This is an automated email from the ASF dual-hosted git repository.
github-bot pushed a commit to branch update/scalafmt-core-3.9.10
in repository https://gitbox.apache.org/repos/asf/pekko-management.git
commit 8b6fb722e0818718f9df8d1cbb7479722d86001f
Author: scala-steward-asf[bot]
<147768647+scala-steward-asf[bot]@users.noreply.github.com>
AuthorDate: Sun Oct 26 08:53:07 2025 +0000
Reformat with scalafmt 3.9.10
Executed command: scalafmt --non-interactive
---
.../pekko/discovery/awsapi/ecs/AsyncEcsTaskSetDiscovery.scala | 2 +-
.../lease/kubernetes/AbstractKubernetesLease.scala | 10 +++++-----
.../lease/kubernetes/internal/AbstractKubernetesApiImpl.scala | 2 +-
.../cluster/bootstrap/internal/BootstrapCoordinator.scala | 2 +-
.../management/cluster/scaladsl/ClusterMembershipCheck.scala | 2 +-
.../scala/org/apache/pekko/management/HealthCheckRoutes.scala | 2 +-
.../org/apache/pekko/management/PekkoManagementSettings.scala | 2 +-
.../apache/pekko/management/internal/HealthChecksImpl.scala | 8 ++++----
.../management/javadsl/ManagementRouteProviderSettings.scala | 2 +-
.../org/apache/pekko/management/scaladsl/PekkoManagement.scala | 2 +-
10 files changed, 17 insertions(+), 17 deletions(-)
diff --git
a/discovery-aws-api-async/src/main/scala/org/apache/pekko/discovery/awsapi/ecs/AsyncEcsTaskSetDiscovery.scala
b/discovery-aws-api-async/src/main/scala/org/apache/pekko/discovery/awsapi/ecs/AsyncEcsTaskSetDiscovery.scala
index fdcb4b96..61fbcba2 100644
---
a/discovery-aws-api-async/src/main/scala/org/apache/pekko/discovery/awsapi/ecs/AsyncEcsTaskSetDiscovery.scala
+++
b/discovery-aws-api-async/src/main/scala/org/apache/pekko/discovery/awsapi/ecs/AsyncEcsTaskSetDiscovery.scala
@@ -118,7 +118,7 @@ object AsyncEcsTaskSetDiscovery {
mat: Materializer): Future[Option[TaskMetadata]] = {
val ecsContainerMetadataUri = sys.env.get(ECS_CONTAINER_METADATA_URI_PATH)
match {
case Some(uri) => uri
- case None =>
+ case None =>
throw new IllegalStateException("The environment variable
ECS_CONTAINER_METADATA_URI cannot be found")
}
diff --git
a/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/AbstractKubernetesLease.scala
b/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/AbstractKubernetesLease.scala
index 3633952f..d405042f 100644
---
a/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/AbstractKubernetesLease.scala
+++
b/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/AbstractKubernetesLease.scala
@@ -95,8 +95,8 @@ abstract class AbstractKubernetesLease(system:
ExtendedActorSystem, leaseTaken:
override def release(): Future[Boolean] = {
(leaseActor ? Release())
.transform {
- case Success(LeaseReleased) => Success(true)
- case Success(InvalidRequest(msg)) => Failure(new LeaseException(msg))
+ case Success(LeaseReleased) => Success(true)
+ case Success(InvalidRequest(msg)) => Failure(new
LeaseException(msg))
case Failure(_: AskTimeoutException) => Failure(
new LeaseTimeoutException(
s"Timed out trying to release lease [$leaseName,
${settings.ownerName}]. It may still be taken."))
@@ -112,9 +112,9 @@ abstract class AbstractKubernetesLease(system:
ExtendedActorSystem, leaseTaken:
override def acquire(leaseLostCallback: Option[Throwable] => Unit):
Future[Boolean] = {
(leaseActor ? Acquire(leaseLostCallback))
.transform {
- case Success(LeaseAcquired) => Success(true)
- case Success(LeaseTaken) => Success(false)
- case Success(InvalidRequest(msg)) => Failure(new LeaseException(msg))
+ case Success(LeaseAcquired) => Success(true)
+ case Success(LeaseTaken) => Success(false)
+ case Success(InvalidRequest(msg)) => Failure(new
LeaseException(msg))
case Failure(_: AskTimeoutException) => Failure(new
LeaseTimeoutException(
s"Timed out trying to acquire lease [$leaseName,
${settings.ownerName}]. It may still be taken."))
case Failure(exception) => Failure(exception)
diff --git
a/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/internal/AbstractKubernetesApiImpl.scala
b/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/internal/AbstractKubernetesApiImpl.scala
index 32b474cc..99fa22dc 100644
---
a/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/internal/AbstractKubernetesApiImpl.scala
+++
b/lease-kubernetes/src/main/scala/org/apache/pekko/coordination/lease/kubernetes/internal/AbstractKubernetesApiImpl.scala
@@ -97,7 +97,7 @@ import scala.util.control.NonFatal
log.info("lease {} does not exist, creating", name)
createLeaseResource(name).flatMap {
case Some(created) => Future.successful(created)
- case None =>
+ case None =>
if (tries < maxTries) loop(tries + 1)
else Future.failed(new LeaseException(s"Unable to create or
read lease after $maxTries tries"))
}
diff --git
a/management-cluster-bootstrap/src/main/scala/org/apache/pekko/management/cluster/bootstrap/internal/BootstrapCoordinator.scala
b/management-cluster-bootstrap/src/main/scala/org/apache/pekko/management/cluster/bootstrap/internal/BootstrapCoordinator.scala
index de9c9daf..dba79025 100644
---
a/management-cluster-bootstrap/src/main/scala/org/apache/pekko/management/cluster/bootstrap/internal/BootstrapCoordinator.scala
+++
b/management-cluster-bootstrap/src/main/scala/org/apache/pekko/management/cluster/bootstrap/internal/BootstrapCoordinator.scala
@@ -266,7 +266,7 @@ private[pekko] class BootstrapCoordinator(
case d: JoinDecision =>
decisionInProgress = false
d match {
- case KeepProbing => // continue scheduled lookups and probing of
discovered contact points
+ case KeepProbing => // continue scheduled lookups
and probing of discovered contact points
case JoinOtherSeedNodes(seedNodes) =>
if (seedNodes.nonEmpty) {
log.info(
diff --git
a/management-cluster-http/src/main/scala/org/apache/pekko/management/cluster/scaladsl/ClusterMembershipCheck.scala
b/management-cluster-http/src/main/scala/org/apache/pekko/management/cluster/scaladsl/ClusterMembershipCheck.scala
index fc7dc058..29ae4f09 100644
---
a/management-cluster-http/src/main/scala/org/apache/pekko/management/cluster/scaladsl/ClusterMembershipCheck.scala
+++
b/management-cluster-http/src/main/scala/org/apache/pekko/management/cluster/scaladsl/ClusterMembershipCheck.scala
@@ -38,7 +38,7 @@ private[pekko] object ClusterMembershipCheckSettings {
case "joining" => MemberStatus.Joining
case "leaving" => MemberStatus.Leaving
case "removed" => MemberStatus.Removed
- case invalid =>
+ case invalid =>
throw new IllegalArgumentException(
s"'$invalid' is not a valid MemberStatus. See reference.conf for
valid values")
}
diff --git
a/management/src/main/scala/org/apache/pekko/management/HealthCheckRoutes.scala
b/management/src/main/scala/org/apache/pekko/management/HealthCheckRoutes.scala
index 61ec3a70..4fb3c608 100644
---
a/management/src/main/scala/org/apache/pekko/management/HealthCheckRoutes.scala
+++
b/management/src/main/scala/org/apache/pekko/management/HealthCheckRoutes.scala
@@ -39,7 +39,7 @@ private[pekko] class HealthCheckRoutes(system:
ExtendedActorSystem) extends Mana
protected val healthChecks = HealthChecks(system, settings)
private val healthCheckResponse: Try[Either[String, Unit]] => Route = {
- case Success(Right(())) => complete(StatusCodes.OK)
+ case Success(Right(())) => complete(StatusCodes.OK)
case Success(Left(failingChecks)) =>
complete(StatusCodes.InternalServerError -> s"Not Healthy:
$failingChecks")
case Failure(t) =>
diff --git
a/management/src/main/scala/org/apache/pekko/management/PekkoManagementSettings.scala
b/management/src/main/scala/org/apache/pekko/management/PekkoManagementSettings.scala
index ae7a6301..e6c38ed7 100644
---
a/management/src/main/scala/org/apache/pekko/management/PekkoManagementSettings.scala
+++
b/management/src/main/scala/org/apache/pekko/management/PekkoManagementSettings.scala
@@ -50,7 +50,7 @@ final class PekkoManagementSettings(val config: Config) {
}
val EffectiveBindPort: Int = cc.getString("bind-port") match {
- case "" => Port
+ case "" => Port
case value =>
val p = value.toInt
require(0 to 65535 contains p, s"pekko.management.http.bind-port must
be 0 through 65535 (was $p)")
diff --git
a/management/src/main/scala/org/apache/pekko/management/internal/HealthChecksImpl.scala
b/management/src/main/scala/org/apache/pekko/management/internal/HealthChecksImpl.scala
index 3bc93247..5b8bb081 100644
---
a/management/src/main/scala/org/apache/pekko/management/internal/HealthChecksImpl.scala
+++
b/management/src/main/scala/org/apache/pekko/management/internal/HealthChecksImpl.scala
@@ -139,7 +139,7 @@ final private[pekko] class HealthChecksImpl(system:
ExtendedActorSystem, setting
tryLoadJavaHealthCheck(namedHealthCheck.fullyQualifiedClassName)
})
.map {
- case Success(c) => c
+ case Success(c) => c
case Failure(_: NoSuchMethodException) =>
throw new InvalidHealthCheckException(
s"Health checks: [${checks.mkString(",")}] must have a no args
constructor or a single argument constructor that takes an ActorSystem")
@@ -159,7 +159,7 @@ final private[pekko] class HealthChecksImpl(system:
ExtendedActorSystem, setting
def startupResult(): Future[Either[String, Unit]] = {
val result = check(startupChecks)
result.onComplete {
- case Success(Right(())) =>
+ case Success(Right(())) =>
case Success(Left(reason)) =>
log.info(ManagementLogMarker.startupCheckFailed, reason)
case Failure(e) =>
@@ -173,7 +173,7 @@ final private[pekko] class HealthChecksImpl(system:
ExtendedActorSystem, setting
def readyResult(): Future[Either[String, Unit]] = {
val result = check(readiness)
result.onComplete {
- case Success(Right(())) =>
+ case Success(Right(())) =>
case Success(Left(reason)) =>
log.info(ManagementLogMarker.readinessCheckFailed, reason)
case Failure(e) =>
@@ -187,7 +187,7 @@ final private[pekko] class HealthChecksImpl(system:
ExtendedActorSystem, setting
def aliveResult(): Future[Either[String, Unit]] = {
val result = check(liveness)
result.onComplete {
- case Success(Right(())) =>
+ case Success(Right(())) =>
case Success(Left(reason)) =>
log.info(ManagementLogMarker.livenessCheckFailed, reason)
case Failure(e) =>
diff --git
a/management/src/main/scala/org/apache/pekko/management/javadsl/ManagementRouteProviderSettings.scala
b/management/src/main/scala/org/apache/pekko/management/javadsl/ManagementRouteProviderSettings.scala
index 273f2cb0..4bf9f9a1 100644
---
a/management/src/main/scala/org/apache/pekko/management/javadsl/ManagementRouteProviderSettings.scala
+++
b/management/src/main/scala/org/apache/pekko/management/javadsl/ManagementRouteProviderSettings.scala
@@ -96,7 +96,7 @@ sealed abstract class ManagementRouteProviderSettings {
if (httpsConnectionContext.isPresent) {
httpsConnectionContext.get match {
case ctx: pekko.http.scaladsl.HttpsConnectionContext => Option(ctx)
- case other =>
+ case other =>
throw new IllegalStateException(
"org.apache.pekko.http.javadsl.HttpsConnectionContext should be a
" +
s"org.apache.pekko.http.scaladsl.HttpsConnectionContext, but was
[${other.getClass.getName}]")
diff --git
a/management/src/main/scala/org/apache/pekko/management/scaladsl/PekkoManagement.scala
b/management/src/main/scala/org/apache/pekko/management/scaladsl/PekkoManagement.scala
index 8c4a4242..ee964d92 100644
---
a/management/src/main/scala/org/apache/pekko/management/scaladsl/PekkoManagement.scala
+++
b/management/src/main/scala/org/apache/pekko/management/scaladsl/PekkoManagement.scala
@@ -279,7 +279,7 @@ final class PekkoManagement(implicit private[pekko] val
system: ExtendedActorSys
system.registerExtension(p.lookup) match {
case provider: ManagementRouteProvider => provider
case provider: javadsl.ManagementRouteProvider => new
ManagementRouteProviderAdapter(provider)
- case other =>
+ case other =>
throw new RuntimeException(
s"Extension [$fqcn] should create a
'ManagementRouteProvider' but was " +
s"[${other.getClass.getName}]")
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]