Server IP : 85.214.239.14 / Your IP : 3.15.15.31 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /proc/2/root/usr/lib/python3/dist-packages/ansible_test/_internal/cli/commands/coverage/ |
Upload File : |
"""Command line parsing for the `coverage report` command.""" from __future__ import annotations import argparse import collections.abc as c import typing as t from ....commands.coverage.report import ( command_coverage_report, CoverageReportConfig, ) from ...environments import ( CompositeActionCompletionFinder, ControllerMode, TargetMode, add_environments, ) def do_report( subparsers, parent: argparse.ArgumentParser, add_coverage_common: c.Callable[[argparse.ArgumentParser], None], completer: CompositeActionCompletionFinder, ) -> None: """Command line parsing for the `coverage report` command.""" parser: argparse.ArgumentParser = subparsers.add_parser( 'report', parents=[parent], help='generate console coverage report', ) parser.set_defaults( func=command_coverage_report, config=CoverageReportConfig, ) coverage_report = t.cast(argparse.ArgumentParser, parser.add_argument_group('coverage arguments')) add_coverage_common(coverage_report) coverage_report.add_argument( '--show-missing', action='store_true', help='show line numbers of statements not executed', ) coverage_report.add_argument( '--include', metavar='PAT[,...]', help='only include paths that match a pattern (accepts quoted shell wildcards)', ) coverage_report.add_argument( '--omit', metavar='PAT[,...]', help='omit paths that match a pattern (accepts quoted shell wildcards)', ) add_environments(parser, completer, ControllerMode.DELEGATED, TargetMode.NO_TARGETS) # coverage report