
||||
api.nova.tenant_quota_get(IsA(http.HttpRequest), '1') \
|
||||
.AndReturn(self.quotas.first())
|
||||
.AndReturn(self.quotas.first())
|
||||
api.network.floating_ip_supported(IsA(http.HttpRequest)) \
|
||||
.AndReturn(True)
|
||||
.AndReturn(True)
|
||||
api.network.tenant_floating_ip_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn([])
|
||||
.AndReturn([])
|
||||
api.nova.server_list(IsA(http.HttpRequest)).AndReturn([[], False])
|
||||
|
||||
self.mox.ReplayAll()
|
||||
|
@ -182,19 +182,19 @@ class QuotaTests(test.APITestCase):
|
|||
api.base.is_service_enabled(IsA(http.HttpRequest),
|
||||
'network').AndReturn(False)
|
||||
api.nova.flavor_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.flavors.list())
|
||||
.AndReturn(self.flavors.list())
|
||||
api.nova.tenant_quota_get(IsA(http.HttpRequest), '1') \
|
||||
.AndReturn(inf_quota)
|
||||
.AndReturn(inf_quota)
|
||||
api.network.floating_ip_supported(IsA(http.HttpRequest)) \
|
||||
.AndReturn(True)
|
||||
.AndReturn(True)
|
||||
api.network.tenant_floating_ip_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.floating_ips.list())
|
||||
.AndReturn(self.floating_ips.list())
|
||||
api.nova.server_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn([servers, False])
|
||||
.AndReturn([servers, False])
|
||||
cinder.volume_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.volumes.list())
|
||||
.AndReturn(self.volumes.list())
|
||||
cinder.volume_snapshot_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.snapshots.list())
|
||||
.AndReturn(self.snapshots.list())
|
||||
cinder.tenant_quota_get(IsA(http.HttpRequest), '1') \
|
||||
.AndReturn(self.cinder_quotas.first())
|
||||
|
||||
|
@ -226,17 +226,17 @@ class QuotaTests(test.APITestCase):
|
|||
api.base.is_service_enabled(IsA(http.HttpRequest),
|
||||
'network').AndReturn(False)
|
||||
api.nova.flavor_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.flavors.list())
|
||||
.AndReturn(self.flavors.list())
|
||||
api.nova.tenant_quota_get(IsA(http.HttpRequest), '1') \
|
||||
.AndReturn(self.quotas.first())
|
||||
.AndReturn(self.quotas.first())
|
||||
api.network.floating_ip_supported(IsA(http.HttpRequest)) \
|
||||
.AndReturn(False)
|
||||
.AndReturn(False)
|
||||
api.nova.server_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn([servers, False])
|
||||
.AndReturn([servers, False])
|
||||
cinder.volume_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.volumes.list())
|
||||
.AndReturn(self.volumes.list())
|
||||
cinder.volume_snapshot_list(IsA(http.HttpRequest)) \
|
||||
.AndReturn(self.snapshots.list())
|
||||
.AndReturn(self.snapshots.list())
|
||||
cinder.tenant_quota_get(IsA(http.HttpRequest), '1') \
|
||||
.AndReturn(self.cinder_quotas.first())
|
||||
|
||||
|
|
|
@ -45,7 +45,7 @@ def import_dashboard_config(modules):
|
|||
dashboard = submodule.DASHBOARD
|
||||
config[dashboard].update(submodule.__dict__)
|
||||
elif (hasattr(submodule, 'PANEL')
|
||||
or hasattr(submodule, 'PANEL_GROUP')):
|
||||
or hasattr(submodule, 'PANEL_GROUP')):
|
||||
config[submodule.__name__] = submodule.__dict__
|
||||
else:
|
||||
logging.warning("Skipping %s because it doesn't have DASHBOARD"
|
||||
|
|
9
tox.ini
9
tox.ini
|
@ -62,13 +62,12 @@ downloadcache = ~/cache/pip
|
|||
|
||||
[flake8]
|
||||
exclude = .venv,.git,.tox,dist,*openstack/common*,*lib/python*,*egg,build,panel_template,dash_template,local_settings.py,*/local/*,*/test/test_plugins/*,.ropeproject
|
||||
# E127 continuation line over-indented for visual indent
|
||||
# E128 continuation line under-indented for visual indent
|
||||
# H307 like imports should be grouped together
|
||||
# H405 multi line docstring summary not separated with an empty line
|
||||
# H307 like imports should be grouped together
|
||||
# H405 multi line docstring summary not separated with an empty line
|
||||
# H803 git commit title should not end with period (disabled on purpose, see bug #1236621)
|
||||
# H904 Wrap long lines in parentheses instead of a backslash
|
||||
ignore = E127,E128,H307,H405,H803,H904
|
||||
# H904 Wrap long lines in parentheses instead of a backslash
|
||||
ignore = E128,H307,H405,H803,H904
|
||||
|
||||
[hacking]
|
||||
import_exceptions = collections.defaultdict,
|
||||
|
|
Loading…
Reference in New Issue