This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a commit to branch update/scalafmt-core-3.9.10
in repository https://gitbox.apache.org/repos/asf/pekko-management.git

commit 8b6fb722e0818718f9df8d1cbb7479722d86001f
Author: scala-steward-asf[bot] 
<147768647+scala-steward-asf[bot]@users.noreply.github.com>
AuthorDate: Sun Oct 26 08:53:07 2025 +0000

    Reformat with scalafmt 3.9.10
    
    Executed command: scalafmt --non-interactive
---
 .../pekko/discovery/awsapi/ecs/AsyncEcsTaskSetDiscovery.scala  |  2 +-
 .../lease/kubernetes/AbstractKubernetesLease.scala             | 10 +++++-----
 .../lease/kubernetes/internal/AbstractKubernetesApiImpl.scala  |  2 +-
 .../cluster/bootstrap/internal/BootstrapCoordinator.scala      |  2 +-
 .../management/cluster/scaladsl/ClusterMembershipCheck.scala   |  2 +-
 .../scala/org/apache/pekko/management/HealthCheckRoutes.scala  |  2 +-
 .../org/apache/pekko/management/PekkoManagementSettings.scala  |  2 +-
 .../apache/pekko/management/internal/HealthChecksImpl.scala    |  8 ++++----
 .../management/javadsl/ManagementRouteProviderSettings.scala   |  2 +-
 .../org/apache/pekko/management/scaladsl/PekkoManagement.scala |  2 +-
 10 files changed, 17 insertions(+), 17 deletions(-)

diff --git 
a/discovery-aws-api-async/src/main/scala/org/apache/pekko/discovery/awsapi/ecs/AsyncEcsTaskSetDiscovery.scala
 
b/discovery-aws-api-async/src/main/scala/org/apache/pekko/discovery/awsapi/ecs/AsyncEcsTaskSetDiscovery.scala
index fdcb4b96..61fbcba2 100644
--- 
a/discovery-aws-api-async/src/main/scala/org/apache/pekko/discovery/awsapi/ecs/AsyncEcsTaskSetDiscovery.scala
+++ 
b/discovery-aws-api-async/src/main/scala/org/apache/pekko/discovery/awsapi/ecs/AsyncEcsTaskSetDiscovery.scala
@@ -118,7 +118,7 @@ object AsyncEcsTaskSetDiscovery {
       mat: Materializer): Future[Option[TaskMetadata]] = {
     val ecsContainerMetadataUri = sys.env.get(ECS_CONTAINER_METADATA_URI_PATH) 
match {
       case Some(uri) => uri
-      case None =>
+      case None      =>
         throw new IllegalStateException("The environment variable 
ECS_CONTAINER_METADATA_URI cannot be found")
     }
 
diff --git 
a/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/AbstractKubernetesLease.scala
 
b/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/AbstractKubernetesLease.scala
index 3633952f..d405042f 100644
--- 
a/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/AbstractKubernetesLease.scala
+++ 
b/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/AbstractKubernetesLease.scala
@@ -95,8 +95,8 @@ abstract class AbstractKubernetesLease(system: 
ExtendedActorSystem, leaseTaken:
   override def release(): Future[Boolean] = {
     (leaseActor ? Release())
       .transform {
-        case Success(LeaseReleased)       => Success(true)
-        case Success(InvalidRequest(msg)) => Failure(new LeaseException(msg))
+        case Success(LeaseReleased)          => Success(true)
+        case Success(InvalidRequest(msg))    => Failure(new 
LeaseException(msg))
         case Failure(_: AskTimeoutException) => Failure(
             new LeaseTimeoutException(
               s"Timed out trying to release lease [$leaseName, 
${settings.ownerName}]. It may still be taken."))
@@ -112,9 +112,9 @@ abstract class AbstractKubernetesLease(system: 
ExtendedActorSystem, leaseTaken:
   override def acquire(leaseLostCallback: Option[Throwable] => Unit): 
Future[Boolean] = {
     (leaseActor ? Acquire(leaseLostCallback))
       .transform {
-        case Success(LeaseAcquired)       => Success(true)
-        case Success(LeaseTaken)          => Success(false)
-        case Success(InvalidRequest(msg)) => Failure(new LeaseException(msg))
+        case Success(LeaseAcquired)          => Success(true)
+        case Success(LeaseTaken)             => Success(false)
+        case Success(InvalidRequest(msg))    => Failure(new 
LeaseException(msg))
         case Failure(_: AskTimeoutException) => Failure(new 
LeaseTimeoutException(
             s"Timed out trying to acquire lease [$leaseName, 
${settings.ownerName}]. It may still be taken."))
         case Failure(exception) => Failure(exception)
diff --git 
a/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/internal/AbstractKubernetesApiImpl.scala
 
b/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/internal/AbstractKubernetesApiImpl.scala
index 32b474cc..99fa22dc 100644
--- 
a/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/internal/AbstractKubernetesApiImpl.scala
+++ 
b/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/internal/AbstractKubernetesApiImpl.scala
@@ -97,7 +97,7 @@ import scala.util.control.NonFatal
             log.info("lease {} does not exist, creating", name)
             createLeaseResource(name).flatMap {
               case Some(created) => Future.successful(created)
-              case None =>
+              case None          =>
                 if (tries < maxTries) loop(tries + 1)
                 else Future.failed(new LeaseException(s"Unable to create or 
read lease after $maxTries tries"))
             }
diff --git 
a/management-cluster-bootstrap/src/main/scala/org/apache/pekko/management/cluster/bootstrap/internal/BootstrapCoordinator.scala
 
b/management-cluster-bootstrap/src/main/scala/org/apache/pekko/management/cluster/bootstrap/internal/BootstrapCoordinator.scala
index de9c9daf..dba79025 100644
--- 
a/management-cluster-bootstrap/src/main/scala/org/apache/pekko/management/cluster/bootstrap/internal/BootstrapCoordinator.scala
+++ 
b/management-cluster-bootstrap/src/main/scala/org/apache/pekko/management/cluster/bootstrap/internal/BootstrapCoordinator.scala
@@ -266,7 +266,7 @@ private[pekko] class BootstrapCoordinator(
     case d: JoinDecision =>
       decisionInProgress = false
       d match {
-        case KeepProbing => // continue scheduled lookups and probing of 
discovered contact points
+        case KeepProbing                   => // continue scheduled lookups 
and probing of discovered contact points
         case JoinOtherSeedNodes(seedNodes) =>
           if (seedNodes.nonEmpty) {
             log.info(
diff --git 
a/management-cluster-http/src/main/scala/org/apache/pekko/management/cluster/scaladsl/ClusterMembershipCheck.scala
 
b/management-cluster-http/src/main/scala/org/apache/pekko/management/cluster/scaladsl/ClusterMembershipCheck.scala
index fc7dc058..29ae4f09 100644
--- 
a/management-cluster-http/src/main/scala/org/apache/pekko/management/cluster/scaladsl/ClusterMembershipCheck.scala
+++ 
b/management-cluster-http/src/main/scala/org/apache/pekko/management/cluster/scaladsl/ClusterMembershipCheck.scala
@@ -38,7 +38,7 @@ private[pekko] object ClusterMembershipCheckSettings {
       case "joining"  => MemberStatus.Joining
       case "leaving"  => MemberStatus.Leaving
       case "removed"  => MemberStatus.Removed
-      case invalid =>
+      case invalid    =>
         throw new IllegalArgumentException(
           s"'$invalid' is not a valid MemberStatus. See reference.conf for 
valid values")
     }
diff --git 
a/management/src/main/scala/org/apache/pekko/management/HealthCheckRoutes.scala 
b/management/src/main/scala/org/apache/pekko/management/HealthCheckRoutes.scala
index 61ec3a70..4fb3c608 100644
--- 
a/management/src/main/scala/org/apache/pekko/management/HealthCheckRoutes.scala
+++ 
b/management/src/main/scala/org/apache/pekko/management/HealthCheckRoutes.scala
@@ -39,7 +39,7 @@ private[pekko] class HealthCheckRoutes(system: 
ExtendedActorSystem) extends Mana
   protected val healthChecks = HealthChecks(system, settings)
 
   private val healthCheckResponse: Try[Either[String, Unit]] => Route = {
-    case Success(Right(())) => complete(StatusCodes.OK)
+    case Success(Right(()))           => complete(StatusCodes.OK)
     case Success(Left(failingChecks)) =>
       complete(StatusCodes.InternalServerError -> s"Not Healthy: 
$failingChecks")
     case Failure(t) =>
diff --git 
a/management/src/main/scala/org/apache/pekko/management/PekkoManagementSettings.scala
 
b/management/src/main/scala/org/apache/pekko/management/PekkoManagementSettings.scala
index ae7a6301..e6c38ed7 100644
--- 
a/management/src/main/scala/org/apache/pekko/management/PekkoManagementSettings.scala
+++ 
b/management/src/main/scala/org/apache/pekko/management/PekkoManagementSettings.scala
@@ -50,7 +50,7 @@ final class PekkoManagementSettings(val config: Config) {
     }
 
     val EffectiveBindPort: Int = cc.getString("bind-port") match {
-      case "" => Port
+      case ""    => Port
       case value =>
         val p = value.toInt
         require(0 to 65535 contains p, s"pekko.management.http.bind-port must 
be 0 through 65535 (was $p)")
diff --git 
a/management/src/main/scala/org/apache/pekko/management/internal/HealthChecksImpl.scala
 
b/management/src/main/scala/org/apache/pekko/management/internal/HealthChecksImpl.scala
index 3bc93247..5b8bb081 100644
--- 
a/management/src/main/scala/org/apache/pekko/management/internal/HealthChecksImpl.scala
+++ 
b/management/src/main/scala/org/apache/pekko/management/internal/HealthChecksImpl.scala
@@ -139,7 +139,7 @@ final private[pekko] class HealthChecksImpl(system: 
ExtendedActorSystem, setting
             tryLoadJavaHealthCheck(namedHealthCheck.fullyQualifiedClassName)
         })
       .map {
-        case Success(c) => c
+        case Success(c)                        => c
         case Failure(_: NoSuchMethodException) =>
           throw new InvalidHealthCheckException(
             s"Health checks: [${checks.mkString(",")}] must have a no args 
constructor or a single argument constructor that takes an ActorSystem")
@@ -159,7 +159,7 @@ final private[pekko] class HealthChecksImpl(system: 
ExtendedActorSystem, setting
   def startupResult(): Future[Either[String, Unit]] = {
     val result = check(startupChecks)
     result.onComplete {
-      case Success(Right(())) =>
+      case Success(Right(()))    =>
       case Success(Left(reason)) =>
         log.info(ManagementLogMarker.startupCheckFailed, reason)
       case Failure(e) =>
@@ -173,7 +173,7 @@ final private[pekko] class HealthChecksImpl(system: 
ExtendedActorSystem, setting
   def readyResult(): Future[Either[String, Unit]] = {
     val result = check(readiness)
     result.onComplete {
-      case Success(Right(())) =>
+      case Success(Right(()))    =>
       case Success(Left(reason)) =>
         log.info(ManagementLogMarker.readinessCheckFailed, reason)
       case Failure(e) =>
@@ -187,7 +187,7 @@ final private[pekko] class HealthChecksImpl(system: 
ExtendedActorSystem, setting
   def aliveResult(): Future[Either[String, Unit]] = {
     val result = check(liveness)
     result.onComplete {
-      case Success(Right(())) =>
+      case Success(Right(()))    =>
       case Success(Left(reason)) =>
         log.info(ManagementLogMarker.livenessCheckFailed, reason)
       case Failure(e) =>
diff --git 
a/management/src/main/scala/org/apache/pekko/management/javadsl/ManagementRouteProviderSettings.scala
 
b/management/src/main/scala/org/apache/pekko/management/javadsl/ManagementRouteProviderSettings.scala
index 273f2cb0..4bf9f9a1 100644
--- 
a/management/src/main/scala/org/apache/pekko/management/javadsl/ManagementRouteProviderSettings.scala
+++ 
b/management/src/main/scala/org/apache/pekko/management/javadsl/ManagementRouteProviderSettings.scala
@@ -96,7 +96,7 @@ sealed abstract class ManagementRouteProviderSettings {
     if (httpsConnectionContext.isPresent) {
       httpsConnectionContext.get match {
         case ctx: pekko.http.scaladsl.HttpsConnectionContext => Option(ctx)
-        case other =>
+        case other                                           =>
           throw new IllegalStateException(
             "org.apache.pekko.http.javadsl.HttpsConnectionContext should be a 
" +
             s"org.apache.pekko.http.scaladsl.HttpsConnectionContext, but was 
[${other.getClass.getName}]")
diff --git 
a/management/src/main/scala/org/apache/pekko/management/scaladsl/PekkoManagement.scala
 
b/management/src/main/scala/org/apache/pekko/management/scaladsl/PekkoManagement.scala
index 8c4a4242..ee964d92 100644
--- 
a/management/src/main/scala/org/apache/pekko/management/scaladsl/PekkoManagement.scala
+++ 
b/management/src/main/scala/org/apache/pekko/management/scaladsl/PekkoManagement.scala
@@ -279,7 +279,7 @@ final class PekkoManagement(implicit private[pekko] val 
system: ExtendedActorSys
             system.registerExtension(p.lookup) match {
               case provider: ManagementRouteProvider         => provider
               case provider: javadsl.ManagementRouteProvider => new 
ManagementRouteProviderAdapter(provider)
-              case other =>
+              case other                                     =>
                 throw new RuntimeException(
                   s"Extension [$fqcn] should create a 
'ManagementRouteProvider' but was " +
                   s"[${other.getClass.getName}]")


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to