Update keystoneclient code to account for hacking 0.9.2
Fixed most of the errors reported back from hacking 0.9.2. Specifically: - E128 continuation line under-indented for visual indent - E251 unexpected spaces around keyword / parameter equals - E265 block comment should start with '# ' - H305 imports not grouped correctly - H307 like imports should be grouped together - H402 one line docstring needs punctuation - H904 Wrap long lines in parentheses instead of a backslash But opted to ignore the following for now: - E122: continuation line missing indentation or outdented - H405: multi line docstring summary not separated with an empty line Change-Id: Ib8e698d85fd598fa91435538657361a1f695ce89
This commit is contained in:
		@@ -11,6 +11,7 @@
 | 
			
		||||
# under the License.
 | 
			
		||||
 | 
			
		||||
import abc
 | 
			
		||||
 | 
			
		||||
import six
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -12,6 +12,7 @@
 | 
			
		||||
 | 
			
		||||
import abc
 | 
			
		||||
import logging
 | 
			
		||||
 | 
			
		||||
import six
 | 
			
		||||
 | 
			
		||||
from keystoneclient.auth import base
 | 
			
		||||
 
 | 
			
		||||
@@ -24,8 +24,9 @@ import logging
 | 
			
		||||
from six.moves.urllib import parse as urlparse
 | 
			
		||||
 | 
			
		||||
try:
 | 
			
		||||
    import keyring
 | 
			
		||||
    import pickle
 | 
			
		||||
 | 
			
		||||
    import keyring
 | 
			
		||||
except ImportError:
 | 
			
		||||
    keyring = None
 | 
			
		||||
    pickle = None
 | 
			
		||||
 
 | 
			
		||||
@@ -149,13 +149,13 @@ import contextlib
 | 
			
		||||
import datetime
 | 
			
		||||
import logging
 | 
			
		||||
import os
 | 
			
		||||
import requests
 | 
			
		||||
import stat
 | 
			
		||||
import tempfile
 | 
			
		||||
import time
 | 
			
		||||
 | 
			
		||||
import netaddr
 | 
			
		||||
from oslo.config import cfg
 | 
			
		||||
import requests
 | 
			
		||||
import six
 | 
			
		||||
from six.moves import urllib
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -33,9 +33,10 @@ import hashlib
 | 
			
		||||
import hmac
 | 
			
		||||
import math
 | 
			
		||||
import os
 | 
			
		||||
import six
 | 
			
		||||
import sys
 | 
			
		||||
 | 
			
		||||
import six
 | 
			
		||||
 | 
			
		||||
# make sure pycrypto is available
 | 
			
		||||
try:
 | 
			
		||||
    from Crypto.Cipher import AES
 | 
			
		||||
 
 | 
			
		||||
@@ -32,11 +32,11 @@ This WSGI component:
 | 
			
		||||
"""
 | 
			
		||||
 | 
			
		||||
import logging
 | 
			
		||||
import webob
 | 
			
		||||
 | 
			
		||||
import requests
 | 
			
		||||
import six
 | 
			
		||||
from six.moves import urllib
 | 
			
		||||
import webob
 | 
			
		||||
 | 
			
		||||
from keystoneclient.openstack.common import jsonutils
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -637,7 +637,7 @@ class CommonAuthTokenMiddlewareTest(object):
 | 
			
		||||
        for _ in range(2):  # Do it twice because first result was cached.
 | 
			
		||||
            self.assert_valid_request_200(
 | 
			
		||||
                self.token_dict['signed_token_scoped'])
 | 
			
		||||
            #ensure that signed requests do not generate HTTP traffic
 | 
			
		||||
            # ensure that signed requests do not generate HTTP traffic
 | 
			
		||||
            self.assertLastPath(None)
 | 
			
		||||
 | 
			
		||||
    def test_valid_signed_compressed_request(self):
 | 
			
		||||
@@ -722,7 +722,7 @@ class CommonAuthTokenMiddlewareTest(object):
 | 
			
		||||
        return jsonutils.dumps(revocation_list)
 | 
			
		||||
 | 
			
		||||
    def test_is_signed_token_revoked_returns_false(self):
 | 
			
		||||
        #explicitly setting an empty revocation list here to document intent
 | 
			
		||||
        # explicitly setting an empty revocation list here to document intent
 | 
			
		||||
        self.middleware.token_revocation_list = jsonutils.dumps(
 | 
			
		||||
            {"revoked": [], "extra": "success"})
 | 
			
		||||
        result = self.middleware.is_signed_token_revoked(
 | 
			
		||||
@@ -1443,10 +1443,10 @@ class v2AuthTokenMiddlewareTest(BaseAuthTokenMiddlewareTest,
 | 
			
		||||
                      self.examples.UUID_TOKEN_UNKNOWN_BIND,
 | 
			
		||||
                      self.examples.UUID_TOKEN_NO_SERVICE_CATALOG,
 | 
			
		||||
                      self.examples.SIGNED_TOKEN_SCOPED_KEY,):
 | 
			
		||||
            response_body = self.examples.JSON_TOKEN_RESPONSES[token]
 | 
			
		||||
            httpretty.register_uri(httpretty.GET,
 | 
			
		||||
                                   "%s/v2.0/tokens/%s" % (BASE_URI, token),
 | 
			
		||||
                                   body=
 | 
			
		||||
                                   self.examples.JSON_TOKEN_RESPONSES[token])
 | 
			
		||||
                                   body=response_body)
 | 
			
		||||
 | 
			
		||||
        httpretty.register_uri(httpretty.GET,
 | 
			
		||||
                               '%s/v2.0/tokens/%s' % (BASE_URI, ERROR_TOKEN),
 | 
			
		||||
@@ -1537,10 +1537,10 @@ class CrossVersionAuthTokenMiddlewareTest(BaseAuthTokenMiddlewareTest,
 | 
			
		||||
                               body=FAKE_ADMIN_TOKEN)
 | 
			
		||||
 | 
			
		||||
        token = self.examples.UUID_TOKEN_DEFAULT
 | 
			
		||||
        response_body = self.examples.JSON_TOKEN_RESPONSES[token]
 | 
			
		||||
        httpretty.register_uri(httpretty.GET,
 | 
			
		||||
                               "%s/v2.0/tokens/%s" % (BASE_URI, token),
 | 
			
		||||
                               body=
 | 
			
		||||
                               self.examples.JSON_TOKEN_RESPONSES[token])
 | 
			
		||||
                               body=response_body)
 | 
			
		||||
 | 
			
		||||
        self.set_middleware(conf=conf)
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -90,8 +90,8 @@ class KeyringTest(utils.TestCase):
 | 
			
		||||
                                   tenant_id=TENANT_ID, auth_url=AUTH_URL)
 | 
			
		||||
 | 
			
		||||
        # stub and check that a new token is received
 | 
			
		||||
        with mock.patch.object(cl, 'get_raw_token_from_identity_service') \
 | 
			
		||||
                as meth:
 | 
			
		||||
        method = 'get_raw_token_from_identity_service'
 | 
			
		||||
        with mock.patch.object(cl, method) as meth:
 | 
			
		||||
            meth.return_value = (True, PROJECT_SCOPED_TOKEN)
 | 
			
		||||
 | 
			
		||||
            self.assertTrue(cl.authenticate())
 | 
			
		||||
@@ -128,8 +128,8 @@ class KeyringTest(utils.TestCase):
 | 
			
		||||
        self.memory_keyring.password = pickle.dumps(auth_ref)
 | 
			
		||||
 | 
			
		||||
        # stub and check that a new token is received, so not using expired
 | 
			
		||||
        with mock.patch.object(cl, 'get_raw_token_from_identity_service') \
 | 
			
		||||
                as meth:
 | 
			
		||||
        method = 'get_raw_token_from_identity_service'
 | 
			
		||||
        with mock.patch.object(cl, method) as meth:
 | 
			
		||||
            meth.return_value = (True, PROJECT_SCOPED_TOKEN)
 | 
			
		||||
 | 
			
		||||
            self.assertTrue(cl.authenticate())
 | 
			
		||||
@@ -166,8 +166,8 @@ class KeyringTest(utils.TestCase):
 | 
			
		||||
                                   use_keyring=True)
 | 
			
		||||
 | 
			
		||||
        # stub and check that a new token is received
 | 
			
		||||
        with mock.patch.object(cl, 'get_raw_token_from_identity_service') \
 | 
			
		||||
                as meth:
 | 
			
		||||
        method = 'get_raw_token_from_identity_service'
 | 
			
		||||
        with mock.patch.object(cl, method) as meth:
 | 
			
		||||
            meth.return_value = (True, PROJECT_SCOPED_TOKEN)
 | 
			
		||||
 | 
			
		||||
            self.assertTrue(cl.authenticate())
 | 
			
		||||
 
 | 
			
		||||
@@ -313,9 +313,9 @@ class ShellTest(utils.TestCase):
 | 
			
		||||
            shell('tenant-create')
 | 
			
		||||
            assert do_tenant_mock.called
 | 
			
		||||
            # FIXME(dtroyer): how do you test the decorators?
 | 
			
		||||
            #shell('tenant-create --tenant-name wilma '
 | 
			
		||||
            # shell('tenant-create --tenant-name wilma '
 | 
			
		||||
            #        '--description "fred\'s wife"')
 | 
			
		||||
            #assert do_tenant_mock.called
 | 
			
		||||
            # assert do_tenant_mock.called
 | 
			
		||||
 | 
			
		||||
    def test_do_tenant_list(self):
 | 
			
		||||
        do_tenant_mock = mock.MagicMock()
 | 
			
		||||
 
 | 
			
		||||
@@ -13,6 +13,7 @@
 | 
			
		||||
import logging
 | 
			
		||||
import sys
 | 
			
		||||
import time
 | 
			
		||||
import uuid
 | 
			
		||||
 | 
			
		||||
import fixtures
 | 
			
		||||
import httpretty
 | 
			
		||||
@@ -22,7 +23,6 @@ import requests
 | 
			
		||||
import six
 | 
			
		||||
from six.moves.urllib import parse as urlparse
 | 
			
		||||
import testtools
 | 
			
		||||
import uuid
 | 
			
		||||
 | 
			
		||||
from keystoneclient.openstack.common import jsonutils
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -218,18 +218,18 @@ class FakeHTTPClient(fakes.FakeClient):
 | 
			
		||||
 | 
			
		||||
    def post_tenants(self, **kw):
 | 
			
		||||
        body = {"tenant":
 | 
			
		||||
               {"enabled": True,
 | 
			
		||||
                "description": None,
 | 
			
		||||
                "name": "new-tenant",
 | 
			
		||||
                "id": "1"}}
 | 
			
		||||
                {"enabled": True,
 | 
			
		||||
                 "description": None,
 | 
			
		||||
                 "name": "new-tenant",
 | 
			
		||||
                 "id": "1"}}
 | 
			
		||||
        return (200, body)
 | 
			
		||||
 | 
			
		||||
    def post_tenants_2(self, **kw):
 | 
			
		||||
        body = {"tenant":
 | 
			
		||||
               {"enabled": False,
 | 
			
		||||
                "description": "desc",
 | 
			
		||||
                "name": "new-tenant1",
 | 
			
		||||
                "id": "2"}}
 | 
			
		||||
                {"enabled": False,
 | 
			
		||||
                 "description": "desc",
 | 
			
		||||
                 "name": "new-tenant1",
 | 
			
		||||
                 "id": "2"}}
 | 
			
		||||
        return (200, body)
 | 
			
		||||
 | 
			
		||||
    def get_tenants(self, **kw):
 | 
			
		||||
@@ -253,18 +253,18 @@ class FakeHTTPClient(fakes.FakeClient):
 | 
			
		||||
 | 
			
		||||
    def get_tenants_1(self, **kw):
 | 
			
		||||
        body = {"tenant":
 | 
			
		||||
               {"enabled": True,
 | 
			
		||||
                "description": None,
 | 
			
		||||
                "name": "new-tenant",
 | 
			
		||||
                "id": "1"}}
 | 
			
		||||
                {"enabled": True,
 | 
			
		||||
                 "description": None,
 | 
			
		||||
                 "name": "new-tenant",
 | 
			
		||||
                 "id": "1"}}
 | 
			
		||||
        return (200, body)
 | 
			
		||||
 | 
			
		||||
    def get_tenants_2(self, **kw):
 | 
			
		||||
        body = {"tenant":
 | 
			
		||||
               {"enabled": True,
 | 
			
		||||
                "description": None,
 | 
			
		||||
                "name": "new-tenant",
 | 
			
		||||
                "id": "2"}}
 | 
			
		||||
                {"enabled": True,
 | 
			
		||||
                 "description": None,
 | 
			
		||||
                 "name": "new-tenant",
 | 
			
		||||
                 "id": "2"}}
 | 
			
		||||
        return (200, body)
 | 
			
		||||
 | 
			
		||||
    def delete_tenants_2(self, **kw):
 | 
			
		||||
@@ -375,8 +375,8 @@ class FakeHTTPClient(fakes.FakeClient):
 | 
			
		||||
 | 
			
		||||
    def post_OS_KSADM_roles(self, **kw):
 | 
			
		||||
        body = {"role":
 | 
			
		||||
               {"name": "new-role",
 | 
			
		||||
                "id": "1"}}
 | 
			
		||||
                {"name": "new-role",
 | 
			
		||||
                 "id": "1"}}
 | 
			
		||||
        return (200, body)
 | 
			
		||||
 | 
			
		||||
    def get_OS_KSADM_roles(self, **kw):
 | 
			
		||||
@@ -389,8 +389,8 @@ class FakeHTTPClient(fakes.FakeClient):
 | 
			
		||||
 | 
			
		||||
    def get_OS_KSADM_roles_1(self, **kw):
 | 
			
		||||
        body = {"role":
 | 
			
		||||
               {"name": "new-role",
 | 
			
		||||
                "id": "1"}
 | 
			
		||||
                {"name": "new-role",
 | 
			
		||||
                 "id": "1"}
 | 
			
		||||
                }
 | 
			
		||||
        return (200, body)
 | 
			
		||||
 | 
			
		||||
@@ -400,19 +400,19 @@ class FakeHTTPClient(fakes.FakeClient):
 | 
			
		||||
 | 
			
		||||
    def post_OS_KSADM_services(self, **kw):
 | 
			
		||||
        body = {"OS-KSADM:service":
 | 
			
		||||
               {"id": "1",
 | 
			
		||||
                "type": "compute",
 | 
			
		||||
                "name": "service1",
 | 
			
		||||
                "description": None}
 | 
			
		||||
                {"id": "1",
 | 
			
		||||
                 "type": "compute",
 | 
			
		||||
                 "name": "service1",
 | 
			
		||||
                 "description": None}
 | 
			
		||||
                }
 | 
			
		||||
        return (200, body)
 | 
			
		||||
 | 
			
		||||
    def get_OS_KSADM_services_1(self, **kw):
 | 
			
		||||
        body = {"OS-KSADM:service":
 | 
			
		||||
               {"description": None,
 | 
			
		||||
                "type": "compute",
 | 
			
		||||
                "id": "1",
 | 
			
		||||
                "name": "service1"}
 | 
			
		||||
                {"description": None,
 | 
			
		||||
                 "type": "compute",
 | 
			
		||||
                 "id": "1",
 | 
			
		||||
                 "name": "service1"}
 | 
			
		||||
                }
 | 
			
		||||
        return (200, body)
 | 
			
		||||
 | 
			
		||||
@@ -436,10 +436,10 @@ class FakeHTTPClient(fakes.FakeClient):
 | 
			
		||||
 | 
			
		||||
    def post_users_1_credentials_OS_EC2(self, **kw):
 | 
			
		||||
        body = {"credential":
 | 
			
		||||
               {"access": "1",
 | 
			
		||||
                "tenant_id": "1",
 | 
			
		||||
                "secret": "1",
 | 
			
		||||
                "user_id": "1"}
 | 
			
		||||
                {"access": "1",
 | 
			
		||||
                 "tenant_id": "1",
 | 
			
		||||
                 "secret": "1",
 | 
			
		||||
                 "user_id": "1"}
 | 
			
		||||
                }
 | 
			
		||||
        return (200, body)
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -176,7 +176,7 @@ class TenantTests(utils.TestCase):
 | 
			
		||||
                "description": "I changed you!",
 | 
			
		||||
                "enabled": False,
 | 
			
		||||
                "extravalue01": "metadataChanged",
 | 
			
		||||
                #"extraname": "dontoverwrite!",
 | 
			
		||||
                # "extraname": "dontoverwrite!",
 | 
			
		||||
            },
 | 
			
		||||
        }
 | 
			
		||||
        resp_body = {
 | 
			
		||||
 
 | 
			
		||||
@@ -87,7 +87,7 @@ def do_user_get(kc, args):
 | 
			
		||||
@utils.arg('--enabled', metavar='<true|false>', default=True,
 | 
			
		||||
           help='Initial user enabled status. Default is true.')
 | 
			
		||||
def do_user_create(kc, args):
 | 
			
		||||
    """Create new user"""
 | 
			
		||||
    """Create new user."""
 | 
			
		||||
    if args.tenant:
 | 
			
		||||
        tenant_id = utils.find_resource(kc.tenants, args.tenant).id
 | 
			
		||||
    elif args.tenant_id:
 | 
			
		||||
 
 | 
			
		||||
@@ -81,7 +81,7 @@ class TenantManager(base.ManagerWithFind):
 | 
			
		||||
                             "description": description,
 | 
			
		||||
                             "enabled": enabled}}
 | 
			
		||||
 | 
			
		||||
        #Allow Extras Passthru and ensure we don't clobber primary arguments.
 | 
			
		||||
        # Allow Extras Passthru and ensure we don't clobber primary arguments.
 | 
			
		||||
        for k, v in six.iteritems(kwargs):
 | 
			
		||||
            if k not in params['tenant']:
 | 
			
		||||
                params['tenant'][k] = v
 | 
			
		||||
@@ -131,7 +131,7 @@ class TenantManager(base.ManagerWithFind):
 | 
			
		||||
        if description is not None:
 | 
			
		||||
            body['tenant']['description'] = description
 | 
			
		||||
 | 
			
		||||
        #Allow Extras Passthru and ensure we don't clobber primary arguments.
 | 
			
		||||
        # Allow Extras Passthru and ensure we don't clobber primary arguments.
 | 
			
		||||
        for k, v in six.iteritems(kwargs):
 | 
			
		||||
            if k not in body['tenant']:
 | 
			
		||||
                body['tenant'][k] = v
 | 
			
		||||
 
 | 
			
		||||
@@ -20,7 +20,7 @@ from keystoneclient import base
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
class User(base.Resource):
 | 
			
		||||
    """Represents a Keystone user"""
 | 
			
		||||
    """Represents a Keystone user."""
 | 
			
		||||
    def __repr__(self):
 | 
			
		||||
        return "<User %s>" % self._info
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										4
									
								
								tox.ini
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								tox.ini
									
									
									
									
									
								
							@@ -36,7 +36,9 @@ commands =
 | 
			
		||||
# F821: undefined name
 | 
			
		||||
# H304: no relative imports
 | 
			
		||||
# H803  Commit message should not end with a period (do not remove per list discussion)
 | 
			
		||||
ignore = F821,H304,H803
 | 
			
		||||
# H405: multi line docstring summary not separated with an empty line
 | 
			
		||||
# E122: continuation line missing indentation or outdented
 | 
			
		||||
ignore = F821,H304,H803,H405,E122
 | 
			
		||||
show-source = True
 | 
			
		||||
exclude = .venv,.tox,dist,doc,*egg,build,*openstack/common*
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user