diff --git a/contrib/inventory/azure_rm.py b/contrib/inventory/azure_rm.py
index 0232ce74fa0..a5119748dc4 100755
--- a/contrib/inventory/azure_rm.py
+++ b/contrib/inventory/azure_rm.py
@@ -446,7 +446,7 @@ class AzureInventory(object):
def _parse_cli_args(self):
# Parse command line arguments
parser = argparse.ArgumentParser(
- description='Produce an Ansible Inventory file for an Azure subscription')
+ description='Produce an Ansible Inventory file for an Azure subscription')
parser.add_argument('--list', action='store_true', default=True,
help='List instances (default: True)')
parser.add_argument('--debug', action='store_true', default=False,
diff --git a/contrib/inventory/cloudstack.py b/contrib/inventory/cloudstack.py
index 23ae44fbc68..b5ecd8bd82e 100755
--- a/contrib/inventory/cloudstack.py
+++ b/contrib/inventory/cloudstack.py
@@ -199,8 +199,8 @@ class CloudStackInventory(object):
group_name = group['name']
if group_name and not group_name in data:
data[group_name] = {
- 'hosts': []
- }
+ 'hosts': []
+ }
hosts = self.cs.listVirtualMachines(projectid=project_id, domainid=domain_id)
if not hosts:
diff --git a/contrib/inventory/consul_io.py b/contrib/inventory/consul_io.py
index 330d2849118..12fb747a203 100755
--- a/contrib/inventory/consul_io.py
+++ b/contrib/inventory/consul_io.py
@@ -252,10 +252,10 @@ class ConsulInventory(object):
ok = 'passing' == check['Status']
if ok:
suffix = self.config.get_availability_suffix(
- 'available_suffix', '_available')
+ 'available_suffix', '_available')
else:
suffix = self.config.get_availability_suffix(
- 'unavailable_suffix', '_unavailable')
+ 'unavailable_suffix', '_unavailable')
self.add_node_to_map(self.nodes_by_availability,
service_name + suffix, node['Node'])
diff --git a/contrib/inventory/digital_ocean.py b/contrib/inventory/digital_ocean.py
index 9649a88aee2..f76cf0c4429 100755
--- a/contrib/inventory/digital_ocean.py
+++ b/contrib/inventory/digital_ocean.py
@@ -353,12 +353,12 @@ or environment variables (DO_API_TOKEN)\n''')
def build_inventory(self):
'''Build Ansible inventory of droplets'''
self.inventory = {
- 'all': {
- 'hosts': [],
- 'vars': self.group_variables
- },
- '_meta': {'hostvars': {}}
- }
+ 'all': {
+ 'hosts': [],
+ 'vars': self.group_variables
+ },
+ '_meta': {'hostvars': {}}
+ }
# add all droplets by id and name
for droplet in self.data['droplets']:
@@ -379,22 +379,22 @@ or environment variables (DO_API_TOKEN)\n''')
# groups that are always present
for group in [
- 'region_' + droplet['region']['slug'],
- 'image_' + str(droplet['image']['id']),
- 'size_' + droplet['size']['slug'],
- 'distro_' + self.to_safe(droplet['image']['distribution']),
- 'status_' + droplet['status'],
+ 'region_' + droplet['region']['slug'],
+ 'image_' + str(droplet['image']['id']),
+ 'size_' + droplet['size']['slug'],
+ 'distro_' + self.to_safe(droplet['image']['distribution']),
+ 'status_' + droplet['status'],
- ]:
+ ]:
if group not in self.inventory:
self.inventory[group] = { 'hosts': [ ], 'vars': {} }
self.inventory[group]['hosts'].append(dest)
# groups that are not always present
for group in [
- droplet['image']['slug'],
- droplet['image']['name']
- ]:
+ droplet['image']['slug'],
+ droplet['image']['name']
+ ]:
if group:
image = 'image_' + self.to_safe(group)
if image not in self.inventory:
diff --git a/contrib/inventory/docker.py b/contrib/inventory/docker.py
index 0649cac4d1e..167f3e93bc9 100755
--- a/contrib/inventory/docker.py
+++ b/contrib/inventory/docker.py
@@ -676,7 +676,7 @@ class DockerInventory(object):
# use hosts from config file
for host in hosts_list:
docker_host = host.get('host') or def_host or self._args.docker_host or \
- self._env_args.docker_host or DEFAULT_DOCKER_HOST
+ self._env_args.docker_host or DEFAULT_DOCKER_HOST
api_version = host.get('version') or def_version or self._args.api_version or \
self._env_args.api_version or DEFAULT_DOCKER_API_VERSION
tls_hostname = host.get('tls_hostname') or def_tls_hostname or self._args.tls_hostname or \
@@ -816,7 +816,7 @@ class DockerInventory(object):
default_config = basename + '.yml'
parser = argparse.ArgumentParser(
- description='Return Ansible inventory for one or more Docker hosts.')
+ description='Return Ansible inventory for one or more Docker hosts.')
parser.add_argument('--list', action='store_true', default=True,
help='List all containers (default: True)')
parser.add_argument('--debug', action='store_true', default=False,
diff --git a/contrib/inventory/gce.py b/contrib/inventory/gce.py
index fdb9fba8840..5c5814635c4 100755
--- a/contrib/inventory/gce.py
+++ b/contrib/inventory/gce.py
@@ -323,7 +323,7 @@ class GceInventory(object):
''' Command line argument processing '''
parser = argparse.ArgumentParser(
- description='Produce an Ansible Inventory file based on GCE')
+ description='Produce an Ansible Inventory file based on GCE')
parser.add_argument('--list', action='store_true', default=True,
help='List instances (default: True)')
parser.add_argument('--host', action='store',
diff --git a/contrib/inventory/ssh_config.py b/contrib/inventory/ssh_config.py
index 3ff7eb9658d..ae41e5810fc 100755
--- a/contrib/inventory/ssh_config.py
+++ b/contrib/inventory/ssh_config.py
@@ -109,7 +109,7 @@ def print_host(host):
def get_args(args_list):
parser = argparse.ArgumentParser(
- description='ansible inventory script parsing .ssh/config')
+ description='ansible inventory script parsing .ssh/config')
mutex_group = parser.add_mutually_exclusive_group(required=True)
help_list = 'list all hosts from .ssh/config inventory'
mutex_group.add_argument('--list', action='store_true', help=help_list)
diff --git a/docs/api/conf.py b/docs/api/conf.py
index cd76128fdc2..83065598fb4 100644
--- a/docs/api/conf.py
+++ b/docs/api/conf.py
@@ -230,17 +230,17 @@ htmlhelp_basename = 'Ansibledoc'
# -- Options for LaTeX output ---------------------------------------------
latex_elements = {
-# The paper size ('letterpaper' or 'a4paper').
-#'papersize': 'letterpaper',
+ # The paper size ('letterpaper' or 'a4paper').
+ #'papersize': 'letterpaper',
-# The font size ('10pt', '11pt' or '12pt').
-#'pointsize': '10pt',
+ # The font size ('10pt', '11pt' or '12pt').
+ #'pointsize': '10pt',
-# Additional stuff for the LaTeX preamble.
-#'preamble': '',
+ # Additional stuff for the LaTeX preamble.
+ #'preamble': '',
-# Latex figure (float) alignment
-#'figure_align': 'htbp',
+ # Latex figure (float) alignment
+ #'figure_align': 'htbp',
}
# Grouping the document tree into LaTeX files. List of tuples
diff --git a/docs/docsite/conf.py b/docs/docsite/conf.py
index 9167ca35b29..acc3e8db538 100644
--- a/docs/docsite/conf.py
+++ b/docs/docsite/conf.py
@@ -203,7 +203,7 @@ htmlhelp_basename = 'Poseidodoc'
# (source start file, target name, title, author, document class
# [howto/manual]).
latex_documents = [
- ('index', 'ansible.tex', 'Ansible 2.2 Documentation', AUTHOR, 'manual'),
+ ('index', 'ansible.tex', 'Ansible 2.2 Documentation', AUTHOR, 'manual'),
]
# The name of an image file (relative to this directory) to place at the top of
diff --git a/docs/docsite/rst/conf.py b/docs/docsite/rst/conf.py
index 0c30e41ae11..a86eb2496e2 100644
--- a/docs/docsite/rst/conf.py
+++ b/docs/docsite/rst/conf.py
@@ -203,7 +203,7 @@ htmlhelp_basename = 'Poseidodoc'
# (source start file, target name, title, author, document class
# [howto/manual]).
latex_documents = [
- ('index', 'ansible.tex', 'Ansible 1.2 Documentation',
+ ('index', 'ansible.tex', 'Ansible 1.2 Documentation',
AUTHOR, 'manual'),
]
diff --git a/docs/docsite/rst/dev_guide/conf.py b/docs/docsite/rst/dev_guide/conf.py
index 0e14a2c83d2..1cd353db4cb 100644
--- a/docs/docsite/rst/dev_guide/conf.py
+++ b/docs/docsite/rst/dev_guide/conf.py
@@ -238,21 +238,21 @@ htmlhelp_basename = 'dev_guidedoc'
# -- Options for LaTeX output ---------------------------------------------
latex_elements = {
- # The paper size ('letterpaper' or 'a4paper').
- #
- # 'papersize': 'letterpaper',
+ # The paper size ('letterpaper' or 'a4paper').
+ #
+ # 'papersize': 'letterpaper',
- # The font size ('10pt', '11pt' or '12pt').
- #
- # 'pointsize': '10pt',
+ # The font size ('10pt', '11pt' or '12pt').
+ #
+ # 'pointsize': '10pt',
- # Additional stuff for the LaTeX preamble.
- #
- # 'preamble': '',
+ # Additional stuff for the LaTeX preamble.
+ #
+ # 'preamble': '',
- # Latex figure (float) alignment
- #
- # 'figure_align': 'htbp',
+ # Latex figure (float) alignment
+ #
+ # 'figure_align': 'htbp',
}
# Grouping the document tree into LaTeX files. List of tuples
diff --git a/examples/scripts/uptime.py b/examples/scripts/uptime.py
index be533527faf..c7d26cf5e95 100755
--- a/examples/scripts/uptime.py
+++ b/examples/scripts/uptime.py
@@ -48,11 +48,11 @@ def main():
# create play with tasks
play_source = dict(
- name = "Ansible Play",
- hosts = host_list,
- gather_facts = 'no',
- tasks = [ dict(action=dict(module='command', args=dict(cmd='/usr/bin/uptime'))) ]
- )
+ name = "Ansible Play",
+ hosts = host_list,
+ gather_facts = 'no',
+ tasks = [ dict(action=dict(module='command', args=dict(cmd='/usr/bin/uptime'))) ]
+ )
play = Play().load(play_source, variable_manager=variable_manager, loader=loader)
# actually run it
@@ -60,12 +60,12 @@ def main():
callback = ResultsCollector()
try:
tqm = TaskQueueManager(
- inventory=inventory,
- variable_manager=variable_manager,
- loader=loader,
- options=options,
- passwords=passwords,
- )
+ inventory=inventory,
+ variable_manager=variable_manager,
+ loader=loader,
+ options=options,
+ passwords=passwords,
+ )
tqm._stdout_callback = callback
result = tqm.run(play)
finally:
diff --git a/hacking/tests/gen_distribution_version_testcase.py b/hacking/tests/gen_distribution_version_testcase.py
index 775c30f8f94..7560c5fe0af 100755
--- a/hacking/tests/gen_distribution_version_testcase.py
+++ b/hacking/tests/gen_distribution_version_testcase.py
@@ -15,23 +15,23 @@ import json
import sys
filelist = [
- '/etc/oracle-release',
- '/etc/slackware-version',
- '/etc/redhat-release',
- '/etc/vmware-release',
- '/etc/openwrt_release',
- '/etc/system-release',
- '/etc/alpine-release',
- '/etc/release',
- '/etc/arch-release',
- '/etc/os-release',
- '/etc/SuSE-release',
- '/etc/gentoo-release',
- '/etc/os-release',
- '/etc/lsb-release',
- '/etc/altlinux-release',
- '/etc/os-release',
- '/etc/coreos/update.conf',
+ '/etc/oracle-release',
+ '/etc/slackware-version',
+ '/etc/redhat-release',
+ '/etc/vmware-release',
+ '/etc/openwrt_release',
+ '/etc/system-release',
+ '/etc/alpine-release',
+ '/etc/release',
+ '/etc/arch-release',
+ '/etc/os-release',
+ '/etc/SuSE-release',
+ '/etc/gentoo-release',
+ '/etc/os-release',
+ '/etc/lsb-release',
+ '/etc/altlinux-release',
+ '/etc/os-release',
+ '/etc/coreos/update.conf',
]
fcont = {}
diff --git a/lib/ansible/cli/adhoc.py b/lib/ansible/cli/adhoc.py
index 4d053a3cf61..df855a32b6b 100644
--- a/lib/ansible/cli/adhoc.py
+++ b/lib/ansible/cli/adhoc.py
@@ -187,15 +187,15 @@ class AdHocCLI(CLI):
self._tqm = None
try:
self._tqm = TaskQueueManager(
- inventory=inventory,
- variable_manager=variable_manager,
- loader=loader,
- options=self.options,
- passwords=passwords,
- stdout_callback=cb,
- run_additional_callbacks=C.DEFAULT_LOAD_CALLBACK_PLUGINS,
- run_tree=run_tree,
- )
+ inventory=inventory,
+ variable_manager=variable_manager,
+ loader=loader,
+ options=self.options,
+ passwords=passwords,
+ stdout_callback=cb,
+ run_additional_callbacks=C.DEFAULT_LOAD_CALLBACK_PLUGINS,
+ run_tree=run_tree,
+ )
result = self._tqm.run(play)
finally:
diff --git a/lib/ansible/cli/console.py b/lib/ansible/cli/console.py
index 291e4b5e6d9..439c040d01f 100644
--- a/lib/ansible/cli/console.py
+++ b/lib/ansible/cli/console.py
@@ -198,15 +198,15 @@ class ConsoleCLI(CLI, cmd.Cmd):
self._tqm = None
try:
self._tqm = TaskQueueManager(
- inventory=self.inventory,
- variable_manager=self.variable_manager,
- loader=self.loader,
- options=self.options,
- passwords=self.passwords,
- stdout_callback=cb,
- run_additional_callbacks=C.DEFAULT_LOAD_CALLBACK_PLUGINS,
- run_tree=False,
- )
+ inventory=self.inventory,
+ variable_manager=self.variable_manager,
+ loader=self.loader,
+ options=self.options,
+ passwords=self.passwords,
+ stdout_callback=cb,
+ run_additional_callbacks=C.DEFAULT_LOAD_CALLBACK_PLUGINS,
+ run_tree=False,
+ )
result = self._tqm.run(play)
finally:
diff --git a/lib/ansible/compat/six/__init__.py b/lib/ansible/compat/six/__init__.py
index f7185d6f12e..473e2d4f1ef 100644
--- a/lib/ansible/compat/six/__init__.py
+++ b/lib/ansible/compat/six/__init__.py
@@ -42,7 +42,7 @@ if _system_six:
not hasattr(_system_six, 'byte2int') or
not hasattr(_system_six, 'add_metaclass') or
not hasattr(_system_six.moves, 'urllib')
- ):
+ ):
_system_six = False
diff --git a/lib/ansible/executor/play_iterator.py b/lib/ansible/executor/play_iterator.py
index 1e7775d3e22..e2f3dcfd138 100644
--- a/lib/ansible/executor/play_iterator.py
+++ b/lib/ansible/executor/play_iterator.py
@@ -177,7 +177,7 @@ class PlayIterator:
setup_task.name = 'Gathering Facts'
setup_task.tags = ['always']
setup_task.args = {
- 'gather_subset': gather_subset,
+ 'gather_subset': gather_subset,
}
if gather_timeout:
setup_task.args['gather_timeout'] = gather_timeout
diff --git a/lib/ansible/module_utils/basic.py b/lib/ansible/module_utils/basic.py
index dcc64489bc1..1099c4ddfc1 100644
--- a/lib/ansible/module_utils/basic.py
+++ b/lib/ansible/module_utils/basic.py
@@ -35,26 +35,26 @@ BOOLEANS = BOOLEANS_TRUE + BOOLEANS_FALSE
SIZE_RANGES = { 'Y': 1<<80, 'Z': 1<<70, 'E': 1<<60, 'P': 1<<50, 'T': 1<<40, 'G': 1<<30, 'M': 1<<20, 'K': 1<<10, 'B': 1 }
FILE_ATTRIBUTES = {
- 'A': 'noatime',
- 'a': 'append',
- 'c': 'compressed',
- 'C': 'nocow',
- 'd': 'nodump',
- 'D': 'dirsync',
- 'e': 'extents',
- 'E': 'encrypted',
- 'h': 'blocksize',
- 'i': 'immutable',
- 'I': 'indexed',
- 'j': 'journalled',
- 'N': 'inline',
- 's': 'zero',
- 'S': 'synchronous',
- 't': 'notail',
- 'T': 'blockroot',
- 'u': 'undelete',
- 'X': 'compressedraw',
- 'Z': 'compresseddirty',
+ 'A': 'noatime',
+ 'a': 'append',
+ 'c': 'compressed',
+ 'C': 'nocow',
+ 'd': 'nodump',
+ 'D': 'dirsync',
+ 'e': 'extents',
+ 'E': 'encrypted',
+ 'h': 'blocksize',
+ 'i': 'immutable',
+ 'I': 'indexed',
+ 'j': 'journalled',
+ 'N': 'inline',
+ 's': 'zero',
+ 'S': 'synchronous',
+ 't': 'notail',
+ 'T': 'blockroot',
+ 'u': 'undelete',
+ 'X': 'compressedraw',
+ 'Z': 'compresseddirty',
}
# ansible modules can be written in any language. To simplify
@@ -728,19 +728,19 @@ class AnsibleModule(object):
self._set_defaults(pre=True)
self._CHECK_ARGUMENT_TYPES_DISPATCHER = {
- 'str': self._check_type_str,
- 'list': self._check_type_list,
- 'dict': self._check_type_dict,
- 'bool': self._check_type_bool,
- 'int': self._check_type_int,
- 'float': self._check_type_float,
- 'path': self._check_type_path,
- 'raw': self._check_type_raw,
- 'jsonarg': self._check_type_jsonarg,
- 'json': self._check_type_jsonarg,
- 'bytes': self._check_type_bytes,
- 'bits': self._check_type_bits,
- }
+ 'str': self._check_type_str,
+ 'list': self._check_type_list,
+ 'dict': self._check_type_dict,
+ 'bool': self._check_type_bool,
+ 'int': self._check_type_int,
+ 'float': self._check_type_float,
+ 'path': self._check_type_path,
+ 'raw': self._check_type_raw,
+ 'jsonarg': self._check_type_jsonarg,
+ 'json': self._check_type_jsonarg,
+ 'bytes': self._check_type_bytes,
+ 'bits': self._check_type_bits,
+ }
if not bypass_checks:
self._check_required_arguments()
self._check_argument_types()
diff --git a/lib/ansible/module_utils/facts.py b/lib/ansible/module_utils/facts.py
index 616beff862e..9522bfe86f1 100644
--- a/lib/ansible/module_utils/facts.py
+++ b/lib/ansible/module_utils/facts.py
@@ -1078,22 +1078,22 @@ class LinuxHardware(Hardware):
memstats['swap:used'] = memstats['swaptotal'] - memstats['swapfree']
self.facts['memory_mb'] = {
- 'real' : {
- 'total': memstats.get('memtotal'),
- 'used': memstats.get('real:used'),
- 'free': memstats.get('memfree'),
- },
- 'nocache' : {
- 'free': memstats.get('nocache:free'),
- 'used': memstats.get('nocache:used'),
- },
- 'swap' : {
- 'total': memstats.get('swaptotal'),
- 'free': memstats.get('swapfree'),
- 'used': memstats.get('swap:used'),
- 'cached': memstats.get('swapcached'),
- },
- }
+ 'real' : {
+ 'total': memstats.get('memtotal'),
+ 'used': memstats.get('real:used'),
+ 'free': memstats.get('memfree'),
+ },
+ 'nocache' : {
+ 'free': memstats.get('nocache:free'),
+ 'used': memstats.get('nocache:used'),
+ },
+ 'swap' : {
+ 'total': memstats.get('swaptotal'),
+ 'free': memstats.get('swapfree'),
+ 'used': memstats.get('swap:used'),
+ 'cached': memstats.get('swapcached'),
+ },
+ }
def get_cpu_facts(self):
i = 0
@@ -1212,15 +1212,15 @@ class LinuxHardware(Hardware):
"CompactPCI", "AdvancedTCA", "Blade" ]
DMI_DICT = {
- 'bios_date': '/sys/devices/virtual/dmi/id/bios_date',
- 'bios_version': '/sys/devices/virtual/dmi/id/bios_version',
- 'form_factor': '/sys/devices/virtual/dmi/id/chassis_type',
- 'product_name': '/sys/devices/virtual/dmi/id/product_name',
- 'product_serial': '/sys/devices/virtual/dmi/id/product_serial',
- 'product_uuid': '/sys/devices/virtual/dmi/id/product_uuid',
- 'product_version': '/sys/devices/virtual/dmi/id/product_version',
- 'system_vendor': '/sys/devices/virtual/dmi/id/sys_vendor'
- }
+ 'bios_date': '/sys/devices/virtual/dmi/id/bios_date',
+ 'bios_version': '/sys/devices/virtual/dmi/id/bios_version',
+ 'form_factor': '/sys/devices/virtual/dmi/id/chassis_type',
+ 'product_name': '/sys/devices/virtual/dmi/id/product_name',
+ 'product_serial': '/sys/devices/virtual/dmi/id/product_serial',
+ 'product_uuid': '/sys/devices/virtual/dmi/id/product_uuid',
+ 'product_version': '/sys/devices/virtual/dmi/id/product_version',
+ 'system_vendor': '/sys/devices/virtual/dmi/id/sys_vendor'
+ }
for (key,path) in DMI_DICT.items():
data = get_file_content(path)
@@ -1239,15 +1239,15 @@ class LinuxHardware(Hardware):
# Fall back to using dmidecode, if available
dmi_bin = self.module.get_bin_path('dmidecode')
DMI_DICT = {
- 'bios_date': 'bios-release-date',
- 'bios_version': 'bios-version',
- 'form_factor': 'chassis-type',
- 'product_name': 'system-product-name',
- 'product_serial': 'system-serial-number',
- 'product_uuid': 'system-uuid',
- 'product_version': 'system-version',
- 'system_vendor': 'system-manufacturer'
- }
+ 'bios_date': 'bios-release-date',
+ 'bios_version': 'bios-version',
+ 'form_factor': 'chassis-type',
+ 'product_name': 'system-product-name',
+ 'product_serial': 'system-serial-number',
+ 'product_uuid': 'system-uuid',
+ 'product_version': 'system-version',
+ 'system_vendor': 'system-manufacturer'
+ }
for (k, v) in DMI_DICT.items():
if dmi_bin is not None:
(rc, out, err) = self.module.run_command('%s -s %s' % (dmi_bin, v))
diff --git a/lib/ansible/module_utils/gcp.py b/lib/ansible/module_utils/gcp.py
index 87415b392eb..4c1168b8d9e 100644
--- a/lib/ansible/module_utils/gcp.py
+++ b/lib/ansible/module_utils/gcp.py
@@ -77,7 +77,7 @@ def _get_gcp_ansible_credentials(module):
def _get_gcp_environ_var(var_name, default_value):
"""Wrapper around os.environ.get call."""
return os.environ.get(
- var_name, default_value)
+ var_name, default_value)
def _get_gcp_environment_credentials(service_account_email, credentials_file, project_id):
"""Helper to look in environment variables for credentials."""
@@ -315,7 +315,7 @@ def get_google_cloud_credentials(module, scopes=[]):
credentials = credentials.with_scopes(scopes)
else:
credentials = google.auth.default(
- scopes=scopes)[0]
+ scopes=scopes)[0]
return (credentials, conn_params)
except Exception as e:
diff --git a/lib/ansible/module_utils/nxos.py b/lib/ansible/module_utils/nxos.py
index 1f6d627405f..0360747d896 100644
--- a/lib/ansible/module_utils/nxos.py
+++ b/lib/ansible/module_utils/nxos.py
@@ -103,7 +103,7 @@ class Nxapi(NxapiConfigMixin):
command_type = self.OUTPUT_TO_COMMAND_TYPE[output]
except KeyError:
msg = 'invalid format, received %s, expected one of %s' % \
- (output, ','.join(self.OUTPUT_TO_COMMAND_TYPE.keys()))
+ (output, ','.join(self.OUTPUT_TO_COMMAND_TYPE.keys()))
self._error(msg=msg)
if isinstance(commands, (list, set, tuple)):
diff --git a/lib/ansible/module_utils/redhat.py b/lib/ansible/module_utils/redhat.py
index ed2a92956f5..749c16f8f07 100644
--- a/lib/ansible/module_utils/redhat.py
+++ b/lib/ansible/module_utils/redhat.py
@@ -141,7 +141,7 @@ class Rhsm(RegistrationBase):
# Quick version...
if False:
return os.path.isfile('/etc/pki/consumer/cert.pem') and \
- os.path.isfile('/etc/pki/consumer/key.pem')
+ os.path.isfile('/etc/pki/consumer/key.pem')
args = ['subscription-manager', 'identity']
rc, stdout, stderr = self.module.run_command(args, check_rc=False)
diff --git a/lib/ansible/modules/cloud/amazon/_ec2_vpc.py b/lib/ansible/modules/cloud/amazon/_ec2_vpc.py
index 50aa45c0646..491b508d1f0 100644
--- a/lib/ansible/modules/cloud/amazon/_ec2_vpc.py
+++ b/lib/ansible/modules/cloud/amazon/_ec2_vpc.py
@@ -698,19 +698,19 @@ def terminate_vpc(module, vpc_conn, vpc_id=None, cidr=None):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- cidr_block = dict(),
- instance_tenancy = dict(choices=['default', 'dedicated'], default='default'),
- wait = dict(type='bool', default=False),
- wait_timeout = dict(default=300),
- dns_support = dict(type='bool', default=True),
- dns_hostnames = dict(type='bool', default=True),
- subnets = dict(type='list'),
- vpc_id = dict(),
- internet_gateway = dict(type='bool', default=False),
- resource_tags = dict(type='dict', required=True),
- route_tables = dict(type='list'),
- state = dict(choices=['present', 'absent'], default='present'),
- )
+ cidr_block = dict(),
+ instance_tenancy = dict(choices=['default', 'dedicated'], default='default'),
+ wait = dict(type='bool', default=False),
+ wait_timeout = dict(default=300),
+ dns_support = dict(type='bool', default=True),
+ dns_hostnames = dict(type='bool', default=True),
+ subnets = dict(type='list'),
+ vpc_id = dict(),
+ internet_gateway = dict(type='bool', default=False),
+ resource_tags = dict(type='dict', required=True),
+ route_tables = dict(type='list'),
+ state = dict(choices=['present', 'absent'], default='present'),
+ )
)
module = AnsibleModule(
diff --git a/lib/ansible/modules/cloud/amazon/aws_kms.py b/lib/ansible/modules/cloud/amazon/aws_kms.py
index 58dabe496e0..9e81c3632e4 100644
--- a/lib/ansible/modules/cloud/amazon/aws_kms.py
+++ b/lib/ansible/modules/cloud/amazon/aws_kms.py
@@ -15,9 +15,9 @@
# along with Ansible. If not, see .
ANSIBLE_METADATA = {
- 'version': '1.0',
- 'status': ['preview'],
- 'supported_by': 'committer'
+ 'version': '1.0',
+ 'status': ['preview'],
+ 'supported_by': 'committer'
}
DOCUMENTATION = '''
@@ -236,14 +236,14 @@ def assert_policy_shape(policy):
def main():
argument_spec = ansible.module_utils.ec2.ec2_argument_spec()
argument_spec.update(dict(
- mode = dict(choices=['grant', 'deny'], default='grant'),
- key_alias = dict(required=False, type='str'),
- key_arn = dict(required=False, type='str'),
- role_name = dict(required=False, type='str'),
- role_arn = dict(required=False, type='str'),
- grant_types = dict(required=False, type='list'),
- clean_invalid_entries = dict(type='bool', default=True),
- )
+ mode = dict(choices=['grant', 'deny'], default='grant'),
+ key_alias = dict(required=False, type='str'),
+ key_arn = dict(required=False, type='str'),
+ role_name = dict(required=False, type='str'),
+ role_arn = dict(required=False, type='str'),
+ grant_types = dict(required=False, type='list'),
+ clean_invalid_entries = dict(type='bool', default=True),
+ )
)
module = AnsibleModule(
diff --git a/lib/ansible/modules/cloud/amazon/cloudformation.py b/lib/ansible/modules/cloud/amazon/cloudformation.py
index 11633aeead9..e58abd9277a 100644
--- a/lib/ansible/modules/cloud/amazon/cloudformation.py
+++ b/lib/ansible/modules/cloud/amazon/cloudformation.py
@@ -390,18 +390,18 @@ def get_stack_facts(cfn, stack_name):
def main():
argument_spec = ansible.module_utils.ec2.ec2_argument_spec()
argument_spec.update(dict(
- stack_name=dict(required=True),
- template_parameters=dict(required=False, type='dict', default={}),
- state=dict(default='present', choices=['present', 'absent']),
- template=dict(default=None, required=False, type='path'),
- notification_arns=dict(default=None, required=False),
- stack_policy=dict(default=None, required=False),
- disable_rollback=dict(default=False, type='bool'),
- template_url=dict(default=None, required=False),
- template_format=dict(default=None, choices=['json', 'yaml'], required=False),
- role_arn=dict(default=None, required=False),
- tags=dict(default=None, type='dict')
- )
+ stack_name=dict(required=True),
+ template_parameters=dict(required=False, type='dict', default={}),
+ state=dict(default='present', choices=['present', 'absent']),
+ template=dict(default=None, required=False, type='path'),
+ notification_arns=dict(default=None, required=False),
+ stack_policy=dict(default=None, required=False),
+ disable_rollback=dict(default=False, type='bool'),
+ template_url=dict(default=None, required=False),
+ template_format=dict(default=None, choices=['json', 'yaml'], required=False),
+ role_arn=dict(default=None, required=False),
+ tags=dict(default=None, type='dict')
+ )
)
module = AnsibleModule(
@@ -413,7 +413,7 @@ def main():
# collect the parameters that are passed to boto3. Keeps us from having so many scalars floating around.
stack_params = {
- 'Capabilities': ['CAPABILITY_IAM', 'CAPABILITY_NAMED_IAM'],
+ 'Capabilities': ['CAPABILITY_IAM', 'CAPABILITY_NAMED_IAM'],
}
state = module.params['state']
stack_params['StackName'] = module.params['stack_name']
diff --git a/lib/ansible/modules/cloud/amazon/ec2.py b/lib/ansible/modules/cloud/amazon/ec2.py
index 34a487f3f26..55ac11b5294 100644
--- a/lib/ansible/modules/cloud/amazon/ec2.py
+++ b/lib/ansible/modules/cloud/amazon/ec2.py
@@ -1135,18 +1135,18 @@ def create_instances(module, ec2, vpc, override_count=None):
if not spot_price:
if assign_public_ip and private_ip:
params.update(dict(
- min_count = count_remaining,
- max_count = count_remaining,
- client_token = id,
- placement_group = placement_group,
+ min_count = count_remaining,
+ max_count = count_remaining,
+ client_token = id,
+ placement_group = placement_group,
))
else:
params.update(dict(
- min_count = count_remaining,
- max_count = count_remaining,
- client_token = id,
- placement_group = placement_group,
- private_ip_address = private_ip,
+ min_count = count_remaining,
+ max_count = count_remaining,
+ client_token = id,
+ placement_group = placement_group,
+ private_ip_address = private_ip,
))
# For ordinary (not spot) instances, we can select 'stop'
@@ -1537,56 +1537,56 @@ def restart_instances(module, ec2, instance_ids, state, instance_tags):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- key_name = dict(aliases = ['keypair']),
- id = dict(),
- group = dict(type='list', aliases=['groups']),
- group_id = dict(type='list'),
- zone = dict(aliases=['aws_zone', 'ec2_zone']),
- instance_type = dict(aliases=['type']),
- spot_price = dict(),
- spot_type = dict(default='one-time', choices=["one-time", "persistent"]),
- spot_launch_group = dict(),
- image = dict(),
- kernel = dict(),
- count = dict(type='int', default='1'),
- monitoring = dict(type='bool', default=False),
- ramdisk = dict(),
- wait = dict(type='bool', default=False),
- wait_timeout = dict(default=300),
- spot_wait_timeout = dict(default=600),
- placement_group = dict(),
- user_data = dict(),
- instance_tags = dict(type='dict'),
- vpc_subnet_id = dict(),
- assign_public_ip = dict(type='bool', default=False),
- private_ip = dict(),
- instance_profile_name = dict(),
- instance_ids = dict(type='list', aliases=['instance_id']),
- source_dest_check = dict(type='bool', default=True),
- termination_protection = dict(type='bool', default=None),
- state = dict(default='present', choices=['present', 'absent', 'running', 'restarted', 'stopped']),
- instance_initiated_shutdown_behavior=dict(default=None, choices=['stop', 'terminate']),
- exact_count = dict(type='int', default=None),
- count_tag = dict(),
- volumes = dict(type='list'),
- ebs_optimized = dict(type='bool', default=False),
- tenancy = dict(default='default'),
- network_interfaces = dict(type='list', aliases=['network_interface'])
- )
+ key_name = dict(aliases = ['keypair']),
+ id = dict(),
+ group = dict(type='list', aliases=['groups']),
+ group_id = dict(type='list'),
+ zone = dict(aliases=['aws_zone', 'ec2_zone']),
+ instance_type = dict(aliases=['type']),
+ spot_price = dict(),
+ spot_type = dict(default='one-time', choices=["one-time", "persistent"]),
+ spot_launch_group = dict(),
+ image = dict(),
+ kernel = dict(),
+ count = dict(type='int', default='1'),
+ monitoring = dict(type='bool', default=False),
+ ramdisk = dict(),
+ wait = dict(type='bool', default=False),
+ wait_timeout = dict(default=300),
+ spot_wait_timeout = dict(default=600),
+ placement_group = dict(),
+ user_data = dict(),
+ instance_tags = dict(type='dict'),
+ vpc_subnet_id = dict(),
+ assign_public_ip = dict(type='bool', default=False),
+ private_ip = dict(),
+ instance_profile_name = dict(),
+ instance_ids = dict(type='list', aliases=['instance_id']),
+ source_dest_check = dict(type='bool', default=True),
+ termination_protection = dict(type='bool', default=None),
+ state = dict(default='present', choices=['present', 'absent', 'running', 'restarted', 'stopped']),
+ instance_initiated_shutdown_behavior=dict(default=None, choices=['stop', 'terminate']),
+ exact_count = dict(type='int', default=None),
+ count_tag = dict(),
+ volumes = dict(type='list'),
+ ebs_optimized = dict(type='bool', default=False),
+ tenancy = dict(default='default'),
+ network_interfaces = dict(type='list', aliases=['network_interface'])
+ )
)
module = AnsibleModule(
argument_spec=argument_spec,
mutually_exclusive = [
- ['exact_count', 'count'],
- ['exact_count', 'state'],
- ['exact_count', 'instance_ids'],
- ['network_interfaces', 'assign_public_ip'],
- ['network_interfaces', 'group'],
- ['network_interfaces', 'group_id'],
- ['network_interfaces', 'private_ip'],
- ['network_interfaces', 'vpc_subnet_id'],
- ],
+ ['exact_count', 'count'],
+ ['exact_count', 'state'],
+ ['exact_count', 'instance_ids'],
+ ['network_interfaces', 'assign_public_ip'],
+ ['network_interfaces', 'group'],
+ ['network_interfaces', 'group_id'],
+ ['network_interfaces', 'private_ip'],
+ ['network_interfaces', 'vpc_subnet_id'],
+ ],
)
if not HAS_BOTO:
diff --git a/lib/ansible/modules/cloud/amazon/ec2_ami.py b/lib/ansible/modules/cloud/amazon/ec2_ami.py
index 267d3187ff9..d95d0b7305b 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_ami.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_ami.py
@@ -584,23 +584,23 @@ def update_image(module, ec2, image_id):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- instance_id = dict(),
- image_id = dict(),
- architecture = dict(default="x86_64"),
- kernel_id = dict(),
- virtualization_type = dict(default="hvm"),
- root_device_name = dict(),
- delete_snapshot = dict(default=False, type='bool'),
- name = dict(),
- wait = dict(type='bool', default=False),
- wait_timeout = dict(default=900),
- description = dict(default=""),
- no_reboot = dict(default=False, type='bool'),
- state = dict(default='present'),
- device_mapping = dict(type='list'),
- tags = dict(type='dict'),
- launch_permissions = dict(type='dict')
- )
+ instance_id = dict(),
+ image_id = dict(),
+ architecture = dict(default="x86_64"),
+ kernel_id = dict(),
+ virtualization_type = dict(default="hvm"),
+ root_device_name = dict(),
+ delete_snapshot = dict(default=False, type='bool'),
+ name = dict(),
+ wait = dict(type='bool', default=False),
+ wait_timeout = dict(default=900),
+ description = dict(default=""),
+ no_reboot = dict(default=False, type='bool'),
+ state = dict(default='present'),
+ device_mapping = dict(type='list'),
+ tags = dict(type='dict'),
+ launch_permissions = dict(type='dict')
+ )
)
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/amazon/ec2_ami_copy.py b/lib/ansible/modules/cloud/amazon/ec2_ami_copy.py
index 8d5363357ad..01ca4d9bff3 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_ami_copy.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_ami_copy.py
@@ -173,9 +173,9 @@ def copy_image(module, ec2):
ec2.get_waiter('image_available').wait(ImageIds=[image_id])
if module.params.get('tags'):
ec2.create_tags(
- Resources=[image_id],
- Tags=[{'Key' : k, 'Value': v} for k,v in module.params.get('tags').items()]
- )
+ Resources=[image_id],
+ Tags=[{'Key' : k, 'Value': v} for k,v in module.params.get('tags').items()]
+ )
module.exit_json(changed=True, image_id=image_id)
except WaiterError as we:
diff --git a/lib/ansible/modules/cloud/amazon/ec2_ami_find.py b/lib/ansible/modules/cloud/amazon/ec2_ami_find.py
index cd333050d18..07cedd8257b 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_ami_find.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_ami_find.py
@@ -298,27 +298,27 @@ def get_block_device_mapping(image):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- owner = dict(required=False, default=None),
- ami_id = dict(required=False),
- ami_tags = dict(required=False, type='dict',
+ owner = dict(required=False, default=None),
+ ami_id = dict(required=False),
+ ami_tags = dict(required=False, type='dict',
aliases = ['search_tags', 'image_tags']),
- architecture = dict(required=False),
- hypervisor = dict(required=False),
- is_public = dict(required=False, type='bool'),
- name = dict(required=False),
- platform = dict(required=False),
- sort = dict(required=False, default=None,
+ architecture = dict(required=False),
+ hypervisor = dict(required=False),
+ is_public = dict(required=False, type='bool'),
+ name = dict(required=False),
+ platform = dict(required=False),
+ sort = dict(required=False, default=None,
choices=['name', 'description', 'tag', 'architecture', 'block_device_mapping', 'creationDate', 'hypervisor', 'is_public', 'location', 'owner_id', 'platform', 'root_device_name', 'root_device_type', 'state', 'virtualization_type']),
- sort_tag = dict(required=False),
- sort_order = dict(required=False, default='ascending',
+ sort_tag = dict(required=False),
+ sort_order = dict(required=False, default='ascending',
choices=['ascending', 'descending']),
- sort_start = dict(required=False),
- sort_end = dict(required=False),
- state = dict(required=False, default='available'),
- virtualization_type = dict(required=False),
- no_result_action = dict(required=False, default='success',
+ sort_start = dict(required=False),
+ sort_end = dict(required=False),
+ state = dict(required=False, default='available'),
+ virtualization_type = dict(required=False),
+ no_result_action = dict(required=False, default='success',
choices = ['success', 'fail']),
- )
+ )
)
module = AnsibleModule(
diff --git a/lib/ansible/modules/cloud/amazon/ec2_asg.py b/lib/ansible/modules/cloud/amazon/ec2_asg.py
index 888e7183c8d..fe1101167db 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_asg.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_asg.py
@@ -473,21 +473,21 @@ def create_autoscaling_group(connection, module):
if len(launch_configs) == 0:
module.fail_json(msg="No launch config found with name %s" % launch_config_name)
ag = AutoScalingGroup(
- group_name=group_name,
- load_balancers=load_balancers,
- availability_zones=availability_zones,
- launch_config=launch_configs[0],
- min_size=min_size,
- max_size=max_size,
- placement_group=placement_group,
- desired_capacity=desired_capacity,
- vpc_zone_identifier=vpc_zone_identifier,
- connection=connection,
- tags=asg_tags,
- health_check_period=health_check_period,
- health_check_type=health_check_type,
- default_cooldown=default_cooldown,
- termination_policies=termination_policies)
+ group_name=group_name,
+ load_balancers=load_balancers,
+ availability_zones=availability_zones,
+ launch_config=launch_configs[0],
+ min_size=min_size,
+ max_size=max_size,
+ placement_group=placement_group,
+ desired_capacity=desired_capacity,
+ vpc_zone_identifier=vpc_zone_identifier,
+ connection=connection,
+ tags=asg_tags,
+ health_check_period=health_check_period,
+ health_check_type=health_check_type,
+ default_cooldown=default_cooldown,
+ termination_policies=termination_policies)
try:
connection.create_auto_scaling_group(ag)
diff --git a/lib/ansible/modules/cloud/amazon/ec2_elb.py b/lib/ansible/modules/cloud/amazon/ec2_elb.py
index 27ed37b3a5d..5b2aa819e35 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_elb.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_elb.py
@@ -326,13 +326,13 @@ class ElbManager:
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- state={'required': True},
- instance_id={'required': True},
- ec2_elbs={'default': None, 'required': False, 'type':'list'},
- enable_availability_zone={'default': True, 'required': False, 'type': 'bool'},
- wait={'required': False, 'default': True, 'type': 'bool'},
- wait_timeout={'required': False, 'default': 0, 'type': 'int'}
- )
+ state={'required': True},
+ instance_id={'required': True},
+ ec2_elbs={'default': None, 'required': False, 'type':'list'},
+ enable_availability_zone={'default': True, 'required': False, 'type': 'bool'},
+ wait={'required': False, 'default': True, 'type': 'bool'},
+ wait_timeout={'required': False, 'default': 0, 'type': 'int'}
+ )
)
module = AnsibleModule(
diff --git a/lib/ansible/modules/cloud/amazon/ec2_elb_facts.py b/lib/ansible/modules/cloud/amazon/ec2_elb_facts.py
index 710331fe809..017b28e01b1 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_elb_facts.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_elb_facts.py
@@ -195,8 +195,8 @@ class ElbInformation(object):
elb_info['instances_outofservice'] = [inst.instance_id for inst in instance_health if inst.state == 'OutOfService']
elb_info['instances_outofservice_count'] = len(elb_info['instances_outofservice'])
elb_info['instances_inservice_percent'] = float(elb_info['instances_inservice_count'])/(
- float(elb_info['instances_inservice_count']) +
- float(elb_info['instances_outofservice_count']))*100
+ float(elb_info['instances_inservice_count']) +
+ float(elb_info['instances_outofservice_count']))*100
return elb_info
@@ -221,8 +221,8 @@ class ElbInformation(object):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- names={'default': [], 'type': 'list'}
- )
+ names={'default': [], 'type': 'list'}
+ )
)
module = AnsibleModule(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/cloud/amazon/ec2_elb_lb.py b/lib/ansible/modules/cloud/amazon/ec2_elb_lb.py
index 3c97a420fc2..0a55354d7a3 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_elb_lb.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_elb_lb.py
@@ -650,7 +650,7 @@ class ElbManager(object):
status_achieved = False
elb_interfaces = self.ec2_conn.get_all_network_interfaces(
- filters={'attachment.instance-owner-id': 'amazon-elb',
+ filters={'attachment.instance-owner-id': 'amazon-elb',
'description': 'ELB {0}'.format(self.name) })
for x in range(0, max_retries):
@@ -1227,29 +1227,29 @@ class ElbManager(object):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- state={'required': True, 'choices': ['present', 'absent']},
- name={'required': True},
- listeners={'default': None, 'required': False, 'type': 'list'},
- purge_listeners={'default': True, 'required': False, 'type': 'bool'},
- instance_ids={'default': None, 'required': False, 'type': 'list'},
- purge_instance_ids={'default': False, 'required': False, 'type': 'bool'},
- zones={'default': None, 'required': False, 'type': 'list'},
- purge_zones={'default': False, 'required': False, 'type': 'bool'},
- security_group_ids={'default': None, 'required': False, 'type': 'list'},
- security_group_names={'default': None, 'required': False, 'type': 'list'},
- health_check={'default': None, 'required': False, 'type': 'dict'},
- subnets={'default': None, 'required': False, 'type': 'list'},
- purge_subnets={'default': False, 'required': False, 'type': 'bool'},
- scheme={'default': 'internet-facing', 'required': False},
- connection_draining_timeout={'default': None, 'required': False},
- idle_timeout={'default': None, 'required': False},
- cross_az_load_balancing={'default': None, 'required': False},
- stickiness={'default': None, 'required': False, 'type': 'dict'},
- access_logs={'default': None, 'required': False, 'type': 'dict'},
- wait={'default': False, 'type': 'bool', 'required': False},
- wait_timeout={'default': 60, 'type': 'int', 'required': False},
- tags={'default': None, 'required': False, 'type': 'dict'}
- )
+ state={'required': True, 'choices': ['present', 'absent']},
+ name={'required': True},
+ listeners={'default': None, 'required': False, 'type': 'list'},
+ purge_listeners={'default': True, 'required': False, 'type': 'bool'},
+ instance_ids={'default': None, 'required': False, 'type': 'list'},
+ purge_instance_ids={'default': False, 'required': False, 'type': 'bool'},
+ zones={'default': None, 'required': False, 'type': 'list'},
+ purge_zones={'default': False, 'required': False, 'type': 'bool'},
+ security_group_ids={'default': None, 'required': False, 'type': 'list'},
+ security_group_names={'default': None, 'required': False, 'type': 'list'},
+ health_check={'default': None, 'required': False, 'type': 'dict'},
+ subnets={'default': None, 'required': False, 'type': 'list'},
+ purge_subnets={'default': False, 'required': False, 'type': 'bool'},
+ scheme={'default': 'internet-facing', 'required': False},
+ connection_draining_timeout={'default': None, 'required': False},
+ idle_timeout={'default': None, 'required': False},
+ cross_az_load_balancing={'default': None, 'required': False},
+ stickiness={'default': None, 'required': False, 'type': 'dict'},
+ access_logs={'default': None, 'required': False, 'type': 'dict'},
+ wait={'default': False, 'type': 'bool', 'required': False},
+ wait_timeout={'default': 60, 'type': 'int', 'required': False},
+ tags={'default': None, 'required': False, 'type': 'dict'}
+ )
)
module = AnsibleModule(
diff --git a/lib/ansible/modules/cloud/amazon/ec2_eni.py b/lib/ansible/modules/cloud/amazon/ec2_eni.py
index aca78a459da..cc3a8be5942 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_eni.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_eni.py
@@ -532,12 +532,12 @@ def main():
module = AnsibleModule(argument_spec=argument_spec,
mutually_exclusive=[
['secondary_private_ip_addresses', 'secondary_private_ip_address_count']
- ],
+ ],
required_if=([
('state', 'present', ['subnet_id']),
('state', 'absent', ['eni_id']),
('attached', True, ['instance_id'])
- ])
+ ])
)
if not HAS_BOTO:
diff --git a/lib/ansible/modules/cloud/amazon/ec2_facts.py b/lib/ansible/modules/cloud/amazon/ec2_facts.py
index 4e0f7531fdf..992766fd0da 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_facts.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_facts.py
@@ -176,8 +176,8 @@ def main():
argument_spec = url_argument_spec()
module = AnsibleModule(
- argument_spec=argument_spec,
- supports_check_mode=True,
+ argument_spec=argument_spec,
+ supports_check_mode=True,
)
ec2_facts = Ec2Metadata(module).run()
diff --git a/lib/ansible/modules/cloud/amazon/ec2_group.py b/lib/ansible/modules/cloud/amazon/ec2_group.py
index cd63bfdefca..319fd0b654a 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_group.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_group.py
@@ -241,16 +241,16 @@ def get_target_from_rule(module, ec2, rule, name, group, groups, vpc_id):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- name=dict(type='str', required=True),
- description=dict(type='str', required=True),
- vpc_id=dict(type='str'),
- rules=dict(type='list'),
- rules_egress=dict(type='list'),
- state = dict(default='present', type='str', choices=['present', 'absent']),
- purge_rules=dict(default=True, required=False, type='bool'),
- purge_rules_egress=dict(default=True, required=False, type='bool'),
-
- )
+ name=dict(type='str', required=True),
+ description=dict(type='str', required=True),
+ vpc_id=dict(type='str'),
+ rules=dict(type='list'),
+ rules_egress=dict(type='list'),
+ state = dict(default='present', type='str', choices=['present', 'absent']),
+ purge_rules=dict(default=True, required=False, type='bool'),
+ purge_rules_egress=dict(default=True, required=False, type='bool'),
+
+ )
)
module = AnsibleModule(
argument_spec=argument_spec,
@@ -427,12 +427,12 @@ def main():
if not module.check_mode:
ec2.authorize_security_group_egress(
- group_id=group.id,
- ip_protocol=rule['proto'],
- from_port=rule['from_port'],
- to_port=rule['to_port'],
- src_group_id=grantGroup,
- cidr_ip=thisip)
+ group_id=group.id,
+ ip_protocol=rule['proto'],
+ from_port=rule['from_port'],
+ to_port=rule['to_port'],
+ src_group_id=grantGroup,
+ cidr_ip=thisip)
changed = True
elif vpc_id:
# when using a vpc, but no egress rules are specified,
@@ -462,12 +462,12 @@ def main():
grantGroup = groups[grant.group_id].id
if not module.check_mode:
ec2.revoke_security_group_egress(
- group_id=group.id,
- ip_protocol=rule.ip_protocol,
- from_port=rule.from_port,
- to_port=rule.to_port,
- src_group_id=grantGroup,
- cidr_ip=grant.cidr_ip)
+ group_id=group.id,
+ ip_protocol=rule.ip_protocol,
+ from_port=rule.from_port,
+ to_port=rule.to_port,
+ src_group_id=grantGroup,
+ cidr_ip=grant.cidr_ip)
changed = True
if group:
diff --git a/lib/ansible/modules/cloud/amazon/ec2_key.py b/lib/ansible/modules/cloud/amazon/ec2_key.py
index 90a68ec6370..0a17145ca18 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_key.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_key.py
@@ -108,12 +108,12 @@ import string
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- name=dict(required=True),
- key_material=dict(required=False),
- state = dict(default='present', choices=['present', 'absent']),
- wait = dict(type='bool', default=False),
- wait_timeout = dict(default=300),
- )
+ name=dict(required=True),
+ key_material=dict(required=False),
+ state = dict(default='present', choices=['present', 'absent']),
+ wait = dict(type='bool', default=False),
+ wait_timeout = dict(default=300),
+ )
)
module = AnsibleModule(
argument_spec=argument_spec,
diff --git a/lib/ansible/modules/cloud/amazon/ec2_lc.py b/lib/ansible/modules/cloud/amazon/ec2_lc.py
index 34d289929cc..32766d86347 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_lc.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_lc.py
@@ -229,7 +229,7 @@ def create_launch_config(connection, module):
result = dict(
((a[0], a[1]) for a in vars(launch_configs[0]).items()
if a[0] not in ('connection', 'created_time', 'instance_monitoring', 'block_device_mappings'))
- )
+ )
result['created_time'] = str(launch_configs[0].created_time)
# Looking at boto's launchconfig.py, it looks like this could be a boolean
# value or an object with an enabled attribute. The enabled attribute
diff --git a/lib/ansible/modules/cloud/amazon/ec2_metric_alarm.py b/lib/ansible/modules/cloud/amazon/ec2_metric_alarm.py
index 984211bc277..6606b32d8f6 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_metric_alarm.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_metric_alarm.py
@@ -261,7 +261,7 @@ def main():
insufficient_data_actions=dict(type='list'),
ok_actions=dict(type='list'),
state=dict(default='present', choices=['present', 'absent']),
- )
+ )
)
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/amazon/ec2_remote_facts.py b/lib/ansible/modules/cloud/amazon/ec2_remote_facts.py
index 98ea16628fa..5b580d40339 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_remote_facts.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_remote_facts.py
@@ -127,9 +127,9 @@ def get_instance_info(instance):
'requester_id': instance.requester_id,
'monitoring_state': instance.monitoring_state,
'placement': {
- 'tenancy': instance._placement.tenancy,
- 'zone': instance._placement.zone
- },
+ 'tenancy': instance._placement.tenancy,
+ 'zone': instance._placement.zone
+ },
'ami_launch_index': instance.ami_launch_index,
'launch_time': instance.launch_time,
'hypervisor': instance.hypervisor,
diff --git a/lib/ansible/modules/cloud/amazon/ec2_tag.py b/lib/ansible/modules/cloud/amazon/ec2_tag.py
index 9f701a55d44..d27af699b88 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_tag.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_tag.py
@@ -130,10 +130,10 @@ except ImportError:
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- resource = dict(required=True),
- tags = dict(type='dict'),
- state = dict(default='present', choices=['present', 'absent', 'list']),
- )
+ resource = dict(required=True),
+ tags = dict(type='dict'),
+ state = dict(default='present', choices=['present', 'absent', 'list']),
+ )
)
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/amazon/ec2_vol.py b/lib/ansible/modules/cloud/amazon/ec2_vol.py
index a89b218f3a0..59491277ba1 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_vol.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_vol.py
@@ -470,23 +470,23 @@ def get_volume_info(volume, state):
attachment = volume.attach_data
volume_info = {
- 'create_time': volume.create_time,
- 'encrypted': volume.encrypted,
- 'id': volume.id,
- 'iops': volume.iops,
- 'size': volume.size,
- 'snapshot_id': volume.snapshot_id,
- 'status': volume.status,
- 'type': volume.type,
- 'zone': volume.zone,
- 'attachment_set': {
- 'attach_time': attachment.attach_time,
- 'device': attachment.device,
- 'instance_id': attachment.instance_id,
- 'status': attachment.status
- },
- 'tags': volume.tags
- }
+ 'create_time': volume.create_time,
+ 'encrypted': volume.encrypted,
+ 'id': volume.id,
+ 'iops': volume.iops,
+ 'size': volume.size,
+ 'snapshot_id': volume.snapshot_id,
+ 'status': volume.status,
+ 'type': volume.type,
+ 'zone': volume.zone,
+ 'attachment_set': {
+ 'attach_time': attachment.attach_time,
+ 'device': attachment.device,
+ 'instance_id': attachment.instance_id,
+ 'status': attachment.status
+ },
+ 'tags': volume.tags
+ }
if hasattr(attachment, 'deleteOnTermination'):
volume_info['attachment_set']['deleteOnTermination'] = attachment.deleteOnTermination
@@ -496,20 +496,20 @@ def get_volume_info(volume, state):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- instance = dict(),
- id = dict(),
- name = dict(),
- volume_size = dict(),
- volume_type = dict(choices=['standard', 'gp2', 'io1', 'st1', 'sc1'], default='standard'),
- iops = dict(),
- encrypted = dict(type='bool', default=False),
- kms_key_id = dict(),
- device_name = dict(),
- delete_on_termination = dict(type='bool', default=False),
- zone = dict(aliases=['availability_zone', 'aws_zone', 'ec2_zone']),
- snapshot = dict(),
- state = dict(choices=['absent', 'present', 'list'], default='present')
- )
+ instance = dict(),
+ id = dict(),
+ name = dict(),
+ volume_size = dict(),
+ volume_type = dict(choices=['standard', 'gp2', 'io1', 'st1', 'sc1'], default='standard'),
+ iops = dict(),
+ encrypted = dict(type='bool', default=False),
+ kms_key_id = dict(),
+ device_name = dict(),
+ delete_on_termination = dict(type='bool', default=False),
+ zone = dict(aliases=['availability_zone', 'aws_zone', 'ec2_zone']),
+ snapshot = dict(),
+ state = dict(choices=['absent', 'present', 'list'], default='present')
+ )
)
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/amazon/ec2_vol_facts.py b/lib/ansible/modules/cloud/amazon/ec2_vol_facts.py
index ba5350789a7..146154b07eb 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_vol_facts.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_vol_facts.py
@@ -79,24 +79,24 @@ def get_volume_info(volume):
attachment = volume.attach_data
volume_info = {
- 'create_time': volume.create_time,
- 'id': volume.id,
- 'encrypted': volume.encrypted,
- 'iops': volume.iops,
- 'size': volume.size,
- 'snapshot_id': volume.snapshot_id,
- 'status': volume.status,
- 'type': volume.type,
- 'zone': volume.zone,
- 'region': volume.region.name,
- 'attachment_set': {
- 'attach_time': attachment.attach_time,
- 'device': attachment.device,
- 'instance_id': attachment.instance_id,
- 'status': attachment.status
- },
- 'tags': volume.tags
- }
+ 'create_time': volume.create_time,
+ 'id': volume.id,
+ 'encrypted': volume.encrypted,
+ 'iops': volume.iops,
+ 'size': volume.size,
+ 'snapshot_id': volume.snapshot_id,
+ 'status': volume.status,
+ 'type': volume.type,
+ 'zone': volume.zone,
+ 'region': volume.region.name,
+ 'attachment_set': {
+ 'attach_time': attachment.attach_time,
+ 'device': attachment.device,
+ 'instance_id': attachment.instance_id,
+ 'status': attachment.status
+ },
+ 'tags': volume.tags
+ }
return volume_info
diff --git a/lib/ansible/modules/cloud/amazon/ec2_vpc_net.py b/lib/ansible/modules/cloud/amazon/ec2_vpc_net.py
index 7b7e0e46477..c041c51997c 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_vpc_net.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_vpc_net.py
@@ -186,16 +186,16 @@ def get_vpc_values(vpc_obj):
def main():
argument_spec=ec2_argument_spec()
argument_spec.update(dict(
- name = dict(type='str', default=None, required=True),
- cidr_block = dict(type='str', default=None, required=True),
- tenancy = dict(choices=['default', 'dedicated'], default='default'),
- dns_support = dict(type='bool', default=True),
- dns_hostnames = dict(type='bool', default=True),
- dhcp_opts_id = dict(type='str', default=None, required=False),
- tags = dict(type='dict', required=False, default=None, aliases=['resource_tags']),
- state = dict(choices=['present', 'absent'], default='present'),
- multi_ok = dict(type='bool', default=False)
- )
+ name = dict(type='str', default=None, required=True),
+ cidr_block = dict(type='str', default=None, required=True),
+ tenancy = dict(choices=['default', 'dedicated'], default='default'),
+ dns_support = dict(type='bool', default=True),
+ dns_hostnames = dict(type='bool', default=True),
+ dhcp_opts_id = dict(type='str', default=None, required=False),
+ tags = dict(type='dict', required=False, default=None, aliases=['resource_tags']),
+ state = dict(choices=['present', 'absent'], default='present'),
+ multi_ok = dict(type='bool', default=False)
+ )
)
module = AnsibleModule(
diff --git a/lib/ansible/modules/cloud/amazon/ec2_vpc_subnet.py b/lib/ansible/modules/cloud/amazon/ec2_vpc_subnet.py
index dc66d445864..d73806512a6 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_vpc_subnet.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_vpc_subnet.py
@@ -150,7 +150,7 @@ def create_subnet(vpc_conn, vpc_id, cidr, az, check_mode):
subnet = None
else:
raise AnsibleVPCSubnetCreationException(
- 'Unable to create subnet {0}, error: {1}'.format(cidr, e))
+ 'Unable to create subnet {0}, error: {1}'.format(cidr, e))
return subnet
diff --git a/lib/ansible/modules/cloud/amazon/ec2_win_password.py b/lib/ansible/modules/cloud/amazon/ec2_win_password.py
index bf89ea0ec8f..d27157dac67 100644
--- a/lib/ansible/modules/cloud/amazon/ec2_win_password.py
+++ b/lib/ansible/modules/cloud/amazon/ec2_win_password.py
@@ -106,12 +106,12 @@ except ImportError:
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- instance_id = dict(required=True),
- key_file = dict(required=True),
- key_passphrase = dict(no_log=True, default=None, required=False),
- wait = dict(type='bool', default=False, required=False),
- wait_timeout = dict(default=120, required=False),
- )
+ instance_id = dict(required=True),
+ key_file = dict(required=True),
+ key_passphrase = dict(no_log=True, default=None, required=False),
+ wait = dict(type='bool', default=False, required=False),
+ wait_timeout = dict(default=120, required=False),
+ )
)
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/amazon/ecs_service.py b/lib/ansible/modules/cloud/amazon/ecs_service.py
index 4a85ff3c0e7..9bf424e1d02 100644
--- a/lib/ansible/modules/cloud/amazon/ecs_service.py
+++ b/lib/ansible/modules/cloud/amazon/ecs_service.py
@@ -260,7 +260,7 @@ class EcsServiceManager:
cluster=cluster_name,
services=[
service_name
- ])
+ ])
msg = ''
if len(response['failures'])>0:
c = self.find_in_array(response['failures'], service_name, 'arn')
diff --git a/lib/ansible/modules/cloud/amazon/elasticache.py b/lib/ansible/modules/cloud/amazon/elasticache.py
index 24272549ebd..22c4b4d4f5c 100644
--- a/lib/ansible/modules/cloud/amazon/elasticache.py
+++ b/lib/ansible/modules/cloud/amazon/elasticache.py
@@ -483,22 +483,22 @@ class ElastiCacheManager(object):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- state ={'required': True, 'choices': ['present', 'absent', 'rebooted']},
- name ={'required': True},
- engine ={'required': False, 'default': 'memcached'},
- cache_engine_version ={'required': False},
- node_type ={'required': False, 'default': 'cache.m1.small'},
- num_nodes ={'required': False, 'default': None, 'type': 'int'},
- # alias for compat with the original PR 1950
- cache_parameter_group ={'required': False, 'default': None, 'aliases': ['parameter_group']},
- cache_port ={'required': False, 'type': 'int'},
- cache_subnet_group ={'required': False, 'default': None},
- cache_security_groups ={'required': False, 'default': [], 'type': 'list'},
- security_group_ids ={'required': False, 'default': [], 'type': 'list'},
- zone ={'required': False, 'default': None},
- wait ={'required': False, 'type' : 'bool', 'default': True},
- hard_modify ={'required': False, 'type': 'bool', 'default': False}
- )
+ state ={'required': True, 'choices': ['present', 'absent', 'rebooted']},
+ name ={'required': True},
+ engine ={'required': False, 'default': 'memcached'},
+ cache_engine_version ={'required': False},
+ node_type ={'required': False, 'default': 'cache.m1.small'},
+ num_nodes ={'required': False, 'default': None, 'type': 'int'},
+ # alias for compat with the original PR 1950
+ cache_parameter_group ={'required': False, 'default': None, 'aliases': ['parameter_group']},
+ cache_port ={'required': False, 'type': 'int'},
+ cache_subnet_group ={'required': False, 'default': None},
+ cache_security_groups ={'required': False, 'default': [], 'type': 'list'},
+ security_group_ids ={'required': False, 'default': [], 'type': 'list'},
+ zone ={'required': False, 'default': None},
+ wait ={'required': False, 'type' : 'bool', 'default': True},
+ hard_modify ={'required': False, 'type': 'bool', 'default': False}
+ )
)
module = AnsibleModule(
diff --git a/lib/ansible/modules/cloud/amazon/elasticache_subnet_group.py b/lib/ansible/modules/cloud/amazon/elasticache_subnet_group.py
index 1e5708c03e3..1a3508bfccb 100644
--- a/lib/ansible/modules/cloud/amazon/elasticache_subnet_group.py
+++ b/lib/ansible/modules/cloud/amazon/elasticache_subnet_group.py
@@ -80,11 +80,11 @@ except ImportError:
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- state = dict(required=True, choices=['present', 'absent']),
- name = dict(required=True),
- description = dict(required=False),
- subnets = dict(required=False, type='list'),
- )
+ state = dict(required=True, choices=['present', 'absent']),
+ name = dict(required=True),
+ description = dict(required=False),
+ subnets = dict(required=False, type='list'),
+ )
)
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/amazon/iam.py b/lib/ansible/modules/cloud/amazon/iam.py
index 907c96af796..8b24b3feb3d 100644
--- a/lib/ansible/modules/cloud/amazon/iam.py
+++ b/lib/ansible/modules/cloud/amazon/iam.py
@@ -297,9 +297,9 @@ def update_user(module, iam, name, new_name, new_path, key_state, key_count, key
error_msg = boto_exception(err)
if 'cannot be found' in error_msg and updated:
current_keys, status = \
- [ck['access_key_id'] for ck in
+ [ck['access_key_id'] for ck in
iam.get_all_access_keys(new_name).list_access_keys_result.access_key_metadata],\
- [ck['status'] for ck in
+ [ck['status'] for ck in
iam.get_all_access_keys(new_name).list_access_keys_result.access_key_metadata]
name = new_name
else:
diff --git a/lib/ansible/modules/cloud/amazon/iam_cert.py b/lib/ansible/modules/cloud/amazon/iam_cert.py
index 9fc36787702..9b540a20469 100644
--- a/lib/ansible/modules/cloud/amazon/iam_cert.py
+++ b/lib/ansible/modules/cloud/amazon/iam_cert.py
@@ -129,9 +129,9 @@ def boto_exception(err):
def cert_meta(iam, name):
opath = iam.get_server_certificate(name).get_server_certificate_result.\
- server_certificate.\
- server_certificate_metadata.\
- path
+ server_certificate.\
+ server_certificate_metadata.\
+ path
ocert = iam.get_server_certificate(name).get_server_certificate_result.\
server_certificate.\
certificate_body
diff --git a/lib/ansible/modules/cloud/amazon/rds.py b/lib/ansible/modules/cloud/amazon/rds.py
index d4ff306951e..e820fc0520d 100644
--- a/lib/ansible/modules/cloud/amazon/rds.py
+++ b/lib/ansible/modules/cloud/amazon/rds.py
@@ -694,7 +694,7 @@ def create_db_instance(module, conn):
try:
result = conn.create_db_instance(instance_name, module.params.get('size'),
module.params.get('instance_type'), module.params.get('db_engine'),
- module.params.get('username'), module.params.get('password'), **params)
+ module.params.get('username'), module.params.get('password'), **params)
changed = True
except RDSException as e:
module.fail_json(msg="Failed to create instance: %s" % e.message)
@@ -953,40 +953,40 @@ def validate_parameters(required_vars, valid_vars, module):
# map to convert rds module options to boto rds and rds2 options
optional_params = {
- 'port': 'port',
- 'db_name': 'db_name',
- 'zone': 'availability_zone',
- 'maint_window': 'preferred_maintenance_window',
- 'backup_window': 'preferred_backup_window',
- 'backup_retention': 'backup_retention_period',
- 'multi_zone': 'multi_az',
- 'engine_version': 'engine_version',
- 'upgrade': 'auto_minor_version_upgrade',
- 'subnet': 'db_subnet_group_name',
- 'license_model': 'license_model',
- 'option_group': 'option_group_name',
- 'size': 'allocated_storage',
- 'iops': 'iops',
- 'new_instance_name': 'new_instance_id',
- 'apply_immediately': 'apply_immediately',
+ 'port': 'port',
+ 'db_name': 'db_name',
+ 'zone': 'availability_zone',
+ 'maint_window': 'preferred_maintenance_window',
+ 'backup_window': 'preferred_backup_window',
+ 'backup_retention': 'backup_retention_period',
+ 'multi_zone': 'multi_az',
+ 'engine_version': 'engine_version',
+ 'upgrade': 'auto_minor_version_upgrade',
+ 'subnet': 'db_subnet_group_name',
+ 'license_model': 'license_model',
+ 'option_group': 'option_group_name',
+ 'size': 'allocated_storage',
+ 'iops': 'iops',
+ 'new_instance_name': 'new_instance_id',
+ 'apply_immediately': 'apply_immediately',
}
# map to convert rds module options to boto rds options
optional_params_rds = {
- 'db_engine': 'engine',
- 'password': 'master_password',
- 'parameter_group': 'param_group',
- 'instance_type': 'instance_class',
+ 'db_engine': 'engine',
+ 'password': 'master_password',
+ 'parameter_group': 'param_group',
+ 'instance_type': 'instance_class',
}
# map to convert rds module options to boto rds2 options
optional_params_rds2 = {
- 'tags': 'tags',
- 'publicly_accessible': 'publicly_accessible',
- 'parameter_group': 'db_parameter_group_name',
- 'character_set_name': 'character_set_name',
- 'instance_type': 'db_instance_class',
- 'password': 'master_user_password',
- 'new_instance_name': 'new_db_instance_identifier',
- 'force_failover': 'force_failover',
+ 'tags': 'tags',
+ 'publicly_accessible': 'publicly_accessible',
+ 'parameter_group': 'db_parameter_group_name',
+ 'character_set_name': 'character_set_name',
+ 'instance_type': 'db_instance_class',
+ 'password': 'master_user_password',
+ 'new_instance_name': 'new_db_instance_identifier',
+ 'force_failover': 'force_failover',
}
if has_rds2:
optional_params.update(optional_params_rds2)
@@ -1029,40 +1029,40 @@ def validate_parameters(required_vars, valid_vars, module):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- command = dict(choices=['create', 'replicate', 'delete', 'facts', 'modify', 'promote', 'snapshot', 'reboot', 'restore'], required=True),
- instance_name = dict(required=False),
- source_instance = dict(required=False),
- db_engine = dict(choices=['mariadb', 'MySQL', 'oracle-se1', 'oracle-se', 'oracle-ee', 'sqlserver-ee', 'sqlserver-se', 'sqlserver-ex', 'sqlserver-web', 'postgres', 'aurora'], required=False),
- size = dict(required=False),
- instance_type = dict(aliases=['type'], required=False),
- username = dict(required=False),
- password = dict(no_log=True, required=False),
- db_name = dict(required=False),
- engine_version = dict(required=False),
- parameter_group = dict(required=False),
- license_model = dict(choices=['license-included', 'bring-your-own-license', 'general-public-license', 'postgresql-license'], required=False),
- multi_zone = dict(type='bool', default=False),
- iops = dict(required=False),
- security_groups = dict(required=False),
- vpc_security_groups = dict(type='list', required=False),
- port = dict(required=False),
- upgrade = dict(type='bool', default=False),
- option_group = dict(required=False),
- maint_window = dict(required=False),
- backup_window = dict(required=False),
- backup_retention = dict(required=False),
- zone = dict(aliases=['aws_zone', 'ec2_zone'], required=False),
- subnet = dict(required=False),
- wait = dict(type='bool', default=False),
- wait_timeout = dict(type='int', default=300),
- snapshot = dict(required=False),
- apply_immediately = dict(type='bool', default=False),
- new_instance_name = dict(required=False),
- tags = dict(type='dict', required=False),
- publicly_accessible = dict(required=False),
- character_set_name = dict(required=False),
- force_failover = dict(type='bool', required=False, default=False)
- )
+ command = dict(choices=['create', 'replicate', 'delete', 'facts', 'modify', 'promote', 'snapshot', 'reboot', 'restore'], required=True),
+ instance_name = dict(required=False),
+ source_instance = dict(required=False),
+ db_engine = dict(choices=['mariadb', 'MySQL', 'oracle-se1', 'oracle-se', 'oracle-ee', 'sqlserver-ee', 'sqlserver-se', 'sqlserver-ex', 'sqlserver-web', 'postgres', 'aurora'], required=False),
+ size = dict(required=False),
+ instance_type = dict(aliases=['type'], required=False),
+ username = dict(required=False),
+ password = dict(no_log=True, required=False),
+ db_name = dict(required=False),
+ engine_version = dict(required=False),
+ parameter_group = dict(required=False),
+ license_model = dict(choices=['license-included', 'bring-your-own-license', 'general-public-license', 'postgresql-license'], required=False),
+ multi_zone = dict(type='bool', default=False),
+ iops = dict(required=False),
+ security_groups = dict(required=False),
+ vpc_security_groups = dict(type='list', required=False),
+ port = dict(required=False),
+ upgrade = dict(type='bool', default=False),
+ option_group = dict(required=False),
+ maint_window = dict(required=False),
+ backup_window = dict(required=False),
+ backup_retention = dict(required=False),
+ zone = dict(aliases=['aws_zone', 'ec2_zone'], required=False),
+ subnet = dict(required=False),
+ wait = dict(type='bool', default=False),
+ wait_timeout = dict(type='int', default=300),
+ snapshot = dict(required=False),
+ apply_immediately = dict(type='bool', default=False),
+ new_instance_name = dict(required=False),
+ tags = dict(type='dict', required=False),
+ publicly_accessible = dict(required=False),
+ character_set_name = dict(required=False),
+ force_failover = dict(type='bool', required=False, default=False)
+ )
)
module = AnsibleModule(
@@ -1073,15 +1073,15 @@ def main():
module.fail_json(msg='boto required for this module')
invocations = {
- 'create': create_db_instance,
- 'replicate': replicate_db_instance,
- 'delete': delete_db_instance_or_snapshot,
- 'facts': facts_db_instance_or_snapshot,
- 'modify': modify_db_instance,
- 'promote': promote_db_instance,
- 'snapshot': snapshot_db_instance,
- 'reboot': reboot_db_instance,
- 'restore': restore_db_instance,
+ 'create': create_db_instance,
+ 'replicate': replicate_db_instance,
+ 'delete': delete_db_instance_or_snapshot,
+ 'facts': facts_db_instance_or_snapshot,
+ 'modify': modify_db_instance,
+ 'promote': promote_db_instance,
+ 'snapshot': snapshot_db_instance,
+ 'reboot': reboot_db_instance,
+ 'restore': restore_db_instance,
}
region, ec2_url, aws_connect_params = get_aws_connection_info(module)
diff --git a/lib/ansible/modules/cloud/amazon/rds_param_group.py b/lib/ansible/modules/cloud/amazon/rds_param_group.py
index 80cf4d60bef..86eecdd0cb3 100644
--- a/lib/ansible/modules/cloud/amazon/rds_param_group.py
+++ b/lib/ansible/modules/cloud/amazon/rds_param_group.py
@@ -219,13 +219,13 @@ def modify_group(group, params, immediate=False):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- state = dict(required=True, choices=['present', 'absent']),
- name = dict(required=True),
- engine = dict(required=False, choices=VALID_ENGINES),
- description = dict(required=False),
- params = dict(required=False, aliases=['parameters'], type='dict'),
- immediate = dict(required=False, type='bool'),
- )
+ state = dict(required=True, choices=['present', 'absent']),
+ name = dict(required=True),
+ engine = dict(required=False, choices=VALID_ENGINES),
+ description = dict(required=False),
+ params = dict(required=False, aliases=['parameters'], type='dict'),
+ immediate = dict(required=False, type='bool'),
+ )
)
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/amazon/rds_subnet_group.py b/lib/ansible/modules/cloud/amazon/rds_subnet_group.py
index cf7f7f80389..bcf3950d9e0 100644
--- a/lib/ansible/modules/cloud/amazon/rds_subnet_group.py
+++ b/lib/ansible/modules/cloud/amazon/rds_subnet_group.py
@@ -84,11 +84,11 @@ except ImportError:
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- state = dict(required=True, choices=['present', 'absent']),
- name = dict(required=True),
- description = dict(required=False),
- subnets = dict(required=False, type='list'),
- )
+ state = dict(required=True, choices=['present', 'absent']),
+ name = dict(required=True),
+ description = dict(required=False),
+ subnets = dict(required=False, type='list'),
+ )
)
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/amazon/redshift.py b/lib/ansible/modules/cloud/amazon/redshift.py
index a1ae146a427..4208301b211 100644
--- a/lib/ansible/modules/cloud/amazon/redshift.py
+++ b/lib/ansible/modules/cloud/amazon/redshift.py
@@ -410,31 +410,31 @@ def modify_cluster(module, redshift):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- command = dict(choices=['create', 'facts', 'delete', 'modify'], required=True),
- identifier = dict(required=True),
- node_type = dict(choices=['ds1.xlarge', 'ds1.8xlarge', 'ds2.xlarge', 'ds2.8xlarge', 'dc1.large', 'dc1.8xlarge', 'dw1.xlarge', 'dw1.8xlarge', 'dw2.large', 'dw2.8xlarge'], required=False),
- username = dict(required=False),
- password = dict(no_log=True, required=False),
- db_name = dict(require=False),
- cluster_type = dict(choices=['multi-node', 'single-node', ], default='single-node'),
- cluster_security_groups = dict(aliases=['security_groups'], type='list'),
- vpc_security_group_ids = dict(aliases=['vpc_security_groups'], type='list'),
- cluster_subnet_group_name = dict(aliases=['subnet']),
- availability_zone = dict(aliases=['aws_zone', 'zone']),
- preferred_maintenance_window = dict(aliases=['maintance_window', 'maint_window']),
- cluster_parameter_group_name = dict(aliases=['param_group_name']),
- automated_snapshot_retention_period = dict(aliases=['retention_period']),
- port = dict(type='int'),
- cluster_version = dict(aliases=['version'], choices=['1.0']),
- allow_version_upgrade = dict(aliases=['version_upgrade'], type='bool', default=True),
- number_of_nodes = dict(type='int'),
- publicly_accessible = dict(type='bool', default=False),
- encrypted = dict(type='bool', default=False),
- elastic_ip = dict(required=False),
- new_cluster_identifier = dict(aliases=['new_identifier']),
- wait = dict(type='bool', default=False),
- wait_timeout = dict(default=300),
- )
+ command = dict(choices=['create', 'facts', 'delete', 'modify'], required=True),
+ identifier = dict(required=True),
+ node_type = dict(choices=['ds1.xlarge', 'ds1.8xlarge', 'ds2.xlarge', 'ds2.8xlarge', 'dc1.large', 'dc1.8xlarge', 'dw1.xlarge', 'dw1.8xlarge', 'dw2.large', 'dw2.8xlarge'], required=False),
+ username = dict(required=False),
+ password = dict(no_log=True, required=False),
+ db_name = dict(require=False),
+ cluster_type = dict(choices=['multi-node', 'single-node', ], default='single-node'),
+ cluster_security_groups = dict(aliases=['security_groups'], type='list'),
+ vpc_security_group_ids = dict(aliases=['vpc_security_groups'], type='list'),
+ cluster_subnet_group_name = dict(aliases=['subnet']),
+ availability_zone = dict(aliases=['aws_zone', 'zone']),
+ preferred_maintenance_window = dict(aliases=['maintance_window', 'maint_window']),
+ cluster_parameter_group_name = dict(aliases=['param_group_name']),
+ automated_snapshot_retention_period = dict(aliases=['retention_period']),
+ port = dict(type='int'),
+ cluster_version = dict(aliases=['version'], choices=['1.0']),
+ allow_version_upgrade = dict(aliases=['version_upgrade'], type='bool', default=True),
+ number_of_nodes = dict(type='int'),
+ publicly_accessible = dict(type='bool', default=False),
+ encrypted = dict(type='bool', default=False),
+ elastic_ip = dict(required=False),
+ new_cluster_identifier = dict(aliases=['new_identifier']),
+ wait = dict(type='bool', default=False),
+ wait_timeout = dict(default=300),
+ )
)
module = AnsibleModule(
diff --git a/lib/ansible/modules/cloud/amazon/route53.py b/lib/ansible/modules/cloud/amazon/route53.py
index 67e09245e08..93f29f43ad0 100644
--- a/lib/ansible/modules/cloud/amazon/route53.py
+++ b/lib/ansible/modules/cloud/amazon/route53.py
@@ -388,28 +388,28 @@ def invoke_with_throttling_retries(function_ref, *argv):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- command = dict(choices=['get', 'create', 'delete'], required=True),
- zone = dict(required=True),
- hosted_zone_id = dict(required=False, default=None),
- record = dict(required=True),
- ttl = dict(required=False, type='int', default=3600),
- type = dict(choices=['A', 'CNAME', 'MX', 'AAAA', 'TXT', 'PTR', 'SRV', 'SPF', 'NS', 'SOA'], required=True),
- alias = dict(required=False, type='bool'),
- alias_hosted_zone_id = dict(required=False),
- alias_evaluate_target_health = dict(required=False, type='bool', default=False),
- value = dict(required=False),
- overwrite = dict(required=False, type='bool'),
- retry_interval = dict(required=False, default=500),
- private_zone = dict(required=False, type='bool', default=False),
- identifier = dict(required=False, default=None),
- weight = dict(required=False, type='int'),
- region = dict(required=False),
- health_check = dict(required=False),
- failover = dict(required=False,choices=['PRIMARY','SECONDARY']),
- vpc_id = dict(required=False),
- wait = dict(required=False, type='bool', default=False),
- wait_timeout = dict(required=False, type='int', default=300),
- )
+ command = dict(choices=['get', 'create', 'delete'], required=True),
+ zone = dict(required=True),
+ hosted_zone_id = dict(required=False, default=None),
+ record = dict(required=True),
+ ttl = dict(required=False, type='int', default=3600),
+ type = dict(choices=['A', 'CNAME', 'MX', 'AAAA', 'TXT', 'PTR', 'SRV', 'SPF', 'NS', 'SOA'], required=True),
+ alias = dict(required=False, type='bool'),
+ alias_hosted_zone_id = dict(required=False),
+ alias_evaluate_target_health = dict(required=False, type='bool', default=False),
+ value = dict(required=False),
+ overwrite = dict(required=False, type='bool'),
+ retry_interval = dict(required=False, default=500),
+ private_zone = dict(required=False, type='bool', default=False),
+ identifier = dict(required=False, default=None),
+ weight = dict(required=False, type='int'),
+ region = dict(required=False),
+ health_check = dict(required=False),
+ failover = dict(required=False,choices=['PRIMARY','SECONDARY']),
+ vpc_id = dict(required=False),
+ wait = dict(required=False, type='bool', default=False),
+ wait_timeout = dict(required=False, type='int', default=300),
+ )
)
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/amazon/route53_health_check.py b/lib/ansible/modules/cloud/amazon/route53_health_check.py
index 0070b3e288c..09f864c5a45 100644
--- a/lib/ansible/modules/cloud/amazon/route53_health_check.py
+++ b/lib/ansible/modules/cloud/amazon/route53_health_check.py
@@ -275,16 +275,16 @@ def update_health_check(conn, health_check_id, health_check_version, health_chec
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- state = dict(choices=['present', 'absent'], default='present'),
- ip_address = dict(),
- port = dict(type='int'),
- type = dict(required=True, choices=['HTTP', 'HTTPS', 'HTTP_STR_MATCH', 'HTTPS_STR_MATCH', 'TCP']),
- resource_path = dict(),
- fqdn = dict(),
- string_match = dict(),
- request_interval = dict(type='int', choices=[10, 30], default=30),
- failure_threshold = dict(type='int', choices=[1, 2, 3, 4, 5, 6, 7, 8, 9, 10], default=3),
- )
+ state = dict(choices=['present', 'absent'], default='present'),
+ ip_address = dict(),
+ port = dict(type='int'),
+ type = dict(required=True, choices=['HTTP', 'HTTPS', 'HTTP_STR_MATCH', 'HTTPS_STR_MATCH', 'TCP']),
+ resource_path = dict(),
+ fqdn = dict(),
+ string_match = dict(),
+ request_interval = dict(type='int', choices=[10, 30], default=30),
+ failure_threshold = dict(type='int', choices=[1, 2, 3, 4, 5, 6, 7, 8, 9, 10], default=3),
+ )
)
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/amazon/route53_zone.py b/lib/ansible/modules/cloud/amazon/route53_zone.py
index 758860f6853..e4700c82ee6 100644
--- a/lib/ansible/modules/cloud/amazon/route53_zone.py
+++ b/lib/ansible/modules/cloud/amazon/route53_zone.py
@@ -138,11 +138,11 @@ from ansible.module_utils.ec2 import ec2_argument_spec, get_aws_connection_info
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- zone=dict(required=True),
- state=dict(default='present', choices=['present', 'absent']),
- vpc_id=dict(default=None),
- vpc_region=dict(default=None),
- comment=dict(default='')))
+ zone=dict(required=True),
+ state=dict(default='present', choices=['present', 'absent']),
+ vpc_id=dict(default=None),
+ vpc_region=dict(default=None),
+ comment=dict(default='')))
module = AnsibleModule(argument_spec=argument_spec)
if not HAS_BOTO:
diff --git a/lib/ansible/modules/cloud/amazon/s3.py b/lib/ansible/modules/cloud/amazon/s3.py
index 5544b990747..4b09e32bfc2 100755
--- a/lib/ansible/modules/cloud/amazon/s3.py
+++ b/lib/ansible/modules/cloud/amazon/s3.py
@@ -433,25 +433,25 @@ def is_walrus(s3_url):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- bucket = dict(required=True),
- dest = dict(default=None),
- encrypt = dict(default=True, type='bool'),
- expiry = dict(default=600, aliases=['expiration']),
- headers = dict(type='dict'),
- marker = dict(default=None),
- max_keys = dict(default=1000),
- metadata = dict(type='dict'),
- mode = dict(choices=['get', 'put', 'delete', 'create', 'geturl', 'getstr', 'delobj', 'list'], required=True),
- object = dict(),
- permission = dict(type='list', default=['private']),
- version = dict(default=None),
- overwrite = dict(aliases=['force'], default='always'),
- prefix = dict(default=None),
- retries = dict(aliases=['retry'], type='int', default=0),
- s3_url = dict(aliases=['S3_URL']),
- rgw = dict(default='no', type='bool'),
- src = dict(),
- ),
+ bucket = dict(required=True),
+ dest = dict(default=None),
+ encrypt = dict(default=True, type='bool'),
+ expiry = dict(default=600, aliases=['expiration']),
+ headers = dict(type='dict'),
+ marker = dict(default=None),
+ max_keys = dict(default=1000),
+ metadata = dict(type='dict'),
+ mode = dict(choices=['get', 'put', 'delete', 'create', 'geturl', 'getstr', 'delobj', 'list'], required=True),
+ object = dict(),
+ permission = dict(type='list', default=['private']),
+ version = dict(default=None),
+ overwrite = dict(aliases=['force'], default='always'),
+ prefix = dict(default=None),
+ retries = dict(aliases=['retry'], type='int', default=0),
+ s3_url = dict(aliases=['S3_URL']),
+ rgw = dict(default='no', type='bool'),
+ src = dict(),
+ ),
)
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/amazon/s3_lifecycle.py b/lib/ansible/modules/cloud/amazon/s3_lifecycle.py
index f981dfadb8f..4cf69faea93 100644
--- a/lib/ansible/modules/cloud/amazon/s3_lifecycle.py
+++ b/lib/ansible/modules/cloud/amazon/s3_lifecycle.py
@@ -377,11 +377,11 @@ def main():
module = AnsibleModule(argument_spec=argument_spec,
mutually_exclusive = [
- [ 'expiration_days', 'expiration_date' ],
- [ 'expiration_days', 'transition_date' ],
- [ 'transition_days', 'transition_date' ],
- [ 'transition_days', 'expiration_date' ]
- ]
+ [ 'expiration_days', 'expiration_date' ],
+ [ 'expiration_days', 'transition_date' ],
+ [ 'transition_days', 'transition_date' ],
+ [ 'transition_days', 'expiration_date' ]
+ ]
)
if not HAS_BOTO:
diff --git a/lib/ansible/modules/cloud/amazon/s3_sync.py b/lib/ansible/modules/cloud/amazon/s3_sync.py
index 1547da4f6b0..466183eb99a 100644
--- a/lib/ansible/modules/cloud/amazon/s3_sync.py
+++ b/lib/ansible/modules/cloud/amazon/s3_sync.py
@@ -306,7 +306,7 @@ def gather_files(fileroot, include=None, exclude=None):
'chopped_path':chopped_path,
'modified_epoch': f_modified_epoch,
'bytes': f_size
- })
+ })
# dirpath = path *to* the directory
# dirnames = subdirs *in* our directory
# filenames
@@ -428,7 +428,7 @@ def upload_files(s3, bucket, filelist, params):
ret = []
for entry in filelist:
args = {
- 'ContentType': entry['mime_type']
+ 'ContentType': entry['mime_type']
}
if params.get('permission'):
args['ACL'] = params['permission']
@@ -440,18 +440,18 @@ def upload_files(s3, bucket, filelist, params):
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
- mode = dict(choices=['push'], default='push'),
- file_change_strategy = dict(choices=['force','date_size','checksum'], default='date_size'),
- bucket = dict(required=True),
- key_prefix = dict(required=False, default=''),
- file_root = dict(required=True, type='path'),
- permission = dict(required=False, choices=['private', 'public-read', 'public-read-write', 'authenticated-read', 'aws-exec-read', 'bucket-owner-read', 'bucket-owner-full-control']),
- retries = dict(required=False),
- mime_map = dict(required=False, type='dict'),
- exclude = dict(required=False, default=".*"),
- include = dict(required=False, default="*"),
- # future options: cache_control (string or map, perhaps), encoding, metadata, storage_class, retries
- )
+ mode = dict(choices=['push'], default='push'),
+ file_change_strategy = dict(choices=['force','date_size','checksum'], default='date_size'),
+ bucket = dict(required=True),
+ key_prefix = dict(required=False, default=''),
+ file_root = dict(required=True, type='path'),
+ permission = dict(required=False, choices=['private', 'public-read', 'public-read-write', 'authenticated-read', 'aws-exec-read', 'bucket-owner-read', 'bucket-owner-full-control']),
+ retries = dict(required=False),
+ mime_map = dict(required=False, type='dict'),
+ exclude = dict(required=False, default=".*"),
+ include = dict(required=False, default="*"),
+ # future options: cache_control (string or map, perhaps), encoding, metadata, storage_class, retries
+ )
)
module = AnsibleModule(
diff --git a/lib/ansible/modules/cloud/amazon/s3_website.py b/lib/ansible/modules/cloud/amazon/s3_website.py
index a47eee51fde..a26a2f311a0 100644
--- a/lib/ansible/modules/cloud/amazon/s3_website.py
+++ b/lib/ansible/modules/cloud/amazon/s3_website.py
@@ -267,9 +267,9 @@ def main():
module = AnsibleModule(
argument_spec=argument_spec,
mutually_exclusive = [
- ['redirect_all_requests', 'suffix'],
- ['redirect_all_requests', 'error_key']
- ])
+ ['redirect_all_requests', 'suffix'],
+ ['redirect_all_requests', 'error_key']
+ ])
if not HAS_BOTO3:
module.fail_json(msg='boto3 required for this module')
diff --git a/lib/ansible/modules/cloud/atomic/atomic_host.py b/lib/ansible/modules/cloud/atomic/atomic_host.py
index ae4cb06e28c..c0a6b9a47e2 100644
--- a/lib/ansible/modules/cloud/atomic/atomic_host.py
+++ b/lib/ansible/modules/cloud/atomic/atomic_host.py
@@ -89,10 +89,10 @@ def core(module):
def main():
module = AnsibleModule(
- argument_spec = dict(
- revision = dict(default='latest', required=False, aliases=["version"]),
- ),
- )
+ argument_spec = dict(
+ revision = dict(default='latest', required=False, aliases=["version"]),
+ ),
+ )
# Verify that the platform is atomic host
if not os.path.exists("/run/ostree-booted"):
diff --git a/lib/ansible/modules/cloud/atomic/atomic_image.py b/lib/ansible/modules/cloud/atomic/atomic_image.py
index 640af4f3a81..eb7bca874ed 100644
--- a/lib/ansible/modules/cloud/atomic/atomic_image.py
+++ b/lib/ansible/modules/cloud/atomic/atomic_image.py
@@ -119,12 +119,12 @@ def core(module):
def main():
module = AnsibleModule(
- argument_spec = dict(
- name = dict(default=None, required=True),
- state = dict(default='latest', choices=['present', 'absent', 'latest']),
- started = dict(default='yes', type='bool'),
- ),
- )
+ argument_spec = dict(
+ name = dict(default=None, required=True),
+ state = dict(default='latest', choices=['present', 'absent', 'latest']),
+ started = dict(default='yes', type='bool'),
+ ),
+ )
# Verify that the platform supports atomic command
rc, out, err = module.run_command('atomic -v', check_rc=False)
diff --git a/lib/ansible/modules/cloud/cloudstack/cs_firewall.py b/lib/ansible/modules/cloud/cloudstack/cs_firewall.py
index 160e58d4723..22312cffd0f 100644
--- a/lib/ansible/modules/cloud/cloudstack/cs_firewall.py
+++ b/lib/ansible/modules/cloud/cloudstack/cs_firewall.py
@@ -299,9 +299,9 @@ class AnsibleCloudStackFirewall(AnsibleCloudStack):
def _icmp_match(self, rule, protocol, icmp_code, icmp_type):
return protocol == 'icmp' \
- and protocol == rule['protocol'] \
- and icmp_code == rule['icmpcode'] \
- and icmp_type == rule['icmptype']
+ and protocol == rule['protocol'] \
+ and icmp_code == rule['icmpcode'] \
+ and icmp_type == rule['icmptype']
def _type_cidr_match(self, rule, cidr):
diff --git a/lib/ansible/modules/cloud/cloudstack/cs_securitygroup_rule.py b/lib/ansible/modules/cloud/cloudstack/cs_securitygroup_rule.py
index 0bfa40746de..a54a599e099 100644
--- a/lib/ansible/modules/cloud/cloudstack/cs_securitygroup_rule.py
+++ b/lib/ansible/modules/cloud/cloudstack/cs_securitygroup_rule.py
@@ -206,27 +206,27 @@ class AnsibleCloudStackSecurityGroupRule(AnsibleCloudStack):
def _tcp_udp_match(self, rule, protocol, start_port, end_port):
return protocol in ['tcp', 'udp'] \
- and protocol == rule['protocol'] \
- and start_port == int(rule['startport']) \
- and end_port == int(rule['endport'])
+ and protocol == rule['protocol'] \
+ and start_port == int(rule['startport']) \
+ and end_port == int(rule['endport'])
def _icmp_match(self, rule, protocol, icmp_code, icmp_type):
return protocol == 'icmp' \
- and protocol == rule['protocol'] \
- and icmp_code == int(rule['icmpcode']) \
- and icmp_type == int(rule['icmptype'])
+ and protocol == rule['protocol'] \
+ and icmp_code == int(rule['icmpcode']) \
+ and icmp_type == int(rule['icmptype'])
def _ah_esp_gre_match(self, rule, protocol):
return protocol in ['ah', 'esp', 'gre'] \
- and protocol == rule['protocol']
+ and protocol == rule['protocol']
def _type_security_group_match(self, rule, security_group_name):
return security_group_name \
- and 'securitygroupname' in rule \
- and security_group_name == rule['securitygroupname']
+ and 'securitygroupname' in rule \
+ and security_group_name == rule['securitygroupname']
def _type_cidr_match(self, rule, cidr):
diff --git a/lib/ansible/modules/cloud/docker/_docker.py b/lib/ansible/modules/cloud/docker/_docker.py
index e9b7f0af0d5..4bad2b246bd 100644
--- a/lib/ansible/modules/cloud/docker/_docker.py
+++ b/lib/ansible/modules/cloud/docker/_docker.py
@@ -682,26 +682,26 @@ class DockerManager(object):
# docker-py version is a tuple of ints because we have to compare them
# server APIVersion is passed to a docker-py function that takes strings
_cap_ver_req = {
- 'devices': ((0, 7, 0), '1.2'),
- 'dns': ((0, 3, 0), '1.10'),
- 'volumes_from': ((0, 3, 0), '1.10'),
- 'restart_policy': ((0, 5, 0), '1.14'),
- 'extra_hosts': ((0, 7, 0), '1.3.1'),
- 'pid': ((1, 0, 0), '1.17'),
- 'log_driver': ((1, 2, 0), '1.18'),
- 'log_opt': ((1, 2, 0), '1.18'),
- 'host_config': ((0, 7, 0), '1.15'),
- 'cpu_set': ((0, 6, 0), '1.14'),
- 'cap_add': ((0, 5, 0), '1.14'),
- 'cap_drop': ((0, 5, 0), '1.14'),
- 'read_only': ((1, 0, 0), '1.17'),
- 'labels': ((1, 2, 0), '1.18'),
- 'stop_timeout': ((0, 5, 0), '1.0'),
- 'ulimits': ((1, 2, 0), '1.18'),
- # Clientside only
- 'insecure_registry': ((0, 5, 0), '0.0'),
- 'env_file': ((1, 4, 0), '0.0')
- }
+ 'devices': ((0, 7, 0), '1.2'),
+ 'dns': ((0, 3, 0), '1.10'),
+ 'volumes_from': ((0, 3, 0), '1.10'),
+ 'restart_policy': ((0, 5, 0), '1.14'),
+ 'extra_hosts': ((0, 7, 0), '1.3.1'),
+ 'pid': ((1, 0, 0), '1.17'),
+ 'log_driver': ((1, 2, 0), '1.18'),
+ 'log_opt': ((1, 2, 0), '1.18'),
+ 'host_config': ((0, 7, 0), '1.15'),
+ 'cpu_set': ((0, 6, 0), '1.14'),
+ 'cap_add': ((0, 5, 0), '1.14'),
+ 'cap_drop': ((0, 5, 0), '1.14'),
+ 'read_only': ((1, 0, 0), '1.17'),
+ 'labels': ((1, 2, 0), '1.18'),
+ 'stop_timeout': ((0, 5, 0), '1.0'),
+ 'ulimits': ((1, 2, 0), '1.18'),
+ # Clientside only
+ 'insecure_registry': ((0, 5, 0), '0.0'),
+ 'env_file': ((1, 4, 0), '0.0')
+ }
def __init__(self, module):
self.module = module
diff --git a/lib/ansible/modules/cloud/docker/docker_container.py b/lib/ansible/modules/cloud/docker/docker_container.py
index 8a3d35d0321..a7686781ca5 100644
--- a/lib/ansible/modules/cloud/docker/docker_container.py
+++ b/lib/ansible/modules/cloud/docker/docker_container.py
@@ -1475,10 +1475,10 @@ class Container(DockerBaseClass):
else:
expected_devices.append(
dict(
- CgroupPermissions=parts[2],
- PathInContainer=parts[1],
- PathOnHost=parts[0]
- ))
+ CgroupPermissions=parts[2],
+ PathInContainer=parts[1],
+ PathOnHost=parts[0]
+ ))
return expected_devices
def _get_expected_entrypoint(self):
diff --git a/lib/ansible/modules/cloud/google/gce_lb.py b/lib/ansible/modules/cloud/google/gce_lb.py
index 1bcdcc24a94..7815102b813 100644
--- a/lib/ansible/modules/cloud/google/gce_lb.py
+++ b/lib/ansible/modules/cloud/google/gce_lb.py
@@ -225,7 +225,7 @@ def main():
try:
gcelb = get_driver_lb(Provider_lb.GCE)(gce_driver=gce)
gcelb.connection.user_agent_append("%s/%s" % (
- USER_AGENT_PRODUCT, USER_AGENT_VERSION))
+ USER_AGENT_PRODUCT, USER_AGENT_VERSION))
except Exception as e:
module.fail_json(msg=unexpected_error_msg(e), changed=False)
diff --git a/lib/ansible/modules/cloud/google/gce_mig.py b/lib/ansible/modules/cloud/google/gce_mig.py
index facc02bc7b3..a05c32860bf 100644
--- a/lib/ansible/modules/cloud/google/gce_mig.py
+++ b/lib/ansible/modules/cloud/google/gce_mig.py
@@ -829,7 +829,7 @@ def main():
if not autoscaler:
module.fail_json(msg='Unable to fetch autoscaler %s to delete \
in zone: %s' % (params['autoscaling']['name'], params['zone']),
- changed=False)
+ changed=False)
changed = delete_autoscaler(autoscaler)
json_output['deleted_autoscaler'] = changed
diff --git a/lib/ansible/modules/cloud/google/gce_pd.py b/lib/ansible/modules/cloud/google/gce_pd.py
index 7702075d0a9..7d0e7237dbb 100644
--- a/lib/ansible/modules/cloud/google/gce_pd.py
+++ b/lib/ansible/modules/cloud/google/gce_pd.py
@@ -254,7 +254,7 @@ def main():
if instance_name and inst is None:
module.fail_json(msg='Instance %s does not exist in zone %s' % (
- instance_name, zone), changed=False)
+ instance_name, zone), changed=False)
if not disk:
if image is not None and snapshot is not None:
diff --git a/lib/ansible/modules/cloud/google/gce_tag.py b/lib/ansible/modules/cloud/google/gce_tag.py
index 68e767562c8..114c314f1ba 100644
--- a/lib/ansible/modules/cloud/google/gce_tag.py
+++ b/lib/ansible/modules/cloud/google/gce_tag.py
@@ -182,10 +182,10 @@ def main():
project_id=dict(),
),
mutually_exclusive=[
- [ 'instance_name', 'instance_pattern' ]
+ [ 'instance_name', 'instance_pattern' ]
],
required_one_of=[
- [ 'instance_name', 'instance_pattern' ]
+ [ 'instance_name', 'instance_pattern' ]
]
)
diff --git a/lib/ansible/modules/cloud/google/gcpubsub.py b/lib/ansible/modules/cloud/google/gcpubsub.py
index 814e07e6cde..5004b290a9e 100644
--- a/lib/ansible/modules/cloud/google/gcpubsub.py
+++ b/lib/ansible/modules/cloud/google/gcpubsub.py
@@ -226,17 +226,17 @@ def pull_messages(pull_params, sub):
def main():
module = AnsibleModule(argument_spec=dict(
- topic=dict(required=True),
- state=dict(choices=['absent', 'present'], default='present'),
- publish=dict(type='list', default=None),
- subscription=dict(type='dict', default=None),
- service_account_email=dict(),
- credentials_file=dict(),
- project_id=dict(), ),)
+ topic=dict(required=True),
+ state=dict(choices=['absent', 'present'], default='present'),
+ publish=dict(type='list', default=None),
+ subscription=dict(type='dict', default=None),
+ service_account_email=dict(),
+ credentials_file=dict(),
+ project_id=dict(), ),)
if not HAS_PYTHON26:
module.fail_json(
- msg="GCE module requires python's 'ast' module, python v2.6+")
+ msg="GCE module requires python's 'ast' module, python v2.6+")
if not HAS_GOOGLE_CLOUD_PUBSUB:
module.fail_json(msg="Please install google-cloud-pubsub library.")
@@ -307,7 +307,7 @@ def main():
if s.push_endpoint is not None:
module.fail_json(msg="Cannot pull messages, push_endpoint is configured.")
(json_output['pulled_messages'], changed) = pull_messages(
- mod_params['subscription']['pull'], s)
+ mod_params['subscription']['pull'], s)
# publish messages to the topic
if mod_params['publish'] and len(mod_params['publish']) > 0:
diff --git a/lib/ansible/modules/cloud/google/gcpubsub_facts.py b/lib/ansible/modules/cloud/google/gcpubsub_facts.py
index 13134c9396c..77c7289b854 100644
--- a/lib/ansible/modules/cloud/google/gcpubsub_facts.py
+++ b/lib/ansible/modules/cloud/google/gcpubsub_facts.py
@@ -102,16 +102,16 @@ def list_func(data, member='name'):
def main():
module = AnsibleModule(argument_spec=dict(
- view=dict(choices=['topics', 'subscriptions'], default='topics'),
- topic=dict(required=False),
- state=dict(choices=['list'], default='list'),
- service_account_email=dict(),
- credentials_file=dict(),
- project_id=dict(), ),)
+ view=dict(choices=['topics', 'subscriptions'], default='topics'),
+ topic=dict(required=False),
+ state=dict(choices=['list'], default='list'),
+ service_account_email=dict(),
+ credentials_file=dict(),
+ project_id=dict(), ),)
if not HAS_PYTHON26:
module.fail_json(
- msg="GCE module requires python's 'ast' module, python v2.6+")
+ msg="GCE module requires python's 'ast' module, python v2.6+")
if not HAS_GOOGLE_CLOUD_PUBSUB:
module.fail_json(msg="Please install google-cloud-pubsub library.")
diff --git a/lib/ansible/modules/cloud/linode/linode.py b/lib/ansible/modules/cloud/linode/linode.py
index d51eb3529d2..97a1abd4e3f 100644
--- a/lib/ansible/modules/cloud/linode/linode.py
+++ b/lib/ansible/modules/cloud/linode/linode.py
@@ -282,13 +282,13 @@ def linodeServers(module, api, state, name, plan, distribution, datacenter, lino
size = servers[0]['TOTALHD'] - swap
if ssh_pub_key:
res = api.linode_disk_createfromdistribution(
- LinodeId=linode_id, DistributionID=distribution,
- rootPass=password, rootSSHKey=ssh_pub_key,
- Label='%s data disk (lid: %s)' % (name, linode_id), Size=size)
+ LinodeId=linode_id, DistributionID=distribution,
+ rootPass=password, rootSSHKey=ssh_pub_key,
+ Label='%s data disk (lid: %s)' % (name, linode_id), Size=size)
else:
res = api.linode_disk_createfromdistribution(
- LinodeId=linode_id, DistributionID=distribution, rootPass=password,
- Label='%s data disk (lid: %s)' % (name, linode_id), Size=size)
+ LinodeId=linode_id, DistributionID=distribution, rootPass=password,
+ Label='%s data disk (lid: %s)' % (name, linode_id), Size=size)
jobs.append(res['JobID'])
# Create SWAP disk
res = api.linode_disk_create(LinodeId=linode_id, Type='swap',
diff --git a/lib/ansible/modules/cloud/misc/proxmox.py b/lib/ansible/modules/cloud/misc/proxmox.py
index b492c96dac0..6c727cd2e3d 100644
--- a/lib/ansible/modules/cloud/misc/proxmox.py
+++ b/lib/ansible/modules/cloud/misc/proxmox.py
@@ -402,33 +402,33 @@ def umount_instance(module, proxmox, vm, vmid, timeout):
def main():
module = AnsibleModule(
- argument_spec = dict(
- api_host = dict(required=True),
- api_user = dict(required=True),
- api_password = dict(no_log=True),
- vmid = dict(required=False),
- validate_certs = dict(type='bool', default='no'),
- node = dict(),
- pool = dict(),
- password = dict(no_log=True),
- hostname = dict(),
- ostemplate = dict(),
- disk = dict(type='str', default='3'),
- cpus = dict(type='int', default=1),
- memory = dict(type='int', default=512),
- swap = dict(type='int', default=0),
- netif = dict(type='dict'),
- mounts = dict(type='dict'),
- ip_address = dict(),
- onboot = dict(type='bool', default='no'),
- storage = dict(default='local'),
- cpuunits = dict(type='int', default=1000),
- nameserver = dict(),
- searchdomain = dict(),
- timeout = dict(type='int', default=30),
- force = dict(type='bool', default='no'),
- state = dict(default='present', choices=['present', 'absent', 'stopped', 'started', 'restarted']),
- )
+ argument_spec = dict(
+ api_host = dict(required=True),
+ api_user = dict(required=True),
+ api_password = dict(no_log=True),
+ vmid = dict(required=False),
+ validate_certs = dict(type='bool', default='no'),
+ node = dict(),
+ pool = dict(),
+ password = dict(no_log=True),
+ hostname = dict(),
+ ostemplate = dict(),
+ disk = dict(type='str', default='3'),
+ cpus = dict(type='int', default=1),
+ memory = dict(type='int', default=512),
+ swap = dict(type='int', default=0),
+ netif = dict(type='dict'),
+ mounts = dict(type='dict'),
+ ip_address = dict(),
+ onboot = dict(type='bool', default='no'),
+ storage = dict(default='local'),
+ cpuunits = dict(type='int', default=1000),
+ nameserver = dict(),
+ searchdomain = dict(),
+ timeout = dict(type='int', default=30),
+ force = dict(type='bool', default='no'),
+ state = dict(default='present', choices=['present', 'absent', 'stopped', 'started', 'restarted']),
+ )
)
if not HAS_PROXMOXER:
diff --git a/lib/ansible/modules/cloud/misc/proxmox_kvm.py b/lib/ansible/modules/cloud/misc/proxmox_kvm.py
index 85b595317a9..25d80fff69b 100644
--- a/lib/ansible/modules/cloud/misc/proxmox_kvm.py
+++ b/lib/ansible/modules/cloud/misc/proxmox_kvm.py
@@ -795,71 +795,71 @@ def stop_vm(module, proxmox, vm, vmid, timeout, force):
def main():
module = AnsibleModule(
- argument_spec = dict(
- acpi = dict(type='bool', default='yes'),
- agent = dict(type='bool'),
- args = dict(type='str', default=None),
- api_host = dict(required=True),
- api_user = dict(required=True),
- api_password = dict(no_log=True),
- autostart = dict(type='bool', default='no'),
- balloon = dict(type='int',default=0),
- bios = dict(choices=['seabios', 'ovmf']),
- boot = dict(type='str', default='cnd'),
- bootdisk = dict(type='str'),
- cores = dict(type='int', default=1),
- cpu = dict(type='str', default='kvm64'),
- cpulimit = dict(type='int'),
- cpuunits = dict(type='int', default=1000),
- delete = dict(type='str'),
- description = dict(type='str'),
- digest = dict(type='str'),
- force = dict(type='bool', default=None),
- freeze = dict(type='bool'),
- hostpci = dict(type='dict'),
- hotplug = dict(type='str'),
- hugepages = dict(choices=['any', '2', '1024']),
- ide = dict(type='dict', default=None),
- keyboard = dict(type='str'),
- kvm = dict(type='bool', default='yes'),
- localtime = dict(type='bool'),
- lock = dict(choices=['migrate', 'backup', 'snapshot', 'rollback']),
- machine = dict(type='str'),
- memory = dict(type='int', default=512),
- migrate_downtime = dict(type='int'),
- migrate_speed = dict(type='int'),
- name = dict(type='str'),
- net = dict(type='dict'),
- node = dict(),
- numa = dict(type='dict'),
- onboot = dict(type='bool', default='yes'),
- ostype = dict(default='l26', choices=['other', 'wxp', 'w2k', 'w2k3', 'w2k8', 'wvista', 'win7', 'win8', 'l24', 'l26', 'solaris']),
- parallel = dict(type='dict'),
- protection = dict(type='bool'),
- reboot = dict(type='bool'),
- revert = dict(),
- sata = dict(type='dict'),
- scsi = dict(type='dict'),
- scsihw = dict(choices=['lsi', 'lsi53c810', 'virtio-scsi-pci', 'virtio-scsi-single', 'megasas', 'pvscsi']),
- serial = dict(type='dict'),
- shares = dict(type='int'),
- skiplock = dict(type='bool'),
- smbios = dict(type='str'),
- sockets = dict(type='int', default=1),
- startdate = dict(type='str'),
- startup = dict(),
- state = dict(default='present', choices=['present', 'absent', 'stopped', 'started', 'restarted', 'current']),
- tablet = dict(type='bool', default='no'),
- tdf = dict(type='bool'),
- template = dict(type='bool', default='no'),
- timeout = dict(type='int', default=30),
- validate_certs = dict(type='bool', default='no'),
- vcpus = dict(type='int', default=None),
- vga = dict(default='std', choices=['std', 'cirrus', 'vmware', 'qxl', 'serial0', 'serial1', 'serial2', 'serial3', 'qxl2', 'qxl3', 'qxl4']),
- virtio = dict(type='dict', default=None),
- vmid = dict(type='int', default=None),
- watchdog = dict(),
- )
+ argument_spec = dict(
+ acpi = dict(type='bool', default='yes'),
+ agent = dict(type='bool'),
+ args = dict(type='str', default=None),
+ api_host = dict(required=True),
+ api_user = dict(required=True),
+ api_password = dict(no_log=True),
+ autostart = dict(type='bool', default='no'),
+ balloon = dict(type='int',default=0),
+ bios = dict(choices=['seabios', 'ovmf']),
+ boot = dict(type='str', default='cnd'),
+ bootdisk = dict(type='str'),
+ cores = dict(type='int', default=1),
+ cpu = dict(type='str', default='kvm64'),
+ cpulimit = dict(type='int'),
+ cpuunits = dict(type='int', default=1000),
+ delete = dict(type='str'),
+ description = dict(type='str'),
+ digest = dict(type='str'),
+ force = dict(type='bool', default=None),
+ freeze = dict(type='bool'),
+ hostpci = dict(type='dict'),
+ hotplug = dict(type='str'),
+ hugepages = dict(choices=['any', '2', '1024']),
+ ide = dict(type='dict', default=None),
+ keyboard = dict(type='str'),
+ kvm = dict(type='bool', default='yes'),
+ localtime = dict(type='bool'),
+ lock = dict(choices=['migrate', 'backup', 'snapshot', 'rollback']),
+ machine = dict(type='str'),
+ memory = dict(type='int', default=512),
+ migrate_downtime = dict(type='int'),
+ migrate_speed = dict(type='int'),
+ name = dict(type='str'),
+ net = dict(type='dict'),
+ node = dict(),
+ numa = dict(type='dict'),
+ onboot = dict(type='bool', default='yes'),
+ ostype = dict(default='l26', choices=['other', 'wxp', 'w2k', 'w2k3', 'w2k8', 'wvista', 'win7', 'win8', 'l24', 'l26', 'solaris']),
+ parallel = dict(type='dict'),
+ protection = dict(type='bool'),
+ reboot = dict(type='bool'),
+ revert = dict(),
+ sata = dict(type='dict'),
+ scsi = dict(type='dict'),
+ scsihw = dict(choices=['lsi', 'lsi53c810', 'virtio-scsi-pci', 'virtio-scsi-single', 'megasas', 'pvscsi']),
+ serial = dict(type='dict'),
+ shares = dict(type='int'),
+ skiplock = dict(type='bool'),
+ smbios = dict(type='str'),
+ sockets = dict(type='int', default=1),
+ startdate = dict(type='str'),
+ startup = dict(),
+ state = dict(default='present', choices=['present', 'absent', 'stopped', 'started', 'restarted', 'current']),
+ tablet = dict(type='bool', default='no'),
+ tdf = dict(type='bool'),
+ template = dict(type='bool', default='no'),
+ timeout = dict(type='int', default=30),
+ validate_certs = dict(type='bool', default='no'),
+ vcpus = dict(type='int', default=None),
+ vga = dict(default='std', choices=['std', 'cirrus', 'vmware', 'qxl', 'serial0', 'serial1', 'serial2', 'serial3', 'qxl2', 'qxl3', 'qxl4']),
+ virtio = dict(type='dict', default=None),
+ vmid = dict(type='int', default=None),
+ watchdog = dict(),
+ )
)
if not HAS_PROXMOXER:
diff --git a/lib/ansible/modules/cloud/misc/proxmox_template.py b/lib/ansible/modules/cloud/misc/proxmox_template.py
index 64c9b96cb62..e46a167fc99 100644
--- a/lib/ansible/modules/cloud/misc/proxmox_template.py
+++ b/lib/ansible/modules/cloud/misc/proxmox_template.py
@@ -179,20 +179,20 @@ def delete_template(module, proxmox, node, storage, content_type, template, time
def main():
module = AnsibleModule(
- argument_spec = dict(
- api_host = dict(required=True),
- api_user = dict(required=True),
- api_password = dict(no_log=True),
- validate_certs = dict(type='bool', default='no'),
- node = dict(),
- src = dict(),
- template = dict(),
- content_type = dict(default='vztmpl', choices=['vztmpl','iso']),
- storage = dict(default='local'),
- timeout = dict(type='int', default=30),
- force = dict(type='bool', default='no'),
- state = dict(default='present', choices=['present', 'absent']),
- )
+ argument_spec = dict(
+ api_host = dict(required=True),
+ api_user = dict(required=True),
+ api_password = dict(no_log=True),
+ validate_certs = dict(type='bool', default='no'),
+ node = dict(),
+ src = dict(),
+ template = dict(),
+ content_type = dict(default='vztmpl', choices=['vztmpl','iso']),
+ storage = dict(default='local'),
+ timeout = dict(type='int', default=30),
+ force = dict(type='bool', default='no'),
+ state = dict(default='present', choices=['present', 'absent']),
+ )
)
if not HAS_PROXMOXER:
diff --git a/lib/ansible/modules/cloud/misc/virt.py b/lib/ansible/modules/cloud/misc/virt.py
index 1a907ca1749..4227aae43f3 100644
--- a/lib/ansible/modules/cloud/misc/virt.py
+++ b/lib/ansible/modules/cloud/misc/virt.py
@@ -132,13 +132,13 @@ ALL_COMMANDS.extend(VM_COMMANDS)
ALL_COMMANDS.extend(HOST_COMMANDS)
VIRT_STATE_NAME_MAP = {
- 0 : "running",
- 1 : "running",
- 2 : "running",
- 3 : "paused",
- 4 : "shutdown",
- 5 : "shutdown",
- 6 : "crashed"
+ 0 : "running",
+ 1 : "running",
+ 2 : "running",
+ 3 : "paused",
+ 4 : "shutdown",
+ 5 : "shutdown",
+ 6 : "crashed"
}
class VMNotFound(Exception):
diff --git a/lib/ansible/modules/cloud/openstack/_glance_image.py b/lib/ansible/modules/cloud/openstack/_glance_image.py
index d915da8a566..18b960bbf9d 100644
--- a/lib/ansible/modules/cloud/openstack/_glance_image.py
+++ b/lib/ansible/modules/cloud/openstack/_glance_image.py
@@ -173,7 +173,7 @@ def _get_glance_client(module, kwargs):
token = _ksclient.auth_token
endpoint =_get_endpoint(module, _ksclient, kwargs.get('endpoint_type'))
kwargs = {
- 'token': token,
+ 'token': token,
}
try:
client = glanceclient.Client('1', endpoint, **kwargs)
@@ -194,12 +194,12 @@ def _glance_image_present(module, params, client):
def _glance_image_create(module, params, client):
kwargs = {
- 'name': params.get('name'),
- 'disk_format': params.get('disk_format'),
- 'container_format': params.get('container_format'),
- 'owner': params.get('owner'),
- 'is_public': params.get('is_public'),
- 'copy_from': params.get('copy_from'),
+ 'name': params.get('name'),
+ 'disk_format': params.get('disk_format'),
+ 'container_format': params.get('container_format'),
+ 'owner': params.get('owner'),
+ 'is_public': params.get('is_public'),
+ 'copy_from': params.get('copy_from'),
}
try:
timeout = float(params.get('timeout'))
diff --git a/lib/ansible/modules/cloud/openstack/_keystone_user.py b/lib/ansible/modules/cloud/openstack/_keystone_user.py
index 202adc63f6d..f563974d5fa 100644
--- a/lib/ansible/modules/cloud/openstack/_keystone_user.py
+++ b/lib/ansible/modules/cloud/openstack/_keystone_user.py
@@ -332,19 +332,19 @@ def main():
argument_spec = openstack_argument_spec()
argument_spec.update(dict(
- tenant_description=dict(required=False),
- email=dict(required=False),
- user=dict(required=False),
- tenant=dict(required=False),
- password=dict(required=False),
- role=dict(required=False),
- state=dict(default='present', choices=['present', 'absent']),
- endpoint=dict(required=False,
+ tenant_description=dict(required=False),
+ email=dict(required=False),
+ user=dict(required=False),
+ tenant=dict(required=False),
+ password=dict(required=False),
+ role=dict(required=False),
+ state=dict(default='present', choices=['present', 'absent']),
+ endpoint=dict(required=False,
default="http://127.0.0.1:35357/v2.0"),
- token=dict(required=False),
- login_user=dict(required=False),
- login_password=dict(required=False),
- login_tenant_name=dict(required=False)
+ token=dict(required=False),
+ login_user=dict(required=False),
+ login_password=dict(required=False),
+ login_tenant_name=dict(required=False)
))
# keystone operations themselves take an endpoint, not a keystone auth_url
del(argument_spec['auth_url'])
diff --git a/lib/ansible/modules/cloud/openstack/_nova_compute.py b/lib/ansible/modules/cloud/openstack/_nova_compute.py
index 56252feea7f..fd22545f37e 100644
--- a/lib/ansible/modules/cloud/openstack/_nova_compute.py
+++ b/lib/ansible/modules/cloud/openstack/_nova_compute.py
@@ -428,12 +428,12 @@ def _create_server(module, nova):
flavor_id = _get_flavor_id(module, nova)
bootargs = [module.params['name'], image_id, flavor_id]
bootkwargs = {
- 'nics' : module.params['nics'],
- 'meta' : module.params['meta'],
- 'security_groups': module.params['security_groups'].split(','),
- #userdata is unhyphenated in novaclient, but hyphenated here for consistency with the ec2 module:
- 'userdata': module.params['user_data'],
- 'config_drive': module.params['config_drive'],
+ 'nics' : module.params['nics'],
+ 'meta' : module.params['meta'],
+ 'security_groups': module.params['security_groups'].split(','),
+ #userdata is unhyphenated in novaclient, but hyphenated here for consistency with the ec2 module:
+ 'userdata': module.params['user_data'],
+ 'config_drive': module.params['config_drive'],
}
for optional_param in ('region_name', 'key_name', 'availability_zone', 'scheduler_hints'):
diff --git a/lib/ansible/modules/cloud/openstack/_quantum_floating_ip.py b/lib/ansible/modules/cloud/openstack/_quantum_floating_ip.py
index 6171a553ac9..c6aee1f4ebd 100644
--- a/lib/ansible/modules/cloud/openstack/_quantum_floating_ip.py
+++ b/lib/ansible/modules/cloud/openstack/_quantum_floating_ip.py
@@ -136,8 +136,8 @@ def _get_neutron_client(module, kwargs):
token = _ksclient.auth_token
endpoint = _get_endpoint(module, _ksclient)
kwargs = {
- 'token': token,
- 'endpoint_url': endpoint
+ 'token': token,
+ 'endpoint_url': endpoint
}
try:
neutron = client.Client('2.0', **kwargs)
@@ -174,7 +174,7 @@ def _get_port_info(neutron, module, instance_id, internal_network_name=None):
subnets = neutron.list_subnets(**kwargs)
subnet_id = subnets['subnets'][0]['id']
kwargs = {
- 'device_id': instance_id,
+ 'device_id': instance_id,
}
try:
ports = neutron.list_ports(**kwargs)
@@ -193,7 +193,7 @@ def _get_port_info(neutron, module, instance_id, internal_network_name=None):
def _get_floating_ip(module, neutron, fixed_ip_address, network_name):
kwargs = {
- 'fixed_ip_address': fixed_ip_address
+ 'fixed_ip_address': fixed_ip_address
}
try:
ips = neutron.list_floatingips(**kwargs)
@@ -214,9 +214,9 @@ def _check_ips_network(neutron, net_id, network_name):
def _create_floating_ip(neutron, module, port_id, net_id, fixed_ip):
kwargs = {
- 'port_id': port_id,
- 'floating_network_id': net_id,
- 'fixed_ip_address': fixed_ip
+ 'port_id': port_id,
+ 'floating_network_id': net_id,
+ 'fixed_ip_address': fixed_ip
}
try:
result = neutron.create_floatingip({'floatingip': kwargs})
@@ -251,10 +251,10 @@ def main():
argument_spec = openstack_argument_spec()
argument_spec.update(dict(
- network_name = dict(required=True),
- instance_name = dict(required=True),
- state = dict(default='present', choices=['absent', 'present']),
- internal_network_name = dict(default=None),
+ network_name = dict(required=True),
+ instance_name = dict(required=True),
+ state = dict(default='present', choices=['absent', 'present']),
+ internal_network_name = dict(default=None),
))
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/openstack/_quantum_floating_ip_associate.py b/lib/ansible/modules/cloud/openstack/_quantum_floating_ip_associate.py
index 55bf1c0b35d..090f65ef4d9 100644
--- a/lib/ansible/modules/cloud/openstack/_quantum_floating_ip_associate.py
+++ b/lib/ansible/modules/cloud/openstack/_quantum_floating_ip_associate.py
@@ -125,8 +125,8 @@ def _get_neutron_client(module, kwargs):
token = _ksclient.auth_token
endpoint = _get_endpoint(module, _ksclient)
kwargs = {
- 'token': token,
- 'endpoint_url': endpoint
+ 'token': token,
+ 'endpoint_url': endpoint
}
try:
neutron = client.Client('2.0', **kwargs)
@@ -191,9 +191,9 @@ def main():
argument_spec = openstack_argument_spec()
argument_spec.update(dict(
- ip_address = dict(required=True),
- instance_name = dict(required=True),
- state = dict(default='present', choices=['absent', 'present'])
+ ip_address = dict(required=True),
+ instance_name = dict(required=True),
+ state = dict(default='present', choices=['absent', 'present'])
))
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/openstack/_quantum_network.py b/lib/ansible/modules/cloud/openstack/_quantum_network.py
index 3a2c754b2ea..ce31ff76ddf 100644
--- a/lib/ansible/modules/cloud/openstack/_quantum_network.py
+++ b/lib/ansible/modules/cloud/openstack/_quantum_network.py
@@ -167,8 +167,8 @@ def _get_neutron_client(module, kwargs):
token = _ksclient.auth_token
endpoint = _get_endpoint(module, _ksclient)
kwargs = {
- 'token': token,
- 'endpoint_url': endpoint
+ 'token': token,
+ 'endpoint_url': endpoint
}
try:
neutron = client.Client('2.0', **kwargs)
@@ -192,8 +192,8 @@ def _set_tenant_id(module):
def _get_net_id(neutron, module):
kwargs = {
- 'tenant_id': _os_tenant_id,
- 'name': module.params['name'],
+ 'tenant_id': _os_tenant_id,
+ 'name': module.params['name'],
}
try:
networks = neutron.list_networks(**kwargs)
@@ -251,15 +251,15 @@ def main():
argument_spec = openstack_argument_spec()
argument_spec.update(dict(
- name = dict(required=True),
- tenant_name = dict(default=None),
- provider_network_type = dict(default=None, choices=['local', 'vlan', 'flat', 'gre']),
- provider_physical_network = dict(default=None),
- provider_segmentation_id = dict(default=None),
- router_external = dict(default=False, type='bool'),
- shared = dict(default=False, type='bool'),
- admin_state_up = dict(default=True, type='bool'),
- state = dict(default='present', choices=['absent', 'present'])
+ name = dict(required=True),
+ tenant_name = dict(default=None),
+ provider_network_type = dict(default=None, choices=['local', 'vlan', 'flat', 'gre']),
+ provider_physical_network = dict(default=None),
+ provider_segmentation_id = dict(default=None),
+ router_external = dict(default=False, type='bool'),
+ shared = dict(default=False, type='bool'),
+ admin_state_up = dict(default=True, type='bool'),
+ state = dict(default='present', choices=['absent', 'present'])
))
module = AnsibleModule(argument_spec=argument_spec)
diff --git a/lib/ansible/modules/cloud/openstack/_quantum_router.py b/lib/ansible/modules/cloud/openstack/_quantum_router.py
index 6726ca20a6e..3ba05c9fded 100644
--- a/lib/ansible/modules/cloud/openstack/_quantum_router.py
+++ b/lib/ansible/modules/cloud/openstack/_quantum_router.py
@@ -129,8 +129,8 @@ def _get_neutron_client(module, kwargs):
token = _ksclient.auth_token
endpoint = _get_endpoint(module, _ksclient)
kwargs = {
- 'token': token,
- 'endpoint_url': endpoint
+ 'token': token,
+ 'endpoint_url': endpoint
}
try:
neutron = client.Client('2.0', **kwargs)
@@ -154,8 +154,8 @@ def _set_tenant_id(module):
def _get_router_id(module, neutron):
kwargs = {
- 'name': module.params['name'],
- 'tenant_id': _os_tenant_id,
+ 'name': module.params['name'],
+ 'tenant_id': _os_tenant_id,
}
try:
routers = neutron.list_routers(**kwargs)
@@ -167,9 +167,9 @@ def _get_router_id(module, neutron):
def _create_router(module, neutron):
router = {
- 'name': module.params['name'],
- 'tenant_id': _os_tenant_id,
- 'admin_state_up': module.params['admin_state_up'],
+ 'name': module.params['name'],
+ 'tenant_id': _os_tenant_id,
+ 'admin_state_up': module.params['admin_state_up'],
}
try:
new_router = neutron.create_router(dict(router=router))
diff --git a/lib/ansible/modules/cloud/openstack/_quantum_router_gateway.py b/lib/ansible/modules/cloud/openstack/_quantum_router_gateway.py
index 7568d297a69..68159985f34 100644
--- a/lib/ansible/modules/cloud/openstack/_quantum_router_gateway.py
+++ b/lib/ansible/modules/cloud/openstack/_quantum_router_gateway.py
@@ -123,8 +123,8 @@ def _get_neutron_client(module, kwargs):
token = _ksclient.auth_token
endpoint = _get_endpoint(module, _ksclient)
kwargs = {
- 'token': token,
- 'endpoint_url': endpoint
+ 'token': token,
+ 'endpoint_url': endpoint
}
try:
neutron = client.Client('2.0', **kwargs)
@@ -134,7 +134,7 @@ def _get_neutron_client(module, kwargs):
def _get_router_id(module, neutron):
kwargs = {
- 'name': module.params['router_name'],
+ 'name': module.params['router_name'],
}
try:
routers = neutron.list_routers(**kwargs)
@@ -191,9 +191,9 @@ def main():
argument_spec = openstack_argument_spec()
argument_spec.update(dict(
- router_name = dict(required=True),
- network_name = dict(required=True),
- state = dict(default='present', choices=['absent', 'present']),
+ router_name = dict(required=True),
+ network_name = dict(required=True),
+ state = dict(default='present', choices=['absent', 'present']),
))
module = AnsibleModule(argument_spec=argument_spec)
if not HAVE_DEPS:
diff --git a/lib/ansible/modules/cloud/openstack/_quantum_router_interface.py b/lib/ansible/modules/cloud/openstack/_quantum_router_interface.py
index 9af05b1b44a..5460f427cbd 100644
--- a/lib/ansible/modules/cloud/openstack/_quantum_router_interface.py
+++ b/lib/ansible/modules/cloud/openstack/_quantum_router_interface.py
@@ -132,8 +132,8 @@ def _get_neutron_client(module, kwargs):
token = _ksclient.auth_token
endpoint = _get_endpoint(module, _ksclient)
kwargs = {
- 'token': token,
- 'endpoint_url': endpoint
+ 'token': token,
+ 'endpoint_url': endpoint
}
try:
neutron = client.Client('2.0', **kwargs)
@@ -171,8 +171,8 @@ def _get_router_id(module, neutron):
def _get_subnet_id(module, neutron):
subnet_id = None
kwargs = {
- 'tenant_id': _os_tenant_id,
- 'name': module.params['subnet_name'],
+ 'tenant_id': _os_tenant_id,
+ 'name': module.params['subnet_name'],
}
try:
subnets = neutron.list_subnets(**kwargs)
@@ -184,8 +184,8 @@ def _get_subnet_id(module, neutron):
def _get_port_id(neutron, module, router_id, subnet_id):
kwargs = {
- 'tenant_id': _os_tenant_id,
- 'device_id': router_id,
+ 'tenant_id': _os_tenant_id,
+ 'device_id': router_id,
}
try:
ports = neutron.list_ports(**kwargs)
@@ -222,10 +222,10 @@ def _remove_interface_router(neutron, module, router_id, subnet_id):
def main():
argument_spec = openstack_argument_spec()
argument_spec.update(dict(
- router_name = dict(required=True),
- subnet_name = dict(required=True),
- tenant_name = dict(default=None),
- state = dict(default='present', choices=['absent', 'present']),
+ router_name = dict(required=True),
+ subnet_name = dict(required=True),
+ tenant_name = dict(default=None),
+ state = dict(default='present', choices=['absent', 'present']),
))
module = AnsibleModule(argument_spec=argument_spec)
if not HAVE_DEPS:
diff --git a/lib/ansible/modules/cloud/openstack/_quantum_subnet.py b/lib/ansible/modules/cloud/openstack/_quantum_subnet.py
index f59919a464a..ab1a6d4140e 100644
--- a/lib/ansible/modules/cloud/openstack/_quantum_subnet.py
+++ b/lib/ansible/modules/cloud/openstack/_quantum_subnet.py
@@ -168,8 +168,8 @@ def _get_neutron_client(module, kwargs):
token = _ksclient.auth_token
endpoint = _get_endpoint(module, _ksclient)
kwargs = {
- 'token': token,
- 'endpoint_url': endpoint
+ 'token': token,
+ 'endpoint_url': endpoint
}
try:
neutron = client.Client('2.0', **kwargs)
@@ -227,14 +227,14 @@ def _get_subnet_id(module, neutron):
def _create_subnet(module, neutron):
neutron.format = 'json'
subnet = {
- 'name': module.params['name'],
- 'ip_version': module.params['ip_version'],
- 'enable_dhcp': module.params['enable_dhcp'],
- 'tenant_id': _os_tenant_id,
- 'gateway_ip': module.params['gateway_ip'],
- 'dns_nameservers': module.params['dns_nameservers'],
- 'network_id': _os_network_id,
- 'cidr': module.params['cidr'],
+ 'name': module.params['name'],
+ 'ip_version': module.params['ip_version'],
+ 'enable_dhcp': module.params['enable_dhcp'],
+ 'tenant_id': _os_tenant_id,
+ 'gateway_ip': module.params['gateway_ip'],
+ 'dns_nameservers': module.params['dns_nameservers'],
+ 'network_id': _os_network_id,
+ 'cidr': module.params['cidr'],
}
if module.params['allocation_pool_start'] and module.params['allocation_pool_end']:
allocation_pools = [
@@ -269,17 +269,17 @@ def main():
argument_spec = openstack_argument_spec()
argument_spec.update(dict(
- name = dict(required=True),
- network_name = dict(required=True),
- cidr = dict(required=True),
- tenant_name = dict(default=None),
- state = dict(default='present', choices=['absent', 'present']),
- ip_version = dict(default='4', choices=['4', '6']),
- enable_dhcp = dict(default='true', type='bool'),
- gateway_ip = dict(default=None),
- dns_nameservers = dict(default=None),
- allocation_pool_start = dict(default=None),
- allocation_pool_end = dict(default=None),
+ name = dict(required=True),
+ network_name = dict(required=True),
+ cidr = dict(required=True),
+ tenant_name = dict(default=None),
+ state = dict(default='present', choices=['absent', 'present']),
+ ip_version = dict(default='4', choices=['4', '6']),
+ enable_dhcp = dict(default='true', type='bool'),
+ gateway_ip = dict(default=None),
+ dns_nameservers = dict(default=None),
+ allocation_pool_start = dict(default=None),
+ allocation_pool_end = dict(default=None),
))
module = AnsibleModule(argument_spec=argument_spec)
if not HAVE_DEPS:
diff --git a/lib/ansible/modules/cloud/openstack/os_auth.py b/lib/ansible/modules/cloud/openstack/os_auth.py
index bcc95aaaa1f..1d1aadb9f22 100644
--- a/lib/ansible/modules/cloud/openstack/os_auth.py
+++ b/lib/ansible/modules/cloud/openstack/os_auth.py
@@ -64,8 +64,8 @@ def main():
module.exit_json(
changed=False,
ansible_facts=dict(
- auth_token=cloud.auth_token,
- service_catalog=cloud.service_catalog))
+ auth_token=cloud.auth_token,
+ service_catalog=cloud.service_catalog))
except shade.OpenStackCloudException as e:
module.fail_json(msg=str(e))
diff --git a/lib/ansible/modules/cloud/openstack/os_quota.py b/lib/ansible/modules/cloud/openstack/os_quota.py
index 0de7d1d322f..407afe0e6a6 100644
--- a/lib/ansible/modules/cloud/openstack/os_quota.py
+++ b/lib/ansible/modules/cloud/openstack/os_quota.py
@@ -345,9 +345,9 @@ def _system_state_change(module, project_quota_output):
"""
changes_required, quota_change_request = _system_state_change_details(
- module,
- project_quota_output
- )
+ module,
+ project_quota_output
+ )
if changes_required:
return True
@@ -452,9 +452,9 @@ def main():
module.exit_json(changed=_system_state_change(module, project_quota_output))
changes_required, quota_change_request = _system_state_change_details(
- module,
- project_quota_output
- )
+ module,
+ project_quota_output
+ )
if changes_required:
for quota_type in quota_change_request.keys():
diff --git a/lib/ansible/modules/cloud/openstack/os_recordset.py b/lib/ansible/modules/cloud/openstack/os_recordset.py
index 62fa8564102..2a13a94fde2 100644
--- a/lib/ansible/modules/cloud/openstack/os_recordset.py
+++ b/lib/ansible/modules/cloud/openstack/os_recordset.py
@@ -215,10 +215,10 @@ def main():
zone, pre_update_recordset)
if changed:
zone = cloud.update_recordset(
- zone, name + '.' + zone,
- records=records,
- description=description,
- ttl=ttl)
+ zone, name + '.' + zone,
+ records=records,
+ description=description,
+ ttl=ttl)
module.exit_json(changed=changed, recordset=recordset)
elif state == 'absent':
diff --git a/lib/ansible/modules/cloud/openstack/os_zone.py b/lib/ansible/modules/cloud/openstack/os_zone.py
index 51d59ec1955..6174cb4eccf 100644
--- a/lib/ansible/modules/cloud/openstack/os_zone.py
+++ b/lib/ansible/modules/cloud/openstack/os_zone.py
@@ -212,9 +212,9 @@ def main():
masters, pre_update_zone)
if changed:
zone = cloud.update_zone(
- name, email=email,
- description=description,
- ttl=ttl, masters=masters)
+ name, email=email,
+ description=description,
+ ttl=ttl, masters=masters)
module.exit_json(changed=changed, zone=zone)
elif state == 'absent':
diff --git a/lib/ansible/modules/cloud/packet/packet_sshkey.py b/lib/ansible/modules/cloud/packet/packet_sshkey.py
index b17ad7bf87a..2d0d580ec67 100644
--- a/lib/ansible/modules/cloud/packet/packet_sshkey.py
+++ b/lib/ansible/modules/cloud/packet/packet_sshkey.py
@@ -202,7 +202,7 @@ def act_on_sshkeys(target_state, module, packet_conn):
raise Exception(_msg)
matching_sshkeys = []
new_key_response = packet_conn.create_ssh_key(
- newkey['label'], newkey['key'])
+ newkey['label'], newkey['key'])
changed = True
matching_sshkeys.append(new_key_response)
diff --git a/lib/ansible/modules/cloud/softlayer/sl_vm.py b/lib/ansible/modules/cloud/softlayer/sl_vm.py
index bb76a203b32..63c5ebe5d76 100644
--- a/lib/ansible/modules/cloud/softlayer/sl_vm.py
+++ b/lib/ansible/modules/cloud/softlayer/sl_vm.py
@@ -260,9 +260,9 @@ except ImportError:
def create_virtual_instance(module):
instances = vsManager.list_instances(
- hostname = module.params.get('hostname'),
- domain = module.params.get('domain'),
- datacenter = module.params.get('datacenter')
+ hostname = module.params.get('hostname'),
+ domain = module.params.get('domain'),
+ datacenter = module.params.get('datacenter')
)
if instances:
@@ -283,24 +283,24 @@ def create_virtual_instance(module):
tags = ','.join(map(str, module.params.get('tags')))
instance = vsManager.create_instance(
- hostname = module.params.get('hostname'),
- domain = module.params.get('domain'),
- cpus = module.params.get('cpus'),
- memory = module.params.get('memory'),
- hourly = module.params.get('hourly'),
- datacenter = module.params.get('datacenter'),
- os_code = module.params.get('os_code'),
- image_id = module.params.get('image_id'),
- local_disk = module.params.get('local_disk'),
- disks = module.params.get('disks'),
- ssh_keys = module.params.get('ssh_keys'),
- nic_speed = module.params.get('nic_speed'),
- private = module.params.get('private'),
- public_vlan = module.params.get('public_vlan'),
- private_vlan = module.params.get('private_vlan'),
- dedicated = module.params.get('dedicated'),
- post_uri = module.params.get('post_uri'),
- tags = tags)
+ hostname = module.params.get('hostname'),
+ domain = module.params.get('domain'),
+ cpus = module.params.get('cpus'),
+ memory = module.params.get('memory'),
+ hourly = module.params.get('hourly'),
+ datacenter = module.params.get('datacenter'),
+ os_code = module.params.get('os_code'),
+ image_id = module.params.get('image_id'),
+ local_disk = module.params.get('local_disk'),
+ disks = module.params.get('disks'),
+ ssh_keys = module.params.get('ssh_keys'),
+ nic_speed = module.params.get('nic_speed'),
+ private = module.params.get('private'),
+ public_vlan = module.params.get('public_vlan'),
+ private_vlan = module.params.get('private_vlan'),
+ dedicated = module.params.get('dedicated'),
+ post_uri = module.params.get('post_uri'),
+ tags = tags)
if instance is not None and instance['id'] > 0:
return True, instance
@@ -349,30 +349,30 @@ def cancel_instance(module):
def main():
module = AnsibleModule(
- argument_spec=dict(
- instance_id=dict(),
- hostname=dict(),
- domain=dict(),
- datacenter=dict(choices=DATACENTERS),
- tags=dict(),
- hourly=dict(type='bool', default=True),
- private=dict(type='bool', default=False),
- dedicated=dict(type='bool', default=False),
- local_disk=dict(type='bool', default=True),
- cpus=dict(type='int', choices=CPU_SIZES),
- memory=dict(type='int', choices=MEMORY_SIZES),
- disks=dict(type='list', default=[25]),
- os_code=dict(),
- image_id=dict(),
- nic_speed=dict(type='int', choices=NIC_SPEEDS),
- public_vlan=dict(),
- private_vlan=dict(),
- ssh_keys=dict(type='list', default=[]),
- post_uri=dict(),
- state=dict(default='present', choices=STATES),
- wait=dict(type='bool', default=True),
- wait_time=dict(type='int', default=600)
- )
+ argument_spec=dict(
+ instance_id=dict(),
+ hostname=dict(),
+ domain=dict(),
+ datacenter=dict(choices=DATACENTERS),
+ tags=dict(),
+ hourly=dict(type='bool', default=True),
+ private=dict(type='bool', default=False),
+ dedicated=dict(type='bool', default=False),
+ local_disk=dict(type='bool', default=True),
+ cpus=dict(type='int', choices=CPU_SIZES),
+ memory=dict(type='int', choices=MEMORY_SIZES),
+ disks=dict(type='list', default=[25]),
+ os_code=dict(),
+ image_id=dict(),
+ nic_speed=dict(type='int', choices=NIC_SPEEDS),
+ public_vlan=dict(),
+ private_vlan=dict(),
+ ssh_keys=dict(type='list', default=[]),
+ post_uri=dict(),
+ state=dict(default='present', choices=STATES),
+ wait=dict(type='bool', default=True),
+ wait_time=dict(type='int', default=600)
+ )
)
if not HAS_SL:
diff --git a/lib/ansible/modules/cloud/vmware/vmware_guest.py b/lib/ansible/modules/cloud/vmware/vmware_guest.py
index d61f807093f..ba59d748513 100644
--- a/lib/ansible/modules/cloud/vmware/vmware_guest.py
+++ b/lib/ansible/modules/cloud/vmware/vmware_guest.py
@@ -408,9 +408,9 @@ class PyVmomiDeviceHelper(object):
@staticmethod
def is_scsi_controller(device):
return isinstance(device, vim.vm.device.VirtualLsiLogicController) or \
- isinstance(device, vim.vm.device.ParaVirtualSCSIController) or \
- isinstance(device, vim.vm.device.VirtualBusLogicController) or \
- isinstance(device, vim.vm.device.VirtualLsiLogicSASController)
+ isinstance(device, vim.vm.device.ParaVirtualSCSIController) or \
+ isinstance(device, vim.vm.device.VirtualBusLogicController) or \
+ isinstance(device, vim.vm.device.VirtualLsiLogicSASController)
def create_scsi_disk(self, scsi_ctl, disk_index=None):
diskspec = vim.vm.device.VirtualDeviceSpec()
diff --git a/lib/ansible/modules/cloud/vmware/vmware_local_user_manager.py b/lib/ansible/modules/cloud/vmware/vmware_local_user_manager.py
index ac52b57465a..dff87c00ac3 100644
--- a/lib/ansible/modules/cloud/vmware/vmware_local_user_manager.py
+++ b/lib/ansible/modules/cloud/vmware/vmware_local_user_manager.py
@@ -91,8 +91,8 @@ class VMwareLocalUserManager(object):
try:
local_account_manager_states = {
'absent': {
- 'present': self.state_remove_user,
- 'absent': self.state_exit_unchanged,
+ 'present': self.state_remove_user,
+ 'absent': self.state_exit_unchanged,
},
'present': {
'present': self.state_update_user,
diff --git a/lib/ansible/modules/cloud/webfaction/webfaction_site.py b/lib/ansible/modules/cloud/webfaction/webfaction_site.py
index 7a28f40cdb0..f4a81d6f52c 100644
--- a/lib/ansible/modules/cloud/webfaction/webfaction_site.py
+++ b/lib/ansible/modules/cloud/webfaction/webfaction_site.py
@@ -178,8 +178,8 @@ def main():
if not module.check_mode:
# If this isn't a dry run, create or modify the site
result.update(
- webfaction.create_website(
- *positional_args
+ webfaction.create_website(
+ *positional_args
) if not existing_site else webfaction.update_website (
*positional_args
)
diff --git a/lib/ansible/modules/clustering/consul.py b/lib/ansible/modules/clustering/consul.py
index 8618dbbd4ad..6caa5e9e502 100644
--- a/lib/ansible/modules/clustering/consul.py
+++ b/lib/ansible/modules/clustering/consul.py
@@ -366,18 +366,18 @@ def parse_check(module):
if module.params.get('check_id') or module.params.get('script') or module.params.get('ttl') or module.params.get('http'):
return ConsulCheck(
- module.params.get('check_id'),
- module.params.get('check_name'),
- module.params.get('check_node'),
- module.params.get('check_host'),
- module.params.get('script'),
- module.params.get('interval'),
- module.params.get('ttl'),
- module.params.get('notes'),
- module.params.get('http'),
- module.params.get('timeout'),
- module.params.get('service_id'),
- )
+ module.params.get('check_id'),
+ module.params.get('check_name'),
+ module.params.get('check_node'),
+ module.params.get('check_host'),
+ module.params.get('script'),
+ module.params.get('interval'),
+ module.params.get('ttl'),
+ module.params.get('notes'),
+ module.params.get('http'),
+ module.params.get('timeout'),
+ module.params.get('service_id'),
+ )
def parse_service(module):
@@ -578,7 +578,7 @@ def main():
register_with_consul(module)
except ConnectionError as e:
module.fail_json(msg='Could not connect to consul agent at %s:%s, error was %s' % (
- module.params.get('host'), module.params.get('port'), str(e)))
+ module.params.get('host'), module.params.get('port'), str(e)))
except Exception as e:
module.fail_json(msg=str(e))
diff --git a/lib/ansible/modules/clustering/consul_acl.py b/lib/ansible/modules/clustering/consul_acl.py
index 43f953c7b5a..b9d09ba22ce 100644
--- a/lib/ansible/modules/clustering/consul_acl.py
+++ b/lib/ansible/modules/clustering/consul_acl.py
@@ -223,7 +223,7 @@ def load_rules_for_token(module, consul_api, token):
except Exception as e:
module.fail_json(
msg="Could not load rule list from retrieved rule data %s, %s" % (
- token, e))
+ token, e))
return json_to_rules(module, loaded)
@@ -357,7 +357,7 @@ def main():
execute(module)
except ConnectionError as e:
module.fail_json(msg='Could not connect to consul agent at %s:%s, error was %s' % (
- module.params.get('host'), module.params.get('port'), str(e)))
+ module.params.get('host'), module.params.get('port'), str(e)))
except Exception as e:
module.fail_json(msg=str(e))
diff --git a/lib/ansible/modules/clustering/consul_kv.py b/lib/ansible/modules/clustering/consul_kv.py
index 3f5cb9a4c81..04ff8a86f8c 100644
--- a/lib/ansible/modules/clustering/consul_kv.py
+++ b/lib/ansible/modules/clustering/consul_kv.py
@@ -282,7 +282,7 @@ def main():
execute(module)
except ConnectionError as e:
module.fail_json(msg='Could not connect to consul agent at %s:%s, error was %s' % (
- module.params.get('host'), module.params.get('port'), str(e)))
+ module.params.get('host'), module.params.get('port'), str(e)))
except Exception as e:
module.fail_json(msg=str(e))
diff --git a/lib/ansible/modules/clustering/consul_session.py b/lib/ansible/modules/clustering/consul_session.py
index e2c23c45dc5..c1cafb3bbfe 100644
--- a/lib/ansible/modules/clustering/consul_session.py
+++ b/lib/ansible/modules/clustering/consul_session.py
@@ -173,7 +173,7 @@ def lookup_sessions(module):
node = module.params.get('node')
if not node:
module.fail_json(
- msg="node name is required to retrieve sessions for node")
+ msg="node name is required to retrieve sessions for node")
sessions = consul_client.session.node(node, dc=datacenter)
module.exit_json(changed=True,
node=node,
@@ -182,7 +182,7 @@ def lookup_sessions(module):
session_id = module.params.get('id')
if not session_id:
module.fail_json(
- msg="session_id is required to retrieve indvidual session info")
+ msg="session_id is required to retrieve indvidual session info")
session_by_id = consul_client.session.info(session_id, dc=datacenter)
module.exit_json(changed=True,
@@ -276,7 +276,7 @@ def main():
execute(module)
except ConnectionError as e:
module.fail_json(msg='Could not connect to consul agent at %s:%s, error was %s' % (
- module.params.get('host'), module.params.get('port'), str(e)))
+ module.params.get('host'), module.params.get('port'), str(e)))
except Exception as e:
module.fail_json(msg=str(e))
diff --git a/lib/ansible/modules/commands/command.py b/lib/ansible/modules/commands/command.py
index 6c0c56edfdd..4081c8c95de 100644
--- a/lib/ansible/modules/commands/command.py
+++ b/lib/ansible/modules/commands/command.py
@@ -136,13 +136,13 @@ def main():
# hence don't copy this one if you are looking to build others!
module = AnsibleModule(
argument_spec=dict(
- _raw_params = dict(),
- _uses_shell = dict(type='bool', default=False),
- chdir = dict(type='path'),
- executable = dict(),
- creates = dict(type='path'),
- removes = dict(type='path'),
- warn = dict(type='bool', default=True),
+ _raw_params = dict(),
+ _uses_shell = dict(type='bool', default=False),
+ chdir = dict(type='path'),
+ executable = dict(),
+ creates = dict(type='path'),
+ removes = dict(type='path'),
+ warn = dict(type='bool', default=True),
)
)
diff --git a/lib/ansible/modules/database/misc/mongodb_user.py b/lib/ansible/modules/database/misc/mongodb_user.py
index a438761e234..afff477ea4d 100644
--- a/lib/ansible/modules/database/misc/mongodb_user.py
+++ b/lib/ansible/modules/database/misc/mongodb_user.py
@@ -285,8 +285,8 @@ def load_mongocnf():
try:
config.readfp(open(mongocnf))
creds = dict(
- user=config.get('client', 'user'),
- password=config.get('client', 'pass')
+ user=config.get('client', 'user'),
+ password=config.get('client', 'pass')
)
except (ConfigParser.NoOptionError, IOError):
return False
diff --git a/lib/ansible/modules/database/misc/redis.py b/lib/ansible/modules/database/misc/redis.py
index 078a46ea206..e217e716860 100644
--- a/lib/ansible/modules/database/misc/redis.py
+++ b/lib/ansible/modules/database/misc/redis.py
@@ -218,11 +218,11 @@ def main():
if mode == "slave": # Only need data if we want to be slave
if not master_host:
module.fail_json(
- msg='In slave mode master host must be provided')
+ msg='In slave mode master host must be provided')
if not master_port:
module.fail_json(
- msg='In slave mode master port must be provided')
+ msg='In slave mode master port must be provided')
#Connect and check
r = redis.StrictRedis(host=login_host,
@@ -281,7 +281,7 @@ def main():
if mode == "db":
if db is None:
module.fail_json(
- msg="In db mode the db number must be provided")
+ msg="In db mode the db number must be provided")
#Connect and check
r = redis.StrictRedis(host=login_host,
diff --git a/lib/ansible/modules/database/misc/riak.py b/lib/ansible/modules/database/misc/riak.py
index e35e08d9252..050d0c36594 100644
--- a/lib/ansible/modules/database/misc/riak.py
+++ b/lib/ansible/modules/database/misc/riak.py
@@ -131,16 +131,16 @@ def main():
module = AnsibleModule(
argument_spec=dict(
- command=dict(required=False, default=None, choices=[
- 'ping', 'kv_test', 'join', 'plan', 'commit']),
- config_dir=dict(default='/etc/riak', type='path'),
- http_conn=dict(required=False, default='127.0.0.1:8098'),
- target_node=dict(default='riak@127.0.0.1', required=False),
- wait_for_handoffs=dict(default=False, type='int'),
- wait_for_ring=dict(default=False, type='int'),
- wait_for_service=dict(
- required=False, default=None, choices=['kv']),
- validate_certs = dict(default='yes', type='bool'))
+ command=dict(required=False, default=None, choices=[
+ 'ping', 'kv_test', 'join', 'plan', 'commit']),
+ config_dir=dict(default='/etc/riak', type='path'),
+ http_conn=dict(required=False, default='127.0.0.1:8098'),
+ target_node=dict(default='riak@127.0.0.1', required=False),
+ wait_for_handoffs=dict(default=False, type='int'),
+ wait_for_ring=dict(default=False, type='int'),
+ wait_for_service=dict(
+ required=False, default=None, choices=['kv']),
+ validate_certs = dict(default='yes', type='bool'))
)
diff --git a/lib/ansible/modules/database/mysql/mysql_replication.py b/lib/ansible/modules/database/mysql/mysql_replication.py
index 837d2b5117b..db196648e84 100644
--- a/lib/ansible/modules/database/mysql/mysql_replication.py
+++ b/lib/ansible/modules/database/mysql/mysql_replication.py
@@ -199,7 +199,7 @@ def changemaster(cursor, chm, chm_params):
def main():
module = AnsibleModule(
- argument_spec = dict(
+ argument_spec = dict(
login_user=dict(default=None),
login_password=dict(default=None, no_log=True),
login_host=dict(default="localhost"),
diff --git a/lib/ansible/modules/database/mysql/mysql_variables.py b/lib/ansible/modules/database/mysql/mysql_variables.py
index 506ff705d56..722bcc6d84e 100644
--- a/lib/ansible/modules/database/mysql/mysql_variables.py
+++ b/lib/ansible/modules/database/mysql/mysql_variables.py
@@ -123,7 +123,7 @@ def setvariable(cursor, mysqlvar, value):
def main():
module = AnsibleModule(
- argument_spec = dict(
+ argument_spec = dict(
login_user=dict(default=None),
login_password=dict(default=None, no_log=True),
login_host=dict(default="localhost"),
diff --git a/lib/ansible/modules/database/postgresql/postgresql_db.py b/lib/ansible/modules/database/postgresql/postgresql_db.py
index 67dcf6eeafa..767a4d136cb 100755
--- a/lib/ansible/modules/database/postgresql/postgresql_db.py
+++ b/lib/ansible/modules/database/postgresql/postgresql_db.py
@@ -309,7 +309,7 @@ def main():
.extensions
.ISOLATION_LEVEL_AUTOCOMMIT)
cursor = db_connection.cursor(
- cursor_factory=psycopg2.extras.DictCursor)
+ cursor_factory=psycopg2.extras.DictCursor)
except TypeError:
e = get_exception()
diff --git a/lib/ansible/modules/database/postgresql/postgresql_ext.py b/lib/ansible/modules/database/postgresql/postgresql_ext.py
index 6ca9b3434ed..ac105251717 100644
--- a/lib/ansible/modules/database/postgresql/postgresql_ext.py
+++ b/lib/ansible/modules/database/postgresql/postgresql_ext.py
@@ -164,7 +164,7 @@ def main():
.extensions
.ISOLATION_LEVEL_AUTOCOMMIT)
cursor = db_connection.cursor(
- cursor_factory=psycopg2.extras.DictCursor)
+ cursor_factory=psycopg2.extras.DictCursor)
except Exception:
e = get_exception()
module.fail_json(msg="unable to connect to database: %s" % e)
diff --git a/lib/ansible/modules/database/postgresql/postgresql_schema.py b/lib/ansible/modules/database/postgresql/postgresql_schema.py
index cf321e998aa..82b3562c863 100644
--- a/lib/ansible/modules/database/postgresql/postgresql_schema.py
+++ b/lib/ansible/modules/database/postgresql/postgresql_schema.py
@@ -228,7 +228,7 @@ def main():
.extensions
.ISOLATION_LEVEL_AUTOCOMMIT)
cursor = db_connection.cursor(
- cursor_factory=psycopg2.extras.DictCursor)
+ cursor_factory=psycopg2.extras.DictCursor)
except Exception:
e = get_exception()
module.fail_json(msg="unable to connect to database: %s" %(text, str(e)))
diff --git a/lib/ansible/modules/files/lineinfile.py b/lib/ansible/modules/files/lineinfile.py
index fc85ee8cf21..c62effec3eb 100644
--- a/lib/ansible/modules/files/lineinfile.py
+++ b/lib/ansible/modules/files/lineinfile.py
@@ -216,7 +216,7 @@ def write_changes(module, b_lines, dest):
if valid:
module.atomic_move(tmpfile,
to_native(os.path.realpath(to_bytes(dest, errors='surrogate_or_strict')), errors='surrogate_or_strict'),
- unsafe_writes=module.params['unsafe_writes'])
+ unsafe_writes=module.params['unsafe_writes'])
def check_file_attrs(module, changed, message, diff):
diff --git a/lib/ansible/modules/files/stat.py b/lib/ansible/modules/files/stat.py
index 8cccae1d685..3bf849c562e 100644
--- a/lib/ansible/modules/files/stat.py
+++ b/lib/ansible/modules/files/stat.py
@@ -423,7 +423,7 @@ def format_output(module, path, st):
('st_rsize', 'real_size'),
('st_creator', 'creator'),
('st_type', 'file_type'),
- ]:
+ ]:
if hasattr(st, other[0]):
output[other[1]] = getattr(st, other[0])
diff --git a/lib/ansible/modules/messaging/rabbitmq_binding.py b/lib/ansible/modules/messaging/rabbitmq_binding.py
index 446d7d8536f..5bf60eff0d4 100644
--- a/lib/ansible/modules/messaging/rabbitmq_binding.py
+++ b/lib/ansible/modules/messaging/rabbitmq_binding.py
@@ -196,14 +196,14 @@ def main():
)
r = requests.post(
- url,
- auth = (module.params['login_user'],module.params['login_password']),
- headers = { "content-type": "application/json"},
- data = json.dumps({
- "routing_key": module.params['routing_key'],
- "arguments": module.params['arguments']
+ url,
+ auth = (module.params['login_user'],module.params['login_password']),
+ headers = { "content-type": "application/json"},
+ data = json.dumps({
+ "routing_key": module.params['routing_key'],
+ "arguments": module.params['arguments']
})
- )
+ )
elif module.params['state'] == 'absent':
r = requests.delete( url, auth = (module.params['login_user'],module.params['login_password']))
diff --git a/lib/ansible/modules/messaging/rabbitmq_exchange.py b/lib/ansible/modules/messaging/rabbitmq_exchange.py
index a5e1e353dac..bf3545800e5 100644
--- a/lib/ansible/modules/messaging/rabbitmq_exchange.py
+++ b/lib/ansible/modules/messaging/rabbitmq_exchange.py
@@ -189,17 +189,17 @@ def main():
if change_required:
if module.params['state'] == 'present':
r = requests.put(
- url,
- auth = (module.params['login_user'],module.params['login_password']),
- headers = { "content-type": "application/json"},
- data = json.dumps({
- "durable": module.params['durable'],
- "auto_delete": module.params['auto_delete'],
- "internal": module.params['internal'],
- "type": module.params['exchange_type'],
- "arguments": module.params['arguments']
+ url,
+ auth = (module.params['login_user'],module.params['login_password']),
+ headers = { "content-type": "application/json"},
+ data = json.dumps({
+ "durable": module.params['durable'],
+ "auto_delete": module.params['auto_delete'],
+ "internal": module.params['internal'],
+ "type": module.params['exchange_type'],
+ "arguments": module.params['arguments']
})
- )
+ )
elif module.params['state'] == 'absent':
r = requests.delete( url, auth = (module.params['login_user'],module.params['login_password']))
diff --git a/lib/ansible/modules/messaging/rabbitmq_queue.py b/lib/ansible/modules/messaging/rabbitmq_queue.py
index 6b49fea9f06..8cfcefe60a7 100644
--- a/lib/ansible/modules/messaging/rabbitmq_queue.py
+++ b/lib/ansible/modules/messaging/rabbitmq_queue.py
@@ -237,15 +237,15 @@ def main():
if change_required:
if module.params['state'] == 'present':
r = requests.put(
- url,
- auth = (module.params['login_user'],module.params['login_password']),
- headers = { "content-type": "application/json"},
- data = json.dumps({
- "durable": module.params['durable'],
- "auto_delete": module.params['auto_delete'],
- "arguments": module.params['arguments']
+ url,
+ auth = (module.params['login_user'],module.params['login_password']),
+ headers = { "content-type": "application/json"},
+ data = json.dumps({
+ "durable": module.params['durable'],
+ "auto_delete": module.params['auto_delete'],
+ "arguments": module.params['arguments']
})
- )
+ )
elif module.params['state'] == 'absent':
r = requests.delete( url, auth = (module.params['login_user'],module.params['login_password']))
diff --git a/lib/ansible/modules/monitoring/boundary_meter.py b/lib/ansible/modules/monitoring/boundary_meter.py
index 7ec661e7692..e4d635fb247 100644
--- a/lib/ansible/modules/monitoring/boundary_meter.py
+++ b/lib/ansible/modules/monitoring/boundary_meter.py
@@ -248,11 +248,11 @@ def main():
module = AnsibleModule(
argument_spec=dict(
- state=dict(required=True, choices=['present', 'absent']),
- name=dict(required=False),
- apikey=dict(required=True),
- apiid=dict(required=True),
- validate_certs = dict(default='yes', type='bool'),
+ state=dict(required=True, choices=['present', 'absent']),
+ name=dict(required=False),
+ apikey=dict(required=True),
+ apiid=dict(required=True),
+ validate_certs = dict(default='yes', type='bool'),
)
)
diff --git a/lib/ansible/modules/monitoring/librato_annotation.py b/lib/ansible/modules/monitoring/librato_annotation.py
index cadade1ef48..3f3e2e35ccf 100644
--- a/lib/ansible/modules/monitoring/librato_annotation.py
+++ b/lib/ansible/modules/monitoring/librato_annotation.py
@@ -146,16 +146,16 @@ def main():
module = AnsibleModule(
argument_spec = dict(
- user = dict(required=True),
- api_key = dict(required=True),
- name = dict(required=False),
- title = dict(required=True),
- source = dict(required=False),
- description = dict(required=False),
- start_time = dict(required=False, default=None, type='int'),
- end_time = dict(require=False, default=None, type='int'),
- links = dict(type='list')
- )
+ user = dict(required=True),
+ api_key = dict(required=True),
+ name = dict(required=False),
+ title = dict(required=True),
+ source = dict(required=False),
+ description = dict(required=False),
+ start_time = dict(required=False, default=None, type='int'),
+ end_time = dict(require=False, default=None, type='int'),
+ links = dict(type='list')
+ )
)
post_annotation(module)
diff --git a/lib/ansible/modules/monitoring/logicmonitor.py b/lib/ansible/modules/monitoring/logicmonitor.py
index ca006525242..96a4c70f224 100644
--- a/lib/ansible/modules/monitoring/logicmonitor.py
+++ b/lib/ansible/modules/monitoring/logicmonitor.py
@@ -32,8 +32,8 @@ try:
# Look for simplejson if that's the case
try:
if (
- not isinstance(json.loads, types.FunctionType) or
- not isinstance(json.dumps, types.FunctionType)
+ not isinstance(json.loads, types.FunctionType) or
+ not isinstance(json.dumps, types.FunctionType)
):
raise ImportError
except AttributeError:
diff --git a/lib/ansible/modules/monitoring/logicmonitor_facts.py b/lib/ansible/modules/monitoring/logicmonitor_facts.py
index 39521a2b42b..ff0954d2510 100644
--- a/lib/ansible/modules/monitoring/logicmonitor_facts.py
+++ b/lib/ansible/modules/monitoring/logicmonitor_facts.py
@@ -29,8 +29,8 @@ try:
# Look for simplejson if that's the case
try:
if (
- not isinstance(json.loads, types.FunctionType) or
- not isinstance(json.dumps, types.FunctionType)
+ not isinstance(json.loads, types.FunctionType) or
+ not isinstance(json.dumps, types.FunctionType)
):
raise ImportError
except AttributeError:
diff --git a/lib/ansible/modules/monitoring/pagerduty.py b/lib/ansible/modules/monitoring/pagerduty.py
index 0331155a7b6..3e8dd0eebd4 100644
--- a/lib/ansible/modules/monitoring/pagerduty.py
+++ b/lib/ansible/modules/monitoring/pagerduty.py
@@ -259,17 +259,17 @@ def main():
module = AnsibleModule(
argument_spec=dict(
- state=dict(required=True, choices=['running', 'started', 'ongoing', 'absent']),
- name=dict(required=True),
- user=dict(required=False),
- passwd=dict(required=False),
- token=dict(required=False),
- service=dict(required=False, type='list', aliases=["services"]),
- requester_id=dict(required=False),
- hours=dict(default='1', required=False),
- minutes=dict(default='0', required=False),
- desc=dict(default='Created by Ansible', required=False),
- validate_certs = dict(default='yes', type='bool'),
+ state=dict(required=True, choices=['running', 'started', 'ongoing', 'absent']),
+ name=dict(required=True),
+ user=dict(required=False),
+ passwd=dict(required=False),
+ token=dict(required=False),
+ service=dict(required=False, type='list', aliases=["services"]),
+ requester_id=dict(required=False),
+ hours=dict(default='1', required=False),
+ minutes=dict(default='0', required=False),
+ desc=dict(default='Created by Ansible', required=False),
+ validate_certs = dict(default='yes', type='bool'),
)
)
diff --git a/lib/ansible/modules/monitoring/pagerduty_alert.py b/lib/ansible/modules/monitoring/pagerduty_alert.py
index 48d81c7e7a9..189b0ea586d 100644
--- a/lib/ansible/modules/monitoring/pagerduty_alert.py
+++ b/lib/ansible/modules/monitoring/pagerduty_alert.py
@@ -189,10 +189,10 @@ def main():
incident_key = module.params['incident_key']
state_event_dict = {
- 'triggered': 'trigger',
- 'acknowledged': 'acknowledge',
- 'resolved': 'resolve'
- }
+ 'triggered': 'trigger',
+ 'acknowledged': 'acknowledge',
+ 'resolved': 'resolve'
+ }
event_type = state_event_dict[state]
diff --git a/lib/ansible/modules/monitoring/pingdom.py b/lib/ansible/modules/monitoring/pingdom.py
index a4b77def8c0..213f548a4d9 100644
--- a/lib/ansible/modules/monitoring/pingdom.py
+++ b/lib/ansible/modules/monitoring/pingdom.py
@@ -125,11 +125,11 @@ def main():
module = AnsibleModule(
argument_spec=dict(
- state=dict(required=True, choices=['running', 'paused', 'started', 'stopped']),
- checkid=dict(required=True),
- uid=dict(required=True),
- passwd=dict(required=True),
- key=dict(required=True)
+ state=dict(required=True, choices=['running', 'paused', 'started', 'stopped']),
+ checkid=dict(required=True),
+ uid=dict(required=True),
+ passwd=dict(required=True),
+ key=dict(required=True)
)
)
diff --git a/lib/ansible/modules/monitoring/statusio_maintenance.py b/lib/ansible/modules/monitoring/statusio_maintenance.py
index 557e3dee899..c4680640810 100644
--- a/lib/ansible/modules/monitoring/statusio_maintenance.py
+++ b/lib/ansible/modules/monitoring/statusio_maintenance.py
@@ -201,7 +201,7 @@ def get_api_auth_headers(api_id, api_key, url, statuspage):
try:
response = open_url(
- url + "/v2/component/list/" + statuspage, headers=headers)
+ url + "/v2/component/list/" + statuspage, headers=headers)
data = json.loads(response.read())
if data['status']['message'] == 'Authentication failed':
return 1, None, None, "Authentication failed: " \
@@ -265,7 +265,7 @@ def get_date_time(start_date, start_time, minutes):
try:
# Work out end date/time based on minutes
date_time_start = datetime.datetime.strptime(
- start_time + start_date, '%H:%M%m/%d/%Y')
+ start_time + start_date, '%H:%M%m/%d/%Y')
delta = date_time_start + datetime.timedelta(minutes=minutes)
returned_date.append(delta.strftime("%m/%d/%Y"))
returned_date.append(delta.strftime("%H:%M"))
@@ -296,25 +296,25 @@ def create_maintenance(auth_headers, url, statuspage, host_ids,
container_id.append(val['container_id'])
try:
values = json.dumps({
- "statuspage_id": statuspage,
- "components": component_id,
- "containers": container_id,
- "all_infrastructure_affected": str(int(all_infrastructure_affected)),
- "automation": str(int(automation)),
- "maintenance_name": title,
- "maintenance_details": desc,
- "date_planned_start": returned_dates[0],
- "time_planned_start": returned_dates[1],
- "date_planned_end": returned_dates[2],
- "time_planned_end": returned_dates[3],
- "maintenance_notify_now": str(int(maintenance_notify_now)),
- "maintenance_notify_72_hr": str(int(maintenance_notify_72_hr)),
- "maintenance_notify_24_hr": str(int(maintenance_notify_24_hr)),
- "maintenance_notify_1_hr": str(int(maintenance_notify_1_hr))
- })
+ "statuspage_id": statuspage,
+ "components": component_id,
+ "containers": container_id,
+ "all_infrastructure_affected": str(int(all_infrastructure_affected)),
+ "automation": str(int(automation)),
+ "maintenance_name": title,
+ "maintenance_details": desc,
+ "date_planned_start": returned_dates[0],
+ "time_planned_start": returned_dates[1],
+ "date_planned_end": returned_dates[2],
+ "time_planned_end": returned_dates[3],
+ "maintenance_notify_now": str(int(maintenance_notify_now)),
+ "maintenance_notify_72_hr": str(int(maintenance_notify_72_hr)),
+ "maintenance_notify_24_hr": str(int(maintenance_notify_24_hr)),
+ "maintenance_notify_1_hr": str(int(maintenance_notify_1_hr))
+ })
response = open_url(
- url + "/v2/maintenance/schedule", data=values,
- headers=auth_headers)
+ url + "/v2/maintenance/schedule", data=values,
+ headers=auth_headers)
data = json.loads(response.read())
if data["status"]["error"] == "yes":
@@ -332,9 +332,9 @@ def delete_maintenance(auth_headers, url, statuspage, maintenance_id):
"maintenance_id": maintenance_id,
})
response = open_url(
- url=url + "/v2/maintenance/delete",
- data=values,
- headers=auth_headers)
+ url=url + "/v2/maintenance/delete",
+ data=values,
+ headers=auth_headers)
data = json.loads(response.read())
if data["status"]["error"] == "yes":
return 1, None, "Invalid maintenance_id"
@@ -411,7 +411,7 @@ def main():
if minutes or start_time and start_date:
(rc, returned_date, error) = get_date_time(
- start_date, start_time, minutes)
+ start_date, start_time, minutes)
if rc != 0:
module.fail_json(msg="Failed to set date/time: %s" % error)
@@ -438,11 +438,11 @@ def main():
module.exit_json(changed=True)
else:
(rc, _, error) = create_maintenance(
- auth_headers, url, statuspage, host_ids,
- all_infrastructure_affected, automation,
- title, desc, returned_date, maintenance_notify_now,
- maintenance_notify_72_hr, maintenance_notify_24_hr,
- maintenance_notify_1_hr)
+ auth_headers, url, statuspage, host_ids,
+ all_infrastructure_affected, automation,
+ title, desc, returned_date, maintenance_notify_now,
+ maintenance_notify_72_hr, maintenance_notify_24_hr,
+ maintenance_notify_1_hr)
if rc == 0:
module.exit_json(changed=True, result="Successfully created "
"maintenance")
@@ -464,15 +464,15 @@ def main():
module.exit_json(changed=True)
else:
(rc, _, error) = delete_maintenance(
- auth_headers, url, statuspage, maintenance_id)
+ auth_headers, url, statuspage, maintenance_id)
if rc == 0:
module.exit_json(
- changed=True,
- result="Successfully deleted maintenance"
+ changed=True,
+ result="Successfully deleted maintenance"
)
else:
module.fail_json(
- msg="Failed to delete maintenance: %s" % error)
+ msg="Failed to delete maintenance: %s" % error)
from ansible.module_utils.basic import *
from ansible.module_utils.urls import *
diff --git a/lib/ansible/modules/network/cloudflare_dns.py b/lib/ansible/modules/network/cloudflare_dns.py
index 14b142c1a12..87cc854cdde 100644
--- a/lib/ansible/modules/network/cloudflare_dns.py
+++ b/lib/ansible/modules/network/cloudflare_dns.py
@@ -628,16 +628,16 @@ def main():
),
supports_check_mode = True,
required_if = ([
- ('state','present',['record','type']),
- ('type','MX',['priority','value']),
- ('type','SRV',['port','priority','proto','service','value','weight']),
- ('type','A',['value']),
- ('type','AAAA',['value']),
- ('type','CNAME',['value']),
- ('type','TXT',['value']),
- ('type','NS',['value']),
- ('type','SPF',['value'])
- ]
+ ('state','present',['record','type']),
+ ('type','MX',['priority','value']),
+ ('type','SRV',['port','priority','proto','service','value','weight']),
+ ('type','A',['value']),
+ ('type','AAAA',['value']),
+ ('type','CNAME',['value']),
+ ('type','TXT',['value']),
+ ('type','NS',['value']),
+ ('type','SPF',['value'])
+ ]
),
required_one_of = (
[['record','value','type']]
diff --git a/lib/ansible/modules/network/nxos/nxos_aaa_server.py b/lib/ansible/modules/network/nxos/nxos_aaa_server.py
index 964854d073f..f106ba42c91 100644
--- a/lib/ansible/modules/network/nxos/nxos_aaa_server.py
+++ b/lib/ansible/modules/network/nxos/nxos_aaa_server.py
@@ -391,7 +391,7 @@ def get_aaa_server_info(server_type, module):
aaa_regex = '.*{0}-server\skey\s\d\s+(?P\S+).*'.format(server_type)
server_body = execute_show_command(
- server_command, module, command_type='cli_show_ascii')[0]
+ server_command, module, command_type='cli_show_ascii')[0]
split_server = server_body.splitlines()
@@ -403,11 +403,11 @@ def get_aaa_server_info(server_type, module):
aaa_server_info['deadtime'] = line.split(':')[1]
request_body = execute_show_command(
- request_command, module, command_type='cli_show_ascii')[0]
+ request_command, module, command_type='cli_show_ascii')[0]
aaa_server_info['directed_request'] = request_body.replace('\n', '')
key_body = execute_show_command(
- global_key_command, module, command_type='cli_show_ascii')[0]
+ global_key_command, module, command_type='cli_show_ascii')[0]
try:
match_global_key = re.match(aaa_regex, key_body, re.DOTALL)
@@ -480,15 +480,15 @@ def default_aaa_server(existing, params, server_type):
def main():
argument_spec = dict(
- server_type=dict(type='str',
+ server_type=dict(type='str',
choices=['radius', 'tacacs'], required=True),
- global_key=dict(type='str'),
- encrypt_type=dict(type='str', choices=['0', '7']),
- deadtime=dict(type='str'),
- server_timeout=dict(type='str'),
- directed_request=dict(type='str',
+ global_key=dict(type='str'),
+ encrypt_type=dict(type='str', choices=['0', '7']),
+ deadtime=dict(type='str'),
+ server_timeout=dict(type='str'),
+ directed_request=dict(type='str',
choices=['enabled', 'disabled', 'default']),
- state=dict(choices=['default', 'present'], default='present'),
+ state=dict(choices=['default', 'present'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -522,7 +522,7 @@ def main():
raise ValueError
except ValueError:
module.fail_json(
- msg='deadtime must be an integer between 0 and 1440')
+ msg='deadtime must be an integer between 0 and 1440')
if server_timeout:
try:
@@ -533,7 +533,7 @@ def main():
msg='server_timeout must be an integer between 1 and 60')
delta = dict(set(proposed.items()).difference(
- existing.items()))
+ existing.items()))
if delta:
command = config_aaa_server(delta, server_type)
if command:
diff --git a/lib/ansible/modules/network/nxos/nxos_aaa_server_host.py b/lib/ansible/modules/network/nxos/nxos_aaa_server_host.py
index dafd197018e..1faf21ce23d 100644
--- a/lib/ansible/modules/network/nxos/nxos_aaa_server_host.py
+++ b/lib/ansible/modules/network/nxos/nxos_aaa_server_host.py
@@ -485,15 +485,15 @@ def config_aaa_host(server_type, address, params, clear=False):
def main():
argument_spec = dict(
- server_type=dict(choices=['radius', 'tacacs'], required=True),
- address=dict(type='str', required=True),
- key=dict(type='str'),
- encrypt_type=dict(type='str', choices=['0', '7']),
- host_timeout=dict(type='str'),
- auth_port=dict(type='str'),
- acct_port=dict(type='str'),
- tacacs_port=dict(type='str'),
- state=dict(choices=['absent', 'present'], default='present'),
+ server_type=dict(choices=['radius', 'tacacs'], required=True),
+ address=dict(type='str', required=True),
+ key=dict(type='str'),
+ encrypt_type=dict(type='str', choices=['0', '7']),
+ host_timeout=dict(type='str'),
+ auth_port=dict(type='str'),
+ acct_port=dict(type='str'),
+ tacacs_port=dict(type='str'),
+ state=dict(choices=['absent', 'present'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -543,7 +543,7 @@ def main():
msg='host_timeout must be an integer between 1 and 60')
delta = dict(
- set(proposed.items()).difference(existing.items()))
+ set(proposed.items()).difference(existing.items()))
if delta:
union = existing.copy()
union.update(delta)
@@ -553,10 +553,10 @@ def main():
elif state == 'absent':
intersect = dict(
- set(proposed.items()).intersection(existing.items()))
+ set(proposed.items()).intersection(existing.items()))
if intersect.get('address') and intersect.get('server_type'):
command = 'no {0}-server host {1}'.format(
- intersect.get('server_type'), intersect.get('address'))
+ intersect.get('server_type'), intersect.get('address'))
commands.append(command)
cmds = flatten_list(commands)
diff --git a/lib/ansible/modules/network/nxos/nxos_acl.py b/lib/ansible/modules/network/nxos/nxos_acl.py
index a27b8e43ec9..bdf00b1a315 100644
--- a/lib/ansible/modules/network/nxos/nxos_acl.py
+++ b/lib/ansible/modules/network/nxos/nxos_acl.py
@@ -641,49 +641,49 @@ def execute_config_command(commands, module):
def main():
argument_spec = dict(
- seq=dict(required=False, type='str'),
- name=dict(required=True, type='str'),
- action=dict(required=False, choices=['remark', 'permit', 'deny']),
- remark=dict(required=False, type='str'),
- proto=dict(required=False, type='str'),
- src=dict(required=False, type='str'),
- src_port_op=dict(required=False),
- src_port1=dict(required=False, type='str'),
- src_port2=dict(required=False, type='str'),
- dest=dict(required=False, type='str'),
- dest_port_op=dict(required=False),
- dest_port1=dict(required=False, type='str'),
- dest_port2=dict(required=False, type='str'),
- log=dict(required=False, choices=['enable']),
- urg=dict(required=False, choices=['enable']),
- ack=dict(required=False, choices=['enable']),
- psh=dict(required=False, choices=['enable']),
- rst=dict(required=False, choices=['enable']),
- syn=dict(required=False, choices=['enable']),
- fragments=dict(required=False, choices=['enable']),
- fin=dict(required=False, choices=['enable']),
- established=dict(required=False, choices=['enable']),
- time_range=dict(required=False),
- precedence=dict(required=False, choices=['critical', 'flash',
+ seq=dict(required=False, type='str'),
+ name=dict(required=True, type='str'),
+ action=dict(required=False, choices=['remark', 'permit', 'deny']),
+ remark=dict(required=False, type='str'),
+ proto=dict(required=False, type='str'),
+ src=dict(required=False, type='str'),
+ src_port_op=dict(required=False),
+ src_port1=dict(required=False, type='str'),
+ src_port2=dict(required=False, type='str'),
+ dest=dict(required=False, type='str'),
+ dest_port_op=dict(required=False),
+ dest_port1=dict(required=False, type='str'),
+ dest_port2=dict(required=False, type='str'),
+ log=dict(required=False, choices=['enable']),
+ urg=dict(required=False, choices=['enable']),
+ ack=dict(required=False, choices=['enable']),
+ psh=dict(required=False, choices=['enable']),
+ rst=dict(required=False, choices=['enable']),
+ syn=dict(required=False, choices=['enable']),
+ fragments=dict(required=False, choices=['enable']),
+ fin=dict(required=False, choices=['enable']),
+ established=dict(required=False, choices=['enable']),
+ time_range=dict(required=False),
+ precedence=dict(required=False, choices=['critical', 'flash',
'flash-override',
'immediate', 'internet',
'network', 'priority',
'routine']),
- dscp=dict(required=False, choices=['af11', 'af12', 'af13', 'af21',
+ dscp=dict(required=False, choices=['af11', 'af12', 'af13', 'af21',
'af22', 'af23', 'af31', 'af32',
'af33', 'af41', 'af42', 'af43',
'cs1', 'cs2', 'cs3', 'cs4',
'cs5', 'cs6', 'cs7', 'default',
'ef']),
- state=dict(choices=['absent', 'present', 'delete_acl'],
+ state=dict(choices=['absent', 'present', 'delete_acl'],
default='present'),
- protocol=dict(choices=['http', 'https'], default='http'),
- host=dict(required=True),
- username=dict(type='str'),
- password=dict(no_log=True, type='str'),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ protocol=dict(choices=['http', 'https'], default='http'),
+ host=dict(required=True),
+ username=dict(type='str'),
+ password=dict(no_log=True, type='str'),
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_acl_interface.py b/lib/ansible/modules/network/nxos/nxos_acl_interface.py
index e9dbcb3fe07..8dd74922b3c 100644
--- a/lib/ansible/modules/network/nxos/nxos_acl_interface.py
+++ b/lib/ansible/modules/network/nxos/nxos_acl_interface.py
@@ -466,14 +466,14 @@ def execute_config_command(commands, module):
def main():
argument_spec = dict(
- name=dict(required=False, type='str'),
- interface=dict(required=True),
- direction=dict(required=True, choices=['egress', 'ingress']),
- state=dict(choices=['absent', 'present'],
+ name=dict(required=False, type='str'),
+ interface=dict(required=True),
+ direction=dict(required=True, choices=['egress', 'ingress']),
+ state=dict(choices=['absent', 'present'],
default='present'),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_bgp.py b/lib/ansible/modules/network/nxos/nxos_bgp.py
index a1d99ba102d..e30c80645b0 100644
--- a/lib/ansible/modules/network/nxos/nxos_bgp.py
+++ b/lib/ansible/modules/network/nxos/nxos_bgp.py
@@ -787,8 +787,8 @@ def state_present(module, existing, proposed, candidate):
commands.append('{0} {1}'.format(key, peer_string))
elif key.startswith('timers bgp'):
command = 'timers bgp {0} {1}'.format(
- proposed['timer_bgp_keepalive'],
- proposed['timer_bgp_hold'])
+ proposed['timer_bgp_keepalive'],
+ proposed['timer_bgp_hold'])
if command not in commands:
commands.append(command)
else:
@@ -857,50 +857,50 @@ def fix_commands(commands):
def main():
argument_spec = dict(
- asn=dict(required=True, type='str'),
- vrf=dict(required=False, type='str', default='default'),
- bestpath_always_compare_med=dict(required=False, type='bool'),
- bestpath_aspath_multipath_relax=dict(required=False, type='bool'),
- bestpath_compare_neighborid=dict(required=False, type='bool'),
- bestpath_compare_routerid=dict(required=False, type='bool'),
- bestpath_cost_community_ignore=dict(required=False, type='bool'),
- bestpath_med_confed=dict(required=False, type='bool'),
- bestpath_med_missing_as_worst=dict(required=False, type='bool'),
- bestpath_med_non_deterministic=dict(required=False, type='bool'),
- cluster_id=dict(required=False, type='str'),
- confederation_id=dict(required=False, type='str'),
- confederation_peers=dict(required=False, type='str'),
- disable_policy_batching=dict(required=False, type='bool'),
- disable_policy_batching_ipv4_prefix_list=dict(required=False, type='str'),
- disable_policy_batching_ipv6_prefix_list=dict(required=False, type='str'),
- enforce_first_as=dict(required=False, type='bool'),
- event_history_cli=dict(required=False, choices=['true', 'false', 'default', 'size_small', 'size_medium', 'size_large', 'size_disable']),
- event_history_detail=dict(required=False, choices=['true', 'false', 'default', 'size_small', 'size_medium', 'size_large', 'size_disable']),
- event_history_events=dict(required=False, choices=['true', 'false', 'default' 'size_small', 'size_medium', 'size_large', 'size_disable']),
- event_history_periodic=dict(required=False, choices=['true', 'false', 'default', 'size_small', 'size_medium', 'size_large', 'size_disable']),
- fast_external_fallover=dict(required=False, type='bool'),
- flush_routes=dict(required=False, type='bool'),
- graceful_restart=dict(required=False, type='bool'),
- graceful_restart_helper=dict(required=False, type='bool'),
- graceful_restart_timers_restart=dict(required=False, type='str'),
- graceful_restart_timers_stalepath_time=dict(required=False, type='str'),
- isolate=dict(required=False, type='bool'),
- local_as=dict(required=False, type='str'),
- log_neighbor_changes=dict(required=False, type='bool'),
- maxas_limit=dict(required=False, type='str'),
- neighbor_down_fib_accelerate=dict(required=False, type='bool'),
- reconnect_interval=dict(required=False, type='str'),
- router_id=dict(required=False, type='str'),
- shutdown=dict(required=False, type='bool'),
- suppress_fib_pending=dict(required=False, type='bool'),
- timer_bestpath_limit=dict(required=False, type='str'),
- timer_bgp_hold=dict(required=False, type='str'),
- timer_bgp_keepalive=dict(required=False, type='str'),
- state=dict(choices=['present', 'absent'], default='present',
+ asn=dict(required=True, type='str'),
+ vrf=dict(required=False, type='str', default='default'),
+ bestpath_always_compare_med=dict(required=False, type='bool'),
+ bestpath_aspath_multipath_relax=dict(required=False, type='bool'),
+ bestpath_compare_neighborid=dict(required=False, type='bool'),
+ bestpath_compare_routerid=dict(required=False, type='bool'),
+ bestpath_cost_community_ignore=dict(required=False, type='bool'),
+ bestpath_med_confed=dict(required=False, type='bool'),
+ bestpath_med_missing_as_worst=dict(required=False, type='bool'),
+ bestpath_med_non_deterministic=dict(required=False, type='bool'),
+ cluster_id=dict(required=False, type='str'),
+ confederation_id=dict(required=False, type='str'),
+ confederation_peers=dict(required=False, type='str'),
+ disable_policy_batching=dict(required=False, type='bool'),
+ disable_policy_batching_ipv4_prefix_list=dict(required=False, type='str'),
+ disable_policy_batching_ipv6_prefix_list=dict(required=False, type='str'),
+ enforce_first_as=dict(required=False, type='bool'),
+ event_history_cli=dict(required=False, choices=['true', 'false', 'default', 'size_small', 'size_medium', 'size_large', 'size_disable']),
+ event_history_detail=dict(required=False, choices=['true', 'false', 'default', 'size_small', 'size_medium', 'size_large', 'size_disable']),
+ event_history_events=dict(required=False, choices=['true', 'false', 'default' 'size_small', 'size_medium', 'size_large', 'size_disable']),
+ event_history_periodic=dict(required=False, choices=['true', 'false', 'default', 'size_small', 'size_medium', 'size_large', 'size_disable']),
+ fast_external_fallover=dict(required=False, type='bool'),
+ flush_routes=dict(required=False, type='bool'),
+ graceful_restart=dict(required=False, type='bool'),
+ graceful_restart_helper=dict(required=False, type='bool'),
+ graceful_restart_timers_restart=dict(required=False, type='str'),
+ graceful_restart_timers_stalepath_time=dict(required=False, type='str'),
+ isolate=dict(required=False, type='bool'),
+ local_as=dict(required=False, type='str'),
+ log_neighbor_changes=dict(required=False, type='bool'),
+ maxas_limit=dict(required=False, type='str'),
+ neighbor_down_fib_accelerate=dict(required=False, type='bool'),
+ reconnect_interval=dict(required=False, type='str'),
+ router_id=dict(required=False, type='str'),
+ shutdown=dict(required=False, type='bool'),
+ suppress_fib_pending=dict(required=False, type='bool'),
+ timer_bestpath_limit=dict(required=False, type='str'),
+ timer_bgp_hold=dict(required=False, type='str'),
+ timer_bgp_keepalive=dict(required=False, type='str'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
required_together=[['timer_bgp_hold',
@@ -909,46 +909,46 @@ def main():
state = module.params['state']
args = [
- "asn",
- "bestpath_always_compare_med",
- "bestpath_aspath_multipath_relax",
- "bestpath_compare_neighborid",
- "bestpath_compare_routerid",
- "bestpath_cost_community_ignore",
- "bestpath_med_confed",
- "bestpath_med_missing_as_worst",
- "bestpath_med_non_deterministic",
- "cluster_id",
- "confederation_id",
- "confederation_peers",
- "disable_policy_batching",
- "disable_policy_batching_ipv4_prefix_list",
- "disable_policy_batching_ipv6_prefix_list",
- "enforce_first_as",
- "event_history_cli",
- "event_history_detail",
- "event_history_events",
- "event_history_periodic",
- "fast_external_fallover",
- "flush_routes",
- "graceful_restart",
- "graceful_restart_helper",
- "graceful_restart_timers_restart",
- "graceful_restart_timers_stalepath_time",
- "isolate",
- "local_as",
- "log_neighbor_changes",
- "maxas_limit",
- "neighbor_down_fib_accelerate",
- "reconnect_interval",
- "router_id",
- "shutdown",
- "suppress_fib_pending",
- "timer_bestpath_limit",
- "timer_bgp_hold",
- "timer_bgp_keepalive",
- "vrf"
- ]
+ "asn",
+ "bestpath_always_compare_med",
+ "bestpath_aspath_multipath_relax",
+ "bestpath_compare_neighborid",
+ "bestpath_compare_routerid",
+ "bestpath_cost_community_ignore",
+ "bestpath_med_confed",
+ "bestpath_med_missing_as_worst",
+ "bestpath_med_non_deterministic",
+ "cluster_id",
+ "confederation_id",
+ "confederation_peers",
+ "disable_policy_batching",
+ "disable_policy_batching_ipv4_prefix_list",
+ "disable_policy_batching_ipv6_prefix_list",
+ "enforce_first_as",
+ "event_history_cli",
+ "event_history_detail",
+ "event_history_events",
+ "event_history_periodic",
+ "fast_external_fallover",
+ "flush_routes",
+ "graceful_restart",
+ "graceful_restart_helper",
+ "graceful_restart_timers_restart",
+ "graceful_restart_timers_stalepath_time",
+ "isolate",
+ "local_as",
+ "log_neighbor_changes",
+ "maxas_limit",
+ "neighbor_down_fib_accelerate",
+ "reconnect_interval",
+ "router_id",
+ "shutdown",
+ "suppress_fib_pending",
+ "timer_bestpath_limit",
+ "timer_bgp_hold",
+ "timer_bgp_keepalive",
+ "vrf"
+ ]
if module.params['vrf'] != 'default':
for param, inserted_value in module.params.items():
diff --git a/lib/ansible/modules/network/nxos/nxos_bgp_af.py b/lib/ansible/modules/network/nxos/nxos_bgp_af.py
index a8ca2cd9930..36fa5f37211 100644
--- a/lib/ansible/modules/network/nxos/nxos_bgp_af.py
+++ b/lib/ansible/modules/network/nxos/nxos_bgp_af.py
@@ -506,11 +506,11 @@ PARAM_TO_COMMAND_KEYMAP = {
'vrf': 'vrf'
}
DAMPENING_PARAMS = [
- 'dampening_half_time',
- 'dampening_suppress_time',
- 'dampening_reuse_time',
- 'dampening_max_suppress_time'
- ]
+ 'dampening_half_time',
+ 'dampening_suppress_time',
+ 'dampening_reuse_time',
+ 'dampening_max_suppress_time'
+ ]
def invoke(name, *args, **kwargs):
@@ -543,11 +543,11 @@ def get_custom_list_value(config, arg, module):
copy_attributes = False
inject_map_command = ('inject-map {0} exist-map {1} '
'copy-attributes'.format(
- inject_group['inject_map'],
- inject_group['exist_map']))
+ inject_group['inject_map'],
+ inject_group['exist_map']))
REGEX = re.compile(r'\s+{0}\s*$'.format(
- inject_map_command), re.M)
+ inject_map_command), re.M)
try:
if REGEX.search(config):
copy_attributes = True
@@ -574,7 +574,7 @@ def get_custom_list_value(config, arg, module):
elif arg == 'redistribute':
RED_REGEX = re.compile(r'(?:{0}\s)(?P.*)$'.format(
- PARAM_TO_COMMAND_KEYMAP[arg]), re.M)
+ PARAM_TO_COMMAND_KEYMAP[arg]), re.M)
for line in splitted_config:
value = []
redistribute_group = {}
@@ -585,7 +585,7 @@ def get_custom_list_value(config, arg, module):
value.pop(1)
elif len(value) == 4:
value = ['{0} {1}'.format(
- value[0], value[1]), value[3]]
+ value[0], value[1]), value[3]]
value_list.append(value)
return value_list
@@ -611,7 +611,7 @@ def get_custom_string_value(config, arg, module):
elif arg.startswith('dampening'):
REGEX = re.compile(r'(?:{0}\s)(?P.*)$'.format(
- PARAM_TO_COMMAND_KEYMAP[arg]), re.M)
+ PARAM_TO_COMMAND_KEYMAP[arg]), re.M)
if arg == 'dampen_igp_metric' or arg == 'dampening_routemap':
value = ''
if PARAM_TO_COMMAND_KEYMAP[arg] in config:
@@ -774,10 +774,10 @@ def default_existing(existing_value, key, value):
for network in existing_value:
if len(network) == 2:
commands.append('no network {0} route-map {1}'.format(
- network[0], network[1]))
+ network[0], network[1]))
elif len(network) == 1:
commands.append('no network {0}'.format(
- network[0]))
+ network[0]))
elif key == 'inject-map':
for maps in existing_value:
@@ -787,7 +787,7 @@ def default_existing(existing_value, key, value):
elif len(maps) == 3:
commands.append('no inject-map {0} exist-map {1} '
'copy-attributes'.format(
- maps[0], maps[1]))
+ maps[0], maps[1]))
else:
commands.append('no {0} {1}'.format(key, existing_value))
return commands
@@ -818,7 +818,7 @@ def get_inject_map_command(existing, key, value):
if maps not in existing_maps:
if len(maps) == 2:
command = ('inject-map {0} exist-map {1}'.format(
- maps[0], maps[1]))
+ maps[0], maps[1]))
elif len(maps) == 3:
command = ('inject-map {0} exist-map {1} '
'copy-attributes'.format(maps[0],
@@ -835,7 +835,7 @@ def get_redistribute_command(existing, key, value):
for each_rule in existing_rule:
if rule[0] in each_rule:
command = 'no {0} {1} route-map {2}'.format(
- key, each_rule[0], each_rule[1])
+ key, each_rule[0], each_rule[1])
commands.append(command)
else:
command = '{0} {1} route-map {2}'.format(key, rule[0], rule[1])
@@ -877,7 +877,7 @@ def state_present(module, existing, proposed, candidate):
for key, value in proposed_commands.items():
if key == 'address-family':
addr_family_command = "address-family {0} {1}".format(
- module.params['afi'], module.params['safi'])
+ module.params['afi'], module.params['safi'])
if addr_family_command not in commands:
commands.append(addr_family_command)
@@ -949,48 +949,48 @@ def state_absent(module, existing, proposed, candidate):
parents.append('vrf {0}'.format(module.params['vrf']))
commands.append('no address-family {0} {1}'.format(
- module.params['afi'], module.params['safi']))
+ module.params['afi'], module.params['safi']))
candidate.add(commands, parents=parents)
def main():
argument_spec = dict(
- asn=dict(required=True, type='str'),
- vrf=dict(required=False, type='str', default='default'),
- safi=dict(required=True, type='str', choices=['unicast','multicast', 'evpn']),
- afi=dict(required=True, type='str', choices=['ipv4','ipv6', 'vpnv4', 'vpnv6', 'l2vpn']),
- additional_paths_install=dict(required=False, type='bool'),
- additional_paths_receive=dict(required=False, type='bool'),
- additional_paths_selection=dict(required=False, type='str'),
- additional_paths_send=dict(required=False, type='bool'),
- advertise_l2vpn_evpn=dict(required=False, type='bool'),
- client_to_client=dict(required=False, type='bool'),
- dampen_igp_metric=dict(required=False, type='str'),
- dampening_state=dict(required=False, type='bool'),
- dampening_half_time=dict(required=False, type='str'),
- dampening_max_suppress_time=dict(required=False, type='str'),
- dampening_reuse_time=dict(required=False, type='str'),
- dampening_routemap=dict(required=False, type='str'),
- dampening_suppress_time=dict(required=False, type='str'),
- default_information_originate=dict(required=False, type='bool'),
- default_metric=dict(required=False, type='str'),
- distance_ebgp=dict(required=False, type='str'),
- distance_ibgp=dict(required=False, type='str'),
- distance_local=dict(required=False, type='str'),
- inject_map=dict(required=False, type='list'),
- maximum_paths=dict(required=False, type='str'),
- maximum_paths_ibgp=dict(required=False, type='str'),
- networks=dict(required=False, type='list'),
- next_hop_route_map=dict(required=False, type='str'),
- redistribute=dict(required=False, type='list'),
- suppress_inactive=dict(required=False, type='bool'),
- table_map=dict(required=False, type='str'),
- table_map_filter=dict(required=False, type='bool'),
- state=dict(choices=['present', 'absent'], default='present',
+ asn=dict(required=True, type='str'),
+ vrf=dict(required=False, type='str', default='default'),
+ safi=dict(required=True, type='str', choices=['unicast','multicast', 'evpn']),
+ afi=dict(required=True, type='str', choices=['ipv4','ipv6', 'vpnv4', 'vpnv6', 'l2vpn']),
+ additional_paths_install=dict(required=False, type='bool'),
+ additional_paths_receive=dict(required=False, type='bool'),
+ additional_paths_selection=dict(required=False, type='str'),
+ additional_paths_send=dict(required=False, type='bool'),
+ advertise_l2vpn_evpn=dict(required=False, type='bool'),
+ client_to_client=dict(required=False, type='bool'),
+ dampen_igp_metric=dict(required=False, type='str'),
+ dampening_state=dict(required=False, type='bool'),
+ dampening_half_time=dict(required=False, type='str'),
+ dampening_max_suppress_time=dict(required=False, type='str'),
+ dampening_reuse_time=dict(required=False, type='str'),
+ dampening_routemap=dict(required=False, type='str'),
+ dampening_suppress_time=dict(required=False, type='str'),
+ default_information_originate=dict(required=False, type='bool'),
+ default_metric=dict(required=False, type='str'),
+ distance_ebgp=dict(required=False, type='str'),
+ distance_ibgp=dict(required=False, type='str'),
+ distance_local=dict(required=False, type='str'),
+ inject_map=dict(required=False, type='list'),
+ maximum_paths=dict(required=False, type='str'),
+ maximum_paths_ibgp=dict(required=False, type='str'),
+ networks=dict(required=False, type='list'),
+ next_hop_route_map=dict(required=False, type='str'),
+ redistribute=dict(required=False, type='list'),
+ suppress_inactive=dict(required=False, type='bool'),
+ table_map=dict(required=False, type='str'),
+ table_map_filter=dict(required=False, type='bool'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
required_together=[DAMPENING_PARAMS,
@@ -1017,38 +1017,38 @@ def main():
' table_map_filter filter.')
args = [
- "additional_paths_install",
- "additional_paths_receive",
- "additional_paths_selection",
- "additional_paths_send",
- "advertise_l2vpn_evpn",
- "afi",
- "asn",
- "client_to_client",
- "dampen_igp_metric",
- "dampening_half_time",
- "dampening_max_suppress_time",
- "dampening_reuse_time",
- "dampening_suppress_time",
- "dampening_routemap",
- "dampening_state",
- "default_information_originate",
- "default_metric",
- "distance_ebgp",
- "distance_ibgp",
- "distance_local",
- "inject_map",
- "maximum_paths",
- "maximum_paths_ibgp",
- "networks",
- "next_hop_route_map",
- "redistribute",
- "safi",
- "suppress_inactive",
- "table_map",
- "table_map_filter",
- "vrf"
- ]
+ "additional_paths_install",
+ "additional_paths_receive",
+ "additional_paths_selection",
+ "additional_paths_send",
+ "advertise_l2vpn_evpn",
+ "afi",
+ "asn",
+ "client_to_client",
+ "dampen_igp_metric",
+ "dampening_half_time",
+ "dampening_max_suppress_time",
+ "dampening_reuse_time",
+ "dampening_suppress_time",
+ "dampening_routemap",
+ "dampening_state",
+ "default_information_originate",
+ "default_metric",
+ "distance_ebgp",
+ "distance_ibgp",
+ "distance_local",
+ "inject_map",
+ "maximum_paths",
+ "maximum_paths_ibgp",
+ "networks",
+ "next_hop_route_map",
+ "redistribute",
+ "safi",
+ "suppress_inactive",
+ "table_map",
+ "table_map_filter",
+ "vrf"
+ ]
existing = invoke('get_existing', module, args)
diff --git a/lib/ansible/modules/network/nxos/nxos_bgp_neighbor.py b/lib/ansible/modules/network/nxos/nxos_bgp_neighbor.py
index f22fd6ccff3..cffc80db13d 100644
--- a/lib/ansible/modules/network/nxos/nxos_bgp_neighbor.py
+++ b/lib/ansible/modules/network/nxos/nxos_bgp_neighbor.py
@@ -653,34 +653,34 @@ def state_absent(module, existing, proposed, candidate):
def main():
argument_spec = dict(
- asn=dict(required=True, type='str'),
- vrf=dict(required=False, type='str', default='default'),
- neighbor=dict(required=True, type='str'),
- description=dict(required=False, type='str'),
- capability_negotiation=dict(required=False, type='bool'),
- connected_check=dict(required=False, type='bool'),
- dynamic_capability=dict(required=False, type='bool'),
- ebgp_multihop=dict(required=False, type='str'),
- local_as=dict(required=False, type='str'),
- log_neighbor_changes=dict(required=False, type='str', choices=['enable', 'disable', 'inherit']),
- low_memory_exempt=dict(required=False, type='bool'),
- maximum_peers=dict(required=False, type='str'),
- pwd=dict(required=False, type='str'),
- pwd_type=dict(required=False, type='str', choices=['cleartext', '3des', 'cisco_type_7', 'default']),
- remote_as=dict(required=False, type='str'),
- remove_private_as=dict(required=False, type='str', choices=['enable', 'disable', 'all', 'replace-as']),
- shutdown=dict(required=False, type='str'),
- suppress_4_byte_as=dict(required=False, type='bool'),
- timers_keepalive=dict(required=False, type='str'),
- timers_holdtime=dict(required=False, type='str'),
- transport_passive_only=dict(required=False, type='bool'),
- update_source=dict(required=False, type='str'),
- m_facts=dict(required=False, default=False, type='bool'),
- state=dict(choices=['present', 'absent'], default='present',
+ asn=dict(required=True, type='str'),
+ vrf=dict(required=False, type='str', default='default'),
+ neighbor=dict(required=True, type='str'),
+ description=dict(required=False, type='str'),
+ capability_negotiation=dict(required=False, type='bool'),
+ connected_check=dict(required=False, type='bool'),
+ dynamic_capability=dict(required=False, type='bool'),
+ ebgp_multihop=dict(required=False, type='str'),
+ local_as=dict(required=False, type='str'),
+ log_neighbor_changes=dict(required=False, type='str', choices=['enable', 'disable', 'inherit']),
+ low_memory_exempt=dict(required=False, type='bool'),
+ maximum_peers=dict(required=False, type='str'),
+ pwd=dict(required=False, type='str'),
+ pwd_type=dict(required=False, type='str', choices=['cleartext', '3des', 'cisco_type_7', 'default']),
+ remote_as=dict(required=False, type='str'),
+ remove_private_as=dict(required=False, type='str', choices=['enable', 'disable', 'all', 'replace-as']),
+ shutdown=dict(required=False, type='str'),
+ suppress_4_byte_as=dict(required=False, type='bool'),
+ timers_keepalive=dict(required=False, type='str'),
+ timers_holdtime=dict(required=False, type='str'),
+ transport_passive_only=dict(required=False, type='bool'),
+ update_source=dict(required=False, type='str'),
+ m_facts=dict(required=False, default=False, type='bool'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
required_together=[['timer_bgp_hold',
@@ -692,29 +692,29 @@ def main():
module.params['pwd_type'] = '0'
args = [
- 'asn',
- 'capability_negotiation',
- 'connected_check',
- 'description',
- 'dynamic_capability',
- 'ebgp_multihop',
- 'local_as',
- 'log_neighbor_changes',
- 'low_memory_exempt',
- 'maximum_peers',
- 'neighbor',
- 'pwd',
- 'pwd_type',
- 'remote_as',
- 'remove_private_as',
- 'shutdown',
- 'suppress_4_byte_as',
- 'timers_keepalive',
- 'timers_holdtime',
- 'transport_passive_only',
- 'update_source',
- 'vrf'
- ]
+ 'asn',
+ 'capability_negotiation',
+ 'connected_check',
+ 'description',
+ 'dynamic_capability',
+ 'ebgp_multihop',
+ 'local_as',
+ 'log_neighbor_changes',
+ 'low_memory_exempt',
+ 'maximum_peers',
+ 'neighbor',
+ 'pwd',
+ 'pwd_type',
+ 'remote_as',
+ 'remove_private_as',
+ 'shutdown',
+ 'suppress_4_byte_as',
+ 'timers_keepalive',
+ 'timers_holdtime',
+ 'transport_passive_only',
+ 'update_source',
+ 'vrf'
+ ]
existing = invoke('get_existing', module, args)
if existing.get('asn'):
diff --git a/lib/ansible/modules/network/nxos/nxos_bgp_neighbor_af.py b/lib/ansible/modules/network/nxos/nxos_bgp_neighbor_af.py
index faca1b15324..a93796ecc81 100644
--- a/lib/ansible/modules/network/nxos/nxos_bgp_neighbor_af.py
+++ b/lib/ansible/modules/network/nxos/nxos_bgp_neighbor_af.py
@@ -684,7 +684,7 @@ def get_existing(module, args):
parents.append('neighbor {0}'.format(module.params['neighbor']))
parents.append('address-family {0} {1}'.format(
- module.params['afi'], module.params['safi']))
+ module.params['afi'], module.params['safi']))
config = netcfg.get_section(parents)
if config:
@@ -722,7 +722,7 @@ def apply_key_map(key_map, table):
def get_address_family_command(key, value, module):
command = "address-family {0} {1}".format(
- module.params['afi'], module.params['safi'])
+ module.params['afi'], module.params['safi'])
return command
@@ -746,13 +746,13 @@ def get_capability_additional_paths_send_command(key, value, module):
def get_advertise_map_exist_command(key, value, module):
command = 'advertise-map {0} exist-map {1}'.format(
- value[0], value[1])
+ value[0], value[1])
return command
def get_advertise_map_non_exist_command(key, value, module):
command = 'advertise-map {0} non-exist-map {1}'.format(
- value[0], value[1])
+ value[0], value[1])
return command
@@ -846,7 +846,7 @@ def get_default_command(key, value, existing_commands):
command = 'no route-map {0} out'.format(existing_value)
elif key.startswith('maximum-prefix'):
command = 'no maximum-prefix {0}'.format(
- existing_commands.get('maximum-prefix'))
+ existing_commands.get('maximum-prefix'))
elif key == 'allowas-in max':
command = ['no allowas-in {0}'.format(existing_value)]
command.append('allowas-in')
@@ -936,11 +936,11 @@ def state_present(module, existing, proposed, candidate):
candidate.add(commands, parents=parents)
elif len(commands) > 1:
af_command = 'address-family {0} {1}'.format(
- module.params['afi'], module.params['safi'])
+ module.params['afi'], module.params['safi'])
if af_command in commands:
commands.remove(af_command)
parents.append('address-family {0} {1}'.format(
- module.params['afi'], module.params['safi']))
+ module.params['afi'], module.params['safi']))
candidate.add(commands, parents=parents)
@@ -952,57 +952,57 @@ def state_absent(module, existing, proposed, candidate):
parents.append('neighbor {0}'.format(module.params['neighbor']))
commands.append('no address-family {0} {1}'.format(
- module.params['afi'], module.params['safi']))
+ module.params['afi'], module.params['safi']))
candidate.add(commands, parents=parents)
def main():
argument_spec = dict(
- asn=dict(required=True, type='str'),
- vrf=dict(required=False, type='str', default='default'),
- neighbor=dict(required=True, type='str'),
- afi=dict(required=True, type='str'),
- safi=dict(required=True, type='str'),
- additional_paths_receive=dict(required=False, type='str',
+ asn=dict(required=True, type='str'),
+ vrf=dict(required=False, type='str', default='default'),
+ neighbor=dict(required=True, type='str'),
+ afi=dict(required=True, type='str'),
+ safi=dict(required=True, type='str'),
+ additional_paths_receive=dict(required=False, type='str',
choices=['enable', 'disable', 'inherit']),
- additional_paths_send=dict(required=False, type='str',
+ additional_paths_send=dict(required=False, type='str',
choices=['enable', 'disable', 'inherit']),
- advertise_map_exist=dict(required=False, type='list'),
- advertise_map_non_exist=dict(required=False, type='list'),
- allowas_in=dict(required=False, type='bool'),
- allowas_in_max=dict(required=False, type='str'),
- as_override=dict(required=False, type='bool'),
- default_originate=dict(required=False, type='bool'),
- default_originate_route_map=dict(required=False, type='str'),
- filter_list_in=dict(required=False, type='str'),
- filter_list_out=dict(required=False, type='str'),
- max_prefix_limit=dict(required=False, type='str'),
- max_prefix_interval=dict(required=False, type='str'),
- max_prefix_threshold=dict(required=False, type='str'),
- max_prefix_warning=dict(required=False, type='bool'),
- next_hop_self=dict(required=False, type='bool'),
- next_hop_third_party=dict(required=False, type='bool'),
- prefix_list_in=dict(required=False, type='str'),
- prefix_list_out=dict(required=False, type='str'),
- route_map_in=dict(required=False, type='str'),
- route_map_out=dict(required=False, type='str'),
- route_reflector_client=dict(required=False, type='bool'),
- send_community=dict(required=False, choices=['none',
+ advertise_map_exist=dict(required=False, type='list'),
+ advertise_map_non_exist=dict(required=False, type='list'),
+ allowas_in=dict(required=False, type='bool'),
+ allowas_in_max=dict(required=False, type='str'),
+ as_override=dict(required=False, type='bool'),
+ default_originate=dict(required=False, type='bool'),
+ default_originate_route_map=dict(required=False, type='str'),
+ filter_list_in=dict(required=False, type='str'),
+ filter_list_out=dict(required=False, type='str'),
+ max_prefix_limit=dict(required=False, type='str'),
+ max_prefix_interval=dict(required=False, type='str'),
+ max_prefix_threshold=dict(required=False, type='str'),
+ max_prefix_warning=dict(required=False, type='bool'),
+ next_hop_self=dict(required=False, type='bool'),
+ next_hop_third_party=dict(required=False, type='bool'),
+ prefix_list_in=dict(required=False, type='str'),
+ prefix_list_out=dict(required=False, type='str'),
+ route_map_in=dict(required=False, type='str'),
+ route_map_out=dict(required=False, type='str'),
+ route_reflector_client=dict(required=False, type='bool'),
+ send_community=dict(required=False, choices=['none',
'both',
'extended',
'standard',
'default']),
- soft_reconfiguration_in=dict(required=False, type='str',
+ soft_reconfiguration_in=dict(required=False, type='str',
choices=['enable', 'always', 'inherit']),
- soo=dict(required=False, type='str'),
- suppress_inactive=dict(required=False, type='bool'),
- unsuppress_map=dict(required=False, type='str'),
- weight=dict(required=False, type='str'),
- state=dict(choices=['present', 'absent'], default='present',
+ soo=dict(required=False, type='str'),
+ suppress_inactive=dict(required=False, type='bool'),
+ unsuppress_map=dict(required=False, type='str'),
+ weight=dict(required=False, type='str'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
mutually_exclusive=[['advertise_map_exist',
@@ -1021,40 +1021,40 @@ def main():
module.fail_json(msg='SOO is only allowed in non-default VRF')
args = [
- 'afi',
- 'asn',
- 'neighbor',
- 'additional_paths_receive',
- 'additional_paths_send',
- 'advertise_map_exist',
- 'advertise_map_non_exist',
- 'allowas_in',
- 'allowas_in_max',
- 'as_override',
- 'default_originate',
- 'default_originate_route_map',
- 'filter_list_in',
- 'filter_list_out',
- 'max_prefix_limit',
- 'max_prefix_interval',
- 'max_prefix_threshold',
- 'max_prefix_warning',
- 'next_hop_self',
- 'next_hop_third_party',
- 'prefix_list_in',
- 'prefix_list_out',
- 'route_map_in',
- 'route_map_out',
- 'soft_reconfiguration_in',
- 'soo',
- 'suppress_inactive',
- 'unsuppress_map',
- 'weight',
- 'route_reflector_client',
- 'safi',
- 'send_community',
- 'vrf'
- ]
+ 'afi',
+ 'asn',
+ 'neighbor',
+ 'additional_paths_receive',
+ 'additional_paths_send',
+ 'advertise_map_exist',
+ 'advertise_map_non_exist',
+ 'allowas_in',
+ 'allowas_in_max',
+ 'as_override',
+ 'default_originate',
+ 'default_originate_route_map',
+ 'filter_list_in',
+ 'filter_list_out',
+ 'max_prefix_limit',
+ 'max_prefix_interval',
+ 'max_prefix_threshold',
+ 'max_prefix_warning',
+ 'next_hop_self',
+ 'next_hop_third_party',
+ 'prefix_list_in',
+ 'prefix_list_out',
+ 'route_map_in',
+ 'route_map_out',
+ 'soft_reconfiguration_in',
+ 'soo',
+ 'suppress_inactive',
+ 'unsuppress_map',
+ 'weight',
+ 'route_reflector_client',
+ 'safi',
+ 'send_community',
+ 'vrf'
+ ]
existing = invoke('get_existing', module, args)
if existing.get('asn'):
diff --git a/lib/ansible/modules/network/nxos/nxos_evpn_global.py b/lib/ansible/modules/network/nxos/nxos_evpn_global.py
index ed4a6a636c1..0838061715d 100644
--- a/lib/ansible/modules/network/nxos/nxos_evpn_global.py
+++ b/lib/ansible/modules/network/nxos/nxos_evpn_global.py
@@ -281,10 +281,10 @@ def get_commands(module, existing, proposed, candidate):
def main():
argument_spec = dict(
- nv_overlay_evpn=dict(required=True, type='bool'),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ nv_overlay_evpn=dict(required=True, type='bool'),
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_evpn_vni.py b/lib/ansible/modules/network/nxos/nxos_evpn_vni.py
index e70d933acd5..b6c8c6160e3 100644
--- a/lib/ansible/modules/network/nxos/nxos_evpn_vni.py
+++ b/lib/ansible/modules/network/nxos/nxos_evpn_vni.py
@@ -409,28 +409,28 @@ def execute_config(module, candidate):
def main():
argument_spec = dict(
- vni=dict(required=True, type='str'),
- route_distinguisher=dict(required=False, type='str'),
- route_target_both=dict(required=False, type='list'),
- route_target_import=dict(required=False, type='list'),
- route_target_export=dict(required=False, type='list'),
- state=dict(choices=['present', 'absent'], default='present',
+ vni=dict(required=True, type='str'),
+ route_distinguisher=dict(required=False, type='str'),
+ route_target_both=dict(required=False, type='list'),
+ route_target_import=dict(required=False, type='list'),
+ route_target_export=dict(required=False, type='list'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
state = module.params['state']
args = [
- 'vni',
- 'route_distinguisher',
- 'route_target_both',
- 'route_target_import',
- 'route_target_export'
- ]
+ 'vni',
+ 'route_distinguisher',
+ 'route_target_both',
+ 'route_target_import',
+ 'route_target_export'
+ ]
existing = invoke('get_existing', module, args)
end_state = existing
@@ -461,9 +461,9 @@ def main():
'It is highly recommended to use a task '
'(with default as value) to explicitly '
'unconfigure it.'.format(
- existing['route_distinguisher']))
+ existing['route_distinguisher']))
remove_commands = ['no rd {0}'.format(
- existing['route_distinguisher'])]
+ existing['route_distinguisher'])]
candidate.add(remove_commands, parents=parents)
result = execute_config(module, candidate)
diff --git a/lib/ansible/modules/network/nxos/nxos_feature.py b/lib/ansible/modules/network/nxos/nxos_feature.py
index d69eb499861..1bbeb11b0ef 100644
--- a/lib/ansible/modules/network/nxos/nxos_feature.py
+++ b/lib/ansible/modules/network/nxos/nxos_feature.py
@@ -405,36 +405,36 @@ def validate_feature(module, mode='show'):
feature_to_be_mapped = {
'show': {
- 'nv overlay': 'nve',
- 'vn-segment-vlan-based': 'vnseg_vlan',
- 'hsrp': 'hsrp_engine',
- 'fabric multicast': 'fabric_mcast',
- 'scp-server': 'scpServer',
- 'sftp-server': 'sftpServer',
- 'sla responder': 'sla_responder',
- 'sla sender': 'sla_sender',
- 'ssh': 'sshServer',
- 'tacacs+': 'tacacs',
- 'telnet': 'telnetServer',
- 'ethernet-link-oam': 'elo',
- 'port-security': 'eth_port_sec'
- },
+ 'nv overlay': 'nve',
+ 'vn-segment-vlan-based': 'vnseg_vlan',
+ 'hsrp': 'hsrp_engine',
+ 'fabric multicast': 'fabric_mcast',
+ 'scp-server': 'scpServer',
+ 'sftp-server': 'sftpServer',
+ 'sla responder': 'sla_responder',
+ 'sla sender': 'sla_sender',
+ 'ssh': 'sshServer',
+ 'tacacs+': 'tacacs',
+ 'telnet': 'telnetServer',
+ 'ethernet-link-oam': 'elo',
+ 'port-security': 'eth_port_sec'
+ },
'config': {
- 'nve': 'nv overlay',
- 'vnseg_vlan': 'vn-segment-vlan-based',
- 'hsrp_engine': 'hsrp',
- 'fabric_mcast': 'fabric multicast',
- 'scpServer': 'scp-server',
- 'sftpServer': 'sftp-server',
- 'sla_sender': 'sla sender',
- 'sla_responder': 'sla responder',
- 'sshServer': 'ssh',
- 'tacacs': 'tacacs+',
- 'telnetServer': 'telnet',
- 'elo': 'ethernet-link-oam',
- 'eth_port_sec': 'port-security'
- }
- }
+ 'nve': 'nv overlay',
+ 'vnseg_vlan': 'vn-segment-vlan-based',
+ 'hsrp_engine': 'hsrp',
+ 'fabric_mcast': 'fabric multicast',
+ 'scpServer': 'scp-server',
+ 'sftpServer': 'sftp-server',
+ 'sla_sender': 'sla sender',
+ 'sla_responder': 'sla responder',
+ 'sshServer': 'ssh',
+ 'tacacs': 'tacacs+',
+ 'telnetServer': 'telnet',
+ 'elo': 'ethernet-link-oam',
+ 'eth_port_sec': 'port-security'
+ }
+ }
if feature in feature_to_be_mapped[mode]:
feature = feature_to_be_mapped[mode][feature]
@@ -444,12 +444,12 @@ def validate_feature(module, mode='show'):
def main():
argument_spec = dict(
- feature=dict(type='str', required=True),
- state=dict(choices=['enabled', 'disabled'], default='enabled',
+ feature=dict(type='str', required=True),
+ state=dict(choices=['enabled', 'disabled'], default='enabled',
required=False),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_file_copy.py b/lib/ansible/modules/network/nxos/nxos_file_copy.py
index 0885c4575e2..e47fc0f2c20 100644
--- a/lib/ansible/modules/network/nxos/nxos_file_copy.py
+++ b/lib/ansible/modules/network/nxos/nxos_file_copy.py
@@ -351,7 +351,7 @@ def transfer_file(module, dest):
except:
time.sleep(10)
temp_size = verify_remote_file_exists(
- module, dest, file_system=module.params['file_system'])
+ module, dest, file_system=module.params['file_system'])
if int(temp_size) == int(file_size):
pass
else:
@@ -365,12 +365,12 @@ def transfer_file(module, dest):
def main():
argument_spec = dict(
- local_file=dict(required=True),
- remote_file=dict(required=False),
- file_system=dict(required=False, default='bootflash:'),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ local_file=dict(required=True),
+ remote_file=dict(required=False),
+ file_system=dict(required=False, default='bootflash:'),
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_gir.py b/lib/ansible/modules/network/nxos/nxos_gir.py
index 19e0983c773..1568a5e29b0 100644
--- a/lib/ansible/modules/network/nxos/nxos_gir.py
+++ b/lib/ansible/modules/network/nxos/nxos_gir.py
@@ -408,7 +408,7 @@ def get_commands(module, state, mode):
commands.append('no system mode maintenance')
elif (module.params[
- 'system_mode_maintenance_dont_generate_profile'] is True and
+ 'system_mode_maintenance_dont_generate_profile'] is True and
mode == 'normal'):
commands.append('system mode maintenance dont-generate-profile')
elif (module.params[
@@ -434,20 +434,20 @@ def get_commands(module, state, mode):
reset_reasons = get_reset_reasons(module)
if (state == 'present' and
module.params[
- 'system_mode_maintenance_on_reload_reset_reason'].lower() not
+ 'system_mode_maintenance_on_reload_reset_reason'].lower() not
in reset_reasons.lower()):
commands.append('system mode maintenance on-reload '
'reset-reason {0}'.format(
- module.params[
- 'system_mode_maintenance_on_reload_reset_reason']))
+ module.params[
+ 'system_mode_maintenance_on_reload_reset_reason']))
elif (state == 'absent' and
module.params[
- 'system_mode_maintenance_on_reload_reset_reason'].lower() in
+ 'system_mode_maintenance_on_reload_reset_reason'].lower() in
reset_reasons.lower()):
commands.append('no system mode maintenance on-reload '
'reset-reason {0}'.format(
- module.params[
- 'system_mode_maintenance_on_reload_reset_reason']))
+ module.params[
+ 'system_mode_maintenance_on_reload_reset_reason']))
if commands:
commands.insert(0, 'terminal dont-ask')
@@ -456,32 +456,32 @@ def get_commands(module, state, mode):
def main():
argument_spec = dict(
- system_mode_maintenance=dict(required=False, type='bool'),
- system_mode_maintenance_dont_generate_profile=dict(required=False,
+ system_mode_maintenance=dict(required=False, type='bool'),
+ system_mode_maintenance_dont_generate_profile=dict(required=False,
type='bool'),
- system_mode_maintenance_timeout=dict(required=False, type='str'),
- system_mode_maintenance_shutdown=dict(required=False, type='bool'),
- system_mode_maintenance_on_reload_reset_reason=dict(required=False,
+ system_mode_maintenance_timeout=dict(required=False, type='str'),
+ system_mode_maintenance_shutdown=dict(required=False, type='bool'),
+ system_mode_maintenance_on_reload_reset_reason=dict(required=False,
choices=['hw_error','svc_failure','kern_failure',
'wdog_timeout','fatal_error','lc_failure',
'match_any','manual_reload']),
- state=dict(choices=['absent', 'present', 'default'],
+ state=dict(choices=['absent', 'present', 'default'],
default='present', required=False)
)
module = get_network_module(argument_spec=argument_spec,
mutually_exclusive=[[
- 'system_mode_maintenance',
- 'system_mode_maintenance_dont_generate_profile',
- 'system_mode_maintenance_timeout',
- 'system_mode_maintenance_shutdown',
- 'system_mode_maintenance_on_reload_reset_reason'
+ 'system_mode_maintenance',
+ 'system_mode_maintenance_dont_generate_profile',
+ 'system_mode_maintenance_timeout',
+ 'system_mode_maintenance_shutdown',
+ 'system_mode_maintenance_on_reload_reset_reason'
]],
required_one_of=[[
- 'system_mode_maintenance',
- 'system_mode_maintenance_dont_generate_profile',
- 'system_mode_maintenance_timeout',
- 'system_mode_maintenance_shutdown',
- 'system_mode_maintenance_on_reload_reset_reason'
+ 'system_mode_maintenance',
+ 'system_mode_maintenance_dont_generate_profile',
+ 'system_mode_maintenance_timeout',
+ 'system_mode_maintenance_shutdown',
+ 'system_mode_maintenance_on_reload_reset_reason'
]],
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_gir_profile_management.py b/lib/ansible/modules/network/nxos/nxos_gir_profile_management.py
index 22aae584aad..af0444b6755 100644
--- a/lib/ansible/modules/network/nxos/nxos_gir_profile_management.py
+++ b/lib/ansible/modules/network/nxos/nxos_gir_profile_management.py
@@ -335,12 +335,12 @@ def execute_config_command(commands, module):
def main():
argument_spec = dict(
- commands=dict(required=False, type='list'),
- mode=dict(required=True, choices=['maintenance', 'normal']),
- state=dict(choices=['absent', 'present'],
+ commands=dict(required=False, type='list'),
+ mode=dict(required=True, choices=['maintenance', 'normal']),
+ state=dict(choices=['absent', 'present'],
default='present'),
- include_defaults=dict(default=False),
- config=dict()
+ include_defaults=dict(default=False),
+ config=dict()
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_hsrp.py b/lib/ansible/modules/network/nxos/nxos_hsrp.py
index f1e069d144f..a183a0c0ee4 100644
--- a/lib/ansible/modules/network/nxos/nxos_hsrp.py
+++ b/lib/ansible/modules/network/nxos/nxos_hsrp.py
@@ -604,20 +604,20 @@ def validate_params(param, module):
def main():
argument_spec = dict(
- group=dict(required=True, type='str'),
- interface=dict(required=True),
- version=dict(choices=['1', '2'], default='2', required=False),
- priority=dict(type='str', required=False),
- preempt=dict(type='str', choices=['disabled', 'enabled'],
+ group=dict(required=True, type='str'),
+ interface=dict(required=True),
+ version=dict(choices=['1', '2'], default='2', required=False),
+ priority=dict(type='str', required=False),
+ preempt=dict(type='str', choices=['disabled', 'enabled'],
required=False),
- vip=dict(type='str', required=False),
- auth_type=dict(choices=['text', 'md5'], required=False),
- auth_string=dict(type='str', required=False),
- state=dict(choices=['absent', 'present'], required=False,
+ vip=dict(type='str', required=False),
+ auth_type=dict(choices=['text', 'md5'], required=False),
+ auth_string=dict(type='str', required=False),
+ state=dict(choices=['absent', 'present'], required=False,
default='present'),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -685,7 +685,7 @@ def main():
commands = []
if state == 'present':
delta = dict(
- set(proposed.items()).difference(existing.items()))
+ set(proposed.items()).difference(existing.items()))
if delta:
command = get_commands_config_hsrp(delta, interface, args)
commands.extend(command)
diff --git a/lib/ansible/modules/network/nxos/nxos_igmp.py b/lib/ansible/modules/network/nxos/nxos_igmp.py
index def225466af..70731eaa6a3 100644
--- a/lib/ansible/modules/network/nxos/nxos_igmp.py
+++ b/lib/ansible/modules/network/nxos/nxos_igmp.py
@@ -335,13 +335,13 @@ def apply_key_map(key_map, table):
def main():
argument_spec = dict(
- flush_routes=dict(type='bool'),
- enforce_rtr_alert=dict(type='bool'),
- restart=dict(type='bool', default=False),
- state=dict(choices=['present', 'default'], default='present'),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ flush_routes=dict(type='bool'),
+ enforce_rtr_alert=dict(type='bool'),
+ restart=dict(type='bool', default=False),
+ state=dict(choices=['present', 'default'], default='present'),
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -354,9 +354,9 @@ def main():
module.fail_json(msg='When state=default other params have no effect.')
args = [
- "flush_routes",
- "enforce_rtr_alert",
- ]
+ "flush_routes",
+ "enforce_rtr_alert",
+ ]
existing = invoke('get_existing', module, args)
end_state = existing
diff --git a/lib/ansible/modules/network/nxos/nxos_igmp_interface.py b/lib/ansible/modules/network/nxos/nxos_igmp_interface.py
index b72a22940af..36bba1a6874 100644
--- a/lib/ansible/modules/network/nxos/nxos_igmp_interface.py
+++ b/lib/ansible/modules/network/nxos/nxos_igmp_interface.py
@@ -552,7 +552,7 @@ def get_igmp_interface(module, interface):
command = 'show run interface {0} | inc oif'.format(interface)
body = execute_show_command(
- command, module, command_type='cli_show_ascii')[0]
+ command, module, command_type='cli_show_ascii')[0]
staticoif = []
if body:
@@ -573,7 +573,7 @@ def get_igmp_interface(module, interface):
try:
match_prefix_source = re.match(
- prefix_source_regex, line, re.DOTALL)
+ prefix_source_regex, line, re.DOTALL)
prefix_source_group = match_prefix_source.groupdict()
prefix = prefix_source_group['prefix']
source = prefix_source_group['source']
@@ -694,7 +694,7 @@ def config_remove_oif(existing, existing_oif_prefix_source):
command = None
if existing.get('routemap'):
command = 'no ip igmp static-oif route-map {0}'.format(
- existing.get('routemap'))
+ existing.get('routemap'))
if existing_oif_prefix_source:
for each in existing_oif_prefix_source:
if each.get('prefix') and each.get('source'):
@@ -732,28 +732,28 @@ def execute_config_command(commands, module):
def main():
argument_spec = dict(
- interface=dict(required=True, type='str'),
- version=dict(required=False, type='str'),
- startup_query_interval=dict(required=False, type='str'),
- startup_query_count=dict(required=False, type='str'),
- robustness=dict(required=False, type='str'),
- querier_timeout=dict(required=False, type='str'),
- query_mrt=dict(required=False, type='str'),
- query_interval=dict(required=False, type='str'),
- last_member_qrt=dict(required=False, type='str'),
- last_member_query_count=dict(required=False, type='str'),
- group_timeout=dict(required=False, type='str'),
- report_llg=dict(type='bool'),
- immediate_leave=dict(type='bool'),
- oif_routemap=dict(required=False, type='str'),
- oif_prefix=dict(required=False, type='str'),
- oif_source=dict(required=False, type='str'),
- restart=dict(type='bool', default=False),
- state=dict(choices=['present', 'absent', 'default'],
+ interface=dict(required=True, type='str'),
+ version=dict(required=False, type='str'),
+ startup_query_interval=dict(required=False, type='str'),
+ startup_query_count=dict(required=False, type='str'),
+ robustness=dict(required=False, type='str'),
+ querier_timeout=dict(required=False, type='str'),
+ query_mrt=dict(required=False, type='str'),
+ query_interval=dict(required=False, type='str'),
+ last_member_qrt=dict(required=False, type='str'),
+ last_member_query_count=dict(required=False, type='str'),
+ group_timeout=dict(required=False, type='str'),
+ report_llg=dict(type='bool'),
+ immediate_leave=dict(type='bool'),
+ oif_routemap=dict(required=False, type='str'),
+ oif_prefix=dict(required=False, type='str'),
+ oif_source=dict(required=False, type='str'),
+ restart=dict(type='bool', default=False),
+ state=dict(choices=['present', 'absent', 'default'],
default='present'),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_igmp_snooping.py b/lib/ansible/modules/network/nxos/nxos_igmp_snooping.py
index b6a443a3201..75383c37708 100644
--- a/lib/ansible/modules/network/nxos/nxos_igmp_snooping.py
+++ b/lib/ansible/modules/network/nxos/nxos_igmp_snooping.py
@@ -408,7 +408,7 @@ def get_igmp_snooping(module):
command = 'show run all | include igmp.snooping'
existing = {}
body = execute_show_command(
- command, module, command_type='cli_show_ascii')[0]
+ command, module, command_type='cli_show_ascii')[0]
if body:
split_body = body.splitlines()
@@ -485,12 +485,12 @@ def get_igmp_snooping_defaults():
def main():
argument_spec = dict(
- snooping=dict(required=False, type='bool'),
- group_timeout=dict(required=False, type='str'),
- link_local_grp_supp=dict(required=False, type='bool'),
- report_supp=dict(required=False, type='bool'),
- v3_report_supp=dict(required=False, type='bool'),
- state=dict(choices=['present', 'default'], default='present'),
+ snooping=dict(required=False, type='bool'),
+ group_timeout=dict(required=False, type='str'),
+ link_local_grp_supp=dict(required=False, type='bool'),
+ report_supp=dict(required=False, type='bool'),
+ v3_report_supp=dict(required=False, type='bool'),
+ state=dict(choices=['present', 'default'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -516,8 +516,8 @@ def main():
commands = []
if state == 'present':
delta = dict(
- set(proposed.items()).difference(existing.items())
- )
+ set(proposed.items()).difference(existing.items())
+ )
if delta:
command = config_igmp_snooping(delta, existing)
if command:
@@ -525,8 +525,8 @@ def main():
elif state == 'default':
proposed = get_igmp_snooping_defaults()
delta = dict(
- set(proposed.items()).difference(existing.items())
- )
+ set(proposed.items()).difference(existing.items())
+ )
if delta:
command = config_igmp_snooping(delta, existing, default=True)
if command:
diff --git a/lib/ansible/modules/network/nxos/nxos_install_os.py b/lib/ansible/modules/network/nxos/nxos_install_os.py
index 278afb36d97..65497b9e8ec 100644
--- a/lib/ansible/modules/network/nxos/nxos_install_os.py
+++ b/lib/ansible/modules/network/nxos/nxos_install_os.py
@@ -381,8 +381,8 @@ def set_boot_options(module, image_name, kickstart=None):
def main():
argument_spec = dict(
- system_image_file=dict(required=True),
- kickstart_image_file=dict(required=False),
+ system_image_file=dict(required=True),
+ kickstart_image_file=dict(required=False),
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_interface.py b/lib/ansible/modules/network/nxos/nxos_interface.py
index 275a0dcf6e7..424d52c4ca1 100644
--- a/lib/ansible/modules/network/nxos/nxos_interface.py
+++ b/lib/ansible/modules/network/nxos/nxos_interface.py
@@ -655,7 +655,7 @@ def get_interface_config_commands(interface, intf, existing):
commands.append('no ip forward')
fabric_forwarding_anycast_gateway = interface.get(
- 'fabric_forwarding_anycast_gateway')
+ 'fabric_forwarding_anycast_gateway')
if fabric_forwarding_anycast_gateway is not None:
if fabric_forwarding_anycast_gateway is True:
commands.append('fabric forwarding mode anycast-gateway')
diff --git a/lib/ansible/modules/network/nxos/nxos_interface_ospf.py b/lib/ansible/modules/network/nxos/nxos_interface_ospf.py
index c69e30e09bb..3f37517deb8 100644
--- a/lib/ansible/modules/network/nxos/nxos_interface_ospf.py
+++ b/lib/ansible/modules/network/nxos/nxos_interface_ospf.py
@@ -465,11 +465,11 @@ def get_default_commands(existing, proposed, existing_commands, key, module):
elif existing['message_digest_encryption_type'] == 'cisco_type_7':
encryption_type = '7'
command = 'no {0} {1} {2} {3} {4}'.format(
- key,
- existing['message_digest_key_id'],
- existing['message_digest_algorithm_type'],
- encryption_type,
- existing['message_digest_password'])
+ key,
+ existing['message_digest_key_id'],
+ existing['message_digest_algorithm_type'],
+ encryption_type,
+ existing['message_digest_password'])
commands.append(command)
else:
commands.append('no {0} {1}'.format(key, existing_value))
@@ -493,11 +493,11 @@ def get_custom_command(existing_cmd, proposed, key, module):
elif proposed['message_digest_encryption_type'] == 'cisco_type_7':
encryption_type = '7'
command = '{0} {1} {2} {3} {4}'.format(
- key,
- proposed['message_digest_key_id'],
- proposed['message_digest_algorithm_type'],
- encryption_type,
- proposed['message_digest_password'])
+ key,
+ proposed['message_digest_key_id'],
+ proposed['message_digest_algorithm_type'],
+ encryption_type,
+ proposed['message_digest_password'])
commands.append(command)
return commands
@@ -545,11 +545,11 @@ def state_absent(module, existing, proposed, candidate):
elif existing['message_digest_encryption_type'] == 'cisco_type_7':
encryption_type = '7'
command = 'no {0} {1} {2} {3} {4}'.format(
- key,
- existing['message_digest_key_id'],
- existing['message_digest_algorithm_type'],
- encryption_type,
- existing['message_digest_password'])
+ key,
+ existing['message_digest_key_id'],
+ existing['message_digest_algorithm_type'],
+ encryption_type,
+ existing['message_digest_password'])
commands.append(command)
elif key in ['ip ospf authentication message-digest',
'ip ospf passive-interface']:
@@ -580,25 +580,25 @@ def normalize_area(area, module):
def main():
argument_spec = dict(
- interface=dict(required=True, type='str'),
- ospf=dict(required=True, type='str'),
- area=dict(required=True, type='str'),
- cost=dict(required=False, type='str'),
- hello_interval=dict(required=False, type='str'),
- dead_interval=dict(required=False, type='str'),
- passive_interface=dict(required=False, type='bool'),
- message_digest=dict(required=False, type='bool'),
- message_digest_key_id=dict(required=False, type='str'),
- message_digest_algorithm_type=dict(required=False, type='str',
+ interface=dict(required=True, type='str'),
+ ospf=dict(required=True, type='str'),
+ area=dict(required=True, type='str'),
+ cost=dict(required=False, type='str'),
+ hello_interval=dict(required=False, type='str'),
+ dead_interval=dict(required=False, type='str'),
+ passive_interface=dict(required=False, type='bool'),
+ message_digest=dict(required=False, type='bool'),
+ message_digest_key_id=dict(required=False, type='str'),
+ message_digest_algorithm_type=dict(required=False, type='str',
choices=['md5']),
- message_digest_encryption_type=dict(required=False, type='str',
+ message_digest_encryption_type=dict(required=False, type='str',
choices=['cisco_type_7','3des']),
- message_digest_password=dict(required=False, type='str'),
- state=dict(choices=['present', 'absent'], default='present',
+ message_digest_password=dict(required=False, type='str'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
required_together=[['message_digest_key_id',
@@ -616,19 +616,19 @@ def main():
state = module.params['state']
args = [
- 'interface',
- 'ospf',
- 'area',
- 'cost',
- 'hello_interval',
- 'dead_interval',
- 'passive_interface',
- 'message_digest',
- 'message_digest_key_id',
- 'message_digest_algorithm_type',
- 'message_digest_encryption_type',
- 'message_digest_password'
- ]
+ 'interface',
+ 'ospf',
+ 'area',
+ 'cost',
+ 'hello_interval',
+ 'dead_interval',
+ 'passive_interface',
+ 'message_digest',
+ 'message_digest_key_id',
+ 'message_digest_algorithm_type',
+ 'message_digest_encryption_type',
+ 'message_digest_password'
+ ]
existing = invoke('get_existing', module, args)
end_state = existing
diff --git a/lib/ansible/modules/network/nxos/nxos_ip_interface.py b/lib/ansible/modules/network/nxos/nxos_ip_interface.py
index 7431be75ca5..da7ddebb6d1 100644
--- a/lib/ansible/modules/network/nxos/nxos_ip_interface.py
+++ b/lib/ansible/modules/network/nxos/nxos_ip_interface.py
@@ -508,7 +508,7 @@ def parse_unstructured_data(body, interface_name, module):
interface['prefix'] = prefix
interface_list_table = splitted_body[
- first_reference_point:last_reference_point]
+ first_reference_point:last_reference_point]
for each_line in interface_list_table:
address = each_line.strip().split(' ')[0]
@@ -551,10 +551,10 @@ def get_ip_interface(interface_name, version, module):
# and manually parse it.
if module.params['transport'] == 'nxapi' and version == 'v6':
interface, address_list = parse_unstructured_data(
- body, interface_name, module)
+ body, interface_name, module)
else:
interface, address_list = parse_structured_data(
- body, interface_name, version, module)
+ body, interface_name, version, module)
return interface, address_list
@@ -629,16 +629,16 @@ def validate_params(addr, interface, mask, version, state, intf_type, module):
def main():
argument_spec = dict(
- interface=dict(required=True),
- addr=dict(required=False),
- version=dict(required=False, choices=['v4', 'v6'],
+ interface=dict(required=True),
+ addr=dict(required=False),
+ version=dict(required=False, choices=['v4', 'v6'],
default='v4'),
- mask=dict(type='str', required=False),
- state=dict(required=False, default='present',
+ mask=dict(type='str', required=False),
+ state=dict(required=False, default='present',
choices=['present', 'absent']),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_mtu.py b/lib/ansible/modules/network/nxos/nxos_mtu.py
index 392c4ffbad0..4486e42c5a3 100644
--- a/lib/ansible/modules/network/nxos/nxos_mtu.py
+++ b/lib/ansible/modules/network/nxos/nxos_mtu.py
@@ -461,7 +461,7 @@ def is_default(interface, module):
try:
body = execute_show_command(
- command, module, command_type='cli_show_ascii')[0]
+ command, module, command_type='cli_show_ascii')[0]
if body == 'DNE':
return 'DNE'
else:
@@ -498,10 +498,10 @@ def get_interface_mode(interface, intf_type, module):
def main():
argument_spec = dict(
- mtu=dict(type='str'),
- interface=dict(type='str'),
- sysmtu=dict(type='str'),
- state=dict(choices=['absent', 'present'], default='present'),
+ mtu=dict(type='str'),
+ interface=dict(type='str'),
+ sysmtu=dict(type='str'),
+ state=dict(choices=['absent', 'present'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
required_together=[['mtu', 'interface']],
diff --git a/lib/ansible/modules/network/nxos/nxos_ntp.py b/lib/ansible/modules/network/nxos/nxos_ntp.py
index 0de3f4cf55f..441dbb2aad6 100644
--- a/lib/ansible/modules/network/nxos/nxos_ntp.py
+++ b/lib/ansible/modules/network/nxos/nxos_ntp.py
@@ -400,15 +400,15 @@ def get_ntp_peer(module):
command = 'show run | inc ntp.(server|peer)'
ntp_peer_list = []
ntp = execute_show_command(
- command, module, command_type='cli_show_ascii')
+ command, module, command_type='cli_show_ascii')
if ntp:
ntp = ntp[0]
ntp_regex = (
- ".*ntp\s(server\s(?P\S+)|peer\s(?P\S+))"
- "\s*((?Pprefer)\s*)?(use-vrf\s(?P\S+)\s*)?"
- "(key\s(?P\d+))?.*"
- )
+ ".*ntp\s(server\s(?P\S+)|peer\s(?P\S+))"
+ "\s*((?Pprefer)\s*)?(use-vrf\s(?P\S+)\s*)?"
+ "(key\s(?P\d+))?.*"
+ )
split_ntp = ntp.splitlines()
for peer_line in split_ntp:
@@ -521,14 +521,14 @@ def config_ntp(delta, existing):
def main():
argument_spec = dict(
- server=dict(type='str'),
- peer=dict(type='str'),
- key_id=dict(type='str'),
- prefer=dict(type='str', choices=['enabled', 'disabled']),
- vrf_name=dict(type='str'),
- source_addr=dict(type='str'),
- source_int=dict(type='str'),
- state=dict(choices=['absent', 'present'], default='present'),
+ server=dict(type='str'),
+ peer=dict(type='str'),
+ key_id=dict(type='str'),
+ prefer=dict(type='str', choices=['enabled', 'disabled']),
+ vrf_name=dict(type='str'),
+ source_addr=dict(type='str'),
+ source_int=dict(type='str'),
+ state=dict(choices=['absent', 'present'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
mutually_exclusive=[
@@ -606,7 +606,7 @@ def main():
if proposed_source_type == existing_source_type:
if proposed_source == existing_source:
command = 'no ntp {0} {1}'.format(
- existing_source_type, existing_source)
+ existing_source_type, existing_source)
if command:
commands.append([command])
diff --git a/lib/ansible/modules/network/nxos/nxos_ntp_auth.py b/lib/ansible/modules/network/nxos/nxos_ntp_auth.py
index 4d7be33e342..66ed69a374a 100644
--- a/lib/ansible/modules/network/nxos/nxos_ntp_auth.py
+++ b/lib/ansible/modules/network/nxos/nxos_ntp_auth.py
@@ -393,7 +393,7 @@ def get_ntp_trusted_key(module):
command = 'show run | inc ntp.trusted-key'
trusted_key_str = execute_show_command(
- command, module, command_type='cli_show_ascii')[0]
+ command, module, command_type='cli_show_ascii')[0]
if trusted_key_str:
trusted_keys = trusted_key_str.splitlines()
@@ -496,12 +496,12 @@ def remove_ntp_auth_key(key_id, md5string, auth_type, trusted_key, authenticatio
def main():
argument_spec = dict(
- key_id=dict(required=True, type='str'),
- md5string=dict(required=True, type='str'),
- auth_type=dict(choices=['text', 'encrypt'], default='text'),
- trusted_key=dict(choices=['true', 'false'], default='false'),
- authentication=dict(choices=['on', 'off']),
- state=dict(choices=['absent', 'present'], default='present'),
+ key_id=dict(required=True, type='str'),
+ md5string=dict(required=True, type='str'),
+ auth_type=dict(choices=['text', 'encrypt'], default='text'),
+ trusted_key=dict(choices=['true', 'false'], default='false'),
+ authentication=dict(choices=['on', 'off']),
+ state=dict(choices=['absent', 'present'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_ntp_options.py b/lib/ansible/modules/network/nxos/nxos_ntp_options.py
index 9ef36d75228..121602347bc 100644
--- a/lib/ansible/modules/network/nxos/nxos_ntp_options.py
+++ b/lib/ansible/modules/network/nxos/nxos_ntp_options.py
@@ -437,10 +437,10 @@ def config_ntp_options(delta, flip=False):
def main():
argument_spec = dict(
- master=dict(required=False, type='bool'),
- stratum=dict(type='str'),
- logging=dict(required=False, type='bool'),
- state=dict(choices=['absent', 'present'], default='present'),
+ master=dict(required=False, type='bool'),
+ stratum=dict(type='str'),
+ logging=dict(required=False, type='bool'),
+ state=dict(choices=['absent', 'present'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
required_one_of=[['master', 'logging']],
diff --git a/lib/ansible/modules/network/nxos/nxos_ospf.py b/lib/ansible/modules/network/nxos/nxos_ospf.py
index 024b5f0ba24..fbb452ce25b 100644
--- a/lib/ansible/modules/network/nxos/nxos_ospf.py
+++ b/lib/ansible/modules/network/nxos/nxos_ospf.py
@@ -297,12 +297,12 @@ def state_absent(module, proposed, candidate):
def main():
argument_spec = dict(
- ospf=dict(required=True, type='str'),
- state=dict(choices=['present', 'absent'], default='present',
+ ospf=dict(required=True, type='str'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_ospf_vrf.py b/lib/ansible/modules/network/nxos/nxos_ospf_vrf.py
index e2fb59043b3..f9728c978d4 100644
--- a/lib/ansible/modules/network/nxos/nxos_ospf_vrf.py
+++ b/lib/ansible/modules/network/nxos/nxos_ospf_vrf.py
@@ -441,16 +441,16 @@ def state_present(module, existing, proposed, candidate):
else:
if key == 'timers throttle lsa':
command = '{0} {1} {2} {3}'.format(
- key,
- proposed['timer_throttle_lsa_start'],
- proposed['timer_throttle_lsa_hold'],
- proposed['timer_throttle_lsa_max'])
+ key,
+ proposed['timer_throttle_lsa_start'],
+ proposed['timer_throttle_lsa_hold'],
+ proposed['timer_throttle_lsa_max'])
elif key == 'timers throttle spf':
command = '{0} {1} {2} {3}'.format(
- key,
- proposed['timer_throttle_spf_start'],
- proposed['timer_throttle_spf_hold'],
- proposed['timer_throttle_spf_max'])
+ key,
+ proposed['timer_throttle_spf_start'],
+ proposed['timer_throttle_spf_hold'],
+ proposed['timer_throttle_spf_max'])
elif key == 'log-adjacency-changes':
if value == 'log':
command = key
@@ -485,16 +485,16 @@ def state_absent(module, existing, proposed, candidate):
if value:
if key == 'timers throttle lsa':
command = 'no {0} {1} {2} {3}'.format(
- key,
- existing['timer_throttle_lsa_start'],
- existing['timer_throttle_lsa_hold'],
- existing['timer_throttle_lsa_max'])
+ key,
+ existing['timer_throttle_lsa_start'],
+ existing['timer_throttle_lsa_hold'],
+ existing['timer_throttle_lsa_max'])
elif key == 'timers throttle spf':
command = 'no {0} {1} {2} {3}'.format(
- key,
- existing['timer_throttle_spf_start'],
- existing['timer_throttle_spf_hold'],
- existing['timer_throttle_spf_max'])
+ key,
+ existing['timer_throttle_spf_start'],
+ existing['timer_throttle_spf_hold'],
+ existing['timer_throttle_spf_max'])
else:
existing_value = existing_commands.get(key)
command = 'no {0} {1}'.format(key, existing_value)
@@ -508,43 +508,43 @@ def state_absent(module, existing, proposed, candidate):
def main():
argument_spec = dict(
- vrf=dict(required=False, type='str', default='default'),
- ospf=dict(required=True, type='str'),
- router_id=dict(required=False, type='str'),
- default_metric=dict(required=False, type='str'),
- log_adjacency=dict(required=False, type='str',
+ vrf=dict(required=False, type='str', default='default'),
+ ospf=dict(required=True, type='str'),
+ router_id=dict(required=False, type='str'),
+ default_metric=dict(required=False, type='str'),
+ log_adjacency=dict(required=False, type='str',
choices=['log', 'detail', 'default']),
- timer_throttle_lsa_start=dict(required=False, type='str'),
- timer_throttle_lsa_hold=dict(required=False, type='str'),
- timer_throttle_lsa_max=dict(required=False, type='str'),
- timer_throttle_spf_start=dict(required=False, type='str'),
- timer_throttle_spf_hold=dict(required=False, type='str'),
- timer_throttle_spf_max=dict(required=False, type='str'),
- auto_cost=dict(required=False, type='str'),
- state=dict(choices=['present', 'absent'], default='present',
+ timer_throttle_lsa_start=dict(required=False, type='str'),
+ timer_throttle_lsa_hold=dict(required=False, type='str'),
+ timer_throttle_lsa_max=dict(required=False, type='str'),
+ timer_throttle_spf_start=dict(required=False, type='str'),
+ timer_throttle_spf_hold=dict(required=False, type='str'),
+ timer_throttle_spf_max=dict(required=False, type='str'),
+ auto_cost=dict(required=False, type='str'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
state = module.params['state']
args = [
- 'vrf',
- 'ospf',
- 'router_id',
- 'default_metric',
- 'log_adjacency',
- 'timer_throttle_lsa_start',
- 'timer_throttle_lsa_hold',
- 'timer_throttle_lsa_max',
- 'timer_throttle_spf_start',
- 'timer_throttle_spf_hold',
- 'timer_throttle_spf_max',
- 'auto_cost'
- ]
+ 'vrf',
+ 'ospf',
+ 'router_id',
+ 'default_metric',
+ 'log_adjacency',
+ 'timer_throttle_lsa_start',
+ 'timer_throttle_lsa_hold',
+ 'timer_throttle_lsa_max',
+ 'timer_throttle_spf_start',
+ 'timer_throttle_spf_hold',
+ 'timer_throttle_spf_max',
+ 'auto_cost'
+ ]
existing = invoke('get_existing', module, args)
end_state = existing
diff --git a/lib/ansible/modules/network/nxos/nxos_overlay_global.py b/lib/ansible/modules/network/nxos/nxos_overlay_global.py
index 0bf78baeacc..a0325a2bd53 100644
--- a/lib/ansible/modules/network/nxos/nxos_overlay_global.py
+++ b/lib/ansible/modules/network/nxos/nxos_overlay_global.py
@@ -370,18 +370,18 @@ def normalize_mac(proposed_mac, module):
def main():
argument_spec = dict(
- anycast_gateway_mac=dict(required=True, type='str'),
- m_facts=dict(required=False, default=False, type='bool'),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ anycast_gateway_mac=dict(required=True, type='str'),
+ m_facts=dict(required=False, default=False, type='bool'),
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
args = [
- 'anycast_gateway_mac'
- ]
+ 'anycast_gateway_mac'
+ ]
existing = invoke('get_existing', module, args)
end_state = existing
diff --git a/lib/ansible/modules/network/nxos/nxos_pim.py b/lib/ansible/modules/network/nxos/nxos_pim.py
index c972705a997..785df52fe5e 100644
--- a/lib/ansible/modules/network/nxos/nxos_pim.py
+++ b/lib/ansible/modules/network/nxos/nxos_pim.py
@@ -285,11 +285,11 @@ def get_commands(module, existing, proposed, candidate):
def main():
argument_spec = dict(
- ssm_range=dict(required=True, type='str'),
- m_facts=dict(required=False, default=False, type='bool'),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ ssm_range=dict(required=True, type='str'),
+ m_facts=dict(required=False, default=False, type='bool'),
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -300,8 +300,8 @@ def main():
"or the keyword 'none'.")
args = [
- 'ssm_range'
- ]
+ 'ssm_range'
+ ]
existing = invoke('get_existing', module, args)
end_state = existing
diff --git a/lib/ansible/modules/network/nxos/nxos_pim_interface.py b/lib/ansible/modules/network/nxos/nxos_pim_interface.py
index 466294e0079..179a449eb34 100644
--- a/lib/ansible/modules/network/nxos/nxos_pim_interface.py
+++ b/lib/ansible/modules/network/nxos/nxos_pim_interface.py
@@ -784,7 +784,7 @@ def config_pim_interface_defaults(existing, jp_bidir, isauth):
# returns a dict
defaults = get_pim_interface_defaults()
delta = dict(set(defaults.items()).difference(
- existing.items()))
+ existing.items()))
if delta:
# returns a list
command = config_pim_interface(delta, existing,
@@ -799,19 +799,19 @@ def config_pim_interface_defaults(existing, jp_bidir, isauth):
def main():
argument_spec=dict(
- interface=dict(required=True),
- sparse=dict(type='bool', default=True),
- dr_prio=dict(type='str'),
- hello_auth_key=dict(type='str'),
- hello_interval=dict(type='int'),
- jp_policy_out=dict(type='str'),
- jp_policy_in=dict(type='str'),
- jp_type_out=dict(choices=['prefix', 'routemap']),
- jp_type_in=dict(choices=['prefix', 'routemap']),
- border=dict(type='bool'),
- neighbor_policy=dict(type='str'),
- neighbor_type=dict(choices=['prefix', 'routemap']),
- state=dict(choices=['present', 'absent', 'default'],
+ interface=dict(required=True),
+ sparse=dict(type='bool', default=True),
+ dr_prio=dict(type='str'),
+ hello_auth_key=dict(type='str'),
+ hello_interval=dict(type='int'),
+ jp_policy_out=dict(type='str'),
+ jp_policy_in=dict(type='str'),
+ jp_type_out=dict(choices=['prefix', 'routemap']),
+ jp_type_in=dict(choices=['prefix', 'routemap']),
+ border=dict(type='bool'),
+ neighbor_policy=dict(type='str'),
+ neighbor_type=dict(choices=['prefix', 'routemap']),
+ state=dict(choices=['present', 'absent', 'default'],
default='present'),
)
module = get_network_module(argument_spec=argument_spec,
diff --git a/lib/ansible/modules/network/nxos/nxos_pim_rp_address.py b/lib/ansible/modules/network/nxos/nxos_pim_rp_address.py
index 8cd8d96575d..58150fb4af5 100644
--- a/lib/ansible/modules/network/nxos/nxos_pim_rp_address.py
+++ b/lib/ansible/modules/network/nxos/nxos_pim_rp_address.py
@@ -325,7 +325,7 @@ def build_command(param_dict, command):
for param in ['group_list', 'prefix_list', 'route_map']:
if param_dict.get(param):
command += ' {0} {1}'.format(
- param.replace('_', '-'), param_dict.get(param))
+ param.replace('_', '-'), param_dict.get(param))
if param_dict.get('bidir'):
command += ' bidir'
return [command]
@@ -346,16 +346,16 @@ def state_absent(module, existing, proposed, candidate):
def main():
argument_spec = dict(
- rp_address=dict(required=True, type='str'),
- group_list=dict(required=False, type='str'),
- prefix_list=dict(required=False, type='str'),
- route_map=dict(required=False, type='str'),
- bidir=dict(required=False, type='bool'),
- state=dict(choices=['present', 'absent'], default='present',
+ rp_address=dict(required=True, type='str'),
+ group_list=dict(required=False, type='str'),
+ prefix_list=dict(required=False, type='str'),
+ route_map=dict(required=False, type='str'),
+ bidir=dict(required=False, type='bool'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
mutually_exclusive=[['group_list', 'route_map'],
@@ -366,12 +366,12 @@ def main():
state = module.params['state']
args = [
- 'rp_address',
- 'group_list',
- 'prefix_list',
- 'route_map',
- 'bidir'
- ]
+ 'rp_address',
+ 'group_list',
+ 'prefix_list',
+ 'route_map',
+ 'bidir'
+ ]
existing = invoke('get_existing', module, args)
end_state = existing
diff --git a/lib/ansible/modules/network/nxos/nxos_ping.py b/lib/ansible/modules/network/nxos/nxos_ping.py
index f5a53dfd8e1..551c409b718 100644
--- a/lib/ansible/modules/network/nxos/nxos_ping.py
+++ b/lib/ansible/modules/network/nxos/nxos_ping.py
@@ -378,15 +378,15 @@ def get_ping_results(command, module, transport):
def main():
argument_spec = dict(
- dest=dict(required=True),
- count=dict(required=False, default=2),
- vrf=dict(required=False),
- source=dict(required=False),
- state=dict(required=False, choices=['present', 'absent'],
+ dest=dict(required=True),
+ count=dict(required=False, default=2),
+ vrf=dict(required=False),
+ source=dict(required=False),
+ state=dict(required=False, choices=['present', 'absent'],
default='present'),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -417,7 +417,7 @@ def main():
ping_command += ' {0} {1}'.format(command, arg)
ping_results, summary, rtt, ping_pass = get_ping_results(
- ping_command, module, module.params['transport'])
+ ping_command, module, module.params['transport'])
packet_loss = summary['packet_loss']
packets_rx = summary['packets_rx']
diff --git a/lib/ansible/modules/network/nxos/nxos_portchannel.py b/lib/ansible/modules/network/nxos/nxos_portchannel.py
index 6614691b050..ee759a25a0d 100644
--- a/lib/ansible/modules/network/nxos/nxos_portchannel.py
+++ b/lib/ansible/modules/network/nxos/nxos_portchannel.py
@@ -316,7 +316,7 @@ def check_interface(module, netcfg):
def get_custom_value(arg, config, module):
REGEX = re.compile(r'\s+member vni {0} associate-vrf\s*$'.format(
- module.params['vni']), re.M)
+ module.params['vni']), re.M)
value = False
try:
if REGEX.search(config):
@@ -529,7 +529,7 @@ def config_portchannel(proposed, mode, group):
command = 'interface port-channel {0}'.format(group)
commands.append(command)
commands.append(config_args.get('min_links').format(
- min_links=min_links))
+ min_links=min_links))
return commands
@@ -641,18 +641,18 @@ def flatten_list(command_lists):
def main():
argument_spec = dict(
- group=dict(required=True, type='str'),
- mode=dict(required=False, choices=['on', 'active', 'passive'],
+ group=dict(required=True, type='str'),
+ mode=dict(required=False, choices=['on', 'active', 'passive'],
default='on', type='str'),
- min_links=dict(required=False, default=None, type='str'),
- members=dict(required=False, default=None, type='list'),
- force=dict(required=False, default='false', type='str',
+ min_links=dict(required=False, default=None, type='str'),
+ members=dict(required=False, default=None, type='list'),
+ force=dict(required=False, default='false', type='str',
choices=['true', 'false']),
- state=dict(required=False, choices=['absent', 'present'],
+ state=dict(required=False, choices=['absent', 'present'],
default='present'),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -675,11 +675,11 @@ def main():
changed = False
args = [
- 'group',
- 'members',
- 'min_links',
- 'mode'
- ]
+ 'group',
+ 'members',
+ 'min_links',
+ 'mode'
+ ]
existing, interface_exist = invoke('get_existing', module, args)
end_state = existing
diff --git a/lib/ansible/modules/network/nxos/nxos_reboot.py b/lib/ansible/modules/network/nxos/nxos_reboot.py
index c479d10a806..3a83ff4b64b 100644
--- a/lib/ansible/modules/network/nxos/nxos_reboot.py
+++ b/lib/ansible/modules/network/nxos/nxos_reboot.py
@@ -269,10 +269,10 @@ def disable_confirmation(module):
def main():
argument_spec = dict(
- confirm=dict(required=True, type='bool'),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ confirm=dict(required=True, type='bool'),
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_rollback.py b/lib/ansible/modules/network/nxos/nxos_rollback.py
index 736fa25ccaa..d525f7780fe 100644
--- a/lib/ansible/modules/network/nxos/nxos_rollback.py
+++ b/lib/ansible/modules/network/nxos/nxos_rollback.py
@@ -291,11 +291,11 @@ def rollback(filename, module):
def main():
argument_spec = dict(
- checkpoint_file=dict(required=False),
- rollback_to=dict(required=False),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ checkpoint_file=dict(required=False),
+ rollback_to=dict(required=False),
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
mutually_exclusive=[['checkpoint_file',
diff --git a/lib/ansible/modules/network/nxos/nxos_smu.py b/lib/ansible/modules/network/nxos/nxos_smu.py
index 1404725ac38..87b902748a0 100644
--- a/lib/ansible/modules/network/nxos/nxos_smu.py
+++ b/lib/ansible/modules/network/nxos/nxos_smu.py
@@ -332,7 +332,7 @@ def get_commands(module, pkg, file_system):
if fixed_pkg not in active_body[0]:
commands.append('install activate {0}{1} force'.format(
- file_system, pkg))
+ file_system, pkg))
command = 'show install committed'
install_body = execute_show_command(command, module,
command_type='cli_show_ascii')
@@ -344,11 +344,11 @@ def get_commands(module, pkg, file_system):
def main():
argument_spec = dict(
- pkg=dict(required=True),
- file_system=dict(required=False, default='bootflash:'),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ pkg=dict(required=True),
+ file_system=dict(required=False, default='bootflash:'),
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_snapshot.py b/lib/ansible/modules/network/nxos/nxos_snapshot.py
index e6f367d7bfa..0bc4d8ee49d 100644
--- a/lib/ansible/modules/network/nxos/nxos_snapshot.py
+++ b/lib/ansible/modules/network/nxos/nxos_snapshot.py
@@ -485,13 +485,13 @@ def action_add(module, existing_snapshots):
if proposed not in sections:
if module.params['element_key2']:
commands.append('snapshot section add {0} "{1}" {2} {3} {4}'.format(
- module.params['section'], module.params['show_command'],
- module.params['row_id'], module.params['element_key1'],
- module.params['element_key2']))
+ module.params['section'], module.params['show_command'],
+ module.params['row_id'], module.params['element_key1'],
+ module.params['element_key2']))
else:
commands.append('snapshot section add {0} "{1}" {2} {3}'.format(
- module.params['section'], module.params['show_command'],
- module.params['row_id'], module.params['element_key1']))
+ module.params['section'], module.params['show_command'],
+ module.params['row_id'], module.params['element_key1']))
return commands
@@ -575,24 +575,24 @@ def write_on_file(content, filename, module):
def main():
argument_spec = dict(
- action=dict(required=True, choices=['create', 'add',
+ action=dict(required=True, choices=['create', 'add',
'compare', 'delete',
'delete_all']),
- snapshot_name=dict(required=False, type='str'),
- description=dict(required=False, type='str'),
- snapshot1=dict(required=False, type='str'),
- snapshot2=dict(required=False, type='str'),
- compare_option=dict(required=False,
+ snapshot_name=dict(required=False, type='str'),
+ description=dict(required=False, type='str'),
+ snapshot1=dict(required=False, type='str'),
+ snapshot2=dict(required=False, type='str'),
+ compare_option=dict(required=False,
choices=['summary', 'ipv4routes', 'ipv6routes']),
- comparison_results_file=dict(required=False, type='str'),
- section=dict(required=False, type='str'),
- show_command=dict(required=False, type='str'),
- row_id=dict(required=False, type='str'),
- element_key1=dict(required=False, type='str'),
- element_key2=dict(required=False, type='str'),
- save_snapshot_locally=dict(required=False, type='bool',
+ comparison_results_file=dict(required=False, type='str'),
+ section=dict(required=False, type='str'),
+ show_command=dict(required=False, type='str'),
+ row_id=dict(required=False, type='str'),
+ element_key1=dict(required=False, type='str'),
+ element_key2=dict(required=False, type='str'),
+ save_snapshot_locally=dict(required=False, type='bool',
default=False),
- path=dict(required=False, type='str', default='./')
+ path=dict(required=False, type='str', default='./')
)
module = get_network_module(argument_spec=argument_spec,
mutually_exclusive=[['delete_all',
@@ -608,7 +608,7 @@ def main():
if not os.path.isdir(module.params['path']):
module.fail_json(msg='{0} is not a valid directory name.'.format(
- module.params['path']))
+ module.params['path']))
if action == 'create':
for param in CREATE_PARAMS:
@@ -643,7 +643,7 @@ def main():
if action == 'compare':
written_file = write_on_file(action_results,
module.params['comparison_results_file'],
- module)
+ module)
result['updates'] = []
else:
if action_results:
diff --git a/lib/ansible/modules/network/nxos/nxos_snmp_community.py b/lib/ansible/modules/network/nxos/nxos_snmp_community.py
index 419a8ea9f7f..c1c45662f5e 100644
--- a/lib/ansible/modules/network/nxos/nxos_snmp_community.py
+++ b/lib/ansible/modules/network/nxos/nxos_snmp_community.py
@@ -429,11 +429,11 @@ def config_snmp_community(delta, community):
def main():
argument_spec = dict(
- community=dict(required=True, type='str'),
- access=dict(choices=['ro', 'rw']),
- group=dict(type='str'),
- acl=dict(type='str'),
- state=dict(choices=['absent', 'present'], default='present'),
+ community=dict(required=True, type='str'),
+ access=dict(choices=['ro', 'rw']),
+ group=dict(type='str'),
+ acl=dict(type='str'),
+ state=dict(choices=['absent', 'present'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
required_one_of=[['access', 'group']],
diff --git a/lib/ansible/modules/network/nxos/nxos_snmp_contact.py b/lib/ansible/modules/network/nxos/nxos_snmp_contact.py
index b5b97da92c1..f5618f3e932 100644
--- a/lib/ansible/modules/network/nxos/nxos_snmp_contact.py
+++ b/lib/ansible/modules/network/nxos/nxos_snmp_contact.py
@@ -353,8 +353,8 @@ def get_snmp_contact(module):
def main():
argument_spec = dict(
- contact=dict(required=True, type='str'),
- state=dict(choices=['absent', 'present'],
+ contact=dict(required=True, type='str'),
+ state=dict(choices=['absent', 'present'],
default='present')
)
module = get_network_module(argument_spec=argument_spec,
diff --git a/lib/ansible/modules/network/nxos/nxos_snmp_host.py b/lib/ansible/modules/network/nxos/nxos_snmp_host.py
index 16afb22c01f..740bb69f7f3 100644
--- a/lib/ansible/modules/network/nxos/nxos_snmp_host.py
+++ b/lib/ansible/modules/network/nxos/nxos_snmp_host.py
@@ -529,16 +529,16 @@ def flatten_list(command_lists):
def main():
argument_spec = dict(
- snmp_host=dict(required=True, type='str'),
- community=dict(type='str'),
- udp=dict(type='str'),
- version=dict(choices=['v2c', 'v3'], default='v2c'),
- src_intf=dict(type='str'),
- v3=dict(choices=['noauth', 'auth', 'priv']),
- vrf_filter=dict(type='str'),
- vrf=dict(type='str'),
- snmp_type=dict(choices=['trap', 'inform'], default='trap'),
- state=dict(choices=['absent', 'present'], default='present'),
+ snmp_host=dict(required=True, type='str'),
+ community=dict(type='str'),
+ udp=dict(type='str'),
+ version=dict(choices=['v2c', 'v3'], default='v2c'),
+ src_intf=dict(type='str'),
+ v3=dict(choices=['noauth', 'auth', 'priv']),
+ vrf_filter=dict(type='str'),
+ vrf=dict(type='str'),
+ snmp_type=dict(choices=['trap', 'inform'], default='trap'),
+ state=dict(choices=['absent', 'present'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -586,16 +586,16 @@ def main():
existing['vrf_filter'] = vrf_filter
args = dict(
- community=community,
- snmp_host=snmp_host,
- udp=udp,
- version=version,
- src_intf=src_intf,
- vrf_filter=vrf_filter,
- v3=v3,
- vrf=vrf,
- snmp_type=snmp_type
- )
+ community=community,
+ snmp_host=snmp_host,
+ udp=udp,
+ version=version,
+ src_intf=src_intf,
+ vrf_filter=vrf_filter,
+ v3=v3,
+ vrf=vrf,
+ snmp_type=snmp_type
+ )
proposed = dict((k, v) for k, v in args.items() if v is not None)
diff --git a/lib/ansible/modules/network/nxos/nxos_snmp_location.py b/lib/ansible/modules/network/nxos/nxos_snmp_location.py
index 193e6afb1fd..dc7adb174f0 100644
--- a/lib/ansible/modules/network/nxos/nxos_snmp_location.py
+++ b/lib/ansible/modules/network/nxos/nxos_snmp_location.py
@@ -372,8 +372,8 @@ def get_snmp_location(module):
def main():
argument_spec = dict(
- location=dict(required=True, type='str'),
- state=dict(choices=['absent', 'present'],
+ location=dict(required=True, type='str'),
+ state=dict(choices=['absent', 'present'],
default='present')
)
module = get_network_module(argument_spec=argument_spec,
diff --git a/lib/ansible/modules/network/nxos/nxos_snmp_traps.py b/lib/ansible/modules/network/nxos/nxos_snmp_traps.py
index cbc7a501bec..f494efbcf3e 100644
--- a/lib/ansible/modules/network/nxos/nxos_snmp_traps.py
+++ b/lib/ansible/modules/network/nxos/nxos_snmp_traps.py
@@ -453,8 +453,8 @@ def get_trap_commands(group, state, existing, module):
def main():
argument_spec = dict(
- state=dict(choices=['enabled', 'disabled'], default='enabled'),
- group=dict(choices=['aaa', 'bridge', 'callhome', 'cfs', 'config',
+ state=dict(choices=['enabled', 'disabled'], default='enabled'),
+ group=dict(choices=['aaa', 'bridge', 'callhome', 'cfs', 'config',
'entity', 'feature-control', 'hsrp',
'license', 'link', 'lldp', 'ospf', 'pim', 'rf',
'rmon', 'snmp', 'storm-control', 'stpx',
diff --git a/lib/ansible/modules/network/nxos/nxos_snmp_user.py b/lib/ansible/modules/network/nxos/nxos_snmp_user.py
index c2c4ccd91a3..aa7b100b152 100644
--- a/lib/ansible/modules/network/nxos/nxos_snmp_user.py
+++ b/lib/ansible/modules/network/nxos/nxos_snmp_user.py
@@ -454,13 +454,13 @@ def config_snmp_user(proposed, user, reset, new):
def main():
argument_spec = dict(
- user=dict(required=True, type='str'),
- group=dict(type='str', required=True),
- pwd=dict(type='str'),
- privacy=dict(type='str'),
- authentication=dict(choices=['md5', 'sha']),
- encrypt=dict(type='bool'),
- state=dict(choices=['absent', 'present'], default='present'),
+ user=dict(required=True, type='str'),
+ group=dict(type='str', required=True),
+ pwd=dict(type='str'),
+ privacy=dict(type='str'),
+ authentication=dict(choices=['md5', 'sha']),
+ encrypt=dict(type='bool'),
+ state=dict(choices=['absent', 'present'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
required_together=[['authentication', 'pwd'],
@@ -522,7 +522,7 @@ def main():
proposed['encrypt'] = 'aes-128'
delta = dict(
- set(proposed.items()).difference(existing.items()))
+ set(proposed.items()).difference(existing.items()))
if delta.get('pwd'):
delta['authentication'] = authentication
diff --git a/lib/ansible/modules/network/nxos/nxos_udld.py b/lib/ansible/modules/network/nxos/nxos_udld.py
index 958490e7a5c..e1d1cba02dc 100644
--- a/lib/ansible/modules/network/nxos/nxos_udld.py
+++ b/lib/ansible/modules/network/nxos/nxos_udld.py
@@ -430,10 +430,10 @@ def get_udld_global(module):
def main():
argument_spec = dict(
- aggressive=dict(required=False, choices=['enabled', 'disabled']),
- msg_time=dict(required=False, type='str'),
- reset=dict(required=False, type='bool'),
- state=dict(choices=['absent', 'present'], default='present'),
+ aggressive=dict(required=False, choices=['enabled', 'disabled']),
+ msg_time=dict(required=False, type='str'),
+ reset=dict(required=False, type='bool'),
+ state=dict(choices=['absent', 'present'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
required_one_of=[['aggressive', 'msg_time', 'reset']],
diff --git a/lib/ansible/modules/network/nxos/nxos_udld_interface.py b/lib/ansible/modules/network/nxos/nxos_udld_interface.py
index e36df50bfbd..ecf90e9ae65 100644
--- a/lib/ansible/modules/network/nxos/nxos_udld_interface.py
+++ b/lib/ansible/modules/network/nxos/nxos_udld_interface.py
@@ -461,10 +461,10 @@ def get_commands_remove_udld_interface(delta, interface, module, existing):
def main():
argument_spec = dict(
- mode=dict(choices=['enabled', 'disabled', 'aggressive'],
+ mode=dict(choices=['enabled', 'disabled', 'aggressive'],
required=True),
- interface=dict(type='str', required=True),
- state=dict(choices=['absent', 'present'], default='present'),
+ interface=dict(type='str', required=True),
+ state=dict(choices=['absent', 'present'], default='present'),
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_vlan.py b/lib/ansible/modules/network/nxos/nxos_vlan.py
index f0413dd0259..69579e7023e 100644
--- a/lib/ansible/modules/network/nxos/nxos_vlan.py
+++ b/lib/ansible/modules/network/nxos/nxos_vlan.py
@@ -555,17 +555,17 @@ def execute_show_command(command, module, command_type='cli_show'):
def main():
argument_spec = dict(
- vlan_id=dict(required=False, type='str'),
- vlan_range=dict(required=False),
- name=dict(required=False),
- vlan_state=dict(choices=['active', 'suspend'], required=False),
- mapped_vni=dict(required=False, type='str'),
- state=dict(choices=['present', 'absent'], default='present',
+ vlan_id=dict(required=False, type='str'),
+ vlan_range=dict(required=False),
+ name=dict(required=False),
+ vlan_state=dict(choices=['active', 'suspend'], required=False),
+ mapped_vni=dict(required=False, type='str'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- admin_state=dict(choices=['up', 'down'], required=False),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ admin_state=dict(choices=['up', 'down'], required=False),
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
mutually_exclusive=[['vlan_range', 'name'],
diff --git a/lib/ansible/modules/network/nxos/nxos_vpc.py b/lib/ansible/modules/network/nxos/nxos_vpc.py
index db78dd0a7fc..18f1fc254a8 100644
--- a/lib/ansible/modules/network/nxos/nxos_vpc.py
+++ b/lib/ansible/modules/network/nxos/nxos_vpc.py
@@ -436,7 +436,7 @@ def get_vpc(module):
body = execute_show_command(command, module)[0]
domain = str(body['vpc-domain-id'])
auto_recovery = get_autorecovery(str(
- body['vpc-auto-recovery-status']))
+ body['vpc-auto-recovery-status']))
if domain != 'not configured':
delay_restore = None
@@ -563,19 +563,19 @@ def get_commands_to_remove_vpc_interface(portchannel, config_value):
def main():
argument_spec = dict(
- domain=dict(required=True, type='str'),
- role_priority=dict(required=False, type='str'),
- system_priority=dict(required=False, type='str'),
- pkl_src=dict(required=False),
- pkl_dest=dict(required=False),
- pkl_vrf=dict(required=False, default='management'),
- peer_gw=dict(required=True, type='bool'),
- auto_recovery=dict(required=True, type='bool'),
- delay_restore=dict(required=False, type='str'),
- state=dict(choices=['absent', 'present'], default='present'),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ domain=dict(required=True, type='str'),
+ role_priority=dict(required=False, type='str'),
+ system_priority=dict(required=False, type='str'),
+ pkl_src=dict(required=False),
+ pkl_dest=dict(required=False),
+ pkl_vrf=dict(required=False, default='management'),
+ peer_gw=dict(required=True, type='bool'),
+ auto_recovery=dict(required=True, type='bool'),
+ delay_restore=dict(required=False, type='str'),
+ state=dict(choices=['absent', 'present'], default='present'),
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_vpc_interface.py b/lib/ansible/modules/network/nxos/nxos_vpc_interface.py
index 85b944f178c..a5e31ae60b9 100644
--- a/lib/ansible/modules/network/nxos/nxos_vpc_interface.py
+++ b/lib/ansible/modules/network/nxos/nxos_vpc_interface.py
@@ -477,13 +477,13 @@ def get_commands_to_config_vpc_interface(portchannel, delta, config_value, exist
def main():
argument_spec = dict(
- portchannel=dict(required=True, type='str'),
- vpc=dict(required=False, type='str'),
- peer_link=dict(required=False, type='bool'),
- state=dict(choices=['absent', 'present'], default='present'),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ portchannel=dict(required=True, type='str'),
+ vpc=dict(required=False, type='str'),
+ peer_link=dict(required=False, type='bool'),
+ state=dict(choices=['absent', 'present'], default='present'),
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
mutually_exclusive=[['vpc', 'peer_link']],
@@ -534,7 +534,7 @@ def main():
module.fail_json(msg="A peer link already exists on"
" the device. Remove it first",
current_peer_link='Po{0}'.format(
- active_peer_link))
+ active_peer_link))
config_value = 'peer-link'
diff --git a/lib/ansible/modules/network/nxos/nxos_vrf.py b/lib/ansible/modules/network/nxos/nxos_vrf.py
index 03301fe252e..574a51d4b5e 100644
--- a/lib/ansible/modules/network/nxos/nxos_vrf.py
+++ b/lib/ansible/modules/network/nxos/nxos_vrf.py
@@ -445,17 +445,17 @@ def get_vrf(vrf, module):
def main():
argument_spec = dict(
- vrf=dict(required=True),
- description=dict(default=None, required=False),
- vni=dict(required=False, type='str'),
- rd=dict(required=False, type='str'),
- admin_state=dict(default='up', choices=['up', 'down'],
+ vrf=dict(required=True),
+ description=dict(default=None, required=False),
+ vni=dict(required=False, type='str'),
+ rd=dict(required=False, type='str'),
+ admin_state=dict(default='up', choices=['up', 'down'],
required=False),
- state=dict(default='present', choices=['present', 'absent'],
+ state=dict(default='present', choices=['present', 'absent'],
required=False),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_vrf_af.py b/lib/ansible/modules/network/nxos/nxos_vrf_af.py
index 1beca09ec85..086eef1bfc1 100644
--- a/lib/ansible/modules/network/nxos/nxos_vrf_af.py
+++ b/lib/ansible/modules/network/nxos/nxos_vrf_af.py
@@ -367,16 +367,16 @@ def state_absent(module, existing, proposed, candidate):
def main():
argument_spec = dict(
- vrf=dict(required=True, type='str'),
- safi=dict(required=True, type='str', choices=['unicast','multicast']),
- afi=dict(required=True, type='str', choices=['ipv4','ipv6']),
- route_target_both_auto_evpn=dict(required=False, type='bool'),
- m_facts=dict(required=False, default=False, type='bool'),
- state=dict(choices=['present', 'absent'], default='present',
+ vrf=dict(required=True, type='str'),
+ safi=dict(required=True, type='str', choices=['unicast','multicast']),
+ afi=dict(required=True, type='str', choices=['ipv4','ipv6']),
+ route_target_both_auto_evpn=dict(required=False, type='bool'),
+ m_facts=dict(required=False, default=False, type='bool'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -384,11 +384,11 @@ def main():
state = module.params['state']
args = [
- 'vrf',
- 'safi',
- 'afi',
- 'route_target_both_auto_evpn'
- ]
+ 'vrf',
+ 'safi',
+ 'afi',
+ 'route_target_both_auto_evpn'
+ ]
existing = invoke('get_existing', module, args)
end_state = existing
diff --git a/lib/ansible/modules/network/nxos/nxos_vrf_interface.py b/lib/ansible/modules/network/nxos/nxos_vrf_interface.py
index 66353ee04fd..95e509393a0 100644
--- a/lib/ansible/modules/network/nxos/nxos_vrf_interface.py
+++ b/lib/ansible/modules/network/nxos/nxos_vrf_interface.py
@@ -418,13 +418,13 @@ def is_default(interface, module):
def main():
argument_spec = dict(
- vrf=dict(required=True),
- interface=dict(type='str', required=True),
- state=dict(default='present', choices=['present', 'absent'],
+ vrf=dict(required=True),
+ interface=dict(type='str', required=True),
+ state=dict(default='present', choices=['present', 'absent'],
required=False),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_vrrp.py b/lib/ansible/modules/network/nxos/nxos_vrrp.py
index 9a560bd7949..5fa1c99b25e 100644
--- a/lib/ansible/modules/network/nxos/nxos_vrrp.py
+++ b/lib/ansible/modules/network/nxos/nxos_vrrp.py
@@ -572,20 +572,20 @@ def validate_params(param, module):
def main():
argument_spec = dict(
- group=dict(required=True, type='str'),
- interface=dict(required=True),
- priority=dict(required=False, type='str'),
- preempt=dict(required=False, type='bool'),
- vip=dict(required=False, type='str'),
- admin_state=dict(required=False, type='str',
+ group=dict(required=True, type='str'),
+ interface=dict(required=True),
+ priority=dict(required=False, type='str'),
+ preempt=dict(required=False, type='bool'),
+ vip=dict(required=False, type='str'),
+ admin_state=dict(required=False, type='str',
choices=['shutdown', 'no shutdown'],
default='no shutdown'),
- authentication=dict(required=False, type='str'),
- state=dict(choices=['absent', 'present'],
+ authentication=dict(required=False, type='str'),
+ state=dict(choices=['absent', 'present'],
required=False, default='present'),
- include_defaults=dict(default=False),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=False),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_vtp_domain.py b/lib/ansible/modules/network/nxos/nxos_vtp_domain.py
index 61f28768b09..f364b266bc7 100644
--- a/lib/ansible/modules/network/nxos/nxos_vtp_domain.py
+++ b/lib/ansible/modules/network/nxos/nxos_vtp_domain.py
@@ -339,7 +339,7 @@ def get_vtp_config(module):
command = 'show vtp status'
body = execute_show_command(
- command, module, command_type='cli_show_ascii')[0]
+ command, module, command_type='cli_show_ascii')[0]
vtp_parsed = {}
if body:
@@ -378,7 +378,7 @@ def get_vtp_password(module):
def main():
argument_spec = dict(
- domain=dict(type='str', required=True),
+ domain=dict(type='str', required=True),
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_vtp_password.py b/lib/ansible/modules/network/nxos/nxos_vtp_password.py
index 69f9d6f852f..c7ae9e314ac 100644
--- a/lib/ansible/modules/network/nxos/nxos_vtp_password.py
+++ b/lib/ansible/modules/network/nxos/nxos_vtp_password.py
@@ -369,7 +369,7 @@ def get_vtp_config(module):
command = 'show vtp status'
body = execute_show_command(
- command, module, command_type='cli_show_ascii')[0]
+ command, module, command_type='cli_show_ascii')[0]
vtp_parsed = {}
if body:
@@ -408,8 +408,8 @@ def get_vtp_password(module):
def main():
argument_spec = dict(
- vtp_password=dict(type='str', no_log=True),
- state=dict(choices=['absent', 'present'],
+ vtp_password=dict(type='str', no_log=True),
+ state=dict(choices=['absent', 'present'],
default='present'),
)
module = get_network_module(argument_spec=argument_spec,
diff --git a/lib/ansible/modules/network/nxos/nxos_vtp_version.py b/lib/ansible/modules/network/nxos/nxos_vtp_version.py
index 5661f45084b..2cc1f5f923c 100644
--- a/lib/ansible/modules/network/nxos/nxos_vtp_version.py
+++ b/lib/ansible/modules/network/nxos/nxos_vtp_version.py
@@ -334,7 +334,7 @@ def get_vtp_config(module):
command = 'show vtp status'
body = execute_show_command(
- command, module, command_type='cli_show_ascii')[0]
+ command, module, command_type='cli_show_ascii')[0]
vtp_parsed = {}
if body:
@@ -373,7 +373,7 @@ def get_vtp_password(module):
def main():
argument_spec = dict(
- version=dict(type='str', choices=['1', '2'], required=True),
+ version=dict(type='str', choices=['1', '2'], required=True),
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
diff --git a/lib/ansible/modules/network/nxos/nxos_vxlan_vtep.py b/lib/ansible/modules/network/nxos/nxos_vxlan_vtep.py
index 835c072f7cd..96d3513ac0f 100644
--- a/lib/ansible/modules/network/nxos/nxos_vxlan_vtep.py
+++ b/lib/ansible/modules/network/nxos/nxos_vxlan_vtep.py
@@ -445,18 +445,18 @@ def state_absent(module, existing, proposed, candidate):
def main():
argument_spec = dict(
- interface=dict(required=True, type='str'),
- description=dict(required=False, type='str'),
- host_reachability=dict(required=False, type='bool'),
- shutdown=dict(required=False, type='bool'),
- source_interface=dict(required=False, type='str'),
- source_interface_hold_down_time=dict(required=False, type='str'),
- m_facts=dict(required=False, default=False, type='bool'),
- state=dict(choices=['present', 'absent'], default='present',
+ interface=dict(required=True, type='str'),
+ description=dict(required=False, type='str'),
+ host_reachability=dict(required=False, type='bool'),
+ shutdown=dict(required=False, type='bool'),
+ source_interface=dict(required=False, type='str'),
+ source_interface_hold_down_time=dict(required=False, type='str'),
+ m_facts=dict(required=False, default=False, type='bool'),
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -465,13 +465,13 @@ def main():
interface = module.params['interface'].lower()
args = [
- 'interface',
- 'description',
- 'host_reachability',
- 'shutdown',
- 'source_interface',
- 'source_interface_hold_down_time'
- ]
+ 'interface',
+ 'description',
+ 'host_reachability',
+ 'shutdown',
+ 'source_interface',
+ 'source_interface_hold_down_time'
+ ]
existing = invoke('get_existing', module, args)
end_state = existing
diff --git a/lib/ansible/modules/network/nxos/nxos_vxlan_vtep_vni.py b/lib/ansible/modules/network/nxos/nxos_vxlan_vtep_vni.py
index 38ffffdbd70..cfdf7ea364e 100644
--- a/lib/ansible/modules/network/nxos/nxos_vxlan_vtep_vni.py
+++ b/lib/ansible/modules/network/nxos/nxos_vxlan_vtep_vni.py
@@ -378,7 +378,7 @@ def get_existing(module, args):
if 'member vni {0} associate-vrf'.format(module.params['vni']) in temp_config:
parents.append('member vni {0} associate-vrf'.format(
- module.params['vni']))
+ module.params['vni']))
config = netcfg.get_section(parents)
elif "member vni {0}".format(module.params['vni']) in temp_config:
parents.append('member vni {0}'.format(module.params['vni']))
@@ -473,7 +473,7 @@ def state_present(module, existing, proposed, candidate):
def state_absent(module, existing, proposed, candidate):
if existing['assoc_vrf']:
commands = ['no member vni {0} associate-vrf'.format(
- module.params['vni'])]
+ module.params['vni'])]
else:
commands = ['no member vni {0}'.format(module.params['vni'])]
parents = ['interface {0}'.format(module.params['interface'])]
@@ -482,19 +482,19 @@ def state_absent(module, existing, proposed, candidate):
def main():
argument_spec = dict(
- interface=dict(required=True, type='str'),
- vni=dict(required=True, type='str'),
- assoc_vrf=dict(required=False, type='bool'),
- multicast_group=dict(required=False, type='str'),
- peer_list=dict(required=False, type='list'),
- suppress_arp=dict(required=False, type='bool'),
- ingress_replication=dict(required=False, type='str',
+ interface=dict(required=True, type='str'),
+ vni=dict(required=True, type='str'),
+ assoc_vrf=dict(required=False, type='bool'),
+ multicast_group=dict(required=False, type='str'),
+ peer_list=dict(required=False, type='list'),
+ suppress_arp=dict(required=False, type='bool'),
+ ingress_replication=dict(required=False, type='str',
choices=['bgp', 'static', 'default']),
- state=dict(choices=['present', 'absent'], default='present',
+ state=dict(choices=['present', 'absent'], default='present',
required=False),
- include_defaults=dict(default=True),
- config=dict(),
- save=dict(type='bool', default=False)
+ include_defaults=dict(default=True),
+ config=dict(),
+ save=dict(type='bool', default=False)
)
module = get_network_module(argument_spec=argument_spec,
supports_check_mode=True)
@@ -521,14 +521,14 @@ def main():
state = module.params['state']
args = [
- 'assoc_vrf',
- 'interface',
- 'vni',
- 'ingress_replication',
- 'multicast_group',
- 'peer_list',
- 'suppress_arp'
- ]
+ 'assoc_vrf',
+ 'interface',
+ 'vni',
+ 'ingress_replication',
+ 'multicast_group',
+ 'peer_list',
+ 'suppress_arp'
+ ]
existing, interface_exist = invoke('get_existing', module, args)
end_state = existing
@@ -557,7 +557,7 @@ def main():
existing['vni'] != module.params['vni']):
module.fail_json(msg="ERROR: VNI delete failed: Could not find"
" vni node for {0}".format(
- module.params['vni']),
+ module.params['vni']),
existing_vni=existing['vni'])
else:
candidate = CustomNetworkConfig(indent=3)
diff --git a/lib/ansible/modules/network/snmp_facts.py b/lib/ansible/modules/network/snmp_facts.py
index 9fab434f2a6..e28b733c3f9 100644
--- a/lib/ansible/modules/network/snmp_facts.py
+++ b/lib/ansible/modules/network/snmp_facts.py
@@ -156,10 +156,10 @@ def decode_mac(hexstring):
def lookup_adminstatus(int_adminstatus):
adminstatus_options = {
- 1: 'up',
- 2: 'down',
- 3: 'testing'
- }
+ 1: 'up',
+ 2: 'down',
+ 3: 'testing'
+ }
if int_adminstatus in adminstatus_options:
return adminstatus_options[int_adminstatus]
else:
@@ -167,14 +167,14 @@ def lookup_adminstatus(int_adminstatus):
def lookup_operstatus(int_operstatus):
operstatus_options = {
- 1: 'up',
- 2: 'down',
- 3: 'testing',
- 4: 'unknown',
- 5: 'dormant',
- 6: 'notPresent',
- 7: 'lowerLayerDown'
- }
+ 1: 'up',
+ 2: 'down',
+ 3: 'testing',
+ 4: 'unknown',
+ 5: 'dormant',
+ 6: 'notPresent',
+ 7: 'lowerLayerDown'
+ }
if int_operstatus in operstatus_options:
return operstatus_options[int_operstatus]
else:
@@ -354,9 +354,9 @@ def main():
for ipv4_network in ipv4_networks:
current_interface = ipv4_networks[ipv4_network]['interface']
current_network = {
- 'address': ipv4_networks[ipv4_network]['address'],
- 'netmask': ipv4_networks[ipv4_network]['netmask']
- }
+ 'address': ipv4_networks[ipv4_network]['address'],
+ 'netmask': ipv4_networks[ipv4_network]['netmask']
+ }
if not current_interface in interface_to_ipv4:
interface_to_ipv4[current_interface] = []
interface_to_ipv4[current_interface].append(current_network)
diff --git a/lib/ansible/modules/notification/sendgrid.py b/lib/ansible/modules/notification/sendgrid.py
index 4b5b9b16175..63da5a7fcdc 100644
--- a/lib/ansible/modules/notification/sendgrid.py
+++ b/lib/ansible/modules/notification/sendgrid.py
@@ -230,9 +230,9 @@ def main():
),
supports_check_mode=True,
mutually_exclusive = [
- ['api_key', 'password'],
- ['api_key', 'username']
- ],
+ ['api_key', 'password'],
+ ['api_key', 'username']
+ ],
required_together = [['username', 'password']],
)
diff --git a/lib/ansible/modules/packaging/language/bundler.py b/lib/ansible/modules/packaging/language/bundler.py
index e7950b08548..deef30b9fe1 100644
--- a/lib/ansible/modules/packaging/language/bundler.py
+++ b/lib/ansible/modules/packaging/language/bundler.py
@@ -152,19 +152,19 @@ def get_bundler_executable(module):
def main():
module = AnsibleModule(
argument_spec=dict(
- executable=dict(default=None, required=False),
- state=dict(default='present', required=False, choices=['present', 'latest']),
- chdir=dict(default=None, required=False, type='path'),
- exclude_groups=dict(default=None, required=False, type='list'),
- clean=dict(default=False, required=False, type='bool'),
- gemfile=dict(default=None, required=False, type='path'),
- local=dict(default=False, required=False, type='bool'),
- deployment_mode=dict(default=False, required=False, type='bool'),
- user_install=dict(default=True, required=False, type='bool'),
- gem_path=dict(default=None, required=False, type='path'),
- binstub_directory=dict(default=None, required=False, type='path'),
- extra_args=dict(default=None, required=False),
- ),
+ executable=dict(default=None, required=False),
+ state=dict(default='present', required=False, choices=['present', 'latest']),
+ chdir=dict(default=None, required=False, type='path'),
+ exclude_groups=dict(default=None, required=False, type='list'),
+ clean=dict(default=False, required=False, type='bool'),
+ gemfile=dict(default=None, required=False, type='path'),
+ local=dict(default=False, required=False, type='bool'),
+ deployment_mode=dict(default=False, required=False, type='bool'),
+ user_install=dict(default=True, required=False, type='bool'),
+ gem_path=dict(default=None, required=False, type='path'),
+ binstub_directory=dict(default=None, required=False, type='path'),
+ extra_args=dict(default=None, required=False),
+ ),
supports_check_mode=True
)
diff --git a/lib/ansible/modules/packaging/os/apt.py b/lib/ansible/modules/packaging/os/apt.py
index 5afbfde6e6a..15d499bb690 100644
--- a/lib/ansible/modules/packaging/os/apt.py
+++ b/lib/ansible/modules/packaging/os/apt.py
@@ -239,14 +239,14 @@ from ansible.module_utils.urls import fetch_url
# APT related constants
APT_ENV_VARS = dict(
- DEBIAN_FRONTEND = 'noninteractive',
- DEBIAN_PRIORITY = 'critical',
- # We screenscrape apt-get and aptitude output for information so we need
- # to make sure we use the C locale when running commands
- LANG = 'C',
- LC_ALL = 'C',
- LC_MESSAGES = 'C',
- LC_CTYPE = 'C',
+ DEBIAN_FRONTEND = 'noninteractive',
+ DEBIAN_PRIORITY = 'critical',
+ # We screenscrape apt-get and aptitude output for information so we need
+ # to make sure we use the C locale when running commands
+ LANG = 'C',
+ LC_ALL = 'C',
+ LC_MESSAGES = 'C',
+ LC_CTYPE = 'C',
)
DPKG_OPTIONS = 'force-confdef,force-confold'
diff --git a/lib/ansible/modules/packaging/os/apt_rpm.py b/lib/ansible/modules/packaging/os/apt_rpm.py
index f800073ea4c..4091c5a2c38 100755
--- a/lib/ansible/modules/packaging/os/apt_rpm.py
+++ b/lib/ansible/modules/packaging/os/apt_rpm.py
@@ -158,10 +158,10 @@ def install_packages(module, pkgspec):
def main():
module = AnsibleModule(
- argument_spec = dict(
- state = dict(default='installed', choices=['installed', 'removed', 'absent', 'present']),
- update_cache = dict(default=False, aliases=['update-cache'], type='bool'),
- package = dict(aliases=['pkg', 'name'], required=True)))
+ argument_spec = dict(
+ state = dict(default='installed', choices=['installed', 'removed', 'absent', 'present']),
+ update_cache = dict(default=False, aliases=['update-cache'], type='bool'),
+ package = dict(aliases=['pkg', 'name'], required=True)))
if not os.path.exists(APT_PATH) or not os.path.exists(RPM_PATH):
diff --git a/lib/ansible/modules/packaging/os/pkgin.py b/lib/ansible/modules/packaging/os/pkgin.py
index a66c11fe4a5..4a51c079eb7 100755
--- a/lib/ansible/modules/packaging/os/pkgin.py
+++ b/lib/ansible/modules/packaging/os/pkgin.py
@@ -336,16 +336,16 @@ def clean_cache(module):
def main():
module = AnsibleModule(
- argument_spec = dict(
- state = dict(default="present", choices=["present","absent"]),
- name = dict(aliases=["pkg"], type='list'),
- update_cache = dict(default='no', type='bool'),
- upgrade = dict(default='no', type='bool'),
- full_upgrade = dict(default='no', type='bool'),
- clean = dict(default='no', type='bool'),
- force = dict(default='no', type='bool')),
- required_one_of = [['name', 'update_cache', 'upgrade', 'full_upgrade', 'clean']],
- supports_check_mode = True)
+ argument_spec = dict(
+ state = dict(default="present", choices=["present","absent"]),
+ name = dict(aliases=["pkg"], type='list'),
+ update_cache = dict(default='no', type='bool'),
+ upgrade = dict(default='no', type='bool'),
+ full_upgrade = dict(default='no', type='bool'),
+ clean = dict(default='no', type='bool'),
+ force = dict(default='no', type='bool')),
+ required_one_of = [['name', 'update_cache', 'upgrade', 'full_upgrade', 'clean']],
+ supports_check_mode = True)
global PKGIN_PATH
PKGIN_PATH = module.get_bin_path('pkgin', True, ['/opt/local/bin'])
diff --git a/lib/ansible/modules/packaging/os/pkgng.py b/lib/ansible/modules/packaging/os/pkgng.py
index 4b6eac739c2..cb31cf3d84f 100644
--- a/lib/ansible/modules/packaging/os/pkgng.py
+++ b/lib/ansible/modules/packaging/os/pkgng.py
@@ -305,17 +305,17 @@ def autoremove_packages(module, pkgng_path, dir_arg):
def main():
module = AnsibleModule(
- argument_spec = dict(
- state = dict(default="present", choices=["present","absent"], required=False),
- name = dict(aliases=["pkg"], required=True, type='list'),
- cached = dict(default=False, type='bool'),
- annotation = dict(default="", required=False),
- pkgsite = dict(default="", required=False),
- rootdir = dict(default="", required=False, type='path'),
- chroot = dict(default="", required=False, type='path'),
- autoremove = dict(default=False, type='bool')),
- supports_check_mode = True,
- mutually_exclusive =[["rootdir", "chroot"]])
+ argument_spec = dict(
+ state = dict(default="present", choices=["present","absent"], required=False),
+ name = dict(aliases=["pkg"], required=True, type='list'),
+ cached = dict(default=False, type='bool'),
+ annotation = dict(default="", required=False),
+ pkgsite = dict(default="", required=False),
+ rootdir = dict(default="", required=False, type='path'),
+ chroot = dict(default="", required=False, type='path'),
+ autoremove = dict(default=False, type='bool')),
+ supports_check_mode = True,
+ mutually_exclusive =[["rootdir", "chroot"]])
pkgng_path = module.get_bin_path('pkg', True)
diff --git a/lib/ansible/modules/packaging/os/portinstall.py b/lib/ansible/modules/packaging/os/portinstall.py
index 3f0e4965e83..b5741058347 100644
--- a/lib/ansible/modules/packaging/os/portinstall.py
+++ b/lib/ansible/modules/packaging/os/portinstall.py
@@ -195,10 +195,10 @@ def install_packages(module, packages, use_packages):
def main():
module = AnsibleModule(
- argument_spec = dict(
- state = dict(default="present", choices=["present","absent"]),
- name = dict(aliases=["pkg"], required=True),
- use_packages = dict(type='bool', default='yes')))
+ argument_spec = dict(
+ state = dict(default="present", choices=["present","absent"]),
+ name = dict(aliases=["pkg"], required=True),
+ use_packages = dict(type='bool', default='yes')))
p = module.params
diff --git a/lib/ansible/modules/packaging/os/redhat_subscription.py b/lib/ansible/modules/packaging/os/redhat_subscription.py
index c1a4324d7b1..d65c29d26b4 100644
--- a/lib/ansible/modules/packaging/os/redhat_subscription.py
+++ b/lib/ansible/modules/packaging/os/redhat_subscription.py
@@ -273,7 +273,7 @@ class Rhsm(RegistrationBase):
# Quick version...
if False:
return os.path.isfile('/etc/pki/consumer/cert.pem') and \
- os.path.isfile('/etc/pki/consumer/key.pem')
+ os.path.isfile('/etc/pki/consumer/key.pem')
args = [SUBMAN_CMD, 'identity']
rc, stdout, stderr = self.module.run_command(args, check_rc=False)
@@ -469,26 +469,26 @@ def main():
rhsm = Rhsm(None)
module = AnsibleModule(
- argument_spec = dict(
- state = dict(default='present', choices=['present', 'absent']),
- username = dict(default=None, required=False),
- password = dict(default=None, required=False, no_log=True),
- server_hostname = dict(default=rhsm.config.get_option('server.hostname'), required=False),
- server_insecure = dict(default=rhsm.config.get_option('server.insecure'), required=False),
- rhsm_baseurl = dict(default=rhsm.config.get_option('rhsm.baseurl'), required=False),
- autosubscribe = dict(default=False, type='bool'),
- activationkey = dict(default=None, required=False),
- org_id = dict(default=None, required=False),
- environment = dict(default=None, required=False, type='str'),
- pool = dict(default='^$', required=False, type='str'),
- consumer_type = dict(default=None, required=False),
- consumer_name = dict(default=None, required=False),
- consumer_id = dict(default=None, required=False),
- force_register = dict(default=False, type='bool'),
- ),
- required_together = [ ['username', 'password'], ['activationkey', 'org_id'] ],
- mutually_exclusive = [ ['username', 'activationkey'] ],
- )
+ argument_spec = dict(
+ state = dict(default='present', choices=['present', 'absent']),
+ username = dict(default=None, required=False),
+ password = dict(default=None, required=False, no_log=True),
+ server_hostname = dict(default=rhsm.config.get_option('server.hostname'), required=False),
+ server_insecure = dict(default=rhsm.config.get_option('server.insecure'), required=False),
+ rhsm_baseurl = dict(default=rhsm.config.get_option('rhsm.baseurl'), required=False),
+ autosubscribe = dict(default=False, type='bool'),
+ activationkey = dict(default=None, required=False),
+ org_id = dict(default=None, required=False),
+ environment = dict(default=None, required=False, type='str'),
+ pool = dict(default='^$', required=False, type='str'),
+ consumer_type = dict(default=None, required=False),
+ consumer_name = dict(default=None, required=False),
+ consumer_id = dict(default=None, required=False),
+ force_register = dict(default=False, type='bool'),
+ ),
+ required_together = [ ['username', 'password'], ['activationkey', 'org_id'] ],
+ mutually_exclusive = [ ['username', 'activationkey'] ],
+ )
rhsm.module = module
state = module.params['state']
diff --git a/lib/ansible/modules/packaging/os/rhn_channel.py b/lib/ansible/modules/packaging/os/rhn_channel.py
index 5f35a3f78a7..69993e33ef2 100644
--- a/lib/ansible/modules/packaging/os/rhn_channel.py
+++ b/lib/ansible/modules/packaging/os/rhn_channel.py
@@ -135,7 +135,7 @@ def main():
user = dict(required=True),
password = dict(required=True, aliases=['pwd']),
)
-# supports_check_mode=True
+ # supports_check_mode=True
)
state = module.params['state']
diff --git a/lib/ansible/modules/packaging/os/rhn_register.py b/lib/ansible/modules/packaging/os/rhn_register.py
index c228f0b1b7a..ab2431c7ec4 100644
--- a/lib/ansible/modules/packaging/os/rhn_register.py
+++ b/lib/ansible/modules/packaging/os/rhn_register.py
@@ -358,19 +358,19 @@ def main():
rhn = Rhn()
module = AnsibleModule(
- argument_spec = dict(
- state = dict(default='present', choices=['present', 'absent']),
- username = dict(default=None, required=False),
- password = dict(default=None, required=False, no_log=True),
- server_url = dict(default=None, required=False),
- activationkey = dict(default=None, required=False, no_log=True),
- profilename = dict(default=None, required=False),
- sslcacert = dict(default=None, required=False, type='path'),
- systemorgid = dict(default=None, required=False),
- enable_eus = dict(default=False, type='bool'),
- channels = dict(default=[], type='list'),
- )
+ argument_spec = dict(
+ state = dict(default='present', choices=['present', 'absent']),
+ username = dict(default=None, required=False),
+ password = dict(default=None, required=False, no_log=True),
+ server_url = dict(default=None, required=False),
+ activationkey = dict(default=None, required=False, no_log=True),
+ profilename = dict(default=None, required=False),
+ sslcacert = dict(default=None, required=False, type='path'),
+ systemorgid = dict(default=None, required=False),
+ enable_eus = dict(default=False, type='bool'),
+ channels = dict(default=[], type='list'),
)
+ )
if not HAS_UP2DATE_CLIENT:
module.fail_json(msg="Unable to import up2date_client. Is 'rhn-client-tools' installed?")
diff --git a/lib/ansible/modules/packaging/os/rpm_key.py b/lib/ansible/modules/packaging/os/rpm_key.py
index 9cb058c56aa..5ab45db9f24 100644
--- a/lib/ansible/modules/packaging/os/rpm_key.py
+++ b/lib/ansible/modules/packaging/os/rpm_key.py
@@ -200,13 +200,13 @@ class RpmKey:
def main():
module = AnsibleModule(
- argument_spec = dict(
- state=dict(default='present', choices=['present', 'absent'], type='str'),
- key=dict(required=True, type='str'),
- validate_certs=dict(default='yes', type='bool'),
- ),
- supports_check_mode=True
- )
+ argument_spec = dict(
+ state=dict(default='present', choices=['present', 'absent'], type='str'),
+ key=dict(required=True, type='str'),
+ validate_certs=dict(default='yes', type='bool'),
+ ),
+ supports_check_mode=True
+ )
RpmKey(module)
diff --git a/lib/ansible/modules/packaging/os/urpmi.py b/lib/ansible/modules/packaging/os/urpmi.py
index 300bb29570d..2dc94267dfe 100644
--- a/lib/ansible/modules/packaging/os/urpmi.py
+++ b/lib/ansible/modules/packaging/os/urpmi.py
@@ -183,12 +183,12 @@ def install_packages(module, pkgspec, force=True, no_recommends=True):
def main():
module = AnsibleModule(
- argument_spec = dict(
- state = dict(default='installed', choices=['installed', 'removed', 'absent', 'present']),
- update_cache = dict(default=False, aliases=['update-cache'], type='bool'),
- force = dict(default=True, type='bool'),
- no_recommends = dict(default=True, aliases=['no-recommends'], type='bool'),
- package = dict(aliases=['pkg', 'name'], required=True)))
+ argument_spec = dict(
+ state = dict(default='installed', choices=['installed', 'removed', 'absent', 'present']),
+ update_cache = dict(default=False, aliases=['update-cache'], type='bool'),
+ force = dict(default=True, type='bool'),
+ no_recommends = dict(default=True, aliases=['no-recommends'], type='bool'),
+ package = dict(aliases=['pkg', 'name'], required=True)))
if not os.path.exists(URPMI_PATH):
diff --git a/lib/ansible/modules/source_control/github_hooks.py b/lib/ansible/modules/source_control/github_hooks.py
index 56bf49fdb6f..ec14f2bc171 100644
--- a/lib/ansible/modules/source_control/github_hooks.py
+++ b/lib/ansible/modules/source_control/github_hooks.py
@@ -166,13 +166,13 @@ def _delete(module, hookurl, oauthkey, repo, user, hookid):
def main():
module = AnsibleModule(
argument_spec=dict(
- action=dict(required=True, choices=['list','clean504','cleanall','create']),
- hookurl=dict(required=False),
- oauthkey=dict(required=True, no_log=True),
- repo=dict(required=True),
- user=dict(required=True),
- validate_certs=dict(default='yes', type='bool'),
- content_type=dict(default='json', choices=['json', 'form']),
+ action=dict(required=True, choices=['list','clean504','cleanall','create']),
+ hookurl=dict(required=False),
+ oauthkey=dict(required=True, no_log=True),
+ repo=dict(required=True),
+ user=dict(required=True),
+ validate_certs=dict(default='yes', type='bool'),
+ content_type=dict(default='json', choices=['json', 'form']),
)
)
diff --git a/lib/ansible/modules/system/authorized_key.py b/lib/ansible/modules/system/authorized_key.py
index aa2c9d21a4b..1800fc2590d 100644
--- a/lib/ansible/modules/system/authorized_key.py
+++ b/lib/ansible/modules/system/authorized_key.py
@@ -639,15 +639,15 @@ def enforce_state(module, params):
def main():
module = AnsibleModule(
argument_spec = dict(
- user = dict(required=True, type='str'),
- key = dict(required=True, type='str'),
- path = dict(required=False, type='str'),
- manage_dir = dict(required=False, type='bool', default=True),
- state = dict(default='present', choices=['absent','present']),
- key_options = dict(required=False, type='str'),
- unique = dict(default=False, type='bool'),
- exclusive = dict(default=False, type='bool'),
- validate_certs = dict(default=True, type='bool'),
+ user = dict(required=True, type='str'),
+ key = dict(required=True, type='str'),
+ path = dict(required=False, type='str'),
+ manage_dir = dict(required=False, type='bool', default=True),
+ state = dict(default='present', choices=['absent','present']),
+ key_options = dict(required=False, type='str'),
+ unique = dict(default=False, type='bool'),
+ exclusive = dict(default=False, type='bool'),
+ validate_certs = dict(default=True, type='bool'),
),
supports_check_mode=True
)
diff --git a/lib/ansible/modules/system/cron.py b/lib/ansible/modules/system/cron.py
index 764f19362f4..8b46bcfd7a0 100644
--- a/lib/ansible/modules/system/cron.py
+++ b/lib/ansible/modules/system/cron.py
@@ -605,9 +605,9 @@ def main():
),
supports_check_mode = True,
mutually_exclusive=[
- ['reboot', 'special_time'],
- ['insertafter', 'insertbefore'],
- ]
+ ['reboot', 'special_time'],
+ ['insertafter', 'insertbefore'],
+ ]
)
name = module.params['name']
diff --git a/lib/ansible/modules/system/debconf.py b/lib/ansible/modules/system/debconf.py
index 224f2fbcb9b..e2d5b83ff33 100644
--- a/lib/ansible/modules/system/debconf.py
+++ b/lib/ansible/modules/system/debconf.py
@@ -138,11 +138,11 @@ def main():
module = AnsibleModule(
argument_spec = dict(
- name = dict(required=True, aliases=['pkg'], type='str'),
- question = dict(required=False, aliases=['setting', 'selection'], type='str'),
- vtype = dict(required=False, type='str', choices=['string', 'password', 'boolean', 'select', 'multiselect', 'note', 'error', 'title', 'text', 'seen']),
- value = dict(required=False, type='str', aliases=['answer']),
- unseen = dict(required=False, type='bool'),
+ name = dict(required=True, aliases=['pkg'], type='str'),
+ question = dict(required=False, aliases=['setting', 'selection'], type='str'),
+ vtype = dict(required=False, type='str', choices=['string', 'password', 'boolean', 'select', 'multiselect', 'note', 'error', 'title', 'text', 'seen']),
+ value = dict(required=False, type='str', aliases=['answer']),
+ unseen = dict(required=False, type='bool'),
),
required_together = ( ['question','vtype', 'value'],),
supports_check_mode=True,
diff --git a/lib/ansible/modules/system/gconftool2.py b/lib/ansible/modules/system/gconftool2.py
index 3bdd65d51ce..3c4a919c820 100644
--- a/lib/ansible/modules/system/gconftool2.py
+++ b/lib/ansible/modules/system/gconftool2.py
@@ -166,21 +166,21 @@ def main():
# Setup the Ansible module
module = AnsibleModule(
argument_spec=dict(
- key=dict(required=True, default=None, type='str'),
- value_type=dict(required=False,
+ key=dict(required=True, default=None, type='str'),
+ value_type=dict(required=False,
choices=['int', 'bool',
'float', 'string'],
type='str'),
- value=dict(required=False, default=None,
+ value=dict(required=False, default=None,
type='str'),
- state=dict(required=True, default=None,
+ state=dict(required=True, default=None,
choices=['present', 'get', 'absent'],
type='str'),
- direct=dict(required=False,
+ direct=dict(required=False,
default=False, type='bool'),
- config_source=dict(required=False,
+ config_source=dict(required=False,
default=None, type='str')
- ),
+ ),
supports_check_mode=True
)
diff --git a/lib/ansible/modules/system/openwrt_init.py b/lib/ansible/modules/system/openwrt_init.py
index e986775672e..1e54c2f9eda 100644
--- a/lib/ansible/modules/system/openwrt_init.py
+++ b/lib/ansible/modules/system/openwrt_init.py
@@ -110,11 +110,11 @@ def main():
# init
module = AnsibleModule(
argument_spec = dict(
- name = dict(required=True, type='str', aliases=['service']),
- state = dict(choices=['started', 'stopped', 'restarted', 'reloaded'], type='str'),
- enabled = dict(type='bool'),
- pattern = dict(required=False, default=None),
- ),
+ name = dict(required=True, type='str', aliases=['service']),
+ state = dict(choices=['started', 'stopped', 'restarted', 'reloaded'], type='str'),
+ enabled = dict(type='bool'),
+ pattern = dict(required=False, default=None),
+ ),
supports_check_mode=True,
required_one_of=[['state', 'enabled']],
)
diff --git a/lib/ansible/modules/system/sefcontext.py b/lib/ansible/modules/system/sefcontext.py
index 5ca1fc4e55c..6c9aac929f2 100644
--- a/lib/ansible/modules/system/sefcontext.py
+++ b/lib/ansible/modules/system/sefcontext.py
@@ -117,14 +117,14 @@ if HAVE_SEOBJECT:
### Make backward compatible
option_to_file_type_str = dict(
- a = 'all files',
- b = 'block device',
- c = 'character device',
- d = 'directory',
- f = 'regular file',
- l = 'symbolic link',
- p = 'named pipe',
- s = 'socket file',
+ a = 'all files',
+ b = 'block device',
+ c = 'character device',
+ d = 'directory',
+ f = 'regular file',
+ l = 'symbolic link',
+ p = 'named pipe',
+ s = 'socket file',
)
def semanage_fcontext_exists(sefcontext, target, ftype):
@@ -225,14 +225,14 @@ def semanage_fcontext_delete(module, result, target, ftype, do_reload, sestore='
def main():
module = AnsibleModule(
argument_spec = dict(
- target = dict(required=True, aliases=['path']),
- ftype = dict(required=False, choices=option_to_file_type_str.keys(), default='a'),
- setype = dict(required=True),
- seuser = dict(required=False, default=None),
- selevel = dict(required=False, default=None, aliases=['serange']),
- state = dict(required=False, choices=['present', 'absent'], default='present'),
- reload = dict(required=False, type='bool', default='yes'),
- ),
+ target = dict(required=True, aliases=['path']),
+ ftype = dict(required=False, choices=option_to_file_type_str.keys(), default='a'),
+ setype = dict(required=True),
+ seuser = dict(required=False, default=None),
+ selevel = dict(required=False, default=None, aliases=['serange']),
+ state = dict(required=False, choices=['present', 'absent'], default='present'),
+ reload = dict(required=False, type='bool', default='yes'),
+ ),
supports_check_mode = True,
)
if not HAVE_SELINUX:
diff --git a/lib/ansible/modules/system/seport.py b/lib/ansible/modules/system/seport.py
index bbd049c030c..1fd409981e5 100644
--- a/lib/ansible/modules/system/seport.py
+++ b/lib/ansible/modules/system/seport.py
@@ -266,26 +266,26 @@ def semanage_port_del(module, ports, proto, setype, do_reload, sestore=''):
def main():
module = AnsibleModule(
argument_spec={
- 'ports': {
- 'required': True,
+ 'ports': {
+ 'required': True,
},
- 'proto': {
- 'required': True,
- 'choices': ['tcp', 'udp'],
+ 'proto': {
+ 'required': True,
+ 'choices': ['tcp', 'udp'],
},
- 'setype': {
- 'required': True,
+ 'setype': {
+ 'required': True,
},
- 'state': {
- 'required': True,
- 'choices': ['present', 'absent'],
+ 'state': {
+ 'required': True,
+ 'choices': ['present', 'absent'],
},
- 'reload': {
- 'required': False,
- 'type': 'bool',
- 'default': 'yes',
+ 'reload': {
+ 'required': False,
+ 'type': 'bool',
+ 'default': 'yes',
},
- },
+ },
supports_check_mode=True
)
if not HAVE_SELINUX:
diff --git a/lib/ansible/modules/system/systemd.py b/lib/ansible/modules/system/systemd.py
index 2f93820a1a7..704ba19c22a 100644
--- a/lib/ansible/modules/system/systemd.py
+++ b/lib/ansible/modules/system/systemd.py
@@ -259,14 +259,14 @@ def main():
# initialize
module = AnsibleModule(
argument_spec = dict(
- name = dict(required=True, type='str', aliases=['unit', 'service']),
- state = dict(choices=[ 'started', 'stopped', 'restarted', 'reloaded'], type='str'),
- enabled = dict(type='bool'),
- masked = dict(type='bool'),
- daemon_reload = dict(type='bool', default=False, aliases=['daemon-reload']),
- user = dict(type='bool', default=False),
- no_block = dict(type='bool', default=False),
- ),
+ name = dict(required=True, type='str', aliases=['unit', 'service']),
+ state = dict(choices=[ 'started', 'stopped', 'restarted', 'reloaded'], type='str'),
+ enabled = dict(type='bool'),
+ masked = dict(type='bool'),
+ daemon_reload = dict(type='bool', default=False, aliases=['daemon-reload']),
+ user = dict(type='bool', default=False),
+ no_block = dict(type='bool', default=False),
+ ),
supports_check_mode=True,
required_one_of=[['state', 'enabled', 'masked', 'daemon_reload']],
)
diff --git a/lib/ansible/modules/system/user.py b/lib/ansible/modules/system/user.py
index 721c5d57f9e..6ce4bad2479 100644
--- a/lib/ansible/modules/system/user.py
+++ b/lib/ansible/modules/system/user.py
@@ -2112,10 +2112,10 @@ class HPUX(User):
def main():
ssh_defaults = {
- 'bits': 0,
- 'type': 'rsa',
- 'passphrase': None,
- 'comment': 'ansible-generated on %s' % socket.gethostname()
+ 'bits': 0,
+ 'type': 'rsa',
+ 'passphrase': None,
+ 'comment': 'ansible-generated on %s' % socket.gethostname()
}
module = AnsibleModule(
argument_spec = dict(
diff --git a/lib/ansible/modules/utilities/logic/wait_for.py b/lib/ansible/modules/utilities/logic/wait_for.py
index 8c234fa343a..ee133818dd4 100644
--- a/lib/ansible/modules/utilities/logic/wait_for.py
+++ b/lib/ansible/modules/utilities/logic/wait_for.py
@@ -382,12 +382,12 @@ def _timedelta_total_seconds(timedelta):
def get_connection_state_id(state):
connection_state_id = {
- 'ESTABLISHED': '01',
- 'SYN_SENT': '02',
- 'SYN_RECV': '03',
- 'FIN_WAIT1': '04',
- 'FIN_WAIT2': '05',
- 'TIME_WAIT': '06',
+ 'ESTABLISHED': '01',
+ 'SYN_SENT': '02',
+ 'SYN_RECV': '03',
+ 'FIN_WAIT1': '04',
+ 'FIN_WAIT2': '05',
+ 'TIME_WAIT': '06',
}
return connection_state_id[state]
diff --git a/lib/ansible/modules/web_infrastructure/apache2_module.py b/lib/ansible/modules/web_infrastructure/apache2_module.py
index 6e2519b688b..923c42a28e8 100644
--- a/lib/ansible/modules/web_infrastructure/apache2_module.py
+++ b/lib/ansible/modules/web_infrastructure/apache2_module.py
@@ -120,8 +120,8 @@ def _get_ctl_binary(module):
return ctl_binary
module.fail_json(
- msg="Neither of apache2ctl nor apachctl found."
- " At least one apache control binary is necessary."
+ msg="Neither of apache2ctl nor apachctl found."
+ " At least one apache control binary is necessary."
)
def _module_is_enabled(module):
diff --git a/lib/ansible/modules/web_infrastructure/taiga_issue.py b/lib/ansible/modules/web_infrastructure/taiga_issue.py
index d64f3fa9bc0..83470cc4f65 100644
--- a/lib/ansible/modules/web_infrastructure/taiga_issue.py
+++ b/lib/ansible/modules/web_infrastructure/taiga_issue.py
@@ -193,15 +193,15 @@ def manage_issue(module, taiga_host, project_name, issue_subject, issue_priority
severity_id = severity_list[0].id
issue = {
- "project": project_name,
- "subject": issue_subject,
- "priority": issue_priority,
- "status": issue_status,
- "type": issue_type,
- "severity": issue_severity,
- "description": issue_description,
- "tags": issue_tags,
- }
+ "project": project_name,
+ "subject": issue_subject,
+ "priority": issue_priority,
+ "status": issue_status,
+ "type": issue_type,
+ "severity": issue_severity,
+ "description": issue_description,
+ "tags": issue_tags,
+ }
# An issue is identified by the project_name, the issue_subject and the issue_type
matching_issue_list = filter(lambda x: x.subject == issue_subject and x.type == type_id, project.list_issues())
@@ -288,21 +288,21 @@ def main():
state = module.params['state']
return_status, changed, msg, issue_attr_dict = manage_issue(
- module,
- taiga_host,
- project_name,
- issue_subject,
- issue_priority,
- issue_status,
- issue_type,
- issue_severity,
- issue_description,
- issue_attachment,
- issue_attachment_description,
- issue_tags,
- state,
- check_mode=module.check_mode
- )
+ module,
+ taiga_host,
+ project_name,
+ issue_subject,
+ issue_priority,
+ issue_status,
+ issue_type,
+ issue_severity,
+ issue_description,
+ issue_attachment,
+ issue_attachment_description,
+ issue_tags,
+ state,
+ check_mode=module.check_mode
+ )
if return_status:
if len(issue_attr_dict) > 0:
module.exit_json(changed=changed, msg=msg, issue=issue_attr_dict)
diff --git a/lib/ansible/playbook/block.py b/lib/ansible/playbook/block.py
index 71f074da757..2ff5d33b349 100644
--- a/lib/ansible/playbook/block.py
+++ b/lib/ansible/playbook/block.py
@@ -349,8 +349,8 @@ class Block(Base, Become, Conditional, Taggable):
if isinstance(task, Block):
tmp_list.append(evaluate_block(task))
elif task.action == 'meta' \
- or (task.action == 'include' and task.evaluate_tags([], play_context.skip_tags, all_vars=all_vars)) \
- or task.evaluate_tags(play_context.only_tags, play_context.skip_tags, all_vars=all_vars):
+ or (task.action == 'include' and task.evaluate_tags([], play_context.skip_tags, all_vars=all_vars)) \
+ or task.evaluate_tags(play_context.only_tags, play_context.skip_tags, all_vars=all_vars):
tmp_list.append(task)
return tmp_list
diff --git a/lib/ansible/playbook/helpers.py b/lib/ansible/playbook/helpers.py
index 5e9c0fb81bf..6c6e1151a09 100644
--- a/lib/ansible/playbook/helpers.py
+++ b/lib/ansible/playbook/helpers.py
@@ -133,8 +133,8 @@ def load_list_of_tasks(ds, play, block=None, role=None, task_include=None, use_h
is_static = t.static
else:
is_static = C.DEFAULT_TASK_INCLUDES_STATIC or \
- (use_handlers and C.DEFAULT_HANDLER_INCLUDES_STATIC) or \
- (not templar._contains_vars(t.args['_raw_params']) and t.all_parents_static() and not t.loop)
+ (use_handlers and C.DEFAULT_HANDLER_INCLUDES_STATIC) or \
+ (not templar._contains_vars(t.args['_raw_params']) and t.all_parents_static() and not t.loop)
if is_static:
if t.loop is not None:
@@ -179,13 +179,13 @@ def load_list_of_tasks(ds, play, block=None, role=None, task_include=None, use_h
include_target = templar.template(t.args['_raw_params'])
except AnsibleUndefinedVariable:
raise AnsibleParserError(
- "Error when evaluating variable in include name: %s.\n\n" \
- "When using static includes, ensure that any variables used in their names are defined in vars/vars_files\n" \
- "or extra-vars passed in from the command line. Static includes cannot use variables from inventory\n" \
- "sources like group or host vars." % t.args['_raw_params'],
- obj=task_ds,
- suppress_extended_error=True,
- )
+ "Error when evaluating variable in include name: %s.\n\n" \
+ "When using static includes, ensure that any variables used in their names are defined in vars/vars_files\n" \
+ "or extra-vars passed in from the command line. Static includes cannot use variables from inventory\n" \
+ "sources like group or host vars." % t.args['_raw_params'],
+ obj=task_ds,
+ suppress_extended_error=True,
+ )
if t._role:
include_file = loader.path_dwim_relative(t._role._role_path, subdir, include_target)
else:
@@ -269,13 +269,13 @@ def load_list_of_tasks(ds, play, block=None, role=None, task_include=None, use_h
elif 'include_role' in task_ds:
ir = IncludeRole.load(
- task_ds,
- block=block,
- role=role,
- task_include=None,
- variable_manager=variable_manager,
- loader=loader
- )
+ task_ds,
+ block=block,
+ role=role,
+ task_include=None,
+ variable_manager=variable_manager,
+ loader=loader
+ )
# 1. the user has set the 'static' option to false or true
# 2. one of the appropriate config options was set
diff --git a/lib/ansible/playbook/play_context.py b/lib/ansible/playbook/play_context.py
index fa4fa4f54ef..65c40b44da3 100644
--- a/lib/ansible/playbook/play_context.py
+++ b/lib/ansible/playbook/play_context.py
@@ -51,41 +51,41 @@ except ImportError:
# in variable names.
MAGIC_VARIABLE_MAPPING = dict(
- connection = ('ansible_connection',),
- remote_addr = ('ansible_ssh_host', 'ansible_host'),
- remote_user = ('ansible_ssh_user', 'ansible_user'),
- port = ('ansible_ssh_port', 'ansible_port'),
- ssh_executable = ('ansible_ssh_executable',),
- accelerate_port = ('ansible_accelerate_port',),
- password = ('ansible_ssh_pass', 'ansible_password'),
- private_key_file = ('ansible_ssh_private_key_file', 'ansible_private_key_file'),
- pipelining = ('ansible_ssh_pipelining', 'ansible_pipelining'),
- shell = ('ansible_shell_type',),
- network_os = ('ansible_network_os',),
- become = ('ansible_become',),
- become_method = ('ansible_become_method',),
- become_user = ('ansible_become_user',),
- become_pass = ('ansible_become_password','ansible_become_pass'),
- become_exe = ('ansible_become_exe',),
- become_flags = ('ansible_become_flags',),
- ssh_common_args = ('ansible_ssh_common_args',),
- docker_extra_args= ('ansible_docker_extra_args',),
- sftp_extra_args = ('ansible_sftp_extra_args',),
- scp_extra_args = ('ansible_scp_extra_args',),
- ssh_extra_args = ('ansible_ssh_extra_args',),
- ssh_transfer_method = ('ansible_ssh_transfer_method',),
- sudo = ('ansible_sudo',),
- sudo_user = ('ansible_sudo_user',),
- sudo_pass = ('ansible_sudo_password', 'ansible_sudo_pass'),
- sudo_exe = ('ansible_sudo_exe',),
- sudo_flags = ('ansible_sudo_flags',),
- su = ('ansible_su',),
- su_user = ('ansible_su_user',),
- su_pass = ('ansible_su_password', 'ansible_su_pass'),
- su_exe = ('ansible_su_exe',),
- su_flags = ('ansible_su_flags',),
- executable = ('ansible_shell_executable',),
- module_compression = ('ansible_module_compression',),
+ connection = ('ansible_connection',),
+ remote_addr = ('ansible_ssh_host', 'ansible_host'),
+ remote_user = ('ansible_ssh_user', 'ansible_user'),
+ port = ('ansible_ssh_port', 'ansible_port'),
+ ssh_executable = ('ansible_ssh_executable',),
+ accelerate_port = ('ansible_accelerate_port',),
+ password = ('ansible_ssh_pass', 'ansible_password'),
+ private_key_file = ('ansible_ssh_private_key_file', 'ansible_private_key_file'),
+ pipelining = ('ansible_ssh_pipelining', 'ansible_pipelining'),
+ shell = ('ansible_shell_type',),
+ network_os = ('ansible_network_os',),
+ become = ('ansible_become',),
+ become_method = ('ansible_become_method',),
+ become_user = ('ansible_become_user',),
+ become_pass = ('ansible_become_password','ansible_become_pass'),
+ become_exe = ('ansible_become_exe',),
+ become_flags = ('ansible_become_flags',),
+ ssh_common_args = ('ansible_ssh_common_args',),
+ docker_extra_args= ('ansible_docker_extra_args',),
+ sftp_extra_args = ('ansible_sftp_extra_args',),
+ scp_extra_args = ('ansible_scp_extra_args',),
+ ssh_extra_args = ('ansible_ssh_extra_args',),
+ ssh_transfer_method = ('ansible_ssh_transfer_method',),
+ sudo = ('ansible_sudo',),
+ sudo_user = ('ansible_sudo_user',),
+ sudo_pass = ('ansible_sudo_password', 'ansible_sudo_pass'),
+ sudo_exe = ('ansible_sudo_exe',),
+ sudo_flags = ('ansible_sudo_flags',),
+ su = ('ansible_su',),
+ su_user = ('ansible_su_user',),
+ su_pass = ('ansible_su_password', 'ansible_su_pass'),
+ su_exe = ('ansible_su_exe',),
+ su_flags = ('ansible_su_flags',),
+ executable = ('ansible_shell_executable',),
+ module_compression = ('ansible_module_compression',),
)
b_SU_PROMPT_LOCALIZATIONS = [
diff --git a/lib/ansible/plugins/action/__init__.py b/lib/ansible/plugins/action/__init__.py
index 89de093731d..2e348972024 100644
--- a/lib/ansible/plugins/action/__init__.py
+++ b/lib/ansible/plugins/action/__init__.py
@@ -441,11 +441,11 @@ class ActionBase(with_metaclass(ABCMeta, object)):
Get information from remote file.
'''
module_args=dict(
- path=path,
- follow=follow,
- get_md5=False,
- get_checksum=True,
- checksum_algo='sha1',
+ path=path,
+ follow=follow,
+ get_md5=False,
+ get_checksum=True,
+ checksum_algo='sha1',
)
mystat = self._execute_module(module_name='stat', module_args=module_args, task_vars=all_vars, tmp=tmp, delete_remote_tmp=(tmp is None))
diff --git a/lib/ansible/plugins/action/template.py b/lib/ansible/plugins/action/template.py
index b1a3dc4281c..ea47d67f372 100644
--- a/lib/ansible/plugins/action/template.py
+++ b/lib/ansible/plugins/action/template.py
@@ -175,12 +175,12 @@ class ActionModule(ActionBase):
# run the copy module
new_module_args.update(
- dict(
- src=xfered,
- dest=dest,
- original_basename=os.path.basename(source),
- follow=True,
- ),
+ dict(
+ src=xfered,
+ dest=dest,
+ original_basename=os.path.basename(source),
+ follow=True,
+ ),
)
result.update(self._execute_module(module_name='copy', module_args=new_module_args, task_vars=task_vars, tmp=tmp, delete_remote_tmp=False))
diff --git a/lib/ansible/plugins/callback/dense.py b/lib/ansible/plugins/callback/dense.py
index 181dd6ff062..22b70f38473 100644
--- a/lib/ansible/plugins/callback/dense.py
+++ b/lib/ansible/plugins/callback/dense.py
@@ -167,9 +167,9 @@ class CallbackModule_dense(CallbackModule_default):
# Attributes to remove from results for more density
self.removed_attributes = (
-# 'changed',
+ # 'changed',
'delta',
-# 'diff',
+ # 'diff',
'end',
'failed',
'failed_when_result',
diff --git a/lib/ansible/plugins/callback/foreman.py b/lib/ansible/plugins/callback/foreman.py
index a899a710987..24b3fcc4169 100644
--- a/lib/ansible/plugins/callback/foreman.py
+++ b/lib/ansible/plugins/callback/foreman.py
@@ -63,8 +63,8 @@ class CallbackModule(CallbackBase):
"/etc/foreman/client_key.pem"))
FOREMAN_SSL_VERIFY = os.getenv('FOREMAN_SSL_VERIFY', "1")
FOREMAN_HEADERS = {
- "Content-Type": "application/json",
- "Accept": "application/json"
+ "Content-Type": "application/json",
+ "Accept": "application/json"
}
TIME_FORMAT = "%Y-%m-%d %H:%M:%S %f"
@@ -155,7 +155,7 @@ class CallbackModule(CallbackBase):
"status": status,
"logs": log,
}
- }
+ }
# To be changed to /api/v2/config_reports in 1.11. Maybe we
# could make a GET request to get the Foreman version & do
# this automatically.
diff --git a/lib/ansible/plugins/callback/selective.py b/lib/ansible/plugins/callback/selective.py
index 90b7f831453..a1eb06a8c9e 100644
--- a/lib/ansible/plugins/callback/selective.py
+++ b/lib/ansible/plugins/callback/selective.py
@@ -226,7 +226,7 @@ class CallbackModule(CallbackBase):
color = 'ok'
msg = '{} : ok={}\tchanged={}\tfailed={}\tunreachable={}'.format(
- host, s['ok'], s['changed'], s['failures'], s['unreachable'])
+ host, s['ok'], s['changed'], s['failures'], s['unreachable'])
print(colorize(msg, color))
def v2_runner_on_skipped(self, result, **kwargs):
diff --git a/lib/ansible/plugins/connection/ssh.py b/lib/ansible/plugins/connection/ssh.py
index 9278de820fe..5fb79b4e521 100644
--- a/lib/ansible/plugins/connection/ssh.py
+++ b/lib/ansible/plugins/connection/ssh.py
@@ -202,8 +202,8 @@ class Connection(ConnectionBase):
if user:
self._add_args(b_command,
(b"-o", b"User=" + to_bytes(self._play_context.remote_user, errors='surrogate_or_strict')),
- u"ANSIBLE_REMOTE_USER/remote_user/ansible_user/user/-u set"
- )
+ u"ANSIBLE_REMOTE_USER/remote_user/ansible_user/user/-u set"
+ )
self._add_args(b_command,
(b"-o", b"ConnectTimeout=" + to_bytes(self._play_context.timeout, errors='surrogate_or_strict', nonstring='simplerepr')),
diff --git a/lib/ansible/plugins/filter/ipaddr.py b/lib/ansible/plugins/filter/ipaddr.py
index 32b6017e12b..4837f9d7f6c 100644
--- a/lib/ansible/plugins/filter/ipaddr.py
+++ b/lib/ansible/plugins/filter/ipaddr.py
@@ -262,61 +262,61 @@ def ipaddr(value, query = '', version = False, alias = 'ipaddr'):
''' Check if string is an IP address or network and filter it '''
query_func_extra_args = {
- '': ('vtype',),
- '6to4': ('vtype', 'value'),
- 'cidr_lookup': ('iplist', 'value'),
- 'int': ('vtype',),
- 'ipv4': ('value',),
- 'ipv6': ('value',),
- 'link-local': ('value',),
- 'loopback': ('value',),
- 'lo': ('value',),
- 'multicast': ('value',),
- 'private': ('value',),
- 'public': ('value',),
- 'unicast': ('value',),
- 'wrap': ('vtype', 'value'),
- }
+ '': ('vtype',),
+ '6to4': ('vtype', 'value'),
+ 'cidr_lookup': ('iplist', 'value'),
+ 'int': ('vtype',),
+ 'ipv4': ('value',),
+ 'ipv6': ('value',),
+ 'link-local': ('value',),
+ 'loopback': ('value',),
+ 'lo': ('value',),
+ 'multicast': ('value',),
+ 'private': ('value',),
+ 'public': ('value',),
+ 'unicast': ('value',),
+ 'wrap': ('vtype', 'value'),
+ }
query_func_map = {
- '': _empty_ipaddr_query,
- '6to4': _6to4_query,
- 'address': _ip_query,
- 'address/prefix': _gateway_query,
- 'bool': _bool_ipaddr_query,
- 'broadcast': _broadcast_query,
- 'cidr': _cidr_query,
- 'cidr_lookup': _cidr_lookup_query,
- 'gateway': _gateway_query,
- 'gw': _gateway_query,
- 'host': _host_query,
- 'host/prefix': _gateway_query,
- 'hostmask': _hostmask_query,
- 'hostnet': _gateway_query,
- 'int': _int_query,
- 'ip': _ip_query,
- 'ipv4': _ipv4_query,
- 'ipv6': _ipv6_query,
- 'link-local': _link_local_query,
- 'lo': _loopback_query,
- 'loopback': _loopback_query,
- 'multicast': _multicast_query,
- 'net': _net_query,
- 'netmask': _netmask_query,
- 'network': _network_query,
- 'prefix': _prefix_query,
- 'private': _private_query,
- 'public': _public_query,
- 'revdns': _revdns_query,
- 'router': _gateway_query,
- 'size': _size_query,
- 'subnet': _subnet_query,
- 'type': _type_query,
- 'unicast': _unicast_query,
- 'v4': _ipv4_query,
- 'v6': _ipv6_query,
- 'version': _version_query,
- 'wrap': _wrap_query,
- }
+ '': _empty_ipaddr_query,
+ '6to4': _6to4_query,
+ 'address': _ip_query,
+ 'address/prefix': _gateway_query,
+ 'bool': _bool_ipaddr_query,
+ 'broadcast': _broadcast_query,
+ 'cidr': _cidr_query,
+ 'cidr_lookup': _cidr_lookup_query,
+ 'gateway': _gateway_query,
+ 'gw': _gateway_query,
+ 'host': _host_query,
+ 'host/prefix': _gateway_query,
+ 'hostmask': _hostmask_query,
+ 'hostnet': _gateway_query,
+ 'int': _int_query,
+ 'ip': _ip_query,
+ 'ipv4': _ipv4_query,
+ 'ipv6': _ipv6_query,
+ 'link-local': _link_local_query,
+ 'lo': _loopback_query,
+ 'loopback': _loopback_query,
+ 'multicast': _multicast_query,
+ 'net': _net_query,
+ 'netmask': _netmask_query,
+ 'network': _network_query,
+ 'prefix': _prefix_query,
+ 'private': _private_query,
+ 'public': _public_query,
+ 'revdns': _revdns_query,
+ 'router': _gateway_query,
+ 'size': _size_query,
+ 'subnet': _subnet_query,
+ 'type': _type_query,
+ 'unicast': _unicast_query,
+ 'v4': _ipv4_query,
+ 'v6': _ipv6_query,
+ 'version': _version_query,
+ 'wrap': _wrap_query,
+ }
vtype = None
@@ -633,22 +633,22 @@ def hwaddr(value, query = '', alias = 'hwaddr'):
''' Check if string is a HW/MAC address and filter it '''
query_func_extra_args = {
- '': ('value',),
- }
+ '': ('value',),
+ }
query_func_map = {
- '': _empty_hwaddr_query,
- 'bare': _bare_query,
- 'bool': _bool_hwaddr_query,
- 'int': _int_hwaddr_query,
- 'cisco': _cisco_query,
- 'eui48': _win_query,
- 'linux': _linux_query,
- 'pgsql': _postgresql_query,
- 'postgresql': _postgresql_query,
- 'psql': _postgresql_query,
- 'unix': _unix_query,
- 'win': _win_query,
- }
+ '': _empty_hwaddr_query,
+ 'bare': _bare_query,
+ 'bool': _bool_hwaddr_query,
+ 'int': _int_hwaddr_query,
+ 'cisco': _cisco_query,
+ 'eui48': _win_query,
+ 'linux': _linux_query,
+ 'pgsql': _postgresql_query,
+ 'postgresql': _postgresql_query,
+ 'psql': _postgresql_query,
+ 'unix': _unix_query,
+ 'win': _win_query,
+ }
try:
v = netaddr.EUI(value)
diff --git a/lib/ansible/plugins/lookup/dig.py b/lib/ansible/plugins/lookup/dig.py
index a50da9c780d..034324eb2e4 100644
--- a/lib/ansible/plugins/lookup/dig.py
+++ b/lib/ansible/plugins/lookup/dig.py
@@ -39,29 +39,29 @@ def make_rdata_dict(rdata):
Note: adding support for RRSIG is hard work. :)
'''
supported_types = {
- A : ['address'],
- AAAA : ['address'],
- CNAME : ['target'],
- DNAME : ['target'],
- DLV : ['algorithm', 'digest_type', 'key_tag', 'digest'],
- DNSKEY : ['flags', 'algorithm', 'protocol', 'key'],
- DS : ['algorithm', 'digest_type', 'key_tag', 'digest'],
- HINFO : ['cpu', 'os'],
- LOC : ['latitude', 'longitude', 'altitude', 'size', 'horizontal_precision', 'vertical_precision'],
- MX : ['preference', 'exchange'],
- NAPTR : ['order', 'preference', 'flags', 'service', 'regexp', 'replacement'],
- NS : ['target'],
- NSEC3PARAM : ['algorithm', 'flags', 'iterations', 'salt'],
- PTR : ['target'],
- RP : ['mbox', 'txt'],
- # RRSIG : ['algorithm', 'labels', 'original_ttl', 'expiration', 'inception', 'signature'],
- SOA : ['mname', 'rname', 'serial', 'refresh', 'retry', 'expire', 'minimum'],
- SPF : ['strings'],
- SRV : ['priority', 'weight', 'port', 'target'],
- SSHFP : ['algorithm', 'fp_type', 'fingerprint'],
- TLSA : ['usage', 'selector', 'mtype', 'cert'],
- TXT : ['strings'],
- }
+ A : ['address'],
+ AAAA : ['address'],
+ CNAME : ['target'],
+ DNAME : ['target'],
+ DLV : ['algorithm', 'digest_type', 'key_tag', 'digest'],
+ DNSKEY : ['flags', 'algorithm', 'protocol', 'key'],
+ DS : ['algorithm', 'digest_type', 'key_tag', 'digest'],
+ HINFO : ['cpu', 'os'],
+ LOC : ['latitude', 'longitude', 'altitude', 'size', 'horizontal_precision', 'vertical_precision'],
+ MX : ['preference', 'exchange'],
+ NAPTR : ['order', 'preference', 'flags', 'service', 'regexp', 'replacement'],
+ NS : ['target'],
+ NSEC3PARAM : ['algorithm', 'flags', 'iterations', 'salt'],
+ PTR : ['target'],
+ RP : ['mbox', 'txt'],
+ # RRSIG : ['algorithm', 'labels', 'original_ttl', 'expiration', 'inception', 'signature'],
+ SOA : ['mname', 'rname', 'serial', 'refresh', 'retry', 'expire', 'minimum'],
+ SPF : ['strings'],
+ SRV : ['priority', 'weight', 'port', 'target'],
+ SSHFP : ['algorithm', 'fp_type', 'fingerprint'],
+ TLSA : ['usage', 'selector', 'mtype', 'cert'],
+ TXT : ['strings'],
+ }
rd = {}
diff --git a/lib/ansible/template/__init__.py b/lib/ansible/template/__init__.py
index e29a8bf1f09..e3d7bc14bef 100644
--- a/lib/ansible/template/__init__.py
+++ b/lib/ansible/template/__init__.py
@@ -414,12 +414,12 @@ class Templar:
elif isinstance(variable, (list, tuple)):
return [self.template(
- v,
- preserve_trailing_newlines=preserve_trailing_newlines,
- fail_on_undefined=fail_on_undefined,
- overrides=overrides,
- disable_lookups=disable_lookups,
- ) for v in variable]
+ v,
+ preserve_trailing_newlines=preserve_trailing_newlines,
+ fail_on_undefined=fail_on_undefined,
+ overrides=overrides,
+ disable_lookups=disable_lookups,
+ ) for v in variable]
elif isinstance(variable, dict):
d = {}
# we don't use iteritems() here to avoid problems if the underlying dict
@@ -427,12 +427,12 @@ class Templar:
for k in variable.keys():
if k not in static_vars:
d[k] = self.template(
- variable[k],
- preserve_trailing_newlines=preserve_trailing_newlines,
- fail_on_undefined=fail_on_undefined,
- overrides=overrides,
- disable_lookups=disable_lookups,
- )
+ variable[k],
+ preserve_trailing_newlines=preserve_trailing_newlines,
+ fail_on_undefined=fail_on_undefined,
+ overrides=overrides,
+ disable_lookups=disable_lookups,
+ )
else:
d[k] = variable[k]
return d
diff --git a/lib/ansible/utils/module_docs.py b/lib/ansible/utils/module_docs.py
index 4208d497675..47e0b59a942 100755
--- a/lib/ansible/utils/module_docs.py
+++ b/lib/ansible/utils/module_docs.py
@@ -40,7 +40,7 @@ except ImportError:
# modules that are ok that they do not have documentation strings
BLACKLIST_MODULES = frozenset((
- 'async_wrapper',
+ 'async_wrapper',
))
def get_docstring(filename, verbose=False):
diff --git a/setup.py b/setup.py
index 1c9dd62b85a..ad1bd661a93 100644
--- a/setup.py
+++ b/setup.py
@@ -24,7 +24,7 @@ setup(name='ansible',
package_dir={ '': 'lib' },
packages=find_packages('lib'),
package_data={
- '': ['module_utils/*.ps1', 'modules/windows/*.ps1', 'modules/windows/*.ps1', 'galaxy/data/*/*.*', 'galaxy/data/*/*/*.*', 'galaxy/data/*/tests/inventory'],
+ '': ['module_utils/*.ps1', 'modules/windows/*.ps1', 'modules/windows/*.ps1', 'galaxy/data/*/*.*', 'galaxy/data/*/*/*.*', 'galaxy/data/*/tests/inventory'],
},
classifiers=[
'Development Status :: 5 - Production/Stable',
@@ -42,14 +42,14 @@ setup(name='ansible',
'Topic :: Utilities',
],
scripts=[
- 'bin/ansible',
- 'bin/ansible-playbook',
- 'bin/ansible-pull',
- 'bin/ansible-doc',
- 'bin/ansible-galaxy',
- 'bin/ansible-console',
- 'bin/ansible-connection',
- 'bin/ansible-vault',
+ 'bin/ansible',
+ 'bin/ansible-playbook',
+ 'bin/ansible-pull',
+ 'bin/ansible-doc',
+ 'bin/ansible-galaxy',
+ 'bin/ansible-console',
+ 'bin/ansible-connection',
+ 'bin/ansible-vault',
],
data_files=[],
)
diff --git a/test/sanity/pep8/legacy-files.txt b/test/sanity/pep8/legacy-files.txt
index 4c740dfa490..23ec2543d69 100644
--- a/test/sanity/pep8/legacy-files.txt
+++ b/test/sanity/pep8/legacy-files.txt
@@ -1,29 +1,17 @@
contrib/inventory/abiquo.py
-contrib/inventory/azure_rm.py
-contrib/inventory/cloudstack.py
contrib/inventory/consul_io.py
contrib/inventory/digital_ocean.py
contrib/inventory/docker.py
contrib/inventory/ec2.py
-contrib/inventory/gce.py
contrib/inventory/mdt_dynamic_inventory.py
contrib/inventory/openvz.py
contrib/inventory/rax.py
contrib/inventory/softlayer.py
-contrib/inventory/ssh_config.py
contrib/inventory/vbox.py
contrib/inventory/zone.py
-docs/api/conf.py
-docs/docsite/conf.py
-docs/docsite/rst/conf.py
-docs/docsite/rst/dev_guide/conf.py
-examples/scripts/uptime.py
hacking/metadata-tool.py
hacking/module_formatter.py
-hacking/tests/gen_distribution_version_testcase.py
lib/ansible/cli/__init__.py
-lib/ansible/cli/adhoc.py
-lib/ansible/cli/console.py
lib/ansible/cli/galaxy.py
lib/ansible/cli/playbook.py
lib/ansible/compat/six/__init__.py
@@ -42,11 +30,8 @@ lib/ansible/module_utils/ec2.py
lib/ansible/module_utils/eos.py
lib/ansible/module_utils/f5.py
lib/ansible/module_utils/facts.py
-lib/ansible/module_utils/gcp.py
lib/ansible/module_utils/known_hosts.py
lib/ansible/module_utils/mysql.py
-lib/ansible/module_utils/nxos.py
-lib/ansible/module_utils/redhat.py
lib/ansible/module_utils/vmware.py
lib/ansible/modules/cloud/amazon/_ec2_vpc.py
lib/ansible/modules/cloud/amazon/aws_kms.py
@@ -58,19 +43,15 @@ lib/ansible/modules/cloud/amazon/cloudwatchevent_rule.py
lib/ansible/modules/cloud/amazon/dynamodb_table.py
lib/ansible/modules/cloud/amazon/ec2.py
lib/ansible/modules/cloud/amazon/ec2_ami.py
-lib/ansible/modules/cloud/amazon/ec2_ami_copy.py
lib/ansible/modules/cloud/amazon/ec2_ami_find.py
lib/ansible/modules/cloud/amazon/ec2_asg.py
lib/ansible/modules/cloud/amazon/ec2_asg_facts.py
lib/ansible/modules/cloud/amazon/ec2_customer_gateway.py
lib/ansible/modules/cloud/amazon/ec2_elb.py
-lib/ansible/modules/cloud/amazon/ec2_elb_facts.py
lib/ansible/modules/cloud/amazon/ec2_elb_lb.py
lib/ansible/modules/cloud/amazon/ec2_eni.py
lib/ansible/modules/cloud/amazon/ec2_eni_facts.py
-lib/ansible/modules/cloud/amazon/ec2_facts.py
lib/ansible/modules/cloud/amazon/ec2_group.py
-lib/ansible/modules/cloud/amazon/ec2_key.py
lib/ansible/modules/cloud/amazon/ec2_lc.py
lib/ansible/modules/cloud/amazon/ec2_lc_facts.py
lib/ansible/modules/cloud/amazon/ec2_metric_alarm.py
@@ -87,7 +68,6 @@ lib/ansible/modules/cloud/amazon/ec2_vpc_net.py
lib/ansible/modules/cloud/amazon/ec2_vpc_net_facts.py
lib/ansible/modules/cloud/amazon/ec2_vpc_route_table.py
lib/ansible/modules/cloud/amazon/ec2_vpc_route_table_facts.py
-lib/ansible/modules/cloud/amazon/ec2_vpc_subnet.py
lib/ansible/modules/cloud/amazon/ec2_vpc_subnet_facts.py
lib/ansible/modules/cloud/amazon/ec2_vpc_vgw.py
lib/ansible/modules/cloud/amazon/ec2_vpc_vgw_facts.py
@@ -97,7 +77,6 @@ lib/ansible/modules/cloud/amazon/ecs_service_facts.py
lib/ansible/modules/cloud/amazon/ecs_task.py
lib/ansible/modules/cloud/amazon/ecs_taskdefinition.py
lib/ansible/modules/cloud/amazon/elasticache.py
-lib/ansible/modules/cloud/amazon/elasticache_subnet_group.py
lib/ansible/modules/cloud/amazon/iam.py
lib/ansible/modules/cloud/amazon/iam_cert.py
lib/ansible/modules/cloud/amazon/iam_policy.py
@@ -109,7 +88,6 @@ lib/ansible/modules/cloud/amazon/rds_subnet_group.py
lib/ansible/modules/cloud/amazon/redshift.py
lib/ansible/modules/cloud/amazon/route53.py
lib/ansible/modules/cloud/amazon/route53_health_check.py
-lib/ansible/modules/cloud/amazon/route53_zone.py
lib/ansible/modules/cloud/amazon/s3.py
lib/ansible/modules/cloud/amazon/s3_bucket.py
lib/ansible/modules/cloud/amazon/s3_lifecycle.py
@@ -118,8 +96,6 @@ lib/ansible/modules/cloud/amazon/s3_website.py
lib/ansible/modules/cloud/amazon/sns_topic.py
lib/ansible/modules/cloud/amazon/sts_assume_role.py
lib/ansible/modules/cloud/amazon/sts_session_token.py
-lib/ansible/modules/cloud/atomic/atomic_host.py
-lib/ansible/modules/cloud/atomic/atomic_image.py
lib/ansible/modules/cloud/azure/azure.py
lib/ansible/modules/cloud/azure/azure_rm_deployment.py
lib/ansible/modules/cloud/azure/azure_rm_networkinterface.py
@@ -135,46 +111,26 @@ lib/ansible/modules/cloud/cloudstack/cs_host.py
lib/ansible/modules/cloud/cloudstack/cs_instance.py
lib/ansible/modules/cloud/cloudstack/cs_iso.py
lib/ansible/modules/cloud/cloudstack/cs_portforward.py
-lib/ansible/modules/cloud/cloudstack/cs_securitygroup_rule.py
lib/ansible/modules/cloud/cloudstack/cs_sshkeypair.py
lib/ansible/modules/cloud/digital_ocean/digital_ocean.py
lib/ansible/modules/cloud/docker/_docker.py
-lib/ansible/modules/cloud/docker/docker_container.py
lib/ansible/modules/cloud/docker/docker_image.py
lib/ansible/modules/cloud/docker/docker_service.py
lib/ansible/modules/cloud/google/gc_storage.py
lib/ansible/modules/cloud/google/gce_img.py
-lib/ansible/modules/cloud/google/gce_lb.py
-lib/ansible/modules/cloud/google/gce_mig.py
lib/ansible/modules/cloud/google/gce_net.py
-lib/ansible/modules/cloud/google/gce_pd.py
lib/ansible/modules/cloud/google/gce_tag.py
lib/ansible/modules/cloud/google/gcpubsub.py
lib/ansible/modules/cloud/google/gcpubsub_facts.py
-lib/ansible/modules/cloud/linode/linode.py
lib/ansible/modules/cloud/misc/ovirt.py
lib/ansible/modules/cloud/misc/proxmox.py
lib/ansible/modules/cloud/misc/proxmox_kvm.py
lib/ansible/modules/cloud/misc/proxmox_template.py
lib/ansible/modules/cloud/misc/serverless.py
-lib/ansible/modules/cloud/misc/virt.py
lib/ansible/modules/cloud/misc/xenserver_facts.py
-lib/ansible/modules/cloud/openstack/_glance_image.py
-lib/ansible/modules/cloud/openstack/_keystone_user.py
lib/ansible/modules/cloud/openstack/_nova_compute.py
-lib/ansible/modules/cloud/openstack/_quantum_floating_ip.py
-lib/ansible/modules/cloud/openstack/_quantum_floating_ip_associate.py
-lib/ansible/modules/cloud/openstack/_quantum_network.py
-lib/ansible/modules/cloud/openstack/_quantum_router.py
-lib/ansible/modules/cloud/openstack/_quantum_router_gateway.py
-lib/ansible/modules/cloud/openstack/_quantum_router_interface.py
-lib/ansible/modules/cloud/openstack/_quantum_subnet.py
-lib/ansible/modules/cloud/openstack/os_auth.py
lib/ansible/modules/cloud/openstack/os_nova_host_aggregate.py
lib/ansible/modules/cloud/openstack/os_object.py
-lib/ansible/modules/cloud/openstack/os_quota.py
-lib/ansible/modules/cloud/openstack/os_recordset.py
-lib/ansible/modules/cloud/openstack/os_zone.py
lib/ansible/modules/cloud/packet/packet_device.py
lib/ansible/modules/cloud/packet/packet_sshkey.py
lib/ansible/modules/cloud/profitbricks/profitbricks.py
@@ -182,7 +138,6 @@ lib/ansible/modules/cloud/profitbricks/profitbricks_datacenter.py
lib/ansible/modules/cloud/softlayer/sl_vm.py
lib/ansible/modules/cloud/vmware/vca_fw.py
lib/ansible/modules/cloud/vmware/vmware_guest.py
-lib/ansible/modules/cloud/vmware/vmware_local_user_manager.py
lib/ansible/modules/cloud/vmware/vsphere_guest.py
lib/ansible/modules/cloud/webfaction/webfaction_app.py
lib/ansible/modules/cloud/webfaction/webfaction_db.py
@@ -190,17 +145,11 @@ lib/ansible/modules/cloud/webfaction/webfaction_domain.py
lib/ansible/modules/cloud/webfaction/webfaction_mailbox.py
lib/ansible/modules/cloud/webfaction/webfaction_site.py
lib/ansible/modules/clustering/consul.py
-lib/ansible/modules/clustering/consul_acl.py
-lib/ansible/modules/clustering/consul_kv.py
-lib/ansible/modules/clustering/consul_session.py
-lib/ansible/modules/commands/command.py
lib/ansible/modules/commands/script.py
lib/ansible/modules/crypto/openssl_publickey.py
lib/ansible/modules/database/influxdb/influxdb_retention_policy.py
lib/ansible/modules/database/misc/mongodb_parameter.py
lib/ansible/modules/database/misc/mongodb_user.py
-lib/ansible/modules/database/misc/redis.py
-lib/ansible/modules/database/misc/riak.py
lib/ansible/modules/database/mssql/mssql_db.py
lib/ansible/modules/database/mysql/mysql_db.py
lib/ansible/modules/database/mysql/mysql_replication.py
@@ -219,25 +168,17 @@ lib/ansible/modules/files/archive.py
lib/ansible/modules/files/copy.py
lib/ansible/modules/files/find.py
lib/ansible/modules/files/ini_file.py
-lib/ansible/modules/files/lineinfile.py
-lib/ansible/modules/files/stat.py
lib/ansible/modules/files/synchronize.py
lib/ansible/modules/files/tempfile.py
lib/ansible/modules/files/unarchive.py
-lib/ansible/modules/messaging/rabbitmq_binding.py
-lib/ansible/modules/messaging/rabbitmq_exchange.py
lib/ansible/modules/messaging/rabbitmq_queue.py
lib/ansible/modules/monitoring/boundary_meter.py
lib/ansible/modules/monitoring/datadog_monitor.py
lib/ansible/modules/monitoring/librato_annotation.py
lib/ansible/modules/monitoring/logicmonitor.py
-lib/ansible/modules/monitoring/logicmonitor_facts.py
lib/ansible/modules/monitoring/nagios.py
-lib/ansible/modules/monitoring/pagerduty.py
lib/ansible/modules/monitoring/pagerduty_alert.py
-lib/ansible/modules/monitoring/pingdom.py
lib/ansible/modules/monitoring/sensu_check.py
-lib/ansible/modules/monitoring/statusio_maintenance.py
lib/ansible/modules/monitoring/zabbix_screen.py
lib/ansible/modules/network/a10/a10_server.py
lib/ansible/modules/network/a10/a10_server_axapi3.py
@@ -321,28 +262,20 @@ lib/ansible/modules/network/snmp_facts.py
lib/ansible/modules/notification/hall.py
lib/ansible/modules/notification/sendgrid.py
lib/ansible/modules/notification/sns.py
-lib/ansible/modules/packaging/language/bundler.py
lib/ansible/modules/packaging/language/composer.py
lib/ansible/modules/packaging/language/cpanm.py
lib/ansible/modules/packaging/language/maven_artifact.py
lib/ansible/modules/packaging/os/apt.py
lib/ansible/modules/packaging/os/apt_key.py
-lib/ansible/modules/packaging/os/apt_rpm.py
lib/ansible/modules/packaging/os/dnf.py
lib/ansible/modules/packaging/os/dpkg_selections.py
lib/ansible/modules/packaging/os/homebrew.py
lib/ansible/modules/packaging/os/openbsd_pkg.py
lib/ansible/modules/packaging/os/opkg.py
lib/ansible/modules/packaging/os/pacman.py
-lib/ansible/modules/packaging/os/pkgin.py
-lib/ansible/modules/packaging/os/pkgng.py
-lib/ansible/modules/packaging/os/portinstall.py
lib/ansible/modules/packaging/os/redhat_subscription.py
-lib/ansible/modules/packaging/os/rhn_channel.py
lib/ansible/modules/packaging/os/rhn_register.py
-lib/ansible/modules/packaging/os/rpm_key.py
lib/ansible/modules/packaging/os/swdepot.py
-lib/ansible/modules/packaging/os/urpmi.py
lib/ansible/modules/packaging/os/yum.py
lib/ansible/modules/packaging/os/zypper.py
lib/ansible/modules/remote_management/foreman/katello.py
@@ -357,21 +290,15 @@ lib/ansible/modules/storage/netapp/netapp_e_snapshot_group.py
lib/ansible/modules/storage/netapp/netapp_e_snapshot_volume.py
lib/ansible/modules/storage/netapp/netapp_e_storage_system.py
lib/ansible/modules/storage/netapp/netapp_e_storagepool.py
-lib/ansible/modules/system/authorized_key.py
-lib/ansible/modules/system/cron.py
lib/ansible/modules/system/debconf.py
lib/ansible/modules/system/filesystem.py
lib/ansible/modules/system/firewalld.py
-lib/ansible/modules/system/gconftool2.py
lib/ansible/modules/system/gluster_volume.py
lib/ansible/modules/system/group.py
lib/ansible/modules/system/known_hosts.py
lib/ansible/modules/system/locale_gen.py
lib/ansible/modules/system/lvol.py
-lib/ansible/modules/system/openwrt_init.py
lib/ansible/modules/system/pam_limits.py
-lib/ansible/modules/system/sefcontext.py
-lib/ansible/modules/system/seport.py
lib/ansible/modules/system/solaris_zone.py
lib/ansible/modules/system/systemd.py
lib/ansible/modules/system/ufw.py
@@ -384,12 +311,10 @@ lib/ansible/modules/utilities/logic/pause.py
lib/ansible/modules/utilities/logic/set_fact.py
lib/ansible/modules/utilities/logic/wait_for.py
lib/ansible/modules/web_infrastructure/apache2_mod_proxy.py
-lib/ansible/modules/web_infrastructure/apache2_module.py
lib/ansible/modules/web_infrastructure/django_manage.py
lib/ansible/modules/web_infrastructure/jenkins_job.py
lib/ansible/modules/web_infrastructure/jira.py
lib/ansible/modules/web_infrastructure/nginx_status_facts.py
-lib/ansible/modules/web_infrastructure/taiga_issue.py
lib/ansible/modules/windows/win_acl.py
lib/ansible/modules/windows/win_acl_inheritance.py
lib/ansible/modules/windows/win_chocolatey.py
@@ -411,7 +336,6 @@ lib/ansible/modules/windows/win_webpicmd.py
lib/ansible/parsing/mod_args.py
lib/ansible/playbook/attribute.py
lib/ansible/playbook/block.py
-lib/ansible/playbook/helpers.py
lib/ansible/playbook/play_context.py
lib/ansible/playbook/playbook_include.py
lib/ansible/playbook/role/__init__.py
@@ -423,14 +347,10 @@ lib/ansible/plugins/action/async.py
lib/ansible/plugins/action/set_fact.py
lib/ansible/plugins/action/set_stats.py
lib/ansible/plugins/action/synchronize.py
-lib/ansible/plugins/action/template.py
lib/ansible/plugins/cache/jsonfile.py
lib/ansible/plugins/callback/default.py
-lib/ansible/plugins/callback/dense.py
-lib/ansible/plugins/callback/foreman.py
lib/ansible/plugins/callback/logentries.py
lib/ansible/plugins/callback/oneline.py
-lib/ansible/plugins/callback/selective.py
lib/ansible/plugins/connection/accelerate.py
lib/ansible/plugins/connection/paramiko_ssh.py
lib/ansible/plugins/connection/ssh.py
@@ -466,26 +386,9 @@ test/units/errors/test_errors.py
test/units/executor/test_playbook_executor.py
test/units/mock/yaml_helper.py
test/units/module_utils/basic/test__log_invocation.py
-test/units/module_utils/basic/test_exit_json.py
-test/units/module_utils/basic/test_log.py
-test/units/module_utils/basic/test_no_log.py
-test/units/module_utils/basic/test_safe_eval.py
-test/units/module_utils/basic/test_set_mode_if_different.py
-test/units/module_utils/json_utils/test_filter_non_json_lines.py
test/units/module_utils/test_basic.py
test/units/module_utils/test_distribution_version.py
test/units/module_utils/test_facts.py
-test/units/module_utils/test_text.py
-test/units/modules/cloud/amazon/test_ec2_vpc_nat_gateway.py
-test/units/parsing/test_mod_args.py
test/units/parsing/yaml/test_loader.py
-test/units/playbook/test_block.py
test/units/playbook/test_helpers.py
test/units/playbook/test_play_context.py
-test/units/playbook/test_task.py
-test/units/plugins/lookup/test_ini.py
-test/units/plugins/lookup/test_password.py
-test/units/template/test_templar.py
-test/units/template/test_template_utilities.py
-test/units/utils/test_vars.py
-test/units/vars/test_variable_manager.py
diff --git a/test/sanity/pep8/legacy-ignore.txt b/test/sanity/pep8/legacy-ignore.txt
index 5f0d26d7845..14d09ab1ecc 100644
--- a/test/sanity/pep8/legacy-ignore.txt
+++ b/test/sanity/pep8/legacy-ignore.txt
@@ -1,9 +1,6 @@
E111
E114
-E121
-E122
E125
-E126
E129
E501
E712
diff --git a/test/units/module_utils/basic/test_exit_json.py b/test/units/module_utils/basic/test_exit_json.py
index 15e167dbcf4..9f9ed0b9425 100644
--- a/test/units/module_utils/basic/test_exit_json.py
+++ b/test/units/module_utils/basic/test_exit_json.py
@@ -92,28 +92,28 @@ class TestAnsibleModuleExitJson(unittest.TestCase):
class TestAnsibleModuleExitValuesRemoved(unittest.TestCase):
OMIT = 'VALUE_SPECIFIED_IN_NO_LOG_PARAMETER'
dataset = (
- (dict(username='person', password='$ecret k3y'),
+ (dict(username='person', password='$ecret k3y'),
dict(one=1, pwd='$ecret k3y', url='https://username:password12345@foo.com/login/',
not_secret='following the leader', msg='here'),
dict(one=1, pwd=OMIT, url='https://username:password12345@foo.com/login/',
not_secret='following the leader', changed=False, msg='here',
invocation=dict(module_args=dict(password=OMIT, token=None, username='person'))),
),
- (dict(username='person', password='password12345'),
+ (dict(username='person', password='password12345'),
dict(one=1, pwd='$ecret k3y', url='https://username:password12345@foo.com/login/',
not_secret='following the leader', msg='here'),
dict(one=1, pwd='$ecret k3y', url='https://username:********@foo.com/login/',
not_secret='following the leader', changed=False, msg='here',
invocation=dict(module_args=dict(password=OMIT, token=None, username='person'))),
),
- (dict(username='person', password='$ecret k3y'),
+ (dict(username='person', password='$ecret k3y'),
dict(one=1, pwd='$ecret k3y', url='https://username:$ecret k3y@foo.com/login/',
not_secret='following the leader', msg='here'),
dict(one=1, pwd=OMIT, url='https://username:********@foo.com/login/',
not_secret='following the leader', changed=False, msg='here',
invocation=dict(module_args=dict(password=OMIT, token=None, username='person'))),
),
- )
+ )
def test_exit_json_removes_values(self):
self.maxDiff = None
diff --git a/test/units/module_utils/basic/test_log.py b/test/units/module_utils/basic/test_log.py
index f50f7f607b0..05c7420be50 100644
--- a/test/units/module_utils/basic/test_log.py
+++ b/test/units/module_utils/basic/test_log.py
@@ -115,20 +115,20 @@ class TestAnsibleModuleLogSyslog(unittest.TestCase):
"""Test the AnsibleModule Log Method"""
py2_output_data = {
- u'Text string': b'Text string',
- u'Toshio くらとみ non-ascii test': u'Toshio くらとみ non-ascii test'.encode('utf-8'),
- b'Byte string': b'Byte string',
- u'Toshio くらとみ non-ascii test'.encode('utf-8'): u'Toshio くらとみ non-ascii test'.encode('utf-8'),
- b'non-utf8 :\xff: test': b'non-utf8 :\xff: test'.decode('utf-8', 'replace').encode('utf-8'),
- }
+ u'Text string': b'Text string',
+ u'Toshio くらとみ non-ascii test': u'Toshio くらとみ non-ascii test'.encode('utf-8'),
+ b'Byte string': b'Byte string',
+ u'Toshio くらとみ non-ascii test'.encode('utf-8'): u'Toshio くらとみ non-ascii test'.encode('utf-8'),
+ b'non-utf8 :\xff: test': b'non-utf8 :\xff: test'.decode('utf-8', 'replace').encode('utf-8'),
+ }
py3_output_data = {
- u'Text string': u'Text string',
- u'Toshio くらとみ non-ascii test': u'Toshio くらとみ non-ascii test',
- b'Byte string': u'Byte string',
- u'Toshio くらとみ non-ascii test'.encode('utf-8'): u'Toshio くらとみ non-ascii test',
- b'non-utf8 :\xff: test': b'non-utf8 :\xff: test'.decode('utf-8', 'replace')
- }
+ u'Text string': u'Text string',
+ u'Toshio くらとみ non-ascii test': u'Toshio くらとみ non-ascii test',
+ b'Byte string': u'Byte string',
+ u'Toshio くらとみ non-ascii test'.encode('utf-8'): u'Toshio くらとみ non-ascii test',
+ b'non-utf8 :\xff: test': b'non-utf8 :\xff: test'.decode('utf-8', 'replace')
+ }
def setUp(self):
args = json.dumps(dict(ANSIBLE_MODULE_ARGS={}))
@@ -184,12 +184,12 @@ class TestAnsibleModuleLogJournal(unittest.TestCase):
"""Test the AnsibleModule Log Method"""
output_data = {
- u'Text string': u'Text string',
- u'Toshio くらとみ non-ascii test': u'Toshio くらとみ non-ascii test',
- b'Byte string': u'Byte string',
- u'Toshio くらとみ non-ascii test'.encode('utf-8'): u'Toshio くらとみ non-ascii test',
- b'non-utf8 :\xff: test': b'non-utf8 :\xff: test'.decode('utf-8', 'replace')
- }
+ u'Text string': u'Text string',
+ u'Toshio くらとみ non-ascii test': u'Toshio くらとみ non-ascii test',
+ b'Byte string': u'Byte string',
+ u'Toshio くらとみ non-ascii test'.encode('utf-8'): u'Toshio くらとみ non-ascii test',
+ b'non-utf8 :\xff: test': b'non-utf8 :\xff: test'.decode('utf-8', 'replace')
+ }
# overriding run lets us use context managers for setup/teardown-esque behavior
def setUp(self):
diff --git a/test/units/module_utils/basic/test_no_log.py b/test/units/module_utils/basic/test_no_log.py
index 3cb5d7b64b5..7ffb06c5d8b 100644
--- a/test/units/module_utils/basic/test_no_log.py
+++ b/test/units/module_utils/basic/test_no_log.py
@@ -34,21 +34,21 @@ from ansible.module_utils.basic import return_values, remove_values
class TestReturnValues(unittest.TestCase):
dataset = (
- ('string', frozenset(['string'])),
- ('', frozenset()),
- (1, frozenset(['1'])),
- (1.0, frozenset(['1.0'])),
- (False, frozenset()),
- (['1', '2', '3'], frozenset(['1', '2', '3'])),
- (('1', '2', '3'), frozenset(['1', '2', '3'])),
- ({'one': 1, 'two': 'dos'}, frozenset(['1', 'dos'])),
- ({'one': 1, 'two': 'dos',
+ ('string', frozenset(['string'])),
+ ('', frozenset()),
+ (1, frozenset(['1'])),
+ (1.0, frozenset(['1.0'])),
+ (False, frozenset()),
+ (['1', '2', '3'], frozenset(['1', '2', '3'])),
+ (('1', '2', '3'), frozenset(['1', '2', '3'])),
+ ({'one': 1, 'two': 'dos'}, frozenset(['1', 'dos'])),
+ ({'one': 1, 'two': 'dos',
'three': ['amigos', 'musketeers', None,
{'ping': 'pong', 'base': ('balls', 'raquets')}]},
frozenset(['1', 'dos', 'amigos', 'musketeers', 'pong', 'balls', 'raquets'])),
- (u'Toshio くらとみ', frozenset(['Toshio くらとみ'])),
- ('Toshio くらとみ', frozenset(['Toshio くらとみ'])),
- )
+ (u'Toshio くらとみ', frozenset(['Toshio くらとみ'])),
+ ('Toshio くらとみ', frozenset(['Toshio くらとみ'])),
+ )
def test_return_values(self):
for data, expected in self.dataset:
@@ -61,46 +61,46 @@ class TestReturnValues(unittest.TestCase):
class TestRemoveValues(unittest.TestCase):
OMIT = 'VALUE_SPECIFIED_IN_NO_LOG_PARAMETER'
dataset_no_remove = (
- ('string', frozenset(['nope'])),
- (1234, frozenset(['4321'])),
- (False, frozenset(['4321'])),
- (1.0, frozenset(['4321'])),
- (['string', 'strang', 'strung'], frozenset(['nope'])),
- ({'one': 1, 'two': 'dos', 'secret': 'key'}, frozenset(['nope'])),
- ({'one': 1, 'two': 'dos',
+ ('string', frozenset(['nope'])),
+ (1234, frozenset(['4321'])),
+ (False, frozenset(['4321'])),
+ (1.0, frozenset(['4321'])),
+ (['string', 'strang', 'strung'], frozenset(['nope'])),
+ ({'one': 1, 'two': 'dos', 'secret': 'key'}, frozenset(['nope'])),
+ ({'one': 1, 'two': 'dos',
'three': ['amigos', 'musketeers', None,
{'ping': 'pong', 'base': ['balls', 'raquets']}]},
frozenset(['nope'])),
- ('Toshio くら', frozenset(['とみ'])),
- (u'Toshio くら', frozenset(['とみ'])),
- )
+ ('Toshio くら', frozenset(['とみ'])),
+ (u'Toshio くら', frozenset(['とみ'])),
+ )
dataset_remove = (
- ('string', frozenset(['string']), OMIT),
- (1234, frozenset(['1234']), OMIT),
- (1234, frozenset(['23']), OMIT),
- (1.0, frozenset(['1.0']), OMIT),
- (['string', 'strang', 'strung'], frozenset(['strang']), ['string', OMIT, 'strung']),
- (['string', 'strang', 'strung'], frozenset(['strang', 'string', 'strung']), [OMIT, OMIT, OMIT]),
- (('string', 'strang', 'strung'), frozenset(['string', 'strung']), [OMIT, 'strang', OMIT]),
- ((1234567890, 345678, 987654321), frozenset(['1234567890']), [OMIT, 345678, 987654321]),
- ((1234567890, 345678, 987654321), frozenset(['345678']), [OMIT, OMIT, 987654321]),
- ({'one': 1, 'two': 'dos', 'secret': 'key'}, frozenset(['key']),
+ ('string', frozenset(['string']), OMIT),
+ (1234, frozenset(['1234']), OMIT),
+ (1234, frozenset(['23']), OMIT),
+ (1.0, frozenset(['1.0']), OMIT),
+ (['string', 'strang', 'strung'], frozenset(['strang']), ['string', OMIT, 'strung']),
+ (['string', 'strang', 'strung'], frozenset(['strang', 'string', 'strung']), [OMIT, OMIT, OMIT]),
+ (('string', 'strang', 'strung'), frozenset(['string', 'strung']), [OMIT, 'strang', OMIT]),
+ ((1234567890, 345678, 987654321), frozenset(['1234567890']), [OMIT, 345678, 987654321]),
+ ((1234567890, 345678, 987654321), frozenset(['345678']), [OMIT, OMIT, 987654321]),
+ ({'one': 1, 'two': 'dos', 'secret': 'key'}, frozenset(['key']),
{'one': 1, 'two': 'dos', 'secret': OMIT}),
- ({'one': 1, 'two': 'dos', 'secret': 'key'}, frozenset(['key', 'dos', '1']),
+ ({'one': 1, 'two': 'dos', 'secret': 'key'}, frozenset(['key', 'dos', '1']),
{'one': OMIT, 'two': OMIT, 'secret': OMIT}),
- ({'one': 1, 'two': 'dos', 'secret': 'key'}, frozenset(['key', 'dos', '1']),
+ ({'one': 1, 'two': 'dos', 'secret': 'key'}, frozenset(['key', 'dos', '1']),
{'one': OMIT, 'two': OMIT, 'secret': OMIT}),
- ({'one': 1, 'two': 'dos', 'three': ['amigos', 'musketeers', None,
+ ({'one': 1, 'two': 'dos', 'three': ['amigos', 'musketeers', None,
{'ping': 'pong', 'base': ['balls', 'raquets']}]},
frozenset(['balls', 'base', 'pong', 'amigos']),
{'one': 1, 'two': 'dos', 'three': [OMIT, 'musketeers',
None, {'ping': OMIT, 'base': [OMIT, 'raquets']}]}),
- ('This sentence has an enigma wrapped in a mystery inside of a secret. - mr mystery',
+ ('This sentence has an enigma wrapped in a mystery inside of a secret. - mr mystery',
frozenset(['enigma', 'mystery', 'secret']),
'This sentence has an ******** wrapped in a ******** inside of a ********. - mr ********'),
- ('Toshio くらとみ', frozenset(['くらとみ']), 'Toshio ********'),
- (u'Toshio くらとみ', frozenset(['くらとみ']), u'Toshio ********'),
- )
+ ('Toshio くらとみ', frozenset(['くらとみ']), 'Toshio ********'),
+ (u'Toshio くらとみ', frozenset(['くらとみ']), u'Toshio ********'),
+ )
def test_no_removal(self):
for value, no_log_strings in self.dataset_no_remove:
diff --git a/test/units/module_utils/basic/test_safe_eval.py b/test/units/module_utils/basic/test_safe_eval.py
index 0983002049e..bf684f51e87 100644
--- a/test/units/module_utils/basic/test_safe_eval.py
+++ b/test/units/module_utils/basic/test_safe_eval.py
@@ -30,27 +30,27 @@ from units.mock.generator import add_method
# Strings that should be converted into a typed value
VALID_STRINGS = (
- [("'a'", 'a')],
- [("'1'", '1')],
- [("1", 1)],
- [("True", True)],
- [("False", False)],
- [("{}", {})],
- )
+ [("'a'", 'a')],
+ [("'1'", '1')],
+ [("1", 1)],
+ [("True", True)],
+ [("False", False)],
+ [("{}", {})],
+ )
# Passing things that aren't strings should just return the object
NONSTRINGS = (
- [({'a':1}, {'a':1})],
- )
+ [({'a':1}, {'a':1})],
+ )
# These strings are not basic types. For security, these should not be
# executed. We return the same string and get an exception for some
INVALID_STRINGS = (
- [("a=1", "a=1", SyntaxError)],
- [("a.foo()", "a.foo()", None)],
- [("import foo", "import foo", None)],
- [("__import__('foo')", "__import__('foo')", ValueError)],
- )
+ [("a=1", "a=1", SyntaxError)],
+ [("a.foo()", "a.foo()", None)],
+ [("import foo", "import foo", None)],
+ [("__import__('foo')", "__import__('foo')", ValueError)],
+ )
def _check_simple_types(self, code, expected):
diff --git a/test/units/module_utils/basic/test_set_mode_if_different.py b/test/units/module_utils/basic/test_set_mode_if_different.py
index f8caea6d369..e13f2ec6687 100644
--- a/test/units/module_utils/basic/test_set_mode_if_different.py
+++ b/test/units/module_utils/basic/test_set_mode_if_different.py
@@ -79,15 +79,15 @@ def _check_mode_unchanged_when_already_0660(self, mode):
SYNONYMS_0660 = (
- [[0o660]],
- [['0o660']],
- [['660']],
- )
+ [[0o660]],
+ [['0o660']],
+ [['660']],
+ )
@add_method(_check_no_mode_given_returns_previous_changes,
[dict(previous_changes=True)],
- [dict(previous_changes=False)],
- )
+ [dict(previous_changes=False)],
+ )
@add_method(_check_mode_changed_to_0660,
*SYNONYMS_0660
)
@@ -131,8 +131,8 @@ def _check_knows_to_change_to_0660_in_check_mode(self, mode):
@add_method(_check_no_mode_given_returns_previous_changes,
[dict(previous_changes=True)],
- [dict(previous_changes=False)],
- )
+ [dict(previous_changes=False)],
+ )
@add_method(_check_knows_to_change_to_0660_in_check_mode,
*SYNONYMS_0660
)
diff --git a/test/units/module_utils/json_utils/test_filter_non_json_lines.py b/test/units/module_utils/json_utils/test_filter_non_json_lines.py
index b111cda0407..768e770a1e4 100644
--- a/test/units/module_utils/json_utils/test_filter_non_json_lines.py
+++ b/test/units/module_utils/json_utils/test_filter_non_json_lines.py
@@ -46,12 +46,12 @@ class TestAnsibleModuleExitJson(unittest.TestCase):
junk = [u"single line of junk", u"line 1/2 of junk\nline 2/2 of junk"]
unparsable_cases = (
- u'No json here',
- u'"olá": "mundo"',
- u'{"No json": "ending"',
- u'{"wrong": "ending"]',
- u'["wrong": "ending"}',
- )
+ u'No json here',
+ u'"olá": "mundo"',
+ u'{"No json": "ending"',
+ u'{"wrong": "ending"]',
+ u'["wrong": "ending"}',
+ )
def test_just_json(self):
for i in self.all_inputs:
diff --git a/test/units/module_utils/test_distribution_version.py b/test/units/module_utils/test_distribution_version.py
index c9171cd3145..52ca71ccc3b 100644
--- a/test/units/module_utils/test_distribution_version.py
+++ b/test/units/module_utils/test_distribution_version.py
@@ -36,86 +36,86 @@ import ansible.module_utils.facts as facts
# to generate the testcase data, you can use the script gen_distribution_version_testcase.py in hacking/tests
TESTSETS = [
{
- "platform.dist": [
- "centos",
- "7.2.1511",
- "Core"
- ],
- "input": {
- "/etc/redhat-release": "CentOS Linux release 7.2.1511 (Core) \n",
- "/etc/os-release": "NAME=\"CentOS Linux\"\nVERSION=\"7 (Core)\"\nID=\"centos\"\nID_LIKE=\"rhel fedora\"\nVERSION_ID=\"7\"\nPRETTY_NAME=\"CentOS Linux 7 (Core)\"\nANSI_COLOR=\"0;31\"\nCPE_NAME=\"cpe:/o:centos:centos:7\"\nHOME_URL=\"https://www.centos.org/\"\nBUG_REPORT_URL=\"https://bugs.centos.org/\"\n\nCENTOS_MANTISBT_PROJECT=\"CentOS-7\"\nCENTOS_MANTISBT_PROJECT_VERSION=\"7\"\nREDHAT_SUPPORT_PRODUCT=\"centos\"\nREDHAT_SUPPORT_PRODUCT_VERSION=\"7\"\n\n",
- "/etc/system-release": "CentOS Linux release 7.2.1511 (Core) \n"
- },
- "name": "CentOS 7.2.1511",
- "result": {
- "distribution_release": "Core",
- "distribution": "CentOS",
- "distribution_major_version": "7",
- "os_family": "RedHat",
- "distribution_version": "7.2.1511"
- }
-},
+ "platform.dist": [
+ "centos",
+ "7.2.1511",
+ "Core"
+ ],
+ "input": {
+ "/etc/redhat-release": "CentOS Linux release 7.2.1511 (Core) \n",
+ "/etc/os-release": "NAME=\"CentOS Linux\"\nVERSION=\"7 (Core)\"\nID=\"centos\"\nID_LIKE=\"rhel fedora\"\nVERSION_ID=\"7\"\nPRETTY_NAME=\"CentOS Linux 7 (Core)\"\nANSI_COLOR=\"0;31\"\nCPE_NAME=\"cpe:/o:centos:centos:7\"\nHOME_URL=\"https://www.centos.org/\"\nBUG_REPORT_URL=\"https://bugs.centos.org/\"\n\nCENTOS_MANTISBT_PROJECT=\"CentOS-7\"\nCENTOS_MANTISBT_PROJECT_VERSION=\"7\"\nREDHAT_SUPPORT_PRODUCT=\"centos\"\nREDHAT_SUPPORT_PRODUCT_VERSION=\"7\"\n\n",
+ "/etc/system-release": "CentOS Linux release 7.2.1511 (Core) \n"
+ },
+ "name": "CentOS 7.2.1511",
+ "result": {
+ "distribution_release": "Core",
+ "distribution": "CentOS",
+ "distribution_major_version": "7",
+ "os_family": "RedHat",
+ "distribution_version": "7.2.1511"
+ }
+ },
{
- "name": "CentOS 6.7",
- "platform.dist": [
- "centos",
- "6.7",
- "Final"
- ],
- "input": {
- "/etc/redhat-release": "CentOS release 6.7 (Final)\n",
- "/etc/lsb-release": "LSB_VERSION=base-4.0-amd64:base-4.0-noarch:core-4.0-amd64:core-4.0-noarch:graphics-4.0-amd64:graphics-4.0-noarch:printing-4.0-amd64:printing-4.0-noarch\n",
- "/etc/system-release": "CentOS release 6.7 (Final)\n"
- },
- "result": {
- "distribution_release": "Final",
- "distribution": "CentOS",
- "distribution_major_version": "6",
- "os_family": "RedHat",
- "distribution_version": "6.7"
- }
-},
+ "name": "CentOS 6.7",
+ "platform.dist": [
+ "centos",
+ "6.7",
+ "Final"
+ ],
+ "input": {
+ "/etc/redhat-release": "CentOS release 6.7 (Final)\n",
+ "/etc/lsb-release": "LSB_VERSION=base-4.0-amd64:base-4.0-noarch:core-4.0-amd64:core-4.0-noarch:graphics-4.0-amd64:graphics-4.0-noarch:printing-4.0-amd64:printing-4.0-noarch\n",
+ "/etc/system-release": "CentOS release 6.7 (Final)\n"
+ },
+ "result": {
+ "distribution_release": "Final",
+ "distribution": "CentOS",
+ "distribution_major_version": "6",
+ "os_family": "RedHat",
+ "distribution_version": "6.7"
+ }
+ },
+ {
+ "name": "RedHat 7.2",
+ "platform.dist": [
+ "redhat",
+ "7.2",
+ "Maipo"
+ ],
+ "input": {
+ "/etc/redhat-release": "Red Hat Enterprise Linux Server release 7.2 (Maipo)\n",
+ "/etc/os-release": "NAME=\"Red Hat Enterprise Linux Server\"\nVERSION=\"7.2 (Maipo)\"\nID=\"rhel\"\nID_LIKE=\"fedora\"\nVERSION_ID=\"7.2\"\nPRETTY_NAME=\"Red Hat Enterprise Linux Server 7.2 (Maipo)\"\nANSI_COLOR=\"0;31\"\nCPE_NAME=\"cpe:/o:redhat:enterprise_linux:7.2:GA:server\"\nHOME_URL=\"https://www.redhat.com/\"\nBUG_REPORT_URL=\"https://bugzilla.redhat.com/\"\n\nREDHAT_BUGZILLA_PRODUCT=\"Red Hat Enterprise Linux 7\"\nREDHAT_BUGZILLA_PRODUCT_VERSION=7.2\nREDHAT_SUPPORT_PRODUCT=\"Red Hat Enterprise Linux\"\nREDHAT_SUPPORT_PRODUCT_VERSION=\"7.2\"\n",
+ "/etc/system-release": "Red Hat Enterprise Linux Server release 7.2 (Maipo)\n"
+ },
+ "result": {
+ "distribution_release": "Maipo",
+ "distribution": "RedHat",
+ "distribution_major_version": "7",
+ "os_family": "RedHat",
+ "distribution_version": "7.2"
+ }
+ },
+ {
+ "name": "RedHat 6.7",
+ "platform.dist": [
+ "redhat",
+ "6.7",
+ "Santiago"
+ ],
+ "input": {
+ "/etc/redhat-release": "Red Hat Enterprise Linux Server release 6.7 (Santiago)\n",
+ "/etc/lsb-release": "LSB_VERSION=base-4.0-amd64:base-4.0-noarch:core-4.0-amd64:core-4.0-noarch:graphics-4.0-amd64:graphics-4.0-noarch:printing-4.0-amd64:printing-4.0-noarch\n",
+ "/etc/system-release": "Red Hat Enterprise Linux Server release 6.7 (Santiago)\n"
+ },
+ "result": {
+ "distribution_release": "Santiago",
+ "distribution": "RedHat",
+ "distribution_major_version": "6",
+ "os_family": "RedHat",
+ "distribution_version": "6.7"
+ }
+ },
{
- "name": "RedHat 7.2",
- "platform.dist": [
- "redhat",
- "7.2",
- "Maipo"
- ],
- "input": {
- "/etc/redhat-release": "Red Hat Enterprise Linux Server release 7.2 (Maipo)\n",
- "/etc/os-release": "NAME=\"Red Hat Enterprise Linux Server\"\nVERSION=\"7.2 (Maipo)\"\nID=\"rhel\"\nID_LIKE=\"fedora\"\nVERSION_ID=\"7.2\"\nPRETTY_NAME=\"Red Hat Enterprise Linux Server 7.2 (Maipo)\"\nANSI_COLOR=\"0;31\"\nCPE_NAME=\"cpe:/o:redhat:enterprise_linux:7.2:GA:server\"\nHOME_URL=\"https://www.redhat.com/\"\nBUG_REPORT_URL=\"https://bugzilla.redhat.com/\"\n\nREDHAT_BUGZILLA_PRODUCT=\"Red Hat Enterprise Linux 7\"\nREDHAT_BUGZILLA_PRODUCT_VERSION=7.2\nREDHAT_SUPPORT_PRODUCT=\"Red Hat Enterprise Linux\"\nREDHAT_SUPPORT_PRODUCT_VERSION=\"7.2\"\n",
- "/etc/system-release": "Red Hat Enterprise Linux Server release 7.2 (Maipo)\n"
- },
- "result": {
- "distribution_release": "Maipo",
- "distribution": "RedHat",
- "distribution_major_version": "7",
- "os_family": "RedHat",
- "distribution_version": "7.2"
- }
-},
-{
- "name": "RedHat 6.7",
- "platform.dist": [
- "redhat",
- "6.7",
- "Santiago"
- ],
- "input": {
- "/etc/redhat-release": "Red Hat Enterprise Linux Server release 6.7 (Santiago)\n",
- "/etc/lsb-release": "LSB_VERSION=base-4.0-amd64:base-4.0-noarch:core-4.0-amd64:core-4.0-noarch:graphics-4.0-amd64:graphics-4.0-noarch:printing-4.0-amd64:printing-4.0-noarch\n",
- "/etc/system-release": "Red Hat Enterprise Linux Server release 6.7 (Santiago)\n"
- },
- "result": {
- "distribution_release": "Santiago",
- "distribution": "RedHat",
- "distribution_major_version": "6",
- "os_family": "RedHat",
- "distribution_version": "6.7"
- }
-},
-{
"name" : "openSUSE Leap 42.1",
"input": {
"/etc/os-release":
@@ -604,84 +604,84 @@ DISTRIB_DESCRIPTION="CoreOS 976.0.0 (Coeur Rouge)"
"platform.system": "SunOS"
},
-{
- "name": "Solaris 11.3",
- "platform.dist": [
- "",
- "",
- ""
- ],
- "input": {
- "/etc/release": " Oracle Solaris 11.3 X86\n Copyright (c) 1983, 2015, Oracle and/or its affiliates. All rights reserved.\n Assembled 06 October 2015\n"
- },
- "platform.system": "SunOS",
- "result": {
- "distribution_release": "Oracle Solaris 11.3 X86",
- "distribution": "Solaris",
- "os_family": "Solaris",
- "distribution_version": "11.3"
- }
-},
+ {
+ "name": "Solaris 11.3",
+ "platform.dist": [
+ "",
+ "",
+ ""
+ ],
+ "input": {
+ "/etc/release": " Oracle Solaris 11.3 X86\n Copyright (c) 1983, 2015, Oracle and/or its affiliates. All rights reserved.\n Assembled 06 October 2015\n"
+ },
+ "platform.system": "SunOS",
+ "result": {
+ "distribution_release": "Oracle Solaris 11.3 X86",
+ "distribution": "Solaris",
+ "os_family": "Solaris",
+ "distribution_version": "11.3"
+ }
+ },
-{
- "name": "Solaris 10",
- "platform.dist": [
- "",
- "",
- ""
- ],
- "input": {
- "/etc/release": " Oracle Solaris 10 1/13 s10x_u11wos_24a X86\n Copyright (c) 1983, 2013, Oracle and/or its affiliates. All rights reserved.\n Assembled 17 January 2013\n"
- },
- "platform.system": "SunOS",
- "result": {
- "distribution_release": "Oracle Solaris 10 1/13 s10x_u11wos_24a X86",
- "distribution": "Solaris",
- "os_family": "Solaris",
- "distribution_version": "10"
- }
-},
+ {
+ "name": "Solaris 10",
+ "platform.dist": [
+ "",
+ "",
+ ""
+ ],
+ "input": {
+ "/etc/release": " Oracle Solaris 10 1/13 s10x_u11wos_24a X86\n Copyright (c) 1983, 2013, Oracle and/or its affiliates. All rights reserved.\n Assembled 17 January 2013\n"
+ },
+ "platform.system": "SunOS",
+ "result": {
+ "distribution_release": "Oracle Solaris 10 1/13 s10x_u11wos_24a X86",
+ "distribution": "Solaris",
+ "os_family": "Solaris",
+ "distribution_version": "10"
+ }
+ },
-{
- "name": "Fedora 22",
- "platform.dist": [
- "fedora",
- "22",
- "Twenty Two"
- ],
- "input": {
- "/etc/redhat-release": "Fedora release 22 (Twenty Two)\n",
- "/etc/os-release": "NAME=Fedora\nVERSION=\"22 (Twenty Two)\"\nID=fedora\nVERSION_ID=22\nPRETTY_NAME=\"Fedora 22 (Twenty Two)\"\nANSI_COLOR=\"0;34\"\nCPE_NAME=\"cpe:/o:fedoraproject:fedora:22\"\nHOME_URL=\"https://fedoraproject.org/\"\nBUG_REPORT_URL=\"https://bugzilla.redhat.com/\"\nREDHAT_BUGZILLA_PRODUCT=\"Fedora\"\nREDHAT_BUGZILLA_PRODUCT_VERSION=22\nREDHAT_SUPPORT_PRODUCT=\"Fedora\"\nREDHAT_SUPPORT_PRODUCT_VERSION=22\nPRIVACY_POLICY_URL=https://fedoraproject.org/wiki/Legal:PrivacyPolicy\n",
- "/etc/system-release": "Fedora release 22 (Twenty Two)\n"
- },
- "result": {
- "distribution_release": "Twenty Two",
- "distribution": "Fedora",
- "distribution_major_version": "22",
- "os_family": "RedHat",
- "distribution_version": "22"
- }
-},
-{
- "platform.dist": [
- "fedora",
- "25",
- "Rawhide"
- ],
- "input": {
- "/etc/redhat-release": "Fedora release 25 (Rawhide)\n",
- "/etc/os-release": "NAME=Fedora\nVERSION=\"25 (Workstation Edition)\"\nID=fedora\nVERSION_ID=25\nPRETTY_NAME=\"Fedora 25 (Workstation Edition)\"\nANSI_COLOR=\"0;34\"\nCPE_NAME=\"cpe:/o:fedoraproject:fedora:25\"\nHOME_URL=\"https://fedoraproject.org/\"\nBUG_REPORT_URL=\"https://bugzilla.redhat.com/\"\nREDHAT_BUGZILLA_PRODUCT=\"Fedora\"\nREDHAT_BUGZILLA_PRODUCT_VERSION=rawhide\nREDHAT_SUPPORT_PRODUCT=\"Fedora\"\nREDHAT_SUPPORT_PRODUCT_VERSION=rawhide\nPRIVACY_POLICY_URL=https://fedoraproject.org/wiki/Legal:PrivacyPolicy\nVARIANT=\"Workstation Edition\"\nVARIANT_ID=workstation\n",
- "/etc/system-release": "Fedora release 25 (Rawhide)\n"
- },
- "name": "Fedora 25",
- "result": {
- "distribution_release": "Rawhide",
- "distribution": "Fedora",
- "distribution_major_version": "25",
- "os_family": "RedHat",
- "distribution_version": "25"
- }
-},
+ {
+ "name": "Fedora 22",
+ "platform.dist": [
+ "fedora",
+ "22",
+ "Twenty Two"
+ ],
+ "input": {
+ "/etc/redhat-release": "Fedora release 22 (Twenty Two)\n",
+ "/etc/os-release": "NAME=Fedora\nVERSION=\"22 (Twenty Two)\"\nID=fedora\nVERSION_ID=22\nPRETTY_NAME=\"Fedora 22 (Twenty Two)\"\nANSI_COLOR=\"0;34\"\nCPE_NAME=\"cpe:/o:fedoraproject:fedora:22\"\nHOME_URL=\"https://fedoraproject.org/\"\nBUG_REPORT_URL=\"https://bugzilla.redhat.com/\"\nREDHAT_BUGZILLA_PRODUCT=\"Fedora\"\nREDHAT_BUGZILLA_PRODUCT_VERSION=22\nREDHAT_SUPPORT_PRODUCT=\"Fedora\"\nREDHAT_SUPPORT_PRODUCT_VERSION=22\nPRIVACY_POLICY_URL=https://fedoraproject.org/wiki/Legal:PrivacyPolicy\n",
+ "/etc/system-release": "Fedora release 22 (Twenty Two)\n"
+ },
+ "result": {
+ "distribution_release": "Twenty Two",
+ "distribution": "Fedora",
+ "distribution_major_version": "22",
+ "os_family": "RedHat",
+ "distribution_version": "22"
+ }
+ },
+ {
+ "platform.dist": [
+ "fedora",
+ "25",
+ "Rawhide"
+ ],
+ "input": {
+ "/etc/redhat-release": "Fedora release 25 (Rawhide)\n",
+ "/etc/os-release": "NAME=Fedora\nVERSION=\"25 (Workstation Edition)\"\nID=fedora\nVERSION_ID=25\nPRETTY_NAME=\"Fedora 25 (Workstation Edition)\"\nANSI_COLOR=\"0;34\"\nCPE_NAME=\"cpe:/o:fedoraproject:fedora:25\"\nHOME_URL=\"https://fedoraproject.org/\"\nBUG_REPORT_URL=\"https://bugzilla.redhat.com/\"\nREDHAT_BUGZILLA_PRODUCT=\"Fedora\"\nREDHAT_BUGZILLA_PRODUCT_VERSION=rawhide\nREDHAT_SUPPORT_PRODUCT=\"Fedora\"\nREDHAT_SUPPORT_PRODUCT_VERSION=rawhide\nPRIVACY_POLICY_URL=https://fedoraproject.org/wiki/Legal:PrivacyPolicy\nVARIANT=\"Workstation Edition\"\nVARIANT_ID=workstation\n",
+ "/etc/system-release": "Fedora release 25 (Rawhide)\n"
+ },
+ "name": "Fedora 25",
+ "result": {
+ "distribution_release": "Rawhide",
+ "distribution": "Fedora",
+ "distribution_major_version": "25",
+ "os_family": "RedHat",
+ "distribution_version": "25"
+ }
+ },
]
diff --git a/test/units/module_utils/test_text.py b/test/units/module_utils/test_text.py
index 6b11fa4e2a7..388d086b556 100644
--- a/test/units/module_utils/test_text.py
+++ b/test/units/module_utils/test_text.py
@@ -31,13 +31,13 @@ from ansible.module_utils._text import to_text, to_bytes, to_native
# Format: byte representation, text representation, encoding of byte representation
VALID_STRINGS = (
- (b'abcde', u'abcde', 'ascii'),
- (b'caf\xc3\xa9', u'caf\xe9', 'utf-8'),
- (b'caf\xe9', u'caf\xe9', 'latin-1'),
- # u'くらとみ'
- (b'\xe3\x81\x8f\xe3\x82\x89\xe3\x81\xa8\xe3\x81\xbf', u'\u304f\u3089\u3068\u307f', 'utf-8'),
- (b'\x82\xad\x82\xe7\x82\xc6\x82\xdd', u'\u304f\u3089\u3068\u307f', 'shift-jis'),
- )
+ (b'abcde', u'abcde', 'ascii'),
+ (b'caf\xc3\xa9', u'caf\xe9', 'utf-8'),
+ (b'caf\xe9', u'caf\xe9', 'latin-1'),
+ # u'くらとみ'
+ (b'\xe3\x81\x8f\xe3\x82\x89\xe3\x81\xa8\xe3\x81\xbf', u'\u304f\u3089\u3068\u307f', 'utf-8'),
+ (b'\x82\xad\x82\xe7\x82\xc6\x82\xdd', u'\u304f\u3089\u3068\u307f', 'shift-jis'),
+ )
def _check_to_text(self, in_string, encoding, expected):
"""test happy path of decoding to text"""
diff --git a/test/units/modules/cloud/amazon/test_ec2_vpc_nat_gateway.py b/test/units/modules/cloud/amazon/test_ec2_vpc_nat_gateway.py
index f274b701146..6600219612d 100644
--- a/test/units/modules/cloud/amazon/test_ec2_vpc_nat_gateway.py
+++ b/test/units/modules/cloud/amazon/test_ec2_vpc_nat_gateway.py
@@ -57,13 +57,13 @@ def run(play):
results = None
try:
tqm = TaskQueueManager(
- inventory=inventory,
- variable_manager=variable_manager,
- loader=loader,
- options=options,
- passwords=passwords,
- stdout_callback='default',
- )
+ inventory=inventory,
+ variable_manager=variable_manager,
+ loader=loader,
+ options=options,
+ passwords=passwords,
+ stdout_callback='default',
+ )
results = tqm.run(play)
finally:
if tqm is not None:
diff --git a/test/units/parsing/test_mod_args.py b/test/units/parsing/test_mod_args.py
index e83ddeea379..bd5b5c83976 100644
--- a/test/units/parsing/test_mod_args.py
+++ b/test/units/parsing/test_mod_args.py
@@ -47,9 +47,9 @@ class TestModArgsDwim(unittest.TestCase):
self._debug(mod, args, to)
self.assertEqual(mod, 'command')
self.assertEqual(args, dict(
- _raw_params = 'echo hi',
- _uses_shell = True,
- ))
+ _raw_params = 'echo hi',
+ _uses_shell = True,
+ ))
self.assertIsNone(to)
def test_basic_command(self):
@@ -58,8 +58,8 @@ class TestModArgsDwim(unittest.TestCase):
self._debug(mod, args, to)
self.assertEqual(mod, 'command')
self.assertEqual(args, dict(
- _raw_params = 'echo hi',
- ))
+ _raw_params = 'echo hi',
+ ))
self.assertIsNone(to)
def test_shell_with_modifiers(self):
@@ -68,11 +68,11 @@ class TestModArgsDwim(unittest.TestCase):
self._debug(mod, args, to)
self.assertEqual(mod, 'command')
self.assertEqual(args, dict(
- creates = '/tmp/baz',
- removes = '/tmp/bleep',
- _raw_params = '/bin/foo',
- _uses_shell = True,
- ))
+ creates = '/tmp/baz',
+ removes = '/tmp/bleep',
+ _raw_params = '/bin/foo',
+ _uses_shell = True,
+ ))
self.assertIsNone(to)
def test_normal_usage(self):
diff --git a/test/units/playbook/test_block.py b/test/units/playbook/test_block.py
index c116b364f3c..2fec92ef049 100644
--- a/test/units/playbook/test_block.py
+++ b/test/units/playbook/test_block.py
@@ -39,10 +39,10 @@ class TestBlock(unittest.TestCase):
def test_load_block_simple(self):
ds = dict(
- block = [],
- rescue = [],
- always = [],
- #otherwise = [],
+ block = [],
+ rescue = [],
+ always = [],
+ #otherwise = [],
)
b = Block.load(ds)
self.assertEqual(b.block, [])
@@ -53,10 +53,10 @@ class TestBlock(unittest.TestCase):
def test_load_block_with_tasks(self):
ds = dict(
- block = [dict(action='block')],
- rescue = [dict(action='rescue')],
- always = [dict(action='always')],
- #otherwise = [dict(action='otherwise')],
+ block = [dict(action='block')],
+ rescue = [dict(action='rescue')],
+ always = [dict(action='always')],
+ #otherwise = [dict(action='otherwise')],
)
b = Block.load(ds)
self.assertEqual(len(b.block), 1)
@@ -77,9 +77,9 @@ class TestBlock(unittest.TestCase):
def test_deserialize(self):
ds = dict(
- block = [dict(action='block')],
- rescue = [dict(action='rescue')],
- always = [dict(action='always')],
+ block = [dict(action='block')],
+ rescue = [dict(action='rescue')],
+ always = [dict(action='always')],
)
b = Block.load(ds)
data = dict(parent = ds, parent_type = 'Block')
diff --git a/test/units/playbook/test_play_context.py b/test/units/playbook/test_play_context.py
index adbd54f2bb1..4a73e0f56b9 100644
--- a/test/units/playbook/test_play_context.py
+++ b/test/units/playbook/test_play_context.py
@@ -186,7 +186,7 @@ class TestPlayContext(unittest.TestCase):
class TestTaskAndVariableOverrride(unittest.TestCase):
inventory_vars = (
- ('preferred_names',
+ ('preferred_names',
dict(ansible_connection='local',
ansible_user='ansibull',
ansible_become_user='ansibull',
@@ -198,11 +198,11 @@ class TestTaskAndVariableOverrride(unittest.TestCase):
become_method='su',
become_pass='ansibullwuzhere',)
),
- ('alternate_names',
+ ('alternate_names',
dict(ansible_become_password='ansibullwuzhere',),
dict(become_pass='ansibullwuzhere',)
),
- ('deprecated_names',
+ ('deprecated_names',
dict(ansible_ssh_user='ansibull',
ansible_sudo_user='ansibull',
ansible_sudo_pass='ansibullwuzhere',),
@@ -211,7 +211,7 @@ class TestTaskAndVariableOverrride(unittest.TestCase):
become_user='ansibull',
become_pass='ansibullwuzhere',)
),
- ('deprecated_names2',
+ ('deprecated_names2',
dict(ansible_ssh_user='ansibull',
ansible_su_user='ansibull',
ansible_su_pass='ansibullwuzhere',),
@@ -220,17 +220,17 @@ class TestTaskAndVariableOverrride(unittest.TestCase):
become_user='ansibull',
become_pass='ansibullwuzhere',)
),
- ('deprecated_alt_names',
+ ('deprecated_alt_names',
dict(ansible_sudo_password='ansibullwuzhere',),
dict(become_method='sudo',
become_pass='ansibullwuzhere',)
),
- ('deprecated_alt_names2',
+ ('deprecated_alt_names2',
dict(ansible_su_password='ansibullwuzhere',),
dict(become_method='su',
become_pass='ansibullwuzhere',)
),
- ('deprecated_and_preferred_names',
+ ('deprecated_and_preferred_names',
dict(ansible_user='ansibull',
ansible_ssh_user='badbull',
ansible_become_user='ansibull',
@@ -245,7 +245,7 @@ class TestTaskAndVariableOverrride(unittest.TestCase):
become_method='su',
become_pass='ansibullwuzhere',)
),
- )
+ )
def setUp(self):
parser = CLI.base_parser(
diff --git a/test/units/playbook/test_task.py b/test/units/playbook/test_task.py
index b2160e0dd2b..3995c4fd556 100644
--- a/test/units/playbook/test_task.py
+++ b/test/units/playbook/test_task.py
@@ -23,12 +23,12 @@ from ansible.playbook.task import Task
from ansible.compat.tests import unittest
basic_shell_task = dict(
- name = 'Test Task',
- shell = 'echo hi'
+ name = 'Test Task',
+ shell = 'echo hi'
)
kv_shell_task = dict(
- action = 'shell echo hi'
+ action = 'shell echo hi'
)
class TestTask(unittest.TestCase):
diff --git a/test/units/plugins/lookup/test_ini.py b/test/units/plugins/lookup/test_ini.py
index aeb6c2e067f..3fc728aa747 100644
--- a/test/units/plugins/lookup/test_ini.py
+++ b/test/units/plugins/lookup/test_ini.py
@@ -28,26 +28,26 @@ class TestINILookup(unittest.TestCase):
# Currently there isn't a new-style
old_style_params_data = (
- # Simple case
- dict(term=u'keyA section=sectionA file=/path/to/file',
+ # Simple case
+ dict(term=u'keyA section=sectionA file=/path/to/file',
expected=[u'keyA', u'section=sectionA', u'file=/path/to/file'],
),
- dict(term=u'keyB section=sectionB with space file=/path/with/embedded spaces and/file',
+ dict(term=u'keyB section=sectionB with space file=/path/with/embedded spaces and/file',
expected=[u'keyB', u'section=sectionB with space', u'file=/path/with/embedded spaces and/file'],
),
- dict(term=u'keyC section=sectionC file=/path/with/equals/cn=com.ansible',
+ dict(term=u'keyC section=sectionC file=/path/with/equals/cn=com.ansible',
expected=[u'keyC', u'section=sectionC', u'file=/path/with/equals/cn=com.ansible'],
),
- dict(term=u'keyD section=sectionD file=/path/with space and/equals/cn=com.ansible',
+ dict(term=u'keyD section=sectionD file=/path/with space and/equals/cn=com.ansible',
expected=[u'keyD', u'section=sectionD', u'file=/path/with space and/equals/cn=com.ansible'],
),
- dict(term=u'keyE section=sectionE file=/path/with/unicode/くらとみ/file',
+ dict(term=u'keyE section=sectionE file=/path/with/unicode/くらとみ/file',
expected=[u'keyE', u'section=sectionE', u'file=/path/with/unicode/くらとみ/file'],
),
- dict(term=u'keyF section=sectionF file=/path/with/utf 8 and spaces/くらとみ/file',
+ dict(term=u'keyF section=sectionF file=/path/with/utf 8 and spaces/くらとみ/file',
expected=[u'keyF', u'section=sectionF', u'file=/path/with/utf 8 and spaces/くらとみ/file'],
),
- )
+ )
def setUp(self):
diff --git a/test/units/plugins/lookup/test_password.py b/test/units/plugins/lookup/test_password.py
index 7dabba6ce6a..0fdffe99c5e 100644
--- a/test/units/plugins/lookup/test_password.py
+++ b/test/units/plugins/lookup/test_password.py
@@ -305,24 +305,24 @@ class TestParseContent(unittest.TestCase):
class TestFormatContent(unittest.TestCase):
def test_no_encrypt(self):
self.assertEqual(
- password._format_content(password=u'hunter42',
+ password._format_content(password=u'hunter42',
salt=u'87654321',
encrypt=False),
- u'hunter42 salt=87654321')
+ u'hunter42 salt=87654321')
def test_no_encrypt_no_salt(self):
self.assertEqual(
- password._format_content(password=u'hunter42',
+ password._format_content(password=u'hunter42',
salt=None,
encrypt=False),
- u'hunter42')
+ u'hunter42')
def test_encrypt(self):
self.assertEqual(
- password._format_content(password=u'hunter42',
+ password._format_content(password=u'hunter42',
salt=u'87654321',
encrypt='pbkdf2_sha256'),
- u'hunter42 salt=87654321')
+ u'hunter42 salt=87654321')
def test_encrypt_no_salt(self):
self.assertRaises(AssertionError, password._format_content,
diff --git a/test/units/template/test_templar.py b/test/units/template/test_templar.py
index f2e1be5dfb5..6c8f5e7eb64 100644
--- a/test/units/template/test_templar.py
+++ b/test/units/template/test_templar.py
@@ -34,7 +34,7 @@ class TestTemplar(unittest.TestCase):
def setUp(self):
fake_loader = DictDataLoader({
- "/path/to/my_file.txt": "foo\n",
+ "/path/to/my_file.txt": "foo\n",
})
shared_loader = SharedPluginLoaderObj()
variables = dict(
diff --git a/test/units/template/test_template_utilities.py b/test/units/template/test_template_utilities.py
index da0ed0db5e2..5ac866b25a5 100644
--- a/test/units/template/test_template_utilities.py
+++ b/test/units/template/test_template_utilities.py
@@ -30,45 +30,45 @@ from ansible.template import _escape_backslashes, _count_newlines_from_end
class TestBackslashEscape(unittest.TestCase):
test_data = (
- # Test backslashes in a filter arg are double escaped
- dict(
- template=u"{{ 'test2 %s' | format('\\1') }}",
- intermediate=u"{{ 'test2 %s' | format('\\\\1') }}",
- expectation=u"test2 \\1",
- args=dict()
- ),
- # Test backslashes inside the jinja2 var itself are double
- # escaped
- dict(
- template=u"Test 2\\3: {{ '\\1 %s' | format('\\2') }}",
- intermediate=u"Test 2\\3: {{ '\\\\1 %s' | format('\\\\2') }}",
- expectation=u"Test 2\\3: \\1 \\2",
- args=dict()
- ),
- # Test backslashes outside of the jinja2 var are not double
- # escaped
- dict(
- template=u"Test 2\\3: {{ 'test2 %s' | format('\\1') }}; \\done",
- intermediate=u"Test 2\\3: {{ 'test2 %s' | format('\\\\1') }}; \\done",
- expectation=u"Test 2\\3: test2 \\1; \\done",
- args=dict()
- ),
- # Test backslashes in a variable sent to a filter are handled
- dict(
- template=u"{{ 'test2 %s' | format(var1) }}",
- intermediate=u"{{ 'test2 %s' | format(var1) }}",
- expectation=u"test2 \\1",
- args=dict(var1=u'\\1')
- ),
- # Test backslashes in a variable expanded by jinja2 are double
- # escaped
- dict(
- template=u"Test 2\\3: {{ var1 | format('\\2') }}",
- intermediate=u"Test 2\\3: {{ var1 | format('\\\\2') }}",
- expectation=u"Test 2\\3: \\1 \\2",
- args=dict(var1=u'\\1 %s')
- ),
- )
+ # Test backslashes in a filter arg are double escaped
+ dict(
+ template=u"{{ 'test2 %s' | format('\\1') }}",
+ intermediate=u"{{ 'test2 %s' | format('\\\\1') }}",
+ expectation=u"test2 \\1",
+ args=dict()
+ ),
+ # Test backslashes inside the jinja2 var itself are double
+ # escaped
+ dict(
+ template=u"Test 2\\3: {{ '\\1 %s' | format('\\2') }}",
+ intermediate=u"Test 2\\3: {{ '\\\\1 %s' | format('\\\\2') }}",
+ expectation=u"Test 2\\3: \\1 \\2",
+ args=dict()
+ ),
+ # Test backslashes outside of the jinja2 var are not double
+ # escaped
+ dict(
+ template=u"Test 2\\3: {{ 'test2 %s' | format('\\1') }}; \\done",
+ intermediate=u"Test 2\\3: {{ 'test2 %s' | format('\\\\1') }}; \\done",
+ expectation=u"Test 2\\3: test2 \\1; \\done",
+ args=dict()
+ ),
+ # Test backslashes in a variable sent to a filter are handled
+ dict(
+ template=u"{{ 'test2 %s' | format(var1) }}",
+ intermediate=u"{{ 'test2 %s' | format(var1) }}",
+ expectation=u"test2 \\1",
+ args=dict(var1=u'\\1')
+ ),
+ # Test backslashes in a variable expanded by jinja2 are double
+ # escaped
+ dict(
+ template=u"Test 2\\3: {{ var1 | format('\\2') }}",
+ intermediate=u"Test 2\\3: {{ var1 | format('\\\\2') }}",
+ expectation=u"Test 2\\3: \\1 \\2",
+ args=dict(var1=u'\\1 %s')
+ ),
+ )
def setUp(self):
self.env = jinja2.Environment()
diff --git a/test/units/utils/test_vars.py b/test/units/utils/test_vars.py
index aba05c41d4c..1b4b57f2735 100644
--- a/test/units/utils/test_vars.py
+++ b/test/units/utils/test_vars.py
@@ -30,39 +30,39 @@ from ansible.utils.vars import combine_vars, merge_hash
class TestVariableUtils(unittest.TestCase):
test_merge_data = (
- dict(
- a=dict(a=1),
- b=dict(b=2),
- result=dict(a=1, b=2)
+ dict(
+ a=dict(a=1),
+ b=dict(b=2),
+ result=dict(a=1, b=2)
),
- dict(
- a=dict(a=1, c=dict(foo='bar')),
- b=dict(b=2, c=dict(baz='bam')),
- result=dict(a=1, b=2, c=dict(foo='bar', baz='bam'))
+ dict(
+ a=dict(a=1, c=dict(foo='bar')),
+ b=dict(b=2, c=dict(baz='bam')),
+ result=dict(a=1, b=2, c=dict(foo='bar', baz='bam'))
),
- dict(
- a=defaultdict(a=1, c=defaultdict(foo='bar')),
- b=dict(b=2, c=dict(baz='bam')),
- result=defaultdict(a=1, b=2, c=defaultdict(foo='bar', baz='bam'))
+ dict(
+ a=defaultdict(a=1, c=defaultdict(foo='bar')),
+ b=dict(b=2, c=dict(baz='bam')),
+ result=defaultdict(a=1, b=2, c=defaultdict(foo='bar', baz='bam'))
),
- )
+ )
test_replace_data = (
- dict(
- a=dict(a=1),
- b=dict(b=2),
- result=dict(a=1, b=2)
+ dict(
+ a=dict(a=1),
+ b=dict(b=2),
+ result=dict(a=1, b=2)
),
- dict(
- a=dict(a=1, c=dict(foo='bar')),
- b=dict(b=2, c=dict(baz='bam')),
- result=dict(a=1, b=2, c=dict(baz='bam'))
+ dict(
+ a=dict(a=1, c=dict(foo='bar')),
+ b=dict(b=2, c=dict(baz='bam')),
+ result=dict(a=1, b=2, c=dict(baz='bam'))
),
- dict(
- a=defaultdict(a=1, c=dict(foo='bar')),
- b=dict(b=2, c=defaultdict(baz='bam')),
- result=defaultdict(a=1, b=2, c=defaultdict(baz='bam'))
+ dict(
+ a=defaultdict(a=1, c=dict(foo='bar')),
+ b=dict(b=2, c=defaultdict(baz='bam')),
+ result=defaultdict(a=1, b=2, c=defaultdict(baz='bam'))
),
- )
+ )
def setUp(self):
pass
diff --git a/test/units/vars/test_variable_manager.py b/test/units/vars/test_variable_manager.py
index 659ca72c850..b2397d6cf26 100644
--- a/test/units/vars/test_variable_manager.py
+++ b/test/units/vars/test_variable_manager.py
@@ -237,8 +237,8 @@ class TestVariableManager(unittest.TestCase):
inv1.set_playbook_basedir('./')
play1 = Play.load(dict(
- hosts=['all'],
- roles=['defaults_only1', 'defaults_only2'],
+ hosts=['all'],
+ roles=['defaults_only1', 'defaults_only2'],
), loader=fake_loader, variable_manager=v)
# first we assert that the defaults as viewed as a whole are the merged results
@@ -341,8 +341,8 @@ class TestVariableManager(unittest.TestCase):
})
play1 = Play.load(dict(
- hosts=['all'],
- roles=['role1', 'role2'],
+ hosts=['all'],
+ roles=['role1', 'role2'],
), loader=fake_loader, variable_manager=v)
# The task defined by common-role exists twice because role1