diff options
Diffstat (limited to 'lib/ansible/modules/cloud/google/gcp_compute_global_forwarding_rule.py')
-rw-r--r-- | lib/ansible/modules/cloud/google/gcp_compute_global_forwarding_rule.py | 764 |
1 files changed, 0 insertions, 764 deletions
diff --git a/lib/ansible/modules/cloud/google/gcp_compute_global_forwarding_rule.py b/lib/ansible/modules/cloud/google/gcp_compute_global_forwarding_rule.py deleted file mode 100644 index 74c2e6c506..0000000000 --- a/lib/ansible/modules/cloud/google/gcp_compute_global_forwarding_rule.py +++ /dev/null @@ -1,764 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- -# -# Copyright (C) 2017 Google -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -# ---------------------------------------------------------------------------- -# -# *** AUTO GENERATED CODE *** AUTO GENERATED CODE *** -# -# ---------------------------------------------------------------------------- -# -# This file is automatically generated by Magic Modules and manual -# changes will be clobbered when the file is regenerated. -# -# Please read more about how to change this file at -# https://www.github.com/GoogleCloudPlatform/magic-modules -# -# ---------------------------------------------------------------------------- - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type - -################################################################################ -# Documentation -################################################################################ - -ANSIBLE_METADATA = {'metadata_version': '1.1', 'status': ["preview"], 'supported_by': 'community'} - -DOCUMENTATION = ''' ---- -module: gcp_compute_global_forwarding_rule -description: -- Represents a GlobalForwardingRule resource. Global forwarding rules are used to - forward traffic to the correct load balancer for HTTP load balancing. Global forwarding - rules can only be used for HTTP load balancing. -- For more information, see U(https://cloud.google.com/compute/docs/load-balancing/http/) - . -short_description: Creates a GCP GlobalForwardingRule -version_added: '2.6' -author: Google Inc. (@googlecloudplatform) -requirements: -- python >= 2.6 -- requests >= 2.18.4 -- google-auth >= 1.3.0 -options: - state: - description: - - Whether the given object should exist in GCP - choices: - - present - - absent - default: present - type: str - description: - description: - - An optional description of this resource. Provide this property when you create - the resource. - required: false - type: str - ip_address: - description: - - The IP address that this forwarding rule is serving on behalf of. - - Addresses are restricted based on the forwarding rule's load balancing scheme - (EXTERNAL or INTERNAL) and scope (global or regional). - - When the load balancing scheme is EXTERNAL, for global forwarding rules, the - address must be a global IP, and for regional forwarding rules, the address - must live in the same region as the forwarding rule. If this field is empty, - an ephemeral IPv4 address from the same scope (global or regional) will be assigned. - A regional forwarding rule supports IPv4 only. A global forwarding rule supports - either IPv4 or IPv6. - - When the load balancing scheme is INTERNAL, this can only be an RFC 1918 IP - address belonging to the network/subnet configured for the forwarding rule. - By default, if this field is empty, an ephemeral internal IP address will be - automatically allocated from the IP range of the subnet or network configured - for this forwarding rule. - - 'An address can be specified either by a literal IP address or a URL reference - to an existing Address resource. The following examples are all valid: * 100.1.2.3 - * U(https://www.googleapis.com/compute/v1/projects/project/regions/region/addresses/address) - * projects/project/regions/region/addresses/address * regions/region/addresses/address - * global/addresses/address * address .' - required: false - type: str - ip_protocol: - description: - - The IP protocol to which this rule applies. Valid options are TCP, UDP, ESP, - AH, SCTP or ICMP. When the load balancing scheme is INTERNAL_SELF_MANAGED, only - TCP is valid. - - 'Some valid choices include: "TCP", "UDP", "ESP", "AH", "SCTP", "ICMP"' - required: false - type: str - ip_version: - description: - - The IP Version that will be used by this global forwarding rule. - - Valid options are IPV4 or IPV6. - - 'Some valid choices include: "IPV4", "IPV6"' - required: false - type: str - load_balancing_scheme: - description: - - This signifies what the GlobalForwardingRule will be used for. - - 'The value of INTERNAL_SELF_MANAGED means that this will be used for Internal - Global HTTP(S) LB. The value of EXTERNAL means that this will be used for External - Global Load Balancing (HTTP(S) LB, External TCP/UDP LB, SSL Proxy) NOTE: Currently - global forwarding rules cannot be used for INTERNAL load balancing.' - - 'Some valid choices include: "EXTERNAL", "INTERNAL_SELF_MANAGED"' - required: false - default: EXTERNAL - type: str - metadata_filters: - description: - - Opaque filter criteria used by Loadbalancer to restrict routing configuration - to a limited set xDS compliant clients. In their xDS requests to Loadbalancer, - xDS clients present node metadata. If a match takes place, the relevant routing - configuration is made available to those proxies. - - For each metadataFilter in this list, if its filterMatchCriteria is set to MATCH_ANY, - at least one of the filterLabels must match the corresponding label provided - in the metadata. If its filterMatchCriteria is set to MATCH_ALL, then all of - its filterLabels must match with corresponding labels in the provided metadata. - - metadataFilters specified here can be overridden by those specified in the UrlMap - that this ForwardingRule references. - - metadataFilters only applies to Loadbalancers that have their loadBalancingScheme - set to INTERNAL_SELF_MANAGED. - required: false - type: list - version_added: '2.10' - suboptions: - filter_match_criteria: - description: - - Specifies how individual filterLabel matches within the list of filterLabels - contribute towards the overall metadataFilter match. - - MATCH_ANY - At least one of the filterLabels must have a matching label - in the provided metadata. - - MATCH_ALL - All filterLabels must have matching labels in the provided metadata. - - 'Some valid choices include: "MATCH_ANY", "MATCH_ALL"' - required: true - type: str - filter_labels: - description: - - The list of label value pairs that must match labels in the provided metadata - based on filterMatchCriteria This list must not be empty and can have at - the most 64 entries. - required: true - type: list - suboptions: - name: - description: - - Name of the metadata label. The length must be between 1 and 1024 characters, - inclusive. - required: true - type: str - value: - description: - - The value that the label must match. The value has a maximum length - of 1024 characters. - required: true - type: str - name: - description: - - Name of the resource; provided by the client when the resource is created. The - name must be 1-63 characters long, and comply with RFC1035. Specifically, the - name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` - which means the first character must be a lowercase letter, and all following - characters must be a dash, lowercase letter, or digit, except the last character, - which cannot be a dash. - required: true - type: str - network: - description: - - This field is not used for external load balancing. - - For INTERNAL_SELF_MANAGED load balancing, this field identifies the network - that the load balanced IP should belong to for this global forwarding rule. - If this field is not specified, the default network will be used. - - 'This field represents a link to a Network resource in GCP. It can be specified - in two ways. First, you can place a dictionary with key ''selfLink'' and value - of your resource''s selfLink Alternatively, you can add `register: name-of-resource` - to a gcp_compute_network task and then set this network field to "{{ name-of-resource - }}"' - required: false - type: dict - port_range: - description: - - This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, - TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. - - Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed - to ports in the specified range will be forwarded to target. - - Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint - port ranges. - - 'Some types of forwarding target have constraints on the acceptable ports: * - TargetHttpProxy: 80, 8080 * TargetHttpsProxy: 443 * TargetTcpProxy: 25, 43, - 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222 * TargetSslProxy: 25, - 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222 * TargetVpnGateway: - 500, 4500 .' - required: false - type: str - target: - description: - - The URL of the target resource to receive the matched traffic. - - The forwarded traffic must be of a type appropriate to the target object. - - For INTERNAL_SELF_MANAGED load balancing, only HTTP and HTTPS targets are valid. - required: true - type: str - project: - description: - - The Google Cloud Platform project to use. - type: str - auth_kind: - description: - - The type of credential used. - type: str - required: true - choices: - - application - - machineaccount - - serviceaccount - service_account_contents: - description: - - The contents of a Service Account JSON file, either in a dictionary or as a - JSON string that represents it. - type: jsonarg - service_account_file: - description: - - The path of a Service Account JSON file if serviceaccount is selected as type. - type: path - service_account_email: - description: - - An optional service account email address if machineaccount is selected and - the user does not wish to use the default email. - type: str - scopes: - description: - - Array of scopes to be used - type: list - env_type: - description: - - Specifies which Ansible environment you're running this module within. - - This should not be set unless you know what you're doing. - - This only alters the User Agent string for any API requests. - type: str -''' - -EXAMPLES = ''' -- name: create a global address - gcp_compute_global_address: - name: globaladdress-globalforwardingrule - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: present - register: globaladdress - -- name: create a instance group - gcp_compute_instance_group: - name: instancegroup-globalforwardingrule - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: present - register: instancegroup - -- name: create a HTTP health check - gcp_compute_http_health_check: - name: httphealthcheck-globalforwardingrule - healthy_threshold: 10 - port: 8080 - timeout_sec: 2 - unhealthy_threshold: 5 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: present - register: healthcheck - -- name: create a backend service - gcp_compute_backend_service: - name: backendservice-globalforwardingrule - backends: - - group: "{{ instancegroup.selfLink }}" - health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: present - register: backendservice - -- name: create a URL map - gcp_compute_url_map: - name: urlmap-globalforwardingrule - default_service: "{{ backendservice }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: present - register: urlmap - -- name: create a target HTTP proxy - gcp_compute_target_http_proxy: - name: targethttpproxy-globalforwardingrule - url_map: "{{ urlmap }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: present - register: httpproxy - -- name: create a global forwarding rule - gcp_compute_global_forwarding_rule: - name: test_object - ip_address: "{{ globaladdress.address }}" - ip_protocol: TCP - port_range: 80-80 - target: "{{ httpproxy.selfLink }}" - project: test_project - auth_kind: serviceaccount - service_account_file: "/tmp/auth.pem" - state: present -''' - -RETURN = ''' -creationTimestamp: - description: - - Creation timestamp in RFC3339 text format. - returned: success - type: str -description: - description: - - An optional description of this resource. Provide this property when you create - the resource. - returned: success - type: str -id: - description: - - The unique identifier for the resource. - returned: success - type: int -IPAddress: - description: - - The IP address that this forwarding rule is serving on behalf of. - - Addresses are restricted based on the forwarding rule's load balancing scheme - (EXTERNAL or INTERNAL) and scope (global or regional). - - When the load balancing scheme is EXTERNAL, for global forwarding rules, the address - must be a global IP, and for regional forwarding rules, the address must live - in the same region as the forwarding rule. If this field is empty, an ephemeral - IPv4 address from the same scope (global or regional) will be assigned. A regional - forwarding rule supports IPv4 only. A global forwarding rule supports either IPv4 - or IPv6. - - When the load balancing scheme is INTERNAL, this can only be an RFC 1918 IP address - belonging to the network/subnet configured for the forwarding rule. By default, - if this field is empty, an ephemeral internal IP address will be automatically - allocated from the IP range of the subnet or network configured for this forwarding - rule. - - 'An address can be specified either by a literal IP address or a URL reference - to an existing Address resource. The following examples are all valid: * 100.1.2.3 - * U(https://www.googleapis.com/compute/v1/projects/project/regions/region/addresses/address) - * projects/project/regions/region/addresses/address * regions/region/addresses/address - * global/addresses/address * address .' - returned: success - type: str -IPProtocol: - description: - - The IP protocol to which this rule applies. Valid options are TCP, UDP, ESP, AH, - SCTP or ICMP. When the load balancing scheme is INTERNAL_SELF_MANAGED, only TCP - is valid. - returned: success - type: str -ipVersion: - description: - - The IP Version that will be used by this global forwarding rule. - - Valid options are IPV4 or IPV6. - returned: success - type: str -loadBalancingScheme: - description: - - This signifies what the GlobalForwardingRule will be used for. - - 'The value of INTERNAL_SELF_MANAGED means that this will be used for Internal - Global HTTP(S) LB. The value of EXTERNAL means that this will be used for External - Global Load Balancing (HTTP(S) LB, External TCP/UDP LB, SSL Proxy) NOTE: Currently - global forwarding rules cannot be used for INTERNAL load balancing.' - returned: success - type: str -metadataFilters: - description: - - Opaque filter criteria used by Loadbalancer to restrict routing configuration - to a limited set xDS compliant clients. In their xDS requests to Loadbalancer, - xDS clients present node metadata. If a match takes place, the relevant routing - configuration is made available to those proxies. - - For each metadataFilter in this list, if its filterMatchCriteria is set to MATCH_ANY, - at least one of the filterLabels must match the corresponding label provided in - the metadata. If its filterMatchCriteria is set to MATCH_ALL, then all of its - filterLabels must match with corresponding labels in the provided metadata. - - metadataFilters specified here can be overridden by those specified in the UrlMap - that this ForwardingRule references. - - metadataFilters only applies to Loadbalancers that have their loadBalancingScheme - set to INTERNAL_SELF_MANAGED. - returned: success - type: complex - contains: - filterMatchCriteria: - description: - - Specifies how individual filterLabel matches within the list of filterLabels - contribute towards the overall metadataFilter match. - - MATCH_ANY - At least one of the filterLabels must have a matching label in - the provided metadata. - - MATCH_ALL - All filterLabels must have matching labels in the provided metadata. - returned: success - type: str - filterLabels: - description: - - The list of label value pairs that must match labels in the provided metadata - based on filterMatchCriteria This list must not be empty and can have at the - most 64 entries. - returned: success - type: complex - contains: - name: - description: - - Name of the metadata label. The length must be between 1 and 1024 characters, - inclusive. - returned: success - type: str - value: - description: - - The value that the label must match. The value has a maximum length of - 1024 characters. - returned: success - type: str -name: - description: - - Name of the resource; provided by the client when the resource is created. The - name must be 1-63 characters long, and comply with RFC1035. Specifically, the - name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` - which means the first character must be a lowercase letter, and all following - characters must be a dash, lowercase letter, or digit, except the last character, - which cannot be a dash. - returned: success - type: str -network: - description: - - This field is not used for external load balancing. - - For INTERNAL_SELF_MANAGED load balancing, this field identifies the network that - the load balanced IP should belong to for this global forwarding rule. If this - field is not specified, the default network will be used. - returned: success - type: dict -portRange: - description: - - This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, - TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. - - Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to - ports in the specified range will be forwarded to target. - - Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint - port ranges. - - 'Some types of forwarding target have constraints on the acceptable ports: * TargetHttpProxy: - 80, 8080 * TargetHttpsProxy: 443 * TargetTcpProxy: 25, 43, 110, 143, 195, 443, - 465, 587, 700, 993, 995, 1883, 5222 * TargetSslProxy: 25, 43, 110, 143, 195, 443, - 465, 587, 700, 993, 995, 1883, 5222 * TargetVpnGateway: 500, 4500 .' - returned: success - type: str -target: - description: - - The URL of the target resource to receive the matched traffic. - - The forwarded traffic must be of a type appropriate to the target object. - - For INTERNAL_SELF_MANAGED load balancing, only HTTP and HTTPS targets are valid. - returned: success - type: str -''' - -################################################################################ -# Imports -################################################################################ - -from ansible.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, remove_nones_from_dict, replace_resource_dict -import json -import time - -################################################################################ -# Main -################################################################################ - - -def main(): - """Main function""" - - module = GcpModule( - argument_spec=dict( - state=dict(default='present', choices=['present', 'absent'], type='str'), - description=dict(type='str'), - ip_address=dict(type='str'), - ip_protocol=dict(type='str'), - ip_version=dict(type='str'), - load_balancing_scheme=dict(default='EXTERNAL', type='str'), - metadata_filters=dict( - type='list', - elements='dict', - options=dict( - filter_match_criteria=dict(required=True, type='str'), - filter_labels=dict( - required=True, type='list', elements='dict', options=dict(name=dict(required=True, type='str'), value=dict(required=True, type='str')) - ), - ), - ), - name=dict(required=True, type='str'), - network=dict(type='dict'), - port_range=dict(type='str'), - target=dict(required=True, type='str'), - ) - ) - - if not module.params['scopes']: - module.params['scopes'] = ['https://www.googleapis.com/auth/compute'] - - state = module.params['state'] - kind = 'compute#forwardingRule' - - fetch = fetch_resource(module, self_link(module), kind) - changed = False - - if fetch: - if state == 'present': - if is_different(module, fetch): - update(module, self_link(module), kind, fetch) - fetch = fetch_resource(module, self_link(module), kind) - changed = True - else: - delete(module, self_link(module), kind) - fetch = {} - changed = True - else: - if state == 'present': - fetch = create(module, collection(module), kind) - changed = True - else: - fetch = {} - - fetch.update({'changed': changed}) - - module.exit_json(**fetch) - - -def create(module, link, kind): - auth = GcpSession(module, 'compute') - return wait_for_operation(module, auth.post(link, resource_to_request(module))) - - -def update(module, link, kind, fetch): - update_fields(module, resource_to_request(module), response_to_hash(module, fetch)) - return fetch_resource(module, self_link(module), kind) - - -def update_fields(module, request, response): - if response.get('target') != request.get('target'): - target_update(module, request, response) - - -def target_update(module, request, response): - auth = GcpSession(module, 'compute') - auth.post( - ''.join(["https://www.googleapis.com/compute/v1/", "projects/{project}/global/forwardingRules/{name}/setTarget"]).format(**module.params), - {u'target': module.params.get('target')}, - ) - - -def delete(module, link, kind): - auth = GcpSession(module, 'compute') - return wait_for_operation(module, auth.delete(link)) - - -def resource_to_request(module): - request = { - u'kind': 'compute#forwardingRule', - u'description': module.params.get('description'), - u'IPAddress': module.params.get('ip_address'), - u'IPProtocol': module.params.get('ip_protocol'), - u'ipVersion': module.params.get('ip_version'), - u'loadBalancingScheme': module.params.get('load_balancing_scheme'), - u'metadataFilters': GlobalForwardingRuleMetadatafiltersArray(module.params.get('metadata_filters', []), module).to_request(), - u'name': module.params.get('name'), - u'network': replace_resource_dict(module.params.get(u'network', {}), 'selfLink'), - u'portRange': module.params.get('port_range'), - u'target': module.params.get('target'), - } - return_vals = {} - for k, v in request.items(): - if v or v is False: - return_vals[k] = v - - return return_vals - - -def fetch_resource(module, link, kind, allow_not_found=True): - auth = GcpSession(module, 'compute') - return return_if_object(module, auth.get(link), kind, allow_not_found) - - -def self_link(module): - return "https://www.googleapis.com/compute/v1/projects/{project}/global/forwardingRules/{name}".format(**module.params) - - -def collection(module): - return "https://www.googleapis.com/compute/v1/projects/{project}/global/forwardingRules".format(**module.params) - - -def return_if_object(module, response, kind, allow_not_found=False): - # If not found, return nothing. - if allow_not_found and response.status_code == 404: - return None - - # If no content, return nothing. - if response.status_code == 204: - return None - - try: - module.raise_for_status(response) - result = response.json() - except getattr(json.decoder, 'JSONDecodeError', ValueError): - module.fail_json(msg="Invalid JSON response with error: %s" % response.text) - - if navigate_hash(result, ['error', 'errors']): - module.fail_json(msg=navigate_hash(result, ['error', 'errors'])) - - return result - - -def is_different(module, response): - request = resource_to_request(module) - response = response_to_hash(module, response) - - # Remove all output-only from response. - response_vals = {} - for k, v in response.items(): - if k in request: - response_vals[k] = v - - request_vals = {} - for k, v in request.items(): - if k in response: - request_vals[k] = v - - return GcpRequest(request_vals) != GcpRequest(response_vals) - - -# Remove unnecessary properties from the response. -# This is for doing comparisons with Ansible's current parameters. -def response_to_hash(module, response): - return { - u'creationTimestamp': response.get(u'creationTimestamp'), - u'description': response.get(u'description'), - u'id': response.get(u'id'), - u'IPAddress': response.get(u'IPAddress'), - u'IPProtocol': response.get(u'IPProtocol'), - u'ipVersion': response.get(u'ipVersion'), - u'loadBalancingScheme': response.get(u'loadBalancingScheme'), - u'metadataFilters': GlobalForwardingRuleMetadatafiltersArray(response.get(u'metadataFilters', []), module).from_response(), - u'name': response.get(u'name'), - u'network': response.get(u'network'), - u'portRange': response.get(u'portRange'), - u'target': response.get(u'target'), - } - - -def async_op_url(module, extra_data=None): - if extra_data is None: - extra_data = {} - url = "https://www.googleapis.com/compute/v1/projects/{project}/global/operations/{op_id}" - combined = extra_data.copy() - combined.update(module.params) - return url.format(**combined) - - -def wait_for_operation(module, response): - op_result = return_if_object(module, response, 'compute#operation') - if op_result is None: - return {} - status = navigate_hash(op_result, ['status']) - wait_done = wait_for_completion(status, op_result, module) - return fetch_resource(module, navigate_hash(wait_done, ['targetLink']), 'compute#forwardingRule') - - -def wait_for_completion(status, op_result, module): - op_id = navigate_hash(op_result, ['name']) - op_uri = async_op_url(module, {'op_id': op_id}) - while status != 'DONE': - raise_if_errors(op_result, ['error', 'errors'], module) - time.sleep(1.0) - op_result = fetch_resource(module, op_uri, 'compute#operation', False) - status = navigate_hash(op_result, ['status']) - return op_result - - -def raise_if_errors(response, err_path, module): - errors = navigate_hash(response, err_path) - if errors is not None: - module.fail_json(msg=errors) - - -class GlobalForwardingRuleMetadatafiltersArray(object): - def __init__(self, request, module): - self.module = module - if request: - self.request = request - else: - self.request = [] - - def to_request(self): - items = [] - for item in self.request: - items.append(self._request_for_item(item)) - return items - - def from_response(self): - items = [] - for item in self.request: - items.append(self._response_from_item(item)) - return items - - def _request_for_item(self, item): - return remove_nones_from_dict( - { - u'filterMatchCriteria': item.get('filter_match_criteria'), - u'filterLabels': GlobalForwardingRuleFilterlabelsArray(item.get('filter_labels', []), self.module).to_request(), - } - ) - - def _response_from_item(self, item): - return remove_nones_from_dict( - { - u'filterMatchCriteria': item.get(u'filterMatchCriteria'), - u'filterLabels': GlobalForwardingRuleFilterlabelsArray(item.get(u'filterLabels', []), self.module).from_response(), - } - ) - - -class GlobalForwardingRuleFilterlabelsArray(object): - def __init__(self, request, module): - self.module = module - if request: - self.request = request - else: - self.request = [] - - def to_request(self): - items = [] - for item in self.request: - items.append(self._request_for_item(item)) - return items - - def from_response(self): - items = [] - for item in self.request: - items.append(self._response_from_item(item)) - return items - - def _request_for_item(self, item): - return remove_nones_from_dict({u'name': item.get('name'), u'value': item.get('value')}) - - def _response_from_item(self, item): - return remove_nones_from_dict({u'name': item.get(u'name'), u'value': item.get(u'value')}) - - -if __name__ == '__main__': - main() |