summaryrefslogtreecommitdiffstats
path: root/test/lib/ansible_test/_internal
diff options
context:
space:
mode:
authorMatt Clay <matt@mystile.com>2023-01-24 01:56:07 +0100
committerGitHub <noreply@github.com>2023-01-24 01:56:07 +0100
commitc9f20aedc04088f10b864b8f976688384abd50de (patch)
tree2183570b61bdfc4e8d30af44d597c4833a15744e /test/lib/ansible_test/_internal
parentansible-test - Remove obsolete DirectoryTarget. (diff)
downloadansible-c9f20aedc04088f10b864b8f976688384abd50de.tar.xz
ansible-c9f20aedc04088f10b864b8f976688384abd50de.zip
ansible-test - Fix various type hinting issues. (#79798)
* ansible-test - Add missing type hints. * ansible-test - Remove redundant type hints. * ansible-test - Fix return type annotations. * ansible-test - Add assert, casts to assist mypy. * ansible-test - Fix incorrect type hints. * ansible-test - Remove no-op code. * ansible-test - Fix incorrect types. * ansible-test - Fix method signature mismatch.
Diffstat (limited to 'test/lib/ansible_test/_internal')
-rw-r--r--test/lib/ansible_test/_internal/become.py6
-rw-r--r--test/lib/ansible_test/_internal/cgroup.py2
-rw-r--r--test/lib/ansible_test/_internal/ci/__init__.py2
-rw-r--r--test/lib/ansible_test/_internal/ci/azp.py2
-rw-r--r--test/lib/ansible_test/_internal/classification/python.py6
-rw-r--r--test/lib/ansible_test/_internal/cli/argparsing/__init__.py2
-rw-r--r--test/lib/ansible_test/_internal/cli/argparsing/argcompletion.py4
-rw-r--r--test/lib/ansible_test/_internal/cli/argparsing/parsers.py2
-rw-r--r--test/lib/ansible_test/_internal/cli/compat.py16
-rw-r--r--test/lib/ansible_test/_internal/cli/parsers/base_argument_parsers.py2
-rw-r--r--test/lib/ansible_test/_internal/cli/parsers/key_value_parsers.py4
-rw-r--r--test/lib/ansible_test/_internal/commands/coverage/__init__.py2
-rw-r--r--test/lib/ansible_test/_internal/commands/coverage/analyze/targets/__init__.py7
-rw-r--r--test/lib/ansible_test/_internal/commands/coverage/analyze/targets/filter.py13
-rw-r--r--test/lib/ansible_test/_internal/commands/coverage/combine.py2
-rw-r--r--test/lib/ansible_test/_internal/commands/integration/__init__.py14
-rw-r--r--test/lib/ansible_test/_internal/commands/integration/cloud/cs.py2
-rw-r--r--test/lib/ansible_test/_internal/commands/integration/coverage.py4
-rw-r--r--test/lib/ansible_test/_internal/commands/sanity/__init__.py8
-rw-r--r--test/lib/ansible_test/_internal/commands/sanity/integration_aliases.py8
-rw-r--r--test/lib/ansible_test/_internal/commands/sanity/pylint.py2
-rw-r--r--test/lib/ansible_test/_internal/commands/sanity/validate_modules.py2
-rw-r--r--test/lib/ansible_test/_internal/completion.py14
-rw-r--r--test/lib/ansible_test/_internal/containers.py4
-rw-r--r--test/lib/ansible_test/_internal/core_ci.py14
-rw-r--r--test/lib/ansible_test/_internal/data.py6
-rw-r--r--test/lib/ansible_test/_internal/delegation.py2
-rw-r--r--test/lib/ansible_test/_internal/dev/container_probe.py2
-rw-r--r--test/lib/ansible_test/_internal/docker_util.py2
-rw-r--r--test/lib/ansible_test/_internal/executor.py6
-rw-r--r--test/lib/ansible_test/_internal/host_configs.py6
-rw-r--r--test/lib/ansible_test/_internal/host_profiles.py4
-rw-r--r--test/lib/ansible_test/_internal/io.py2
-rw-r--r--test/lib/ansible_test/_internal/metadata.py4
-rw-r--r--test/lib/ansible_test/_internal/provider/layout/__init__.py2
-rw-r--r--test/lib/ansible_test/_internal/pypi_proxy.py2
-rw-r--r--test/lib/ansible_test/_internal/target.py34
-rw-r--r--test/lib/ansible_test/_internal/test.py6
-rw-r--r--test/lib/ansible_test/_internal/thread.py9
-rw-r--r--test/lib/ansible_test/_internal/timeout.py2
-rw-r--r--test/lib/ansible_test/_internal/util.py14
-rw-r--r--test/lib/ansible_test/_internal/util_common.py8
42 files changed, 121 insertions, 134 deletions
diff --git a/test/lib/ansible_test/_internal/become.py b/test/lib/ansible_test/_internal/become.py
index cabf97e4b3..e653959afc 100644
--- a/test/lib/ansible_test/_internal/become.py
+++ b/test/lib/ansible_test/_internal/become.py
@@ -12,7 +12,7 @@ from .util import (
class Become(metaclass=abc.ABCMeta):
"""Base class for become implementations."""
@classmethod
- def name(cls):
+ def name(cls) -> str:
"""The name of this plugin."""
return cls.__name__.lower()
@@ -48,7 +48,7 @@ class Doas(Become):
class DoasSudo(Doas):
"""Become using 'doas' in ansible-test and then after bootstrapping use 'sudo' for other ansible commands."""
@classmethod
- def name(cls):
+ def name(cls) -> str:
"""The name of this plugin."""
return 'doas_sudo'
@@ -78,7 +78,7 @@ class Su(Become):
class SuSudo(Su):
"""Become using 'su' in ansible-test and then after bootstrapping use 'sudo' for other ansible commands."""
@classmethod
- def name(cls):
+ def name(cls) -> str:
"""The name of this plugin."""
return 'su_sudo'
diff --git a/test/lib/ansible_test/_internal/cgroup.py b/test/lib/ansible_test/_internal/cgroup.py
index b55d878dc3..977e359d63 100644
--- a/test/lib/ansible_test/_internal/cgroup.py
+++ b/test/lib/ansible_test/_internal/cgroup.py
@@ -29,7 +29,7 @@ class CGroupEntry:
path: pathlib.PurePosixPath
@property
- def root_path(self):
+ def root_path(self) -> pathlib.PurePosixPath:
"""The root path for this cgroup subsystem."""
return pathlib.PurePosixPath(CGroupPath.ROOT, self.subsystem)
diff --git a/test/lib/ansible_test/_internal/ci/__init__.py b/test/lib/ansible_test/_internal/ci/__init__.py
index 677fafce3e..97e41dae76 100644
--- a/test/lib/ansible_test/_internal/ci/__init__.py
+++ b/test/lib/ansible_test/_internal/ci/__init__.py
@@ -152,6 +152,8 @@ class CryptographyAuthHelper(AuthHelper, metaclass=abc.ABCMeta):
private_key_pem = self.initialize_private_key()
private_key = load_pem_private_key(to_bytes(private_key_pem), None, default_backend())
+ assert isinstance(private_key, ec.EllipticCurvePrivateKey)
+
signature_raw_bytes = private_key.sign(payload_bytes, ec.ECDSA(hashes.SHA256()))
return signature_raw_bytes
diff --git a/test/lib/ansible_test/_internal/ci/azp.py b/test/lib/ansible_test/_internal/ci/azp.py
index 557fbacb31..9170dfecc8 100644
--- a/test/lib/ansible_test/_internal/ci/azp.py
+++ b/test/lib/ansible_test/_internal/ci/azp.py
@@ -40,7 +40,7 @@ CODE = 'azp'
class AzurePipelines(CIProvider):
"""CI provider implementation for Azure Pipelines."""
- def __init__(self):
+ def __init__(self) -> None:
self.auth = AzurePipelinesAuthHelper()
@staticmethod
diff --git a/test/lib/ansible_test/_internal/classification/python.py b/test/lib/ansible_test/_internal/classification/python.py
index df888738b6..77ffeacfa5 100644
--- a/test/lib/ansible_test/_internal/classification/python.py
+++ b/test/lib/ansible_test/_internal/classification/python.py
@@ -146,10 +146,8 @@ def get_python_module_utils_name(path: str) -> str:
return name
-def enumerate_module_utils():
- """Return a list of available module_utils imports.
- :rtype: set[str]
- """
+def enumerate_module_utils() -> set[str]:
+ """Return a list of available module_utils imports."""
module_utils = []
for path in data_context().content.walk_files(data_context().content.module_utils_path):
diff --git a/test/lib/ansible_test/_internal/cli/argparsing/__init__.py b/test/lib/ansible_test/_internal/cli/argparsing/__init__.py
index 9356442d0d..d1541f00d5 100644
--- a/test/lib/ansible_test/_internal/cli/argparsing/__init__.py
+++ b/test/lib/ansible_test/_internal/cli/argparsing/__init__.py
@@ -34,7 +34,7 @@ class RegisteredCompletionFinder(OptionCompletionFinder):
These registered completions, if provided, are used to filter the final completion results.
This works around a known bug: https://github.com/kislyuk/argcomplete/issues/221
"""
- def __init__(self, *args, **kwargs):
+ def __init__(self, *args, **kwargs) -> None:
super().__init__(*args, **kwargs)
self.registered_completions: t.Optional[list[str]] = None
diff --git a/test/lib/ansible_test/_internal/cli/argparsing/argcompletion.py b/test/lib/ansible_test/_internal/cli/argparsing/argcompletion.py
index df19b3382d..cf5776da3f 100644
--- a/test/lib/ansible_test/_internal/cli/argparsing/argcompletion.py
+++ b/test/lib/ansible_test/_internal/cli/argparsing/argcompletion.py
@@ -9,7 +9,7 @@ import typing as t
class Substitute:
"""Substitute for missing class which accepts all arguments."""
- def __init__(self, *args, **kwargs):
+ def __init__(self, *args, **kwargs) -> None:
pass
@@ -87,7 +87,7 @@ class OptionCompletionFinder(CompletionFinder):
"""
enabled = bool(argcomplete)
- def __init__(self, *args, validator=None, **kwargs):
+ def __init__(self, *args, validator=None, **kwargs) -> None:
if validator:
raise ValueError()
diff --git a/test/lib/ansible_test/_internal/cli/argparsing/parsers.py b/test/lib/ansible_test/_internal/cli/argparsing/parsers.py
index 429b9c0cdf..d07e03cbc8 100644
--- a/test/lib/ansible_test/_internal/cli/argparsing/parsers.py
+++ b/test/lib/ansible_test/_internal/cli/argparsing/parsers.py
@@ -341,7 +341,7 @@ class IntegerParser(DynamicChoicesParser):
class BooleanParser(ChoicesParser):
"""Composite argument parser for boolean (yes/no) values."""
- def __init__(self):
+ def __init__(self) -> None:
super().__init__(['yes', 'no'])
def parse(self, state: ParserState) -> bool:
diff --git a/test/lib/ansible_test/_internal/cli/compat.py b/test/lib/ansible_test/_internal/cli/compat.py
index c69b54d7d5..4fdad4ba2e 100644
--- a/test/lib/ansible_test/_internal/cli/compat.py
+++ b/test/lib/ansible_test/_internal/cli/compat.py
@@ -84,25 +84,25 @@ def get_option_name(name: str) -> str:
class PythonVersionUnsupportedError(ApplicationError):
"""A Python version was requested for a context which does not support that version."""
- def __init__(self, context, version, versions):
+ def __init__(self, context: str, version: str, versions: c.Iterable[str]) -> None:
super().__init__(f'Python {version} is not supported by environment `{context}`. Supported Python version(s) are: {", ".join(versions)}')
class PythonVersionUnspecifiedError(ApplicationError):
"""A Python version was not specified for a context which is unknown, thus the Python version is unknown."""
- def __init__(self, context):
+ def __init__(self, context: str) -> None:
super().__init__(f'A Python version was not specified for environment `{context}`. Use the `--python` option to specify a Python version.')
class ControllerNotSupportedError(ApplicationError):
"""Option(s) were specified which do not provide support for the controller and would be ignored because they are irrelevant for the target."""
- def __init__(self, context):
+ def __init__(self, context: str) -> None:
super().__init__(f'Environment `{context}` does not provide a Python version supported by the controller.')
class OptionsConflictError(ApplicationError):
"""Option(s) were specified which conflict with other options."""
- def __init__(self, first, second):
+ def __init__(self, first: c.Iterable[str], second: c.Iterable[str]) -> None:
super().__init__(f'Options `{" ".join(first)}` cannot be combined with options `{" ".join(second)}`.')
@@ -170,22 +170,22 @@ class TargetMode(enum.Enum):
NO_TARGETS = enum.auto() # coverage
@property
- def one_host(self):
+ def one_host(self) -> bool:
"""Return True if only one host (the controller) should be used, otherwise return False."""
return self in (TargetMode.SANITY, TargetMode.UNITS, TargetMode.NO_TARGETS)
@property
- def no_fallback(self):
+ def no_fallback(self) -> bool:
"""Return True if no fallback is acceptable for the controller (due to options not applying to the target), otherwise return False."""
return self in (TargetMode.WINDOWS_INTEGRATION, TargetMode.NETWORK_INTEGRATION, TargetMode.NO_TARGETS)
@property
- def multiple_pythons(self):
+ def multiple_pythons(self) -> bool:
"""Return True if multiple Python versions are allowed, otherwise False."""
return self in (TargetMode.SANITY, TargetMode.UNITS)
@property
- def has_python(self):
+ def has_python(self) -> bool:
"""Return True if this mode uses Python, otherwise False."""
return self in (TargetMode.POSIX_INTEGRATION, TargetMode.SANITY, TargetMode.UNITS, TargetMode.SHELL)
diff --git a/test/lib/ansible_test/_internal/cli/parsers/base_argument_parsers.py b/test/lib/ansible_test/_internal/cli/parsers/base_argument_parsers.py
index ed933bd535..aac7a69468 100644
--- a/test/lib/ansible_test/_internal/cli/parsers/base_argument_parsers.py
+++ b/test/lib/ansible_test/_internal/cli/parsers/base_argument_parsers.py
@@ -69,5 +69,5 @@ class TargetsNamespaceParser(NamespaceParser, metaclass=abc.ABCMeta):
class ControllerRequiredFirstError(CompletionError):
"""Exception raised when controller and target options are specified out-of-order."""
- def __init__(self):
+ def __init__(self) -> None:
super().__init__('The `--controller` option must be specified before `--target` option(s).')
diff --git a/test/lib/ansible_test/_internal/cli/parsers/key_value_parsers.py b/test/lib/ansible_test/_internal/cli/parsers/key_value_parsers.py
index a6af7f803e..049b71ee4c 100644
--- a/test/lib/ansible_test/_internal/cli/parsers/key_value_parsers.py
+++ b/test/lib/ansible_test/_internal/cli/parsers/key_value_parsers.py
@@ -99,7 +99,7 @@ class ControllerKeyValueParser(KeyValueParser):
class DockerKeyValueParser(KeyValueParser):
"""Composite argument parser for docker key/value pairs."""
- def __init__(self, image, controller):
+ def __init__(self, image: str, controller: bool) -> None:
self.controller = controller
self.versions = get_docker_pythons(image, controller, False)
self.allow_default = bool(get_docker_pythons(image, controller, True))
@@ -135,7 +135,7 @@ class DockerKeyValueParser(KeyValueParser):
class PosixRemoteKeyValueParser(KeyValueParser):
"""Composite argument parser for POSIX remote key/value pairs."""
- def __init__(self, name, controller):
+ def __init__(self, name: str, controller: bool) -> None:
self.controller = controller
self.versions = get_remote_pythons(name, controller, False)
self.allow_default = bool(get_remote_pythons(name, controller, True))
diff --git a/test/lib/ansible_test/_internal/commands/coverage/__init__.py b/test/lib/ansible_test/_internal/commands/coverage/__init__.py
index 6b063cf65d..5e56433f30 100644
--- a/test/lib/ansible_test/_internal/commands/coverage/__init__.py
+++ b/test/lib/ansible_test/_internal/commands/coverage/__init__.py
@@ -227,7 +227,7 @@ def read_python_coverage_legacy(path: str) -> PythonArcs:
contents = read_text_file(path)
contents = re.sub(r'''^!coverage.py: This is a private format, don't read it directly!''', '', contents)
data = json.loads(contents)
- arcs: PythonArcs = {filename: [tuple(arc) for arc in arcs] for filename, arcs in data['arcs'].items()}
+ arcs: PythonArcs = {filename: [t.cast(tuple[int, int], tuple(arc)) for arc in arc_list] for filename, arc_list in data['arcs'].items()}
except Exception as ex:
raise CoverageError(path, f'Error reading JSON coverage file: {ex}') from ex
diff --git a/test/lib/ansible_test/_internal/commands/coverage/analyze/targets/__init__.py b/test/lib/ansible_test/_internal/commands/coverage/analyze/targets/__init__.py
index f16f7b4f0f..2dcb4e847e 100644
--- a/test/lib/ansible_test/_internal/commands/coverage/analyze/targets/__init__.py
+++ b/test/lib/ansible_test/_internal/commands/coverage/analyze/targets/__init__.py
@@ -20,6 +20,7 @@ from .. import (
)
TargetKey = t.TypeVar('TargetKey', int, tuple[int, int])
+TFlexKey = t.TypeVar('TFlexKey', int, tuple[int, int], str)
NamedPoints = dict[str, dict[TargetKey, set[str]]]
IndexedPoints = dict[str, dict[TargetKey, set[int]]]
Arcs = dict[str, dict[tuple[int, int], set[int]]]
@@ -120,10 +121,10 @@ def get_target_index(name: str, target_indexes: TargetIndexes) -> int:
def expand_indexes(
source_data: IndexedPoints,
source_index: list[str],
- format_func: c.Callable[[TargetKey], str],
-) -> NamedPoints:
+ format_func: c.Callable[[TargetKey], TFlexKey],
+) -> dict[str, dict[TFlexKey, set[str]]]:
"""Expand indexes from the source into target names for easier processing of the data (arcs or lines)."""
- combined_data: dict[str, dict[t.Any, set[str]]] = {}
+ combined_data: dict[str, dict[TFlexKey, set[str]]] = {}
for covered_path, covered_points in source_data.items():
combined_points = combined_data.setdefault(covered_path, {})
diff --git a/test/lib/ansible_test/_internal/commands/coverage/analyze/targets/filter.py b/test/lib/ansible_test/_internal/commands/coverage/analyze/targets/filter.py
index f1d8551ae0..c305304a9c 100644
--- a/test/lib/ansible_test/_internal/commands/coverage/analyze/targets/filter.py
+++ b/test/lib/ansible_test/_internal/commands/coverage/analyze/targets/filter.py
@@ -24,6 +24,7 @@ from . import (
from . import (
NamedPoints,
+ TargetKey,
TargetIndexes,
)
@@ -50,8 +51,12 @@ def command_coverage_analyze_targets_filter(args: CoverageAnalyzeTargetsFilterCo
covered_targets, covered_path_arcs, covered_path_lines = read_report(args.input_file)
- filtered_path_arcs = expand_indexes(covered_path_arcs, covered_targets, lambda v: v)
- filtered_path_lines = expand_indexes(covered_path_lines, covered_targets, lambda v: v)
+ def pass_target_key(value: TargetKey) -> TargetKey:
+ """Return the given target key unmodified."""
+ return value
+
+ filtered_path_arcs = expand_indexes(covered_path_arcs, covered_targets, pass_target_key)
+ filtered_path_lines = expand_indexes(covered_path_lines, covered_targets, pass_target_key)
include_targets = set(args.include_targets) if args.include_targets else None
exclude_targets = set(args.exclude_targets) if args.exclude_targets else None
@@ -59,7 +64,7 @@ def command_coverage_analyze_targets_filter(args: CoverageAnalyzeTargetsFilterCo
include_path = re.compile(args.include_path) if args.include_path else None
exclude_path = re.compile(args.exclude_path) if args.exclude_path else None
- def path_filter_func(path):
+ def path_filter_func(path: str) -> bool:
"""Return True if the given path should be included, otherwise return False."""
if include_path and not re.search(include_path, path):
return False
@@ -69,7 +74,7 @@ def command_coverage_analyze_targets_filter(args: CoverageAnalyzeTargetsFilterCo
return True
- def target_filter_func(targets):
+ def target_filter_func(targets: set[str]) -> set[str]:
"""Filter the given targets and return the result based on the defined includes and excludes."""
if include_targets:
targets &= include_targets
diff --git a/test/lib/ansible_test/_internal/commands/coverage/combine.py b/test/lib/ansible_test/_internal/commands/coverage/combine.py
index cb086fd5c3..fc4e37f8af 100644
--- a/test/lib/ansible_test/_internal/commands/coverage/combine.py
+++ b/test/lib/ansible_test/_internal/commands/coverage/combine.py
@@ -101,7 +101,7 @@ def combine_coverage_files(args: CoverageCombineConfig, host_state: HostState) -
class ExportedCoverageDataNotFound(ApplicationError):
"""Exception when no combined coverage data is present yet is required."""
- def __init__(self):
+ def __init__(self) -> None:
super().__init__(
'Coverage data must be exported before processing with the `--docker` or `--remote` option.\n'
'Export coverage with `ansible-test coverage combine` using the `--export` option.\n'
diff --git a/test/lib/ansible_test/_internal/commands/integration/__init__.py b/test/lib/ansible_test/_internal/commands/integration/__init__.py
index 33bd45f6a0..4cad715e94 100644
--- a/test/lib/ansible_test/_internal/commands/integration/__init__.py
+++ b/test/lib/ansible_test/_internal/commands/integration/__init__.py
@@ -819,7 +819,7 @@ def integration_environment(
class IntegrationEnvironment:
"""Details about the integration environment."""
- def __init__(self, test_dir, integration_dir, targets_dir, inventory_path, ansible_config, vars_file):
+ def __init__(self, test_dir: str, integration_dir: str, targets_dir: str, inventory_path: str, ansible_config: str, vars_file: str) -> None:
self.test_dir = test_dir
self.integration_dir = integration_dir
self.targets_dir = targets_dir
@@ -831,17 +831,13 @@ class IntegrationEnvironment:
class IntegrationCache(CommonCache):
"""Integration cache."""
@property
- def integration_targets(self):
- """
- :rtype: list[IntegrationTarget]
- """
+ def integration_targets(self) -> list[IntegrationTarget]:
+ """The list of integration test targets."""
return self.get('integration_targets', lambda: list(walk_integration_targets()))
@property
- def dependency_map(self):
- """
- :rtype: dict[str, set[IntegrationTarget]]
- """
+ def dependency_map(self) -> dict[str, set[IntegrationTarget]]:
+ """The dependency map of integration test targets."""
return self.get('dependency_map', lambda: generate_dependency_map(self.integration_targets))
diff --git a/test/lib/ansible_test/_internal/commands/integration/cloud/cs.py b/test/lib/ansible_test/_internal/commands/integration/cloud/cs.py
index 25a02ff5b0..ca454503e4 100644
--- a/test/lib/ansible_test/_internal/commands/integration/cloud/cs.py
+++ b/test/lib/ansible_test/_internal/commands/integration/cloud/cs.py
@@ -131,7 +131,7 @@ class CsCloudProvider(CloudProvider):
def _get_credentials(self, container_name: str) -> dict[str, t.Any]:
"""Wait for the CloudStack simulator to return credentials."""
- def check(value):
+ def check(value) -> bool:
"""Return True if the given configuration is valid JSON, otherwise return False."""
# noinspection PyBroadException
try:
diff --git a/test/lib/ansible_test/_internal/commands/integration/coverage.py b/test/lib/ansible_test/_internal/commands/integration/coverage.py
index e9917692b1..5a486e93b8 100644
--- a/test/lib/ansible_test/_internal/commands/integration/coverage.py
+++ b/test/lib/ansible_test/_internal/commands/integration/coverage.py
@@ -158,7 +158,7 @@ class PosixCoverageHandler(CoverageHandler[PosixConfig]):
self.teardown_controller()
self.teardown_target()
- def setup_controller(self):
+ def setup_controller(self) -> None:
"""Perform setup for code coverage on the controller."""
coverage_config_path = os.path.join(self.common_temp_path, COVERAGE_CONFIG_NAME)
coverage_output_path = os.path.join(self.common_temp_path, ResultType.COVERAGE.name)
@@ -171,7 +171,7 @@ class PosixCoverageHandler(CoverageHandler[PosixConfig]):
os.mkdir(coverage_output_path)
verified_chmod(coverage_output_path, MODE_DIRECTORY_WRITE)
- def setup_target(self):
+ def setup_target(self) -> None:
"""Perform setup for code coverage on the target."""
if not self.target_profile:
return
diff --git a/test/lib/ansible_test/_internal/commands/sanity/__init__.py b/test/lib/ansible_test/_internal/commands/sanity/__init__.py
index cde3060397..1b062fef32 100644
--- a/test/lib/ansible_test/_internal/commands/sanity/__init__.py
+++ b/test/lib/ansible_test/_internal/commands/sanity/__init__.py
@@ -831,7 +831,7 @@ class SanitySingleVersion(SanityTest, metaclass=abc.ABCMeta):
class SanityCodeSmellTest(SanitySingleVersion):
"""Sanity test script."""
- def __init__(self, path):
+ def __init__(self, path) -> None:
name = os.path.splitext(os.path.basename(path))[0]
config_path = os.path.splitext(path)[0] + '.json'
@@ -866,10 +866,10 @@ class SanityCodeSmellTest(SanitySingleVersion):
self.extensions = []
self.prefixes = []
self.files = []
- self.text: t.Optional[bool] = None
+ self.text = None
self.ignore_self = False
- self.minimum_python_version: t.Optional[str] = None
- self.maximum_python_version: t.Optional[str] = None
+ self.minimum_python_version = None
+ self.maximum_python_version = None
self.__all_targets = False
self.__no_targets = True
diff --git a/test/lib/ansible_test/_internal/commands/sanity/integration_aliases.py b/test/lib/ansible_test/_internal/commands/sanity/integration_aliases.py
index 5811dedd24..3fcab1c763 100644
--- a/test/lib/ansible_test/_internal/commands/sanity/integration_aliases.py
+++ b/test/lib/ansible_test/_internal/commands/sanity/integration_aliases.py
@@ -104,7 +104,7 @@ class IntegrationAliasesTest(SanitySingleVersion):
ansible_only = True
- def __init__(self):
+ def __init__(self) -> None:
super().__init__()
self._ci_config: dict[str, t.Any] = {}
@@ -307,10 +307,8 @@ class IntegrationAliasesTest(SanitySingleVersion):
return messages
- def check_windows_targets(self):
- """
- :rtype: list[SanityMessage]
- """
+ def check_windows_targets(self) -> list[SanityMessage]:
+ """Check Windows integration test targets and return messages with any issues found."""
windows_targets = tuple(walk_windows_integration_targets())
messages = []
diff --git a/test/lib/ansible_test/_internal/commands/sanity/pylint.py b/test/lib/ansible_test/_internal/commands/sanity/pylint.py
index cd5a83506a..4db8d7f0c6 100644
--- a/test/lib/ansible_test/_internal/commands/sanity/pylint.py
+++ b/test/lib/ansible_test/_internal/commands/sanity/pylint.py
@@ -58,7 +58,7 @@ from ...host_configs import (
class PylintTest(SanitySingleVersion):
"""Sanity test using pylint."""
- def __init__(self):
+ def __init__(self) -> None:
super().__init__()
self.optional_error_codes.update([
'ansible-deprecated-date',
diff --git a/test/lib/ansible_test/_internal/commands/sanity/validate_modules.py b/test/lib/ansible_test/_internal/commands/sanity/validate_modules.py
index 2caa803e33..ddb31b5988 100644
--- a/test/lib/ansible_test/_internal/commands/sanity/validate_modules.py
+++ b/test/lib/ansible_test/_internal/commands/sanity/validate_modules.py
@@ -60,7 +60,7 @@ from ...host_configs import (
class ValidateModulesTest(SanitySingleVersion):
"""Sanity test using validate-modules."""
- def __init__(self):
+ def __init__(self) -> None:
super().__init__()
self.optional_error_codes.update([
diff --git a/test/lib/ansible_test/_internal/completion.py b/test/lib/ansible_test/_internal/completion.py
index ee096772fa..2df5a67627 100644
--- a/test/lib/ansible_test/_internal/completion.py
+++ b/test/lib/ansible_test/_internal/completion.py
@@ -54,7 +54,7 @@ class CompletionConfig(metaclass=abc.ABCMeta):
@property
@abc.abstractmethod
- def is_default(self):
+ def is_default(self) -> bool:
"""True if the completion entry is only used for defaults, otherwise False."""
@@ -107,17 +107,17 @@ class RemoteCompletionConfig(CompletionConfig):
arch: t.Optional[str] = None
@property
- def platform(self):
+ def platform(self) -> str:
"""The name of the platform."""
return self.name.partition('/')[0]
@property
- def version(self):
+ def version(self) -> str:
"""The version of the platform."""
return self.name.partition('/')[2]
@property
- def is_default(self):
+ def is_default(self) -> bool:
"""True if the completion entry is only used for defaults, otherwise False."""
return not self.version
@@ -166,7 +166,7 @@ class DockerCompletionConfig(PythonCompletionConfig):
placeholder: bool = False
@property
- def is_default(self):
+ def is_default(self) -> bool:
"""True if the completion entry is only used for defaults, otherwise False."""
return False
@@ -276,7 +276,9 @@ def filter_completion(
) -> dict[str, TCompletionConfig]:
"""Return the given completion dictionary, filtering out configs which do not support the controller if controller_only is specified."""
if controller_only:
- completion = {name: config for name, config in completion.items() if isinstance(config, PosixCompletionConfig) and config.controller_supported}
+ # The cast is needed because mypy gets confused here and forgets that completion values are TCompletionConfig.
+ completion = {name: t.cast(TCompletionConfig, config) for name, config in completion.items() if
+ isinstance(config, PosixCompletionConfig) and config.controller_supported}
if not include_defaults:
completion = {name: config for name, config in completion.items() if not config.is_default}
diff --git a/test/lib/ansible_test/_internal/containers.py b/test/lib/ansible_test/_internal/containers.py
index de4a380c47..fad1f48ad6 100644
--- a/test/lib/ansible_test/_internal/containers.py
+++ b/test/lib/ansible_test/_internal/containers.py
@@ -844,12 +844,12 @@ def create_container_hooks(
control_state: dict[str, tuple[list[str], list[SshProcess]]] = {}
managed_state: dict[str, tuple[list[str], list[SshProcess]]] = {}
- def pre_target(target):
+ def pre_target(target: IntegrationTarget) -> None:
"""Configure hosts for SSH port forwarding required by the specified target."""
forward_ssh_ports(args, control_connections, '%s_hosts_prepare.yml' % control_type, control_state, target, HostType.control, control_contexts)
forward_ssh_ports(args, managed_connections, '%s_hosts_prepare.yml' % managed_type, managed_state, target, HostType.managed, managed_contexts)
- def post_target(target):
+ def post_target(target: IntegrationTarget) -> None:
"""Clean up previously configured SSH port forwarding which was required by the specified target."""
cleanup_ssh_ports(args, control_connections, '%s_hosts_restore.yml' % control_type, control_state, target, HostType.control)
cleanup_ssh_ports(args, managed_connections, '%s_hosts_restore.yml' % managed_type, managed_state, target, HostType.managed)
diff --git a/test/lib/ansible_test/_internal/core_ci.py b/test/lib/ansible_test/_internal/core_ci.py
index 15898ef8bf..26e141655e 100644
--- a/test/lib/ansible_test/_internal/core_ci.py
+++ b/test/lib/ansible_test/_internal/core_ci.py
@@ -173,11 +173,11 @@ class AnsibleCoreCI:
self.endpoint = self.default_endpoint
@property
- def available(self):
+ def available(self) -> bool:
"""Return True if Ansible Core CI is supported."""
return self.ci_provider.supports_core_ci_auth()
- def start(self):
+ def start(self) -> t.Optional[dict[str, t.Any]]:
"""Start instance."""
if self.started:
display.info(f'Skipping started {self.label} instance.', verbosity=1)
@@ -185,7 +185,7 @@ class AnsibleCoreCI:
return self._start(self.ci_provider.prepare_core_ci_auth())
- def stop(self):
+ def stop(self) -> None:
"""Stop instance."""
if not self.started:
display.info(f'Skipping invalid {self.label} instance.', verbosity=1)
@@ -279,10 +279,10 @@ class AnsibleCoreCI:
raise ApplicationError(f'Timeout waiting for {self.label} instance.')
@property
- def _uri(self):
+ def _uri(self) -> str:
return f'{self.endpoint}/{self.stage}/{self.provider}/{self.instance_id}'
- def _start(self, auth):
+ def _start(self, auth) -> dict[str, t.Any]:
"""Start instance."""
display.info(f'Initializing new {self.label} instance using: {self._uri}', verbosity=1)
@@ -341,7 +341,7 @@ class AnsibleCoreCI:
display.warning(f'{error}. Trying again after {sleep} seconds.')
time.sleep(sleep)
- def _clear(self):
+ def _clear(self) -> None:
"""Clear instance information."""
try:
self.connection = None
@@ -349,7 +349,7 @@ class AnsibleCoreCI:
except FileNotFoundError:
pass
- def _load(self):
+ def _load(self) -> bool:
"""Load instance information."""
try:
data = read_text_file(self.path)
diff --git a/test/lib/ansible_test/_internal/data.py b/test/lib/ansible_test/_internal/data.py
index 66e21543c1..635b0c328c 100644
--- a/test/lib/ansible_test/_internal/data.py
+++ b/test/lib/ansible_test/_internal/data.py
@@ -52,7 +52,7 @@ from .provider.layout.unsupported import (
class DataContext:
"""Data context providing details about the current execution environment for ansible-test."""
- def __init__(self):
+ def __init__(self) -> None:
content_path = os.environ.get('ANSIBLE_TEST_CONTENT_ROOT')
current_path = os.getcwd()
@@ -245,7 +245,7 @@ class PluginInfo:
@cache
-def content_plugins():
+def content_plugins() -> dict[str, dict[str, PluginInfo]]:
"""
Analyze content.
The primary purpose of this analysis is to facilitate mapping of integration tests to the plugin(s) they are intended to test.
@@ -256,7 +256,7 @@ def content_plugins():
plugin_paths = sorted(data_context().content.walk_files(plugin_directory))
plugin_directory_offset = len(plugin_directory.split(os.path.sep))
- plugin_files = {}
+ plugin_files: dict[str, list[str]] = {}
for plugin_path in plugin_paths:
plugin_filename = os.path.basename(plugin_path)
diff --git a/test/lib/ansible_test/_internal/delegation.py b/test/lib/ansible_test/_internal/delegation.py
index 8c6879d213..e5f889ab57 100644
--- a/test/lib/ansible_test/_internal/delegation.py
+++ b/test/lib/ansible_test/_internal/delegation.py
@@ -226,7 +226,7 @@ def delegate_command(args: EnvironmentConfig, host_state: HostState, exclude: li
target.on_target_failure() # when the controller is delegated, report failures after delegation fails
-def insert_options(command, options):
+def insert_options(command: list[str], options: list[str]) -> list[str]:
"""Insert addition command line options into the given command and return the result."""
result = []
diff --git a/test/lib/ansible_test/_internal/dev/container_probe.py b/test/lib/ansible_test/_internal/dev/container_probe.py
index 84b88f4bb6..be22e01c60 100644
--- a/test/lib/ansible_test/_internal/dev/container_probe.py
+++ b/test/lib/ansible_test/_internal/dev/container_probe.py
@@ -184,7 +184,7 @@ def check_container_cgroup_status(args: EnvironmentConfig, config: DockerConfig,
write_text_file(os.path.join(args.dev_probe_cgroups, f'{identity}.log'), message)
-def get_identity(args: EnvironmentConfig, config: DockerConfig, container_name: str):
+def get_identity(args: EnvironmentConfig, config: DockerConfig, container_name: str) -> str:
"""Generate and return an identity string to use when logging test results."""
engine = require_docker().command
diff --git a/test/lib/ansible_test/_internal/docker_util.py b/test/lib/ansible_test/_internal/docker_util.py
index 77cdd4ee0f..8bea430047 100644
--- a/test/lib/ansible_test/_internal/docker_util.py
+++ b/test/lib/ansible_test/_internal/docker_util.py
@@ -720,7 +720,7 @@ class DockerError(Exception):
class ContainerNotFoundError(DockerError):
"""The container identified by `identifier` was not found."""
- def __init__(self, identifier):
+ def __init__(self, identifier: str) -> None:
super().__init__('The container "%s" was not found.' % identifier)
self.identifier = identifier
diff --git a/test/lib/ansible_test/_internal/executor.py b/test/lib/ansible_test/_internal/executor.py
index b079df9f56..0c94cf3ba9 100644
--- a/test/lib/ansible_test/_internal/executor.py
+++ b/test/lib/ansible_test/_internal/executor.py
@@ -81,13 +81,13 @@ def detect_changes(args: TestConfig) -> t.Optional[list[str]]:
class NoChangesDetected(ApplicationWarning):
"""Exception when change detection was performed, but no changes were found."""
- def __init__(self):
+ def __init__(self) -> None:
super().__init__('No changes detected.')
class NoTestsForChanges(ApplicationWarning):
"""Exception when changes detected, but no tests trigger as a result."""
- def __init__(self):
+ def __init__(self) -> None:
super().__init__('No tests found for detected changes.')
@@ -111,5 +111,5 @@ class ListTargets(Exception):
class AllTargetsSkipped(ApplicationWarning):
"""All targets skipped."""
- def __init__(self):
+ def __init__(self) -> None:
super().__init__('All targets skipped.')
diff --git a/test/lib/ansible_test/_internal/host_configs.py b/test/lib/ansible_test/_internal/host_configs.py
index d7671c7f1f..48d5fd31a0 100644
--- a/test/lib/ansible_test/_internal/host_configs.py
+++ b/test/lib/ansible_test/_internal/host_configs.py
@@ -48,7 +48,7 @@ from .util import (
@dataclasses.dataclass(frozen=True)
class OriginCompletionConfig(PosixCompletionConfig):
"""Pseudo completion config for the origin."""
- def __init__(self):
+ def __init__(self) -> None:
super().__init__(name='origin')
@property
@@ -65,7 +65,7 @@ class OriginCompletionConfig(PosixCompletionConfig):
return version
@property
- def is_default(self):
+ def is_default(self) -> bool:
"""True if the completion entry is only used for defaults, otherwise False."""
return False
@@ -513,7 +513,7 @@ class HostSettings:
with open_binary_file(path) as settings_file:
return pickle.load(settings_file)
- def apply_defaults(self):
+ def apply_defaults(self) -> None:
"""Apply defaults to the host settings."""
context = HostContext(controller_config=None)
self.controller.apply_defaults(context, self.controller.get_defaults(context))
diff --git a/test/lib/ansible_test/_internal/host_profiles.py b/test/lib/ansible_test/_internal/host_profiles.py
index 6575e7c1ca..3cb0c6acac 100644
--- a/test/lib/ansible_test/_internal/host_profiles.py
+++ b/test/lib/ansible_test/_internal/host_profiles.py
@@ -351,7 +351,7 @@ class RemoteProfile(SshTargetHostProfile[TRemoteConfig], metaclass=abc.ABCMeta):
return self.core_ci
- def delete_instance(self):
+ def delete_instance(self) -> None:
"""Delete the AnsibleCoreCI VM instance."""
core_ci = self.get_instance()
@@ -892,7 +892,7 @@ class DockerProfile(ControllerHostProfile[DockerConfig], SshTargetHostProfile[Do
return message
- def check_cgroup_requirements(self):
+ def check_cgroup_requirements(self) -> None:
"""Check cgroup requirements for the container."""
cgroup_version = get_docker_info(self.args).cgroup_version
diff --git a/test/lib/ansible_test/_internal/io.py b/test/lib/ansible_test/_internal/io.py
index 41f2ec03df..80d4769931 100644
--- a/test/lib/ansible_test/_internal/io.py
+++ b/test/lib/ansible_test/_internal/io.py
@@ -80,7 +80,7 @@ def open_binary_file(path: str, mode: str = 'rb') -> t.IO[bytes]:
class SortedSetEncoder(json.JSONEncoder):
"""Encode sets as sorted lists."""
- def default(self, o):
+ def default(self, o: t.Any) -> t.Any:
"""Return a serialized version of the `o` object."""
if isinstance(o, set):
return sorted(o)
diff --git a/test/lib/ansible_test/_internal/metadata.py b/test/lib/ansible_test/_internal/metadata.py
index e969f029ca..94bbc34a60 100644
--- a/test/lib/ansible_test/_internal/metadata.py
+++ b/test/lib/ansible_test/_internal/metadata.py
@@ -19,7 +19,7 @@ from .diff import (
class Metadata:
"""Metadata object for passing data to delegated tests."""
- def __init__(self):
+ def __init__(self) -> None:
"""Initialize metadata."""
self.changes: dict[str, tuple[tuple[int, int], ...]] = {}
self.cloud_config: t.Optional[dict[str, dict[str, t.Union[int, str, bool]]]] = None
@@ -82,7 +82,7 @@ class Metadata:
class ChangeDescription:
"""Description of changes."""
- def __init__(self):
+ def __init__(self) -> None:
self.command: str = ''
self.changed_paths: list[str] = []
self.deleted_paths: list[str] = []
diff --git a/test/lib/ansible_test/_internal/provider/layout/__init__.py b/test/lib/ansible_test/_internal/provider/layout/__init__.py
index 2e8026bf19..aa6693f0a5 100644
--- a/test/lib/ansible_test/_internal/provider/layout/__init__.py
+++ b/test/lib/ansible_test/_internal/provider/layout/__init__.py
@@ -150,7 +150,7 @@ class ContentLayout(Layout):
class LayoutMessages:
"""Messages generated during layout creation that should be deferred for later display."""
- def __init__(self):
+ def __init__(self) -> None:
self.info: list[str] = []
self.warning: list[str] = []
self.error: list[str] = []
diff --git a/test/lib/ansible_test/_internal/pypi_proxy.py b/test/lib/ansible_test/_internal/pypi_proxy.py
index fa26b5fddc..97663eadd1 100644
--- a/test/lib/ansible_test/_internal/pypi_proxy.py
+++ b/test/lib/ansible_test/_internal/pypi_proxy.py
@@ -119,7 +119,7 @@ def configure_target_pypi_proxy(args: EnvironmentConfig, profile: HostProfile, p
create_posix_inventory(args, inventory_path, [profile])
- def cleanup_pypi_proxy():
+ def cleanup_pypi_proxy() -> None:
"""Undo changes made to configure the PyPI proxy."""
run_playbook(args, inventory_path, 'pypi_proxy_restore.yml', capture=True)
diff --git a/test/lib/ansible_test/_internal/target.py b/test/lib/ansible_test/_internal/target.py
index 9efd4b596a..6448f972c1 100644
--- a/test/lib/ansible_test/_internal/target.py
+++ b/test/lib/ansible_test/_internal/target.py
@@ -136,10 +136,8 @@ def filter_targets(targets: c.Iterable[TCompletionTarget],
raise TargetPatternsNotMatched(unmatched)
-def walk_module_targets():
- """
- :rtype: collections.Iterable[TestTarget]
- """
+def walk_module_targets() -> c.Iterable[TestTarget]:
+ """Iterate through the module test targets."""
for target in walk_test_targets(path=data_context().content.module_path, module_path=data_context().content.module_path, extensions=MODULE_EXTENSIONS):
if not target.module:
continue
@@ -244,10 +242,8 @@ def walk_integration_targets() -> c.Iterable[IntegrationTarget]:
yield IntegrationTarget(to_text(path), modules, prefixes)
-def load_integration_prefixes():
- """
- :rtype: dict[str, str]
- """
+def load_integration_prefixes() -> dict[str, str]:
+ """Load and return the integration test prefixes."""
path = data_context().content.integration_path
file_paths = sorted(f for f in data_context().content.get_files(path) if os.path.splitext(os.path.basename(f))[0] == 'target-prefixes')
prefixes = {}
@@ -313,7 +309,7 @@ def analyze_integration_target_dependencies(integration_targets: list[Integratio
role_targets = [target for target in integration_targets if target.type == 'role']
hidden_role_target_names = set(target.name for target in role_targets if 'hidden/' in target.aliases)
- dependencies = collections.defaultdict(set)
+ dependencies: collections.defaultdict[str, set[str]] = collections.defaultdict(set)
# handle setup dependencies
for target in integration_targets:
@@ -405,12 +401,12 @@ def analyze_integration_target_dependencies(integration_targets: list[Integratio
class CompletionTarget(metaclass=abc.ABCMeta):
"""Command-line argument completion target base class."""
- def __init__(self):
- self.name = None
- self.path = None
- self.base_path = None
- self.modules = tuple()
- self.aliases = tuple()
+ def __init__(self) -> None:
+ self.name = ''
+ self.path = ''
+ self.base_path: t.Optional[str] = None
+ self.modules: tuple[str, ...] = tuple()
+ self.aliases: tuple[str, ...] = tuple()
def __eq__(self, other):
if isinstance(other, CompletionTarget):
@@ -446,7 +442,7 @@ class TestTarget(CompletionTarget):
module_prefix: t.Optional[str],
base_path: str,
symlink: t.Optional[bool] = None,
- ):
+ ) -> None:
super().__init__()
if symlink is None:
@@ -665,8 +661,6 @@ class IntegrationTarget(CompletionTarget):
target_type, actual_type = categorize_integration_test(self.name, list(static_aliases), force_target)
- self._remove_group(groups, 'context')
-
groups.extend(['context/', f'context/{target_type.name.lower()}'])
if target_type != actual_type:
@@ -695,10 +689,6 @@ class IntegrationTarget(CompletionTarget):
self.setup_always = tuple(sorted(set(g.split('/')[2] for g in groups if g.startswith('setup/always/'))))
self.needs_target = tuple(sorted(set(g.split('/')[2] for g in groups if g.startswith('needs/target/'))))
- @staticmethod
- def _remove_group(groups, group):
- return [g for g in groups if g != group and not g.startswith('%s/' % group)]
-
class TargetPatternsNotMatched(ApplicationError):
"""One or more targets were not matched when a match was required."""
diff --git a/test/lib/ansible_test/_internal/test.py b/test/lib/ansible_test/_internal/test.py
index da6af355a4..dca0badb9e 100644
--- a/test/lib/ansible_test/_internal/test.py
+++ b/test/lib/ansible_test/_internal/test.py
@@ -333,10 +333,8 @@ class TestFailure(TestResult):
return command
- def find_docs(self):
- """
- :rtype: str
- """
+ def find_docs(self) -> t.Optional[str]:
+ """Return the docs URL for this test or None if there is no docs URL."""
if self.command != 'sanity':
return None # only sanity tests have docs links
diff --git a/test/lib/ansible_test/_internal/thread.py b/test/lib/ansible_test/_internal/thread.py
index d0ed1bab02..edaf1b5c3f 100644
--- a/test/lib/ansible_test/_internal/thread.py
+++ b/test/lib/ansible_test/_internal/thread.py
@@ -21,7 +21,7 @@ class WrappedThread(threading.Thread):
self.action = action
self.result = None
- def run(self):
+ def run(self) -> None:
"""
Run action and capture results or exception.
Do not override. Do not call directly. Executed by the start() method.
@@ -35,11 +35,8 @@ class WrappedThread(threading.Thread):
except: # noqa
self._result.put((None, sys.exc_info()))
- def wait_for_result(self):
- """
- Wait for thread to exit and return the result or raise an exception.
- :rtype: any
- """
+ def wait_for_result(self) -> t.Any:
+ """Wait for thread to exit and return the result or raise an exception."""
result, exception = self._result.get()
if exception:
diff --git a/test/lib/ansible_test/_internal/timeout.py b/test/lib/ansible_test/_internal/timeout.py
index da5cfceb42..90ba583545 100644
--- a/test/lib/ansible_test/_internal/timeout.py
+++ b/test/lib/ansible_test/_internal/timeout.py
@@ -75,7 +75,7 @@ def configure_test_timeout(args: TestConfig) -> None:
display.info('The %d minute test timeout expires in %s at %s.' % (
timeout_duration, timeout_remaining, timeout_deadline), verbosity=1)
- def timeout_handler(_dummy1, _dummy2):
+ def timeout_handler(_dummy1: t.Any, _dummy2: t.Any) -> None:
"""Runs when SIGUSR1 is received."""
test_timeout.write(args)
diff --git a/test/lib/ansible_test/_internal/util.py b/test/lib/ansible_test/_internal/util.py
index 95a8280f5c..92f56f2b1f 100644
--- a/test/lib/ansible_test/_internal/util.py
+++ b/test/lib/ansible_test/_internal/util.py
@@ -611,7 +611,7 @@ class OutputThread(ReaderThread):
src.close()
-def common_environment():
+def common_environment() -> dict[str, str]:
"""Common environment used for executing all programs."""
env = dict(
LC_ALL=CONFIGURED_LOCALE,
@@ -793,17 +793,17 @@ class Display:
3: cyan,
}
- def __init__(self):
+ def __init__(self) -> None:
self.verbosity = 0
self.color = sys.stdout.isatty()
- self.warnings = []
- self.warnings_unique = set()
+ self.warnings: list[str] = []
+ self.warnings_unique: set[str] = set()
self.fd = sys.stderr # default to stderr until config is initialized to avoid early messages going to stdout
self.rows = 0
self.columns = 0
self.truncate = 0
self.redact = True
- self.sensitive = set()
+ self.sensitive: set[str] = set()
if os.isatty(0):
self.rows, self.columns = unpack('HHHH', fcntl.ioctl(0, TIOCGWINSZ, pack('HHHH', 0, 0, 0, 0)))[:2]
@@ -959,7 +959,7 @@ class HostConnectionError(ApplicationError):
self._callback()
-def retry(func, ex_type=SubprocessError, sleep=10, attempts=10, warn=True):
+def retry(func: t.Callable[..., TValue], ex_type: t.Type[BaseException] = SubprocessError, sleep: int = 10, attempts: int = 10, warn: bool = True) -> TValue:
"""Retry the specified function on failure."""
for dummy in range(1, attempts):
try:
@@ -1090,7 +1090,7 @@ def load_module(path: str, name: str) -> None:
spec.loader.exec_module(module)
-def sanitize_host_name(name):
+def sanitize_host_name(name: str) -> str:
"""Return a sanitized version of the given name, suitable for use as a hostname."""
return re.sub('[^A-Za-z0-9]+', '-', name)[:63].strip('-')
diff --git a/test/lib/ansible_test/_internal/util_common.py b/test/lib/ansible_test/_internal/util_common.py
index fbd9e71d87..69d0a6eb09 100644
--- a/test/lib/ansible_test/_internal/util_common.py
+++ b/test/lib/ansible_test/_internal/util_common.py
@@ -96,7 +96,7 @@ class ResultType:
TMP: ResultType = None
@staticmethod
- def _populate():
+ def _populate() -> None:
ResultType.BOT = ResultType('bot')
ResultType.COVERAGE = ResultType('coverage')
ResultType.DATA = ResultType('data')
@@ -288,7 +288,7 @@ def get_injector_path() -> str:
verified_chmod(injector_path, MODE_DIRECTORY)
- def cleanup_injector():
+ def cleanup_injector() -> None:
"""Remove the temporary injector directory."""
remove_tree(injector_path)
@@ -388,7 +388,7 @@ def create_interpreter_wrapper(interpreter: str, injected_interpreter: str) -> N
verified_chmod(injected_interpreter, MODE_FILE_EXECUTE)
-def cleanup_python_paths():
+def cleanup_python_paths() -> None:
"""Clean up all temporary python directories."""
for path in sorted(PYTHON_PATHS.values()):
display.info('Cleaning up temporary python directory: %s' % path, verbosity=2)
@@ -449,7 +449,7 @@ def run_command(
output_stream=output_stream, cmd_verbosity=cmd_verbosity, str_errors=str_errors, error_callback=error_callback)
-def yamlcheck(python):
+def yamlcheck(python: PythonConfig) -> t.Optional[bool]:
"""Return True if PyYAML has libyaml support, False if it does not and None if it was not found."""
result = json.loads(raw_command([python.path, os.path.join(ANSIBLE_TEST_TARGET_TOOLS_ROOT, 'yamlcheck.py')], capture=True)[0])