summaryrefslogtreecommitdiff
path: root/openstackclient/identity/v3/application_credential.py
diff options
context:
space:
mode:
Diffstat (limited to 'openstackclient/identity/v3/application_credential.py')
-rw-r--r--openstackclient/identity/v3/application_credential.py117
1 files changed, 73 insertions, 44 deletions
diff --git a/openstackclient/identity/v3/application_credential.py b/openstackclient/identity/v3/application_credential.py
index a2089856..c75de3a4 100644
--- a/openstackclient/identity/v3/application_credential.py
+++ b/openstackclient/identity/v3/application_credential.py
@@ -43,23 +43,29 @@ class CreateApplicationCredential(command.ShowOne):
parser.add_argument(
'--secret',
metavar='<secret>',
- help=_('Secret to use for authentication (if not provided, one'
- ' will be generated)'),
+ help=_(
+ 'Secret to use for authentication (if not provided, one'
+ ' will be generated)'
+ ),
)
parser.add_argument(
'--role',
metavar='<role>',
action='append',
default=[],
- help=_('Roles to authorize (name or ID) (repeat option to set'
- ' multiple values)'),
+ help=_(
+ 'Roles to authorize (name or ID) (repeat option to set'
+ ' multiple values)'
+ ),
)
parser.add_argument(
'--expiration',
metavar='<expiration>',
- help=_('Sets an expiration date for the application credential,'
- ' format of YYYY-mm-ddTHH:MM:SS (if not provided, the'
- ' application credential will not expire)'),
+ help=_(
+ 'Sets an expiration date for the application credential,'
+ ' format of YYYY-mm-ddTHH:MM:SS (if not provided, the'
+ ' application credential will not expire)'
+ ),
)
parser.add_argument(
'--description',
@@ -69,27 +75,32 @@ class CreateApplicationCredential(command.ShowOne):
parser.add_argument(
'--unrestricted',
action="store_true",
- help=_('Enable application credential to create and delete other'
- ' application credentials and trusts (this is potentially'
- ' dangerous behavior and is disabled by default)'),
+ help=_(
+ 'Enable application credential to create and delete other'
+ ' application credentials and trusts (this is potentially'
+ ' dangerous behavior and is disabled by default)'
+ ),
)
parser.add_argument(
'--restricted',
action="store_true",
- help=_('Prohibit application credential from creating and deleting'
- ' other application credentials and trusts (this is the'
- ' default behavior)'),
+ help=_(
+ 'Prohibit application credential from creating and deleting'
+ ' other application credentials and trusts (this is the'
+ ' default behavior)'
+ ),
)
parser.add_argument(
'--access-rules',
metavar='<access-rules>',
- help=_('Either a string or file path containing a JSON-formatted '
- 'list of access rules, each containing a request method, '
- 'path, and service, for example '
- '\'[{"method": "GET", '
- '"path": "/v2.1/servers", '
- '"service": "compute"}]\''),
-
+ help=_(
+ 'Either a string or file path containing a JSON-formatted '
+ 'list of access rules, each containing a request method, '
+ 'path, and service, for example '
+ '\'[{"method": "GET", '
+ '"path": "/v2.1/servers", '
+ '"service": "compute"}]\''
+ ),
)
return parser
@@ -103,14 +114,16 @@ class CreateApplicationCredential(command.ShowOne):
# which they are currently scoped with a subset of the role
# assignments they have on that project. Don't bother trying to
# look up roles via keystone, just introspect the token.
- role_id = common._get_token_resource(identity_client, "roles",
- role)
+ role_id = common._get_token_resource(
+ identity_client, "roles", role
+ )
role_ids.append(role_id)
expires_at = None
if parsed_args.expiration:
- expires_at = datetime.datetime.strptime(parsed_args.expiration,
- '%Y-%m-%dT%H:%M:%S')
+ expires_at = datetime.datetime.strptime(
+ parsed_args.expiration, '%Y-%m-%dT%H:%M:%S'
+ )
if parsed_args.restricted:
unrestricted = False
@@ -125,9 +138,11 @@ class CreateApplicationCredential(command.ShowOne):
with open(parsed_args.access_rules) as f:
access_rules = json.load(f)
except IOError:
- raise exceptions.CommandError(
- _("Access rules is not valid JSON string or file does"
- " not exist."))
+ msg = _(
+ "Access rules is not valid JSON string or file does"
+ " not exist."
+ )
+ raise exceptions.CommandError(msg)
else:
access_rules = None
@@ -172,18 +187,25 @@ class DeleteApplicationCredential(command.Command):
for ac in parsed_args.application_credential:
try:
app_cred = utils.find_resource(
- identity_client.application_credentials, ac)
+ identity_client.application_credentials, ac
+ )
identity_client.application_credentials.delete(app_cred.id)
except Exception as e:
errors += 1
- LOG.error(_("Failed to delete application credential with "
- "name or ID '%(ac)s': %(e)s"),
- {'ac': ac, 'e': e})
+ LOG.error(
+ _(
+ "Failed to delete application credential with "
+ "name or ID '%(ac)s': %(e)s"
+ ),
+ {'ac': ac, 'e': e},
+ )
if errors > 0:
total = len(parsed_args.application_credential)
- msg = (_("%(errors)s of %(total)s application credentials failed "
- "to delete.") % {'errors': errors, 'total': total})
+ msg = _(
+ "%(errors)s of %(total)s application credentials failed "
+ "to delete."
+ ) % {'errors': errors, 'total': total}
raise exceptions.CommandError(msg)
@@ -203,20 +225,25 @@ class ListApplicationCredential(command.Lister):
def take_action(self, parsed_args):
identity_client = self.app.client_manager.identity
if parsed_args.user:
- user_id = common.find_user(identity_client,
- parsed_args.user,
- parsed_args.user_domain).id
+ user_id = common.find_user(
+ identity_client, parsed_args.user, parsed_args.user_domain
+ ).id
else:
user_id = None
columns = ('ID', 'Name', 'Project ID', 'Description', 'Expires At')
- data = identity_client.application_credentials.list(
- user=user_id)
- return (columns,
- (utils.get_item_properties(
- s, columns,
+ data = identity_client.application_credentials.list(user=user_id)
+ return (
+ columns,
+ (
+ utils.get_item_properties(
+ s,
+ columns,
formatters={},
- ) for s in data))
+ )
+ for s in data
+ ),
+ )
class ShowApplicationCredential(command.ShowOne):
@@ -233,8 +260,10 @@ class ShowApplicationCredential(command.ShowOne):
def take_action(self, parsed_args):
identity_client = self.app.client_manager.identity
- app_cred = utils.find_resource(identity_client.application_credentials,
- parsed_args.application_credential)
+ app_cred = utils.find_resource(
+ identity_client.application_credentials,
+ parsed_args.application_credential,
+ )
app_cred._info.pop('links', None)