Skip to content

Commit dcc2988

Browse files
author
Chang Lu
committed
Style check fixes.
1 parent 76a3731 commit dcc2988

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

src/azure-cli/azure/cli/command_modules/search/_help.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,4 +144,4 @@
144144
- name: Approve a private endpoint connection.
145145
text: >
146146
az search service private-endpoint-connection update --resource-group MyResourceGroup --search-service-name MySearchService --name MyPrivateEndpointConnection
147-
"""
147+
"""

src/azure-cli/azure/cli/command_modules/search/custom.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ def _build_arguments_schema(cls, *args, **kwargs):
3030
args_schema.ip_rules = AAZStrArg(
3131
arg_group="NetworkRuleSet",
3232
options=['--ip-rules'],
33-
help="A list of IP restriction rules that defines the inbound network(s) with allowing access to the search service endpoint. At the meantime, all other public IP networks are blocked by the firewall. These restriction rules are applied only when the 'publicNetworkAccess' of the search service is 'enabled'; otherwise, traffic over public interface is not allowed even with any public IP rules, and private endpoint connections would be the exclusive access method."
33+
help="A list of IP restriction rules that defines the inbound network(s) with allowing access to the search service endpoint. "
3434
)
3535

3636
args_schema.auth_options = AAZStrArg(
@@ -90,7 +90,7 @@ def _build_arguments_schema(cls, *args, **kwargs):
9090
args_schema.ip_rules = AAZStrArg(
9191
arg_group="NetworkRuleSet",
9292
options=['--ip-rules'],
93-
help="A list of IP restriction rules that defines the inbound network(s) with allowing access to the search service endpoint. At the meantime, all other public IP networks are blocked by the firewall. These restriction rules are applied only when the 'publicNetworkAccess' of the search service is 'enabled'; otherwise, traffic over public interface is not allowed even with any public IP rules, and private endpoint connections would be the exclusive access method.",
93+
help="A list of IP restriction rules that defines the inbound network(s) with allowing access to the search service endpoint.",
9494
nullable=True, # allow to remove all the value when it's assigned by null
9595
)
9696

@@ -117,7 +117,7 @@ def pre_operations(self):
117117
if has_value(args.aad_auth_failure_mode):
118118
raise MutuallyExclusiveArgumentError("Both the DisableLocalAuth and AadAuthFailureMode parameters "
119119
"can't be given at the same time")
120-
120+
121121
if has_value(args.ip_rules):
122122
if args.ip_rules.to_serialized_data() is None or args.ip_rules in [';', ',']:
123123
# cleanup all ip_rules

src/azure-cli/azure/cli/command_modules/search/tests/latest/test_service.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -458,7 +458,7 @@ def test_service_create_semantic_search(self, resource_group):
458458
self.check('replicaCount', '{replica_count}'),
459459
self.check('partitionCount', '{partition_count}'),
460460
self.check('semanticSearch', '{semantic_search}')])
461-
461+
462462
@ResourceGroupPreparer(name_prefix='azure_search_cli_test', location='eastus2euap')
463463
def test_service_create_compute_type(self, resource_group):
464464
self.kwargs.update({
@@ -478,7 +478,7 @@ def test_service_create_compute_type(self, resource_group):
478478
self.check('replicaCount', '{replica_count}'),
479479
self.check('partitionCount', '{partition_count}'),
480480
self.check('computeType', '{compute_type}')])
481-
481+
482482
@ResourceGroupPreparer(name_prefix='azure_search_cli_test', location='eastus2euap')
483483
def test_service_create_data_exfiltration_protections(self, resource_group):
484484
self.kwargs.update({

0 commit comments

Comments
 (0)