diff options
Diffstat (limited to 'openstackclient/identity/v3/application_credential.py')
-rw-r--r-- | openstackclient/identity/v3/application_credential.py | 117 |
1 files changed, 73 insertions, 44 deletions
diff --git a/openstackclient/identity/v3/application_credential.py b/openstackclient/identity/v3/application_credential.py index a2089856..c75de3a4 100644 --- a/openstackclient/identity/v3/application_credential.py +++ b/openstackclient/identity/v3/application_credential.py @@ -43,23 +43,29 @@ class CreateApplicationCredential(command.ShowOne): parser.add_argument( '--secret', metavar='<secret>', - help=_('Secret to use for authentication (if not provided, one' - ' will be generated)'), + help=_( + 'Secret to use for authentication (if not provided, one' + ' will be generated)' + ), ) parser.add_argument( '--role', metavar='<role>', action='append', default=[], - help=_('Roles to authorize (name or ID) (repeat option to set' - ' multiple values)'), + help=_( + 'Roles to authorize (name or ID) (repeat option to set' + ' multiple values)' + ), ) parser.add_argument( '--expiration', metavar='<expiration>', - help=_('Sets an expiration date for the application credential,' - ' format of YYYY-mm-ddTHH:MM:SS (if not provided, the' - ' application credential will not expire)'), + help=_( + 'Sets an expiration date for the application credential,' + ' format of YYYY-mm-ddTHH:MM:SS (if not provided, the' + ' application credential will not expire)' + ), ) parser.add_argument( '--description', @@ -69,27 +75,32 @@ class CreateApplicationCredential(command.ShowOne): parser.add_argument( '--unrestricted', action="store_true", - help=_('Enable application credential to create and delete other' - ' application credentials and trusts (this is potentially' - ' dangerous behavior and is disabled by default)'), + help=_( + 'Enable application credential to create and delete other' + ' application credentials and trusts (this is potentially' + ' dangerous behavior and is disabled by default)' + ), ) parser.add_argument( '--restricted', action="store_true", - help=_('Prohibit application credential from creating and deleting' - ' other application credentials and trusts (this is the' - ' default behavior)'), + help=_( + 'Prohibit application credential from creating and deleting' + ' other application credentials and trusts (this is the' + ' default behavior)' + ), ) parser.add_argument( '--access-rules', metavar='<access-rules>', - help=_('Either a string or file path containing a JSON-formatted ' - 'list of access rules, each containing a request method, ' - 'path, and service, for example ' - '\'[{"method": "GET", ' - '"path": "/v2.1/servers", ' - '"service": "compute"}]\''), - + help=_( + 'Either a string or file path containing a JSON-formatted ' + 'list of access rules, each containing a request method, ' + 'path, and service, for example ' + '\'[{"method": "GET", ' + '"path": "/v2.1/servers", ' + '"service": "compute"}]\'' + ), ) return parser @@ -103,14 +114,16 @@ class CreateApplicationCredential(command.ShowOne): # which they are currently scoped with a subset of the role # assignments they have on that project. Don't bother trying to # look up roles via keystone, just introspect the token. - role_id = common._get_token_resource(identity_client, "roles", - role) + role_id = common._get_token_resource( + identity_client, "roles", role + ) role_ids.append(role_id) expires_at = None if parsed_args.expiration: - expires_at = datetime.datetime.strptime(parsed_args.expiration, - '%Y-%m-%dT%H:%M:%S') + expires_at = datetime.datetime.strptime( + parsed_args.expiration, '%Y-%m-%dT%H:%M:%S' + ) if parsed_args.restricted: unrestricted = False @@ -125,9 +138,11 @@ class CreateApplicationCredential(command.ShowOne): with open(parsed_args.access_rules) as f: access_rules = json.load(f) except IOError: - raise exceptions.CommandError( - _("Access rules is not valid JSON string or file does" - " not exist.")) + msg = _( + "Access rules is not valid JSON string or file does" + " not exist." + ) + raise exceptions.CommandError(msg) else: access_rules = None @@ -172,18 +187,25 @@ class DeleteApplicationCredential(command.Command): for ac in parsed_args.application_credential: try: app_cred = utils.find_resource( - identity_client.application_credentials, ac) + identity_client.application_credentials, ac + ) identity_client.application_credentials.delete(app_cred.id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete application credential with " - "name or ID '%(ac)s': %(e)s"), - {'ac': ac, 'e': e}) + LOG.error( + _( + "Failed to delete application credential with " + "name or ID '%(ac)s': %(e)s" + ), + {'ac': ac, 'e': e}, + ) if errors > 0: total = len(parsed_args.application_credential) - msg = (_("%(errors)s of %(total)s application credentials failed " - "to delete.") % {'errors': errors, 'total': total}) + msg = _( + "%(errors)s of %(total)s application credentials failed " + "to delete." + ) % {'errors': errors, 'total': total} raise exceptions.CommandError(msg) @@ -203,20 +225,25 @@ class ListApplicationCredential(command.Lister): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity if parsed_args.user: - user_id = common.find_user(identity_client, - parsed_args.user, - parsed_args.user_domain).id + user_id = common.find_user( + identity_client, parsed_args.user, parsed_args.user_domain + ).id else: user_id = None columns = ('ID', 'Name', 'Project ID', 'Description', 'Expires At') - data = identity_client.application_credentials.list( - user=user_id) - return (columns, - (utils.get_item_properties( - s, columns, + data = identity_client.application_credentials.list(user=user_id) + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class ShowApplicationCredential(command.ShowOne): @@ -233,8 +260,10 @@ class ShowApplicationCredential(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - app_cred = utils.find_resource(identity_client.application_credentials, - parsed_args.application_credential) + app_cred = utils.find_resource( + identity_client.application_credentials, + parsed_args.application_credential, + ) app_cred._info.pop('links', None) |