Hi,
Please find patch to fix pep-8 issues for given modules.
1. server group (__init__.py)
2. server (__init__.py, gpdb.py, types.py, utils.py)
--
*Harshal Dhumal*
*Sr. Software Engineer*
EnterpriseDB India: http://www.enterprisedb.com
The Enterprise PostgreSQL Company
diff --git a/web/pgadmin/browser/server_groups/__init__.py b/web/pgadmin/browser/server_groups/__init__.py
index 73cdabe..633d9ee 100644
--- a/web/pgadmin/browser/server_groups/__init__.py
+++ b/web/pgadmin/browser/server_groups/__init__.py
@@ -240,7 +240,8 @@ class ServerGroupView(NodeView):
return jsonify(
node=self.blueprint.generate_browser_node(
- "%d" % (sg.id),None,
+ "%d" % sg.id,
+ None,
sg.name,
"icon-%s" % self.node_type,
True,
@@ -297,7 +298,8 @@ class ServerGroupView(NodeView):
for group in groups:
nodes.append(
self.blueprint.generate_browser_node(
- "%d" % (group.id), None,
+ "%d" % group.id,
+ None,
group.name,
"icon-%s" % self.node_type,
True,
@@ -306,7 +308,7 @@ class ServerGroupView(NodeView):
)
else:
group = ServerGroup.query.filter_by(user_id=current_user.id,
- id=gid).first()
+ id=gid).first()
if not group:
return gone(
errormsg=gettext("Could not find the server group.")
diff --git a/web/pgadmin/browser/server_groups/servers/__init__.py b/web/pgadmin/browser/server_groups/servers/__init__.py
index 08d139e..dfa9d62 100644
--- a/web/pgadmin/browser/server_groups/servers/__init__.py
+++ b/web/pgadmin/browser/server_groups/servers/__init__.py
@@ -26,6 +26,7 @@ from config import PG_DEFAULT_DRIVER
from pgadmin.model import db, Server, ServerGroup, User
from pgadmin.utils.driver import get_driver
+
def has_any(data, keys):
"""
Checks any one of the keys present in the data given
@@ -42,8 +43,10 @@ def has_any(data, keys):
return False
+
def recovery_state(connection, postgres_version):
- recovery_check_sql = render_template("connect/sql/#{0}#/check_recovery.sql".format(postgres_version))
+ recovery_check_sql = render_template(
+ "connect/sql/#{0}#/check_recovery.sql".format(postgres_version))
status, result = connection.execute_dict(recovery_check_sql)
if status and 'rows' in result and len(result['rows']) > 0:
@@ -54,6 +57,7 @@ def recovery_state(connection, postgres_version):
wal_paused = None
return in_recovery, wal_paused
+
def server_icon_and_background(is_connected, manager, server):
"""
@@ -160,16 +164,16 @@ class ServerModule(sg.ServerGroupPluginModule):
scripts.extend([{
'name': 'pgadmin.browser.server.privilege',
- 'path': url_for('%s.static'% self.name, filename='js/privilege'),
+ 'path': url_for('%s.static' % self.name, filename='js/privilege'),
'when': self.node_type,
'is_template': False,
'deps': ['pgadmin.browser.node.ui']
}, {
'name': 'pgadmin.browser.server.variable',
- 'path': url_for('%s.static'% self.name, filename='js/variable'),
+ 'path': url_for('%s.static' % self.name, filename='js/variable'),
'when': self.node_type,
'is_template': False
- },{
+ }, {
'name': 'pgadmin.server.supported_servers',
'path': url_for('browser.index') + 'server/supported_servers',
'is_template': True,
@@ -246,26 +250,32 @@ class ServerNode(PGChildNodeView):
}],
'check_pgpass': [{'get': 'check_pgpass'}]
})
- EXP_IP4 = "^\s*((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\."\
- "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\."\
- "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\."\
- "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?))\s*$"
- EXP_IP6 = '^\s*((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|'\
- '(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|'\
- '2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3})|:))|'\
- '(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|'\
- ':((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3})|:))|'\
- '(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})?:((25[0-5]|'\
- '2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|'\
- '(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4]\d|1\d\d|'\
- '[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|'\
- '((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|'\
- '(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4]\d|'\
- '1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|'\
- '((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:)))(%.+)?\s*$'
+ EXP_IP4 = "^\s*((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\." \
+ "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\." \
+ "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\." \
+ "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?))\s*$"
+ EXP_IP6 = '^\s*((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|' \
+ '(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|' \
+ '2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d))' \
+ '{3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|' \
+ ':((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d' \
+ '|[1-9]?\d)){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]' \
+ '{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})?:((25[0-5]|2[0-4]\d|1\d\d|' \
+ '[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|' \
+ '(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-' \
+ 'Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25' \
+ '[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:)' \
+ '{2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:(' \
+ '(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|' \
+ '[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]' \
+ '{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4]\d|'\
+ '1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))' \
+ '|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((' \
+ '25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|' \
+ '[1-9]?\d)){3}))|:)))(%.+)?\s*$'
pat4 = re.compile(EXP_IP4)
pat6 = re.compile(EXP_IP6)
- SSL_MODES = ['prefer','require', 'verify-ca', 'verify-full']
+ SSL_MODES = ['prefer', 'require', 'verify-ca', 'verify-full']
def check_ssl_fields(self, data):
"""
@@ -295,13 +305,13 @@ class ServerNode(PGChildNodeView):
# prevent using default SSL certificates from web servers
if config.SERVER_MODE and \
- field in required_ssl_fields_server_mode:
+ field in required_ssl_fields_server_mode:
# Set file manager directory from preference
import os
file_extn = '.key' if field.endswith('key') else '.crt'
dummy_ssl_file = os.path.join(
- '<STORAGE_DIR>', '.postgresql',
- 'postgresql' + file_extn
+ '<STORAGE_DIR>', '.postgresql',
+ 'postgresql' + file_extn
)
data[field] = dummy_ssl_file
# For Desktop mode, we will allow to default
@@ -354,7 +364,7 @@ class ServerNode(PGChildNodeView):
if not len(res):
return gone(errormsg=gettext(
'The specified server group with id# {0} could not be found.'
- ))
+ ))
return make_json_response(result=res)
@@ -493,9 +503,9 @@ class ServerNode(PGChildNodeView):
if not self.pat4.match(data['hostaddr']):
if not self.pat6.match(data['hostaddr']):
return make_json_response(
- success=0,
- status=400,
- errormsg=gettext('Host address not valid')
+ success=0,
+ status=400,
+ errormsg=gettext('Host address not valid')
)
manager = get_driver(PG_DEFAULT_DRIVER).connection_manager(sid)
@@ -504,12 +514,14 @@ class ServerNode(PGChildNodeView):
if connected:
for arg in (
- 'host', 'hostaddr', 'port', 'db', 'username', 'sslmode', 'role'
+ 'host', 'hostaddr', 'port', 'db', 'username', 'sslmode',
+ 'role'
):
if arg in data:
return forbidden(
errormsg=gettext(
- "'{0}' is not allowed to modify, when server is connected."
+ "'{0}' is not allowed to modify, "
+ "when server is connected."
).format(disp_lbl[arg])
)
@@ -709,7 +721,9 @@ class ServerNode(PGChildNodeView):
ssl_mode=data[u'sslmode'],
comment=data[u'comment'] if u'comment' in data else None,
role=data[u'role'] if u'role' in data else None,
- db_res=','.join(data[u'db_res']) if u'db_res' in data else None,
+ db_res=','.join(data[u'db_res'])
+ if u'db_res' in data
+ else None,
sslcert=data['sslcert'] if is_ssl else None,
sslkey=data['sslkey'] if is_ssl else None,
sslrootcert=data['sslrootcert'] if is_ssl else None,
@@ -717,7 +731,7 @@ class ServerNode(PGChildNodeView):
sslcompression=1 if is_ssl and data['sslcompression'] else 0,
bgcolor=data['bgcolor'] if u'bgcolor' in data
else None,
- fgcolor = data['fgcolor'] if u'fgcolor' in data
+ fgcolor=data['fgcolor'] if u'fgcolor' in data
else None
)
@@ -729,7 +743,8 @@ class ServerNode(PGChildNodeView):
manager = None
if 'connect_now' in data and data['connect_now']:
- manager = get_driver(PG_DEFAULT_DRIVER).connection_manager(server.id)
+ manager = get_driver(PG_DEFAULT_DRIVER).connection_manager(
+ server.id)
manager.update(server)
conn = manager.connection()
@@ -759,7 +774,8 @@ class ServerNode(PGChildNodeView):
return make_json_response(
status=401,
success=0,
- errormsg=gettext(u"Unable to connect to server:\n\n%s" % errmsg)
+ errormsg=gettext(
+ u"Unable to connect to server:\n\n%s" % errmsg)
)
else:
if 'save_password' in data and data['save_password'] and \
@@ -779,7 +795,9 @@ class ServerNode(PGChildNodeView):
self.node_type,
user=user,
connected=connected,
- server_type=manager.server_type if manager and manager.server_type else 'pg'
+ server_type=manager.server_type
+ if manager and manager.server_type
+ else 'pg'
)
)
@@ -931,11 +949,11 @@ class ServerNode(PGChildNodeView):
password = conn_passwd or server.password
else:
password = data['password'] if 'password' in data else None
- save_password = \
- data['save_password'] if password and \
- 'save_password' in data else False
+ save_password = data['save_password']\
+ if password and 'save_password' in data else False
- # Encrypt the password before saving with user's login password key.
+ # Encrypt the password before saving with user's login
+ # password key.
try:
password = encrypt(password, user.password) \
if password is not None else server.password
@@ -970,9 +988,8 @@ class ServerNode(PGChildNodeView):
errmsg = errmsg.decode('utf-8')
current_app.logger.error(
- "Could not connected to server(#{0}) - '{1}'.\nError: {2}".format(
- server.id, server.name, errmsg
- )
+ "Could not connected to server(#{0}) - '{1}'.\nError: {2}"
+ .format(server.id, server.name, errmsg)
)
return make_json_response(
@@ -1003,7 +1020,8 @@ class ServerNode(PGChildNodeView):
current_app.logger.info('Connection Established for server: \
%s - %s' % (server.id, server.name))
- # Update the recovery and wal pause option for the server if connected successfully
+ # Update the recovery and wal pause option for the server
+ # if connected successfully
in_recovery, wal_paused = recovery_state(conn, manager.version)
return make_json_response(
@@ -1062,13 +1080,17 @@ class ServerNode(PGChildNodeView):
gettext("Could not reload the server configuration.")
)
else:
- return make_json_response(data={'status': True,
- 'result': gettext('Server configuration reloaded.')})
+ return make_json_response(data={
+ 'status': True,
+ 'result': gettext('Server configuration reloaded.')
+ })
else:
- return make_json_response(data={'status': False,
- 'result': gettext(
- 'Not connected to the server or the connection to the server has been closed.')})
+ return make_json_response(data={
+ 'status': False,
+ 'result': gettext(
+ 'Not connected to the server or the connection to the'
+ ' server has been closed.')})
def create_restore_point(self, gid, sid):
"""
@@ -1143,8 +1165,9 @@ class ServerNode(PGChildNodeView):
# If there is no password found for the server
# then check for pgpass file
if not server.password and not manager.password:
- if server.passfile and manager.passfile and \
- server.passfile == manager.passfile:
+ if server.passfile and \
+ manager.passfile and \
+ server.passfile == manager.passfile:
is_passfile = True
# Check for password only if there is no pgpass file used
@@ -1196,7 +1219,8 @@ class ServerNode(PGChildNodeView):
password = pqencryptpassword(data['newPassword'], manager.user)
SQL = render_template(
- "/servers/sql/#{0}#/change_password.sql".format(manager.version),
+ "/servers/sql/#{0}#/change_password.sql".format(
+ manager.version),
conn=conn, _=gettext,
user=manager.user, encrypted_password=password)
@@ -1335,9 +1359,10 @@ class ServerNode(PGChildNodeView):
)
if not server.password or not manager.password:
- if server.passfile and manager.passfile and \
- server.passfile == manager.passfile:
- is_pgpass = True
+ if server.passfile and \
+ manager.passfile and \
+ server.passfile == manager.passfile:
+ is_pgpass = True
return make_json_response(
success=1,
data=dict({'is_pgpass': is_pgpass}),
@@ -1348,4 +1373,5 @@ class ServerNode(PGChildNodeView):
)
return internal_server_error(errormsg=str(e))
+
ServerNode.register_node_view(blueprint)
diff --git a/web/pgadmin/browser/server_groups/servers/gpdb.py b/web/pgadmin/browser/server_groups/servers/gpdb.py
index 61576ab..260e314 100644
--- a/web/pgadmin/browser/server_groups/servers/gpdb.py
+++ b/web/pgadmin/browser/server_groups/servers/gpdb.py
@@ -22,7 +22,6 @@ class GPDB(ServerType):
def icon(self):
return "gpdb.png"
-
def instanceOf(self, ver):
return "Greenplum Database" in ver
diff --git a/web/pgadmin/browser/server_groups/servers/types.py b/web/pgadmin/browser/server_groups/servers/types.py
index bc44636..83ae029 100644
--- a/web/pgadmin/browser/server_groups/servers/types.py
+++ b/web/pgadmin/browser/server_groups/servers/types.py
@@ -7,7 +7,8 @@
#
##########################################################################
-import os, sys
+import os
+import sys
from flask import render_template
from flask_babel import gettext as _
@@ -15,6 +16,7 @@ from pgadmin.utils.preferences import Preferences
import config
+
class ServerType(object):
"""
Server Type
diff --git a/web/pgadmin/browser/server_groups/servers/utils.py b/web/pgadmin/browser/server_groups/servers/utils.py
index 43ce262..e9ebbb9 100644
--- a/web/pgadmin/browser/server_groups/servers/utils.py
+++ b/web/pgadmin/browser/server_groups/servers/utils.py
@@ -63,7 +63,8 @@ def parse_priv_to_db(str_privileges, allowed_acls=[]):
priv_with_grant = []
priv_without_grant = []
- if isinstance(priv['privileges'], dict) and 'changed' in priv['privileges']:
+ if isinstance(priv['privileges'], dict) \
+ and 'changed' in priv['privileges']:
tmp = []
for p in priv['privileges']['changed']:
tmp_p = {'privilege_type': p['privilege_type'],
@@ -162,9 +163,9 @@ def validate_options(options, option_name, option_value):
len(option[option_name].strip()) > 0:
# If option value is valid
if option_value in option and \
- option[option_value] is not None and \
- option[option_value] != '' and \
- len(option[option_value].strip()) > 0:
+ option[option_value] is not None and \
+ option[option_value] != '' and \
+ len(option[option_value].strip()) > 0:
# Do nothing here
pass
else: