pep8 issues

This commit is contained in:
Jesse Andrews 2011-08-13 16:06:50 -07:00
parent 9c17fad86d
commit 2cb86c56d1
5 changed files with 47 additions and 44 deletions

View File

@ -35,7 +35,8 @@ class SecurityGroupRule(base.Resource):
class SecurityGroupRuleManager(base.ManagerWithFind):
resource_class = SecurityGroupRule
def create(self, parent_group_id, ip_protocol=None, from_port=None, to_port=None, cidr=None, group_id=None):
def create(self, parent_group_id, ip_protocol=None, from_port=None,
to_port=None, cidr=None, group_id=None):
"""
Create a security group
@ -54,14 +55,13 @@ class SecurityGroupRuleManager(base.ManagerWithFind):
"group_id": group_id,
"parent_group_id": parent_group_id}}
return self._create('/os-security-group-rules', body, "security_group_rule")
return self._create('/os-security-group-rules', body,
'security_group_rule')
def delete(self, id):
def delete(self, rule):
"""
Delete a security group rule
:param id: The security group rule ID to delete
:param rule: The security group rule to delete (ID or Class)
"""
if hasattr(id, 'id'):
id = id.id
return self._delete('/os-security-group-rules/%s' % id)
return self._delete('/os-security-group-rules/%s' % base.getid(rule))

View File

@ -49,27 +49,24 @@ class SecurityGroupManager(base.ManagerWithFind):
body = {"security_group": {"name": name, 'description': description}}
return self._create('/os-security-groups', body, 'security_group')
def delete(self, id):
def delete(self, group):
"""
Delete a security group
:param id: The security group ID to delete
:param group: The security group to delete (group or ID)
:rtype: None
"""
if hasattr(id, 'id'):
id = id.id
return self._delete('/os-security-groups/%d' % id)
return self._delete('/os-security-groups/%s' % base.getid(group))
def get(self, id):
"""
Get a security group
:param id: The security group ID to get
:param group: The security group to get by ID
:rtype: :class:`SecurityGroup`
"""
if hasattr(id, 'id'):
id = id.id
return self._get('/os-security-groups/%s' % id, 'security_group')
return self._get('/os-security-groups/%s' % id,
'security_group')
def list(self):
"""

View File

@ -2,8 +2,8 @@
A fake server that "responds" to API methods with pre-canned responses.
All of these responses come from the spec, so if for some reason the spec's
wrong the tests might raise AssertionError. I've indicated in comments the places where actual
behavior differs from the spec.
wrong the tests might raise AssertionError. I've indicated in comments the
places where actual behavior differs from the spec.
"""
import novaclient.client
@ -17,7 +17,8 @@ def assert_has_keys(dict, required=[], optional=[]):
except AssertionError:
allowed_keys = set(required) | set(optional)
extra_keys = set(keys).difference(set(required + optional))
raise AssertionError("found unexpected keys: %s" % list(extra_keys))
raise AssertionError("found unexpected keys: %s" %
list(extra_keys))
class FakeClient(object):

View File

@ -31,7 +31,8 @@ class FakeHTTPClient(base_client.HTTPClient):
assert 'body' in kwargs
# Call the method
munged_url = url.strip('/').replace('/', '_').replace('.', '_').replace('-', '_')
munged_url = url.strip('/').replace('/', '_') \
.replace('.', '_').replace('-', '_')
callback = "%s_%s" % (method.lower(), munged_url)
if not hasattr(self, callback):
raise AssertionError('Called unknown API method: %s %s' % (method,
@ -394,7 +395,8 @@ class FakeHTTPClient(base_client.HTTPClient):
assert body.keys() == ['security_group']
fakes.assert_has_keys(body['security_group'],
required=['name', 'description'])
r = {'security_group': self.get_os_security_groups()[1]['security_groups'][0]}
r = {'security_group':
self.get_os_security_groups()[1]['security_groups'][0]}
return (202, r)
#
@ -402,8 +404,9 @@ class FakeHTTPClient(base_client.HTTPClient):
#
def get_os_security_group_rules(self, **kw):
return (200, {"security_group_rules": [
{'id': 1, 'parent_group_id': 1, 'group_id': 2, 'ip_protocol': 'TCP',
'from_port': '22', 'to_port': 22, 'cidr': '10.0.0.0/8'}
{'id': 1, 'parent_group_id': 1, 'group_id': 2,
'ip_protocol': 'TCP', 'from_port': '22', 'to_port': 22,
'cidr': '10.0.0.0/8'}
]})
def delete_os_security_group_rules_1(self, **kw):
@ -413,7 +416,8 @@ class FakeHTTPClient(base_client.HTTPClient):
assert body.keys() == ['security_group_rule']
fakes.assert_has_keys(body['security_group_rule'],
required=['parent_group_id'],
optional=['group_id','ip_protocol','from_port','to_port','cidr'])
r = {'security_group_rule': self.get_os_security_group_rules()[1]['security_group_rules'][0]}
optional=['group_id', 'ip_protocol', 'from_port',
'to_port', 'cidr'])
r = {'security_group_rule':
self.get_os_security_group_rules()[1]['security_group_rules'][0]}
return (202, r)

View File

@ -11,7 +11,8 @@ class SecurityGroupsTest(utils.TestCase):
def test_list_security_groups(self):
sgs = cs.security_groups.list()
cs.assert_called('GET', '/os-security-groups')
[self.assertTrue(isinstance(sg, security_groups.SecurityGroup)) for sg in sgs]
for sg in sgs:
self.assertTrue(isinstance(sg, security_groups.SecurityGroup))
def test_get_security_groups(self):
sg = cs.security_groups.get(1)