mirror of
https://github.com/ansible-collections/hetzner.hcloud.git
synced 2026-02-04 08:01:49 +00:00
refactor: remove unneeded to_native calls (#477)
##### SUMMARY Since we only support python >=3.8, the `to_native` python2/3 compatibility function is not needed anymore. We only keep it for printing a traceback free exception message. Where a type conversion is needed, we use the built-in `str()` function.
This commit is contained in:
parent
64f7824cc8
commit
4bb02b9cd2
34 changed files with 394 additions and 453 deletions
|
|
@ -219,7 +219,6 @@ hcloud_firewall:
|
|||
import time
|
||||
|
||||
from ansible.module_utils.basic import AnsibleModule
|
||||
from ansible.module_utils.common.text.converters import to_native
|
||||
|
||||
from ..module_utils.hcloud import AnsibleHCloud
|
||||
from ..module_utils.vendor.hcloud import APIException, HCloudException
|
||||
|
|
@ -237,8 +236,8 @@ class AnsibleHCloudFirewall(AnsibleHCloud):
|
|||
|
||||
def _prepare_result(self):
|
||||
return {
|
||||
"id": to_native(self.hcloud_firewall.id),
|
||||
"name": to_native(self.hcloud_firewall.name),
|
||||
"id": str(self.hcloud_firewall.id),
|
||||
"name": self.hcloud_firewall.name,
|
||||
"rules": [self._prepare_result_rule(rule) for rule in self.hcloud_firewall.rules],
|
||||
"labels": self.hcloud_firewall.labels,
|
||||
"applied_to": [self._prepare_result_applied_to(resource) for resource in self.hcloud_firewall.applied_to],
|
||||
|
|
@ -246,27 +245,25 @@ class AnsibleHCloudFirewall(AnsibleHCloud):
|
|||
|
||||
def _prepare_result_rule(self, rule: FirewallRule):
|
||||
return {
|
||||
"direction": to_native(rule.direction),
|
||||
"protocol": to_native(rule.protocol),
|
||||
"port": to_native(rule.port) if rule.port is not None else None,
|
||||
"source_ips": [to_native(cidr) for cidr in rule.source_ips],
|
||||
"destination_ips": [to_native(cidr) for cidr in rule.destination_ips],
|
||||
"description": to_native(rule.description) if rule.description is not None else None,
|
||||
"direction": rule.direction,
|
||||
"protocol": rule.protocol,
|
||||
"port": rule.port,
|
||||
"source_ips": rule.source_ips,
|
||||
"destination_ips": rule.destination_ips,
|
||||
"description": rule.description,
|
||||
}
|
||||
|
||||
def _prepare_result_applied_to(self, resource: FirewallResource):
|
||||
result = {
|
||||
"type": to_native(resource.type),
|
||||
"server": to_native(resource.server.id) if resource.server is not None else None,
|
||||
"label_selector": (
|
||||
to_native(resource.label_selector.selector) if resource.label_selector is not None else None
|
||||
),
|
||||
"type": resource.type,
|
||||
"server": str(resource.server.id) if resource.server is not None else None,
|
||||
"label_selector": resource.label_selector.selector if resource.label_selector is not None else None,
|
||||
}
|
||||
if resource.applied_to_resources is not None:
|
||||
result["applied_to_resources"] = [
|
||||
{
|
||||
"type": to_native(item.type),
|
||||
"server": to_native(item.server.id) if item.server is not None else None,
|
||||
"type": item.type,
|
||||
"server": str(item.server.id) if item.server is not None else None,
|
||||
}
|
||||
for item in resource.applied_to_resources
|
||||
]
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue