Enable check for E124 rule
Fix E124 failures and enable check for E124 E124 closing bracket does not match visual indentation Change-Id: Iec6af44362dcf613cfaccbccbe53de82aba51a6a
This commit is contained in:
parent
7a1066fb79
commit
53f0c5428f
@ -316,12 +316,10 @@ class ClientTest(utils.TestCase):
|
|||||||
cs.http_log_debug = True
|
cs.http_log_debug = True
|
||||||
cs.http_log_req('GET', '/foo', {'headers': {}})
|
cs.http_log_req('GET', '/foo', {'headers': {}})
|
||||||
cs.http_log_req('GET', '/foo', {'headers':
|
cs.http_log_req('GET', '/foo', {'headers':
|
||||||
{'X-Auth-Token': 'totally_bogus'}
|
{'X-Auth-Token': 'totally_bogus'}})
|
||||||
})
|
|
||||||
cs.http_log_req('GET', '/foo', {'headers':
|
cs.http_log_req('GET', '/foo', {'headers':
|
||||||
{'X-Foo': 'bar',
|
{'X-Foo': 'bar',
|
||||||
'X-Auth-Token': 'totally_bogus'}
|
'X-Auth-Token': 'totally_bogus'}})
|
||||||
})
|
|
||||||
cs.http_log_req('GET', '/foo', {'headers': {},
|
cs.http_log_req('GET', '/foo', {'headers': {},
|
||||||
'data':
|
'data':
|
||||||
'{"auth": {"passwordCredentials": '
|
'{"auth": {"passwordCredentials": '
|
||||||
|
@ -97,8 +97,7 @@ class ClientTest(utils.TestCase):
|
|||||||
headers = {"X-Auth-Token": "token",
|
headers = {"X-Auth-Token": "token",
|
||||||
"X-Auth-Project-Id": "project_id",
|
"X-Auth-Project-Id": "project_id",
|
||||||
"User-Agent": cl.USER_AGENT,
|
"User-Agent": cl.USER_AGENT,
|
||||||
'Accept': 'application/json',
|
'Accept': 'application/json'}
|
||||||
}
|
|
||||||
mock_request.assert_called_with(
|
mock_request.assert_called_with(
|
||||||
"GET",
|
"GET",
|
||||||
"http://example.com/hi",
|
"http://example.com/hi",
|
||||||
|
@ -1359,9 +1359,9 @@ class FakeHTTPClient(base_client.HTTPClient):
|
|||||||
#
|
#
|
||||||
def get_os_security_group_rules(self, **kw):
|
def get_os_security_group_rules(self, **kw):
|
||||||
return (200, {}, {"security_group_rules": [
|
return (200, {}, {"security_group_rules": [
|
||||||
{'id': 1, 'parent_group_id': 1, 'group_id': 2,
|
{'id': 1, 'parent_group_id': 1, 'group_id': 2,
|
||||||
'ip_protocol': 'TCP', 'from_port': 22, 'to_port': 22,
|
'ip_protocol': 'TCP', 'from_port': 22, 'to_port': 22,
|
||||||
'cidr': '10.0.0.0/8'}
|
'cidr': '10.0.0.0/8'}
|
||||||
]})
|
]})
|
||||||
|
|
||||||
def delete_os_security_group_rules_1(self, **kw):
|
def delete_os_security_group_rules_1(self, **kw):
|
||||||
@ -1392,8 +1392,8 @@ class FakeHTTPClient(base_client.HTTPClient):
|
|||||||
#
|
#
|
||||||
def get_os_security_group_default_rules(self, **kw):
|
def get_os_security_group_default_rules(self, **kw):
|
||||||
return (200, {}, {"security_group_default_rules": [
|
return (200, {}, {"security_group_default_rules": [
|
||||||
{'id': 1, 'ip_protocol': 'TCP', 'from_port': 22,
|
{'id': 1, 'ip_protocol': 'TCP', 'from_port': 22,
|
||||||
'to_port': 22, 'cidr': '10.0.0.0/8'}
|
'to_port': 22, 'cidr': '10.0.0.0/8'}
|
||||||
]})
|
]})
|
||||||
|
|
||||||
def delete_os_security_group_default_rules_1(self, **kw):
|
def delete_os_security_group_default_rules_1(self, **kw):
|
||||||
|
2
tox.ini
2
tox.ini
@ -45,7 +45,7 @@ downloadcache = ~/cache/pip
|
|||||||
# Following checks are ignored on purpose.
|
# Following checks are ignored on purpose.
|
||||||
#
|
#
|
||||||
# Additional checks are also ignored on purpose: F811, F821
|
# Additional checks are also ignored on purpose: F811, F821
|
||||||
ignore = E124,F811,F821,H404,H405
|
ignore = F811,F821,H404,H405
|
||||||
show-source = True
|
show-source = True
|
||||||
exclude=.venv,.git,.tox,dist,*openstack/common*,*lib/python*,*egg,build,doc/source/conf.py
|
exclude=.venv,.git,.tox,dist,*openstack/common*,*lib/python*,*egg,build,doc/source/conf.py
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user