Delete line breaks before binary operator 97/35097/1
authorCédric Ollivier <cedric.ollivier@orange.com>
Sun, 21 May 2017 08:34:49 +0000 (10:34 +0200)
committerCédric Ollivier <cedric.ollivier@orange.com>
Sun, 21 May 2017 08:34:49 +0000 (10:34 +0200)
They are considered as warnings by flake8.

Change-Id: I84ffedc41c24133aa0d45e312bb095526aa1095b
Signed-off-by: Cédric Ollivier <cedric.ollivier@orange.com>
functest/ci/tier_builder.py
functest/utils/openstack_utils.py

index 12562f0..d03cd90 100644 (file)
@@ -54,8 +54,9 @@ class TierBuilder(object):
                                        blocking=dic_testcase['blocking'],
                                        clean_flag=dic_testcase['clean_flag'],
                                        description=dic_testcase['description'])
                                        blocking=dic_testcase['blocking'],
                                        clean_flag=dic_testcase['clean_flag'],
                                        description=dic_testcase['description'])
-                if (testcase.is_compatible(self.ci_installer, self.ci_scenario)
-                        and testcase.is_enabled()):
+                if (testcase.is_compatible(self.ci_installer,
+                                           self.ci_scenario) and
+                        testcase.is_enabled()):
                     tier.add_test(testcase)
 
             self.tier_objects.append(tier)
                     tier.add_test(testcase)
 
             self.tier_objects.append(tier)
index 8bd9505..57a2aa2 100644 (file)
@@ -1081,10 +1081,10 @@ def check_security_group_rules(neutron_client, sg_id, direction, protocol,
     try:
         security_rules = get_security_group_rules(neutron_client, sg_id)
         security_rules = [rule for rule in security_rules
     try:
         security_rules = get_security_group_rules(neutron_client, sg_id)
         security_rules = [rule for rule in security_rules
-                          if (rule["direction"].lower() == direction
-                              and rule["protocol"].lower() == protocol
-                              and rule["port_range_min"] == port_min
-                              and rule["port_range_max"] == port_max)]
+                          if (rule["direction"].lower() == direction and
+                              rule["protocol"].lower() == protocol and
+                              rule["port_range_min"] == port_min and
+                              rule["port_range_max"] == port_max)]
         if len(security_rules) == 0:
             return True
         else:
         if len(security_rules) == 0:
             return True
         else: