diff --git a/openstackclient/identity/client.py b/openstackclient/identity/client.py index 0292aac21..5ed81e580 100644 --- a/openstackclient/identity/client.py +++ b/openstackclient/identity/client.py @@ -43,18 +43,15 @@ AUTH_VERSIONS = { def make_client(instance): """Returns an identity service client.""" identity_client = utils.get_client_class( - API_NAME, - instance._api_version[API_NAME], - API_VERSIONS) + API_NAME, instance._api_version[API_NAME], API_VERSIONS + ) LOG.debug('Instantiating identity client: %s', identity_client) # Remember interface only if interface is set kwargs = utils.build_kwargs_dict('interface', instance.interface) client = identity_client( - session=instance.session, - region_name=instance.region_name, - **kwargs + session=instance.session, region_name=instance.region_name, **kwargs ) return client @@ -66,8 +63,11 @@ def build_option_parser(parser): '--os-identity-api-version', metavar='', default=utils.env('OS_IDENTITY_API_VERSION'), - help=_('Identity API version, default=%s ' - '(Env: OS_IDENTITY_API_VERSION)') % DEFAULT_API_VERSION, + help=_( + 'Identity API version, default=%s ' + '(Env: OS_IDENTITY_API_VERSION)' + ) + % DEFAULT_API_VERSION, ) return parser diff --git a/openstackclient/identity/common.py b/openstackclient/identity/common.py index a75db4f8d..745ffb2b0 100644 --- a/openstackclient/identity/common.py +++ b/openstackclient/identity/common.py @@ -33,7 +33,8 @@ def find_service_in_list(service_list, service_id): if service.id == service_id: return service raise exceptions.CommandError( - "No service with a type, name or ID of '%s' exists." % service_id) + "No service with a type, name or ID of '%s' exists." % service_id + ) def find_service(identity_client, name_type_or_id): @@ -52,8 +53,10 @@ def find_service(identity_client, name_type_or_id): except identity_exc.NotFound: pass except identity_exc.NoUniqueMatch: - msg = _("Multiple service matches found for '%s', " - "use an ID to be more specific.") + msg = _( + "Multiple service matches found for '%s', " + "use an ID to be more specific." + ) raise exceptions.CommandError(msg % name_type_or_id) try: @@ -63,8 +66,10 @@ def find_service(identity_client, name_type_or_id): msg = _("No service with a type, name or ID of '%s' exists.") raise exceptions.CommandError(msg % name_type_or_id) except identity_exc.NoUniqueMatch: - msg = _("Multiple service matches found for '%s', " - "use an ID to be more specific.") + msg = _( + "Multiple service matches found for '%s', " + "use an ID to be more specific." + ) raise exceptions.CommandError(msg % name_type_or_id) @@ -141,42 +146,56 @@ def _get_domain_id_if_requested(identity_client, domain_name_or_id): def find_domain(identity_client, name_or_id): - return _find_identity_resource(identity_client.domains, name_or_id, - domains.Domain) + return _find_identity_resource( + identity_client.domains, name_or_id, domains.Domain + ) def find_group(identity_client, name_or_id, domain_name_or_id=None): domain_id = _get_domain_id_if_requested(identity_client, domain_name_or_id) if not domain_id: - return _find_identity_resource(identity_client.groups, name_or_id, - groups.Group) + return _find_identity_resource( + identity_client.groups, name_or_id, groups.Group + ) else: - return _find_identity_resource(identity_client.groups, name_or_id, - groups.Group, domain_id=domain_id) + return _find_identity_resource( + identity_client.groups, + name_or_id, + groups.Group, + domain_id=domain_id, + ) def find_project(identity_client, name_or_id, domain_name_or_id=None): domain_id = _get_domain_id_if_requested(identity_client, domain_name_or_id) if not domain_id: - return _find_identity_resource(identity_client.projects, name_or_id, - projects.Project) + return _find_identity_resource( + identity_client.projects, name_or_id, projects.Project + ) else: - return _find_identity_resource(identity_client.projects, name_or_id, - projects.Project, domain_id=domain_id) + return _find_identity_resource( + identity_client.projects, + name_or_id, + projects.Project, + domain_id=domain_id, + ) def find_user(identity_client, name_or_id, domain_name_or_id=None): domain_id = _get_domain_id_if_requested(identity_client, domain_name_or_id) if not domain_id: - return _find_identity_resource(identity_client.users, name_or_id, - users.User) + return _find_identity_resource( + identity_client.users, name_or_id, users.User + ) else: - return _find_identity_resource(identity_client.users, name_or_id, - users.User, domain_id=domain_id) + return _find_identity_resource( + identity_client.users, name_or_id, users.User, domain_id=domain_id + ) -def _find_identity_resource(identity_client_manager, name_or_id, - resource_type, **kwargs): +def _find_identity_resource( + identity_client_manager, name_or_id, resource_type, **kwargs +): """Find a specific identity resource. Using keystoneclient's manager, attempt to find a specific resource by its @@ -203,8 +222,9 @@ def _find_identity_resource(identity_client_manager, name_or_id, """ try: - identity_resource = utils.find_resource(identity_client_manager, - name_or_id, **kwargs) + identity_resource = utils.find_resource( + identity_client_manager, name_or_id, **kwargs + ) if identity_resource is not None: return identity_resource except (exceptions.Forbidden, identity_exc.Forbidden): @@ -226,9 +246,11 @@ def add_user_domain_option_to_parser(parser): parser.add_argument( '--user-domain', metavar='', - help=_('Domain the user belongs to (name or ID). ' - 'This can be used in case collisions between user names ' - 'exist.'), + help=_( + 'Domain the user belongs to (name or ID). ' + 'This can be used in case collisions between user names ' + 'exist.' + ), ) @@ -236,9 +258,11 @@ def add_group_domain_option_to_parser(parser): parser.add_argument( '--group-domain', metavar='', - help=_('Domain the group belongs to (name or ID). ' - 'This can be used in case collisions between group names ' - 'exist.'), + help=_( + 'Domain the group belongs to (name or ID). ' + 'This can be used in case collisions between group names ' + 'exist.' + ), ) @@ -246,9 +270,13 @@ def add_project_domain_option_to_parser(parser, enhance_help=lambda _h: _h): parser.add_argument( '--project-domain', metavar='', - help=enhance_help(_('Domain the project belongs to (name or ID). This ' - 'can be used in case collisions between project ' - 'names exist.')), + help=enhance_help( + _( + 'Domain the project belongs to (name or ID). This ' + 'can be used in case collisions between project ' + 'names exist.' + ) + ), ) @@ -256,9 +284,11 @@ def add_role_domain_option_to_parser(parser): parser.add_argument( '--role-domain', metavar='', - help=_('Domain the role belongs to (name or ID). ' - 'This must be specified when the name of a domain specific ' - 'role is used.'), + help=_( + 'Domain the role belongs to (name or ID). ' + 'This must be specified when the name of a domain specific ' + 'role is used.' + ), ) @@ -267,8 +297,9 @@ def add_inherited_option_to_parser(parser): '--inherited', action='store_true', default=False, - help=_('Specifies if the role grant is inheritable to the sub ' - 'projects'), + help=_( + 'Specifies if the role grant is inheritable to the sub ' 'projects' + ), ) @@ -277,8 +308,10 @@ def add_resource_option_to_parser(parser): enable_group.add_argument( '--immutable', action='store_true', - help=_('Make resource immutable. An immutable project may not ' - 'be deleted or modified except to remove the immutable flag'), + help=_( + 'Make resource immutable. An immutable project may not ' + 'be deleted or modified except to remove the immutable flag' + ), ) enable_group.add_argument( '--no-immutable', diff --git a/openstackclient/identity/v2_0/catalog.py b/openstackclient/identity/v2_0/catalog.py index 05d0e9aeb..bea97cce5 100644 --- a/openstackclient/identity/v2_0/catalog.py +++ b/openstackclient/identity/v2_0/catalog.py @@ -47,7 +47,6 @@ class ListCatalog(command.Lister): _description = _("List services in the service catalog") def take_action(self, parsed_args): - # Trigger auth if it has not happened yet auth_ref = self.app.client_manager.auth_ref if not auth_ref: @@ -57,13 +56,19 @@ class ListCatalog(command.Lister): data = auth_ref.service_catalog.catalog columns = ('Name', 'Type', 'Endpoints') - return (columns, - (utils.get_dict_properties( - s, columns, + return ( + columns, + ( + utils.get_dict_properties( + s, + columns, formatters={ 'Endpoints': EndpointsColumn, }, - ) for s in data)) + ) + for s in data + ), + ) class ShowCatalog(command.ShowOne): @@ -79,7 +84,6 @@ class ShowCatalog(command.ShowOne): return parser def take_action(self, parsed_args): - # Trigger auth if it has not happened yet auth_ref = self.app.client_manager.auth_ref if not auth_ref: @@ -89,8 +93,10 @@ class ShowCatalog(command.ShowOne): data = None for service in auth_ref.service_catalog.catalog: - if (service.get('name') == parsed_args.service or - service.get('type') == parsed_args.service): + if ( + service.get('name') == parsed_args.service + or service.get('type') == parsed_args.service + ): data = service.copy() data['endpoints'] = EndpointsColumn(data['endpoints']) if 'endpoints_links' in data: diff --git a/openstackclient/identity/v2_0/ec2creds.py b/openstackclient/identity/v2_0/ec2creds.py index f712bf458..94d683303 100644 --- a/openstackclient/identity/v2_0/ec2creds.py +++ b/openstackclient/identity/v2_0/ec2creds.py @@ -77,9 +77,7 @@ class CreateEC2Creds(command.ShowOne): info.update(creds._info) if 'tenant_id' in info: - info.update( - {'project_id': info.pop('tenant_id')} - ) + info.update({'project_id': info.pop('tenant_id')}) return zip(*sorted(info.items())) @@ -120,14 +118,19 @@ class DeleteEC2Creds(command.Command): identity_client.ec2.delete(user, access_key) except Exception as e: result += 1 - LOG.error(_("Failed to delete EC2 credentials with " - "access key '%(access_key)s': %(e)s"), - {'access_key': access_key, 'e': e}) + LOG.error( + _( + "Failed to delete EC2 credentials with " + "access key '%(access_key)s': %(e)s" + ), + {'access_key': access_key, 'e': e}, + ) if result > 0: total = len(parsed_args.access_keys) - msg = (_("%(result)s of %(total)s EC2 keys failed " - "to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s EC2 keys failed " "to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -159,11 +162,17 @@ class ListEC2Creds(command.Lister): column_headers = ('Access', 'Secret', 'Project ID', 'User ID') data = identity_client.ec2.list(user) - return (column_headers, - (utils.get_item_properties( - s, columns, + return ( + column_headers, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class ShowEC2Creds(command.ShowOne): @@ -201,8 +210,6 @@ class ShowEC2Creds(command.ShowOne): info.update(creds._info) if 'tenant_id' in info: - info.update( - {'project_id': info.pop('tenant_id')} - ) + info.update({'project_id': info.pop('tenant_id')}) return zip(*sorted(info.items())) diff --git a/openstackclient/identity/v2_0/endpoint.py b/openstackclient/identity/v2_0/endpoint.py index 57906ddff..2b9970a6a 100644 --- a/openstackclient/identity/v2_0/endpoint.py +++ b/openstackclient/identity/v2_0/endpoint.py @@ -69,7 +69,8 @@ class CreateEndpoint(command.ShowOne): service.id, parsed_args.publicurl, parsed_args.adminurl, - parsed_args.internalurl,) + parsed_args.internalurl, + ) info = {} info.update(endpoint._info) @@ -100,14 +101,19 @@ class DeleteEndpoint(command.Command): identity_client.endpoints.delete(endpoint) except Exception as e: result += 1 - LOG.error(_("Failed to delete endpoint with " - "ID '%(endpoint)s': %(e)s"), - {'endpoint': endpoint, 'e': e}) + LOG.error( + _( + "Failed to delete endpoint with " + "ID '%(endpoint)s': %(e)s" + ), + {'endpoint': endpoint, 'e': e}, + ) if result > 0: total = len(parsed_args.endpoints) - msg = (_("%(result)s of %(total)s endpoints failed " - "to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s endpoints failed " "to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -127,8 +133,15 @@ class ListEndpoint(command.Lister): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity if parsed_args.long: - columns = ('ID', 'Region', 'Service Name', 'Service Type', - 'PublicURL', 'AdminURL', 'InternalURL') + columns = ( + 'ID', + 'Region', + 'Service Name', + 'Service Type', + 'PublicURL', + 'AdminURL', + 'InternalURL', + ) else: columns = ('ID', 'Region', 'Service Name', 'Service Type') data = identity_client.endpoints.list() @@ -137,11 +150,17 @@ class ListEndpoint(command.Lister): service = common.find_service(identity_client, ep.service_id) ep.service_name = service.name ep.service_type = service.type - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class ShowEndpoint(command.ShowOne): @@ -152,8 +171,10 @@ class ShowEndpoint(command.ShowOne): parser.add_argument( 'endpoint_or_service', metavar='', - help=_('Endpoint to display (endpoint ID, service ID,' - ' service name, service type)'), + help=_( + 'Endpoint to display (endpoint ID, service ID,' + ' service name, service type)' + ), ) return parser @@ -166,8 +187,9 @@ class ShowEndpoint(command.ShowOne): match = ep service = common.find_service(identity_client, ep.service_id) if match is None: - service = common.find_service(identity_client, - parsed_args.endpoint_or_service) + service = common.find_service( + identity_client, parsed_args.endpoint_or_service + ) for ep in data: if ep.service_id == service.id: match = ep diff --git a/openstackclient/identity/v2_0/project.py b/openstackclient/identity/v2_0/project.py index f431c0214..e2f378db7 100644 --- a/openstackclient/identity/v2_0/project.py +++ b/openstackclient/identity/v2_0/project.py @@ -60,8 +60,10 @@ class CreateProject(command.ShowOne): '--property', metavar='', action=parseractions.KeyValueAction, - help=_('Add a property to ' - '(repeat option to set multiple properties)'), + help=_( + 'Add a property to ' + '(repeat option to set multiple properties)' + ), ) parser.add_argument( '--or-show', @@ -128,14 +130,19 @@ class DeleteProject(command.Command): identity_client.tenants.delete(project_obj.id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete project with " - "name or ID '%(project)s': %(e)s"), - {'project': project, 'e': e}) + LOG.error( + _( + "Failed to delete project with " + "name or ID '%(project)s': %(e)s" + ), + {'project': project, 'e': e}, + ) if errors > 0: total = len(parsed_args.projects) - msg = (_("%(errors)s of %(total)s projects failed " - "to delete.") % {'errors': errors, 'total': total}) + msg = _( + "%(errors)s of %(total)s projects failed " "to delete." + ) % {'errors': errors, 'total': total} raise exceptions.CommandError(msg) @@ -153,9 +160,11 @@ class ListProject(command.Lister): parser.add_argument( '--sort', metavar='[:]', - help=_('Sort output by selected keys and directions (asc or desc) ' - '(default: asc), repeat this option to specify multiple ' - 'keys and directions.'), + help=_( + 'Sort output by selected keys and directions (asc or desc) ' + '(default: asc), repeat this option to specify multiple ' + 'keys and directions.' + ), ) return parser @@ -167,11 +176,17 @@ class ListProject(command.Lister): data = self.app.client_manager.identity.tenants.list() if parsed_args.sort: data = utils.sort_items(data, parsed_args.sort) - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class SetProject(command.Command): @@ -209,8 +224,10 @@ class SetProject(command.Command): '--property', metavar='', action=parseractions.KeyValueAction, - help=_('Set a project property ' - '(repeat option to set multiple properties)'), + help=_( + 'Set a project property ' + '(repeat option to set multiple properties)' + ), ) return parser @@ -268,8 +285,8 @@ class ShowProject(command.ShowOne): except ks_exc.Forbidden: auth_ref = self.app.client_manager.auth_ref if ( - parsed_args.project == auth_ref.project_id or - parsed_args.project == auth_ref.project_name + parsed_args.project == auth_ref.project_id + or parsed_args.project == auth_ref.project_name ): # Ask for currently auth'ed project so return it info = { @@ -316,8 +333,10 @@ class UnsetProject(command.Command): metavar='', action='append', default=[], - help=_('Unset a project property ' - '(repeat option to unset multiple properties)'), + help=_( + 'Unset a project property ' + '(repeat option to unset multiple properties)' + ), ) return parser diff --git a/openstackclient/identity/v2_0/role.py b/openstackclient/identity/v2_0/role.py index 5c53fbcd5..931957bd5 100644 --- a/openstackclient/identity/v2_0/role.py +++ b/openstackclient/identity/v2_0/role.py @@ -133,14 +133,20 @@ class DeleteRole(command.Command): identity_client.roles.delete(role_obj.id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete role with " - "name or ID '%(role)s': %(e)s"), - {'role': role, 'e': e}) + LOG.error( + _( + "Failed to delete role with " + "name or ID '%(role)s': %(e)s" + ), + {'role': role, 'e': e}, + ) if errors > 0: total = len(parsed_args.roles) - msg = (_("%(errors)s of %(total)s roles failed " - "to delete.") % {'errors': errors, 'total': total}) + msg = _("%(errors)s of %(total)s roles failed " "to delete.") % { + 'errors': errors, + 'total': total, + } raise exceptions.CommandError(msg) @@ -153,11 +159,17 @@ class ListRole(command.Lister): columns = ('ID', 'Name') data = identity_client.roles.list() - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class RemoveRole(command.Command): @@ -192,10 +204,7 @@ class RemoveRole(command.Command): parsed_args.project, ) user = utils.find_resource(identity_client.users, parsed_args.user) - identity_client.roles.remove_user_role( - user.id, - role.id, - project.id) + identity_client.roles.remove_user_role(user.id, role.id, project.id) class ShowRole(command.ShowOne): diff --git a/openstackclient/identity/v2_0/role_assignment.py b/openstackclient/identity/v2_0/role_assignment.py index 8236bbfc6..c3d492e27 100644 --- a/openstackclient/identity/v2_0/role_assignment.py +++ b/openstackclient/identity/v2_0/role_assignment.py @@ -51,7 +51,7 @@ class ListRoleAssignment(command.Lister): action="store_true", dest='authproject', help='Only list assignments for the project to which the ' - 'authenticated user\'s token is scoped', + 'authenticated user\'s token is scoped', ) return parser @@ -70,8 +70,7 @@ class ListRoleAssignment(command.Lister): elif parsed_args.authuser: if auth_ref: user = utils.find_resource( - identity_client.users, - auth_ref.user_id + identity_client.users, auth_ref.user_id ) project = None @@ -83,8 +82,7 @@ class ListRoleAssignment(command.Lister): elif parsed_args.authproject: if auth_ref: project = utils.find_resource( - identity_client.projects, - auth_ref.project_id + identity_client.projects, auth_ref.project_id ) # If user or project is not specified, we would ideally list all @@ -107,8 +105,14 @@ class ListRoleAssignment(command.Lister): user_role.user = user.id user_role.project = project.id - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) diff --git a/openstackclient/identity/v2_0/service.py b/openstackclient/identity/v2_0/service.py index afc0b3d7a..15203e694 100644 --- a/openstackclient/identity/v2_0/service.py +++ b/openstackclient/identity/v2_0/service.py @@ -90,14 +90,19 @@ class DeleteService(command.Command): identity_client.services.delete(service.id) except Exception as e: result += 1 - LOG.error(_("Failed to delete service with " - "name or ID '%(service)s': %(e)s"), - {'service': service, 'e': e}) + LOG.error( + _( + "Failed to delete service with " + "name or ID '%(service)s': %(e)s" + ), + {'service': service, 'e': e}, + ) if result > 0: total = len(parsed_args.services) - msg = (_("%(result)s of %(total)s services failed " - "to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s services failed " "to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -115,7 +120,6 @@ class ListService(command.Lister): return parser def take_action(self, parsed_args): - if parsed_args.long: columns = ('ID', 'Name', 'Type', 'Description') else: @@ -151,15 +155,17 @@ class ShowService(command.ShowOne): if parsed_args.catalog: endpoints = auth_ref.service_catalog.get_endpoints( - service_type=parsed_args.service) - for (service, service_endpoints) in endpoints.items(): + service_type=parsed_args.service + ) + for service, service_endpoints in endpoints.items(): if service_endpoints: info = {"type": service} info.update(service_endpoints[0]) return zip(*sorted(info.items())) - msg = _("No service catalog with a type, name or ID of '%s' " - "exists.") % (parsed_args.service) + msg = _( + "No service catalog with a type, name or ID of '%s' " "exists." + ) % (parsed_args.service) raise exceptions.CommandError(msg) else: service = common.find_service(identity_client, parsed_args.service) diff --git a/openstackclient/identity/v2_0/token.py b/openstackclient/identity/v2_0/token.py index 205e15d30..8759df8d9 100644 --- a/openstackclient/identity/v2_0/token.py +++ b/openstackclient/identity/v2_0/token.py @@ -35,7 +35,8 @@ class IssueToken(command.ShowOne): auth_ref = self.app.client_manager.auth_ref if not auth_ref: raise exceptions.AuthorizationFailure( - "Only an authorized user may issue a new token.") + "Only an authorized user may issue a new token." + ) data = {} if auth_ref.auth_token: diff --git a/openstackclient/identity/v2_0/user.py b/openstackclient/identity/v2_0/user.py index 8dac093ef..7bcbc4515 100644 --- a/openstackclient/identity/v2_0/user.py +++ b/openstackclient/identity/v2_0/user.py @@ -122,8 +122,12 @@ class CreateUser(command.ShowOne): parsed_args.password = utils.get_password(self.app.stdin) if not parsed_args.password: - LOG.warning(_("No password was supplied, authentication will fail " - "when a user does not have a password.")) + LOG.warning( + _( + "No password was supplied, authentication will fail " + "when a user does not have a password." + ) + ) try: user = identity_client.users.create( @@ -147,9 +151,7 @@ class CreateUser(command.ShowOne): # the returned resource has 'tenantId'. Sigh. # We're using project_id now inside OSC so there. if 'tenantId' in user._info: - user._info.update( - {'project_id': user._info.pop('tenantId')} - ) + user._info.update({'project_id': user._info.pop('tenantId')}) info = {} info.update(user._info) @@ -182,14 +184,20 @@ class DeleteUser(command.Command): identity_client.users.delete(user_obj.id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete user with " - "name or ID '%(user)s': %(e)s"), - {'user': user, 'e': e}) + LOG.error( + _( + "Failed to delete user with " + "name or ID '%(user)s': %(e)s" + ), + {'user': user, 'e': e}, + ) if errors > 0: total = len(parsed_args.users) - msg = (_("%(errors)s of %(total)s users failed " - "to delete.") % {'errors': errors, 'total': total}) + msg = _("%(errors)s of %(total)s users failed " "to delete.") % { + 'errors': errors, + 'total': total, + } raise exceptions.CommandError(msg) @@ -246,7 +254,8 @@ class ListUser(command.Lister): # Just forget it if there's any trouble pass formatters['tenantId'] = functools.partial( - ProjectColumn, project_cache=project_cache) + ProjectColumn, project_cache=project_cache + ) else: columns = column_headers = ('ID', 'Name') data = identity_client.users.list(tenant_id=project) @@ -267,12 +276,18 @@ class ListUser(command.Lister): d._info['tenantId'] = d._info.pop('tenant_id') d._add_details(d._info) - return (column_headers, - (utils.get_item_properties( - s, columns, + return ( + column_headers, + ( + utils.get_item_properties( + s, + columns, mixed_case_fields=('tenantId',), formatters=formatters, - ) for s in data)) + ) + for s in data + ), + ) class SetUser(command.Command): @@ -331,8 +346,12 @@ class SetUser(command.Command): parsed_args.password = utils.get_password(self.app.stdin) if '' == parsed_args.password: - LOG.warning(_("No password was supplied, authentication will fail " - "when a user does not have a password.")) + LOG.warning( + _( + "No password was supplied, authentication will fail " + "when a user does not have a password." + ) + ) user = utils.find_resource( identity_client.users, @@ -394,8 +413,8 @@ class ShowUser(command.ShowOne): except ks_exc.Forbidden: auth_ref = self.app.client_manager.auth_ref if ( - parsed_args.user == auth_ref.user_id or - parsed_args.user == auth_ref.username + parsed_args.user == auth_ref.user_id + or parsed_args.user == auth_ref.username ): # Ask for currently auth'ed project so return it info = { @@ -409,12 +428,8 @@ class ShowUser(command.ShowOne): raise if 'tenantId' in info: - info.update( - {'project_id': info.pop('tenantId')} - ) + info.update({'project_id': info.pop('tenantId')}) if 'tenant_id' in info: - info.update( - {'project_id': info.pop('tenant_id')} - ) + info.update({'project_id': info.pop('tenant_id')}) return zip(*sorted(info.items())) diff --git a/openstackclient/identity/v3/access_rule.py b/openstackclient/identity/v3/access_rule.py index ffda04f9e..5eff39c77 100644 --- a/openstackclient/identity/v3/access_rule.py +++ b/openstackclient/identity/v3/access_rule.py @@ -48,18 +48,24 @@ class DeleteAccessRule(command.Command): for ac in parsed_args.access_rule: try: access_rule = utils.find_resource( - identity_client.access_rules, ac) + identity_client.access_rules, ac + ) identity_client.access_rules.delete(access_rule.id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete access rule with " - "ID '%(ac)s': %(e)s"), - {'ac': ac, 'e': e}) + LOG.error( + _( + "Failed to delete access rule with " + "ID '%(ac)s': %(e)s" + ), + {'ac': ac, 'e': e}, + ) if errors > 0: total = len(parsed_args.access_rule) - msg = (_("%(errors)s of %(total)s access rules failed " - "to delete.") % {'errors': errors, 'total': total}) + msg = _( + "%(errors)s of %(total)s access rules failed " "to delete." + ) % {'errors': errors, 'total': total} raise exceptions.CommandError(msg) @@ -79,20 +85,25 @@ class ListAccessRule(command.Lister): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity if parsed_args.user: - user_id = common.find_user(identity_client, - parsed_args.user, - parsed_args.user_domain).id + user_id = common.find_user( + identity_client, parsed_args.user, parsed_args.user_domain + ).id else: user_id = None columns = ('ID', 'Service', 'Method', 'Path') - data = identity_client.access_rules.list( - user=user_id) - return (columns, - (utils.get_item_properties( - s, columns, + data = identity_client.access_rules.list(user=user_id) + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class ShowAccessRule(command.ShowOne): @@ -109,8 +120,9 @@ class ShowAccessRule(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - access_rule = utils.find_resource(identity_client.access_rules, - parsed_args.access_rule) + access_rule = utils.find_resource( + identity_client.access_rules, parsed_args.access_rule + ) access_rule._info.pop('links', None) diff --git a/openstackclient/identity/v3/application_credential.py b/openstackclient/identity/v3/application_credential.py index a20898562..c75de3a46 100644 --- a/openstackclient/identity/v3/application_credential.py +++ b/openstackclient/identity/v3/application_credential.py @@ -43,23 +43,29 @@ class CreateApplicationCredential(command.ShowOne): parser.add_argument( '--secret', metavar='', - help=_('Secret to use for authentication (if not provided, one' - ' will be generated)'), + help=_( + 'Secret to use for authentication (if not provided, one' + ' will be generated)' + ), ) parser.add_argument( '--role', metavar='', action='append', default=[], - help=_('Roles to authorize (name or ID) (repeat option to set' - ' multiple values)'), + help=_( + 'Roles to authorize (name or ID) (repeat option to set' + ' multiple values)' + ), ) parser.add_argument( '--expiration', metavar='', - help=_('Sets an expiration date for the application credential,' - ' format of YYYY-mm-ddTHH:MM:SS (if not provided, the' - ' application credential will not expire)'), + help=_( + 'Sets an expiration date for the application credential,' + ' format of YYYY-mm-ddTHH:MM:SS (if not provided, the' + ' application credential will not expire)' + ), ) parser.add_argument( '--description', @@ -69,27 +75,32 @@ class CreateApplicationCredential(command.ShowOne): parser.add_argument( '--unrestricted', action="store_true", - help=_('Enable application credential to create and delete other' - ' application credentials and trusts (this is potentially' - ' dangerous behavior and is disabled by default)'), + help=_( + 'Enable application credential to create and delete other' + ' application credentials and trusts (this is potentially' + ' dangerous behavior and is disabled by default)' + ), ) parser.add_argument( '--restricted', action="store_true", - help=_('Prohibit application credential from creating and deleting' - ' other application credentials and trusts (this is the' - ' default behavior)'), + help=_( + 'Prohibit application credential from creating and deleting' + ' other application credentials and trusts (this is the' + ' default behavior)' + ), ) parser.add_argument( '--access-rules', metavar='', - help=_('Either a string or file path containing a JSON-formatted ' - 'list of access rules, each containing a request method, ' - 'path, and service, for example ' - '\'[{"method": "GET", ' - '"path": "/v2.1/servers", ' - '"service": "compute"}]\''), - + help=_( + 'Either a string or file path containing a JSON-formatted ' + 'list of access rules, each containing a request method, ' + 'path, and service, for example ' + '\'[{"method": "GET", ' + '"path": "/v2.1/servers", ' + '"service": "compute"}]\'' + ), ) return parser @@ -103,14 +114,16 @@ class CreateApplicationCredential(command.ShowOne): # which they are currently scoped with a subset of the role # assignments they have on that project. Don't bother trying to # look up roles via keystone, just introspect the token. - role_id = common._get_token_resource(identity_client, "roles", - role) + role_id = common._get_token_resource( + identity_client, "roles", role + ) role_ids.append(role_id) expires_at = None if parsed_args.expiration: - expires_at = datetime.datetime.strptime(parsed_args.expiration, - '%Y-%m-%dT%H:%M:%S') + expires_at = datetime.datetime.strptime( + parsed_args.expiration, '%Y-%m-%dT%H:%M:%S' + ) if parsed_args.restricted: unrestricted = False @@ -125,9 +138,11 @@ class CreateApplicationCredential(command.ShowOne): with open(parsed_args.access_rules) as f: access_rules = json.load(f) except IOError: - raise exceptions.CommandError( - _("Access rules is not valid JSON string or file does" - " not exist.")) + msg = _( + "Access rules is not valid JSON string or file does" + " not exist." + ) + raise exceptions.CommandError(msg) else: access_rules = None @@ -172,18 +187,25 @@ class DeleteApplicationCredential(command.Command): for ac in parsed_args.application_credential: try: app_cred = utils.find_resource( - identity_client.application_credentials, ac) + identity_client.application_credentials, ac + ) identity_client.application_credentials.delete(app_cred.id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete application credential with " - "name or ID '%(ac)s': %(e)s"), - {'ac': ac, 'e': e}) + LOG.error( + _( + "Failed to delete application credential with " + "name or ID '%(ac)s': %(e)s" + ), + {'ac': ac, 'e': e}, + ) if errors > 0: total = len(parsed_args.application_credential) - msg = (_("%(errors)s of %(total)s application credentials failed " - "to delete.") % {'errors': errors, 'total': total}) + msg = _( + "%(errors)s of %(total)s application credentials failed " + "to delete." + ) % {'errors': errors, 'total': total} raise exceptions.CommandError(msg) @@ -203,20 +225,25 @@ class ListApplicationCredential(command.Lister): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity if parsed_args.user: - user_id = common.find_user(identity_client, - parsed_args.user, - parsed_args.user_domain).id + user_id = common.find_user( + identity_client, parsed_args.user, parsed_args.user_domain + ).id else: user_id = None columns = ('ID', 'Name', 'Project ID', 'Description', 'Expires At') - data = identity_client.application_credentials.list( - user=user_id) - return (columns, - (utils.get_item_properties( - s, columns, + data = identity_client.application_credentials.list(user=user_id) + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class ShowApplicationCredential(command.ShowOne): @@ -233,8 +260,10 @@ class ShowApplicationCredential(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - app_cred = utils.find_resource(identity_client.application_credentials, - parsed_args.application_credential) + app_cred = utils.find_resource( + identity_client.application_credentials, + parsed_args.application_credential, + ) app_cred._info.pop('links', None) diff --git a/openstackclient/identity/v3/catalog.py b/openstackclient/identity/v3/catalog.py index d1f7d3190..a5c2ee47f 100644 --- a/openstackclient/identity/v3/catalog.py +++ b/openstackclient/identity/v3/catalog.py @@ -42,7 +42,6 @@ class ListCatalog(command.Lister): _description = _("List services in the service catalog") def take_action(self, parsed_args): - # Trigger auth if it has not happened yet auth_ref = self.app.client_manager.auth_ref if not auth_ref: @@ -52,13 +51,19 @@ class ListCatalog(command.Lister): data = auth_ref.service_catalog.catalog columns = ('Name', 'Type', 'Endpoints') - return (columns, - (utils.get_dict_properties( - s, columns, + return ( + columns, + ( + utils.get_dict_properties( + s, + columns, formatters={ 'Endpoints': EndpointsColumn, }, - ) for s in data)) + ) + for s in data + ), + ) class ShowCatalog(command.ShowOne): @@ -74,7 +79,6 @@ class ShowCatalog(command.ShowOne): return parser def take_action(self, parsed_args): - # Trigger auth if it has not happened yet auth_ref = self.app.client_manager.auth_ref if not auth_ref: @@ -84,8 +88,10 @@ class ShowCatalog(command.ShowOne): data = None for service in auth_ref.service_catalog.catalog: - if (service.get('name') == parsed_args.service or - service.get('type') == parsed_args.service): + if ( + service.get('name') == parsed_args.service + or service.get('type') == parsed_args.service + ): data = dict(service) data['endpoints'] = EndpointsColumn(data['endpoints']) if 'links' in data: diff --git a/openstackclient/identity/v3/consumer.py b/openstackclient/identity/v3/consumer.py index 2f925aba8..c40c98868 100644 --- a/openstackclient/identity/v3/consumer.py +++ b/openstackclient/identity/v3/consumer.py @@ -67,17 +67,24 @@ class DeleteConsumer(command.Command): for i in parsed_args.consumer: try: consumer = utils.find_resource( - identity_client.oauth1.consumers, i) + identity_client.oauth1.consumers, i + ) identity_client.oauth1.consumers.delete(consumer.id) except Exception as e: result += 1 - LOG.error(_("Failed to delete consumer with name or " - "ID '%(consumer)s': %(e)s"), {'consumer': i, 'e': e}) + LOG.error( + _( + "Failed to delete consumer with name or " + "ID '%(consumer)s': %(e)s" + ), + {'consumer': i, 'e': e}, + ) if result > 0: total = len(parsed_args.consumer) - msg = (_("%(result)s of %(total)s consumers failed " - "to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s consumers failed " "to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -87,11 +94,17 @@ class ListConsumer(command.Lister): def take_action(self, parsed_args): columns = ('ID', 'Description') data = self.app.client_manager.identity.oauth1.consumers.list() - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class SetConsumer(command.Command): @@ -114,13 +127,15 @@ class SetConsumer(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity consumer = utils.find_resource( - identity_client.oauth1.consumers, parsed_args.consumer) + identity_client.oauth1.consumers, parsed_args.consumer + ) kwargs = {} if parsed_args.description: kwargs['description'] = parsed_args.description consumer = identity_client.oauth1.consumers.update( - consumer.id, **kwargs) + consumer.id, **kwargs + ) class ShowConsumer(command.ShowOne): @@ -138,7 +153,8 @@ class ShowConsumer(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity consumer = utils.find_resource( - identity_client.oauth1.consumers, parsed_args.consumer) + identity_client.oauth1.consumers, parsed_args.consumer + ) consumer._info.pop('links', None) return zip(*sorted(consumer._info.items())) diff --git a/openstackclient/identity/v3/credential.py b/openstackclient/identity/v3/credential.py index bf48df83d..80b65befa 100644 --- a/openstackclient/identity/v3/credential.py +++ b/openstackclient/identity/v3/credential.py @@ -52,25 +52,30 @@ class CreateCredential(command.ShowOne): parser.add_argument( '--project', metavar='', - help=_('Project which limits the scope of ' - 'the credential (name or ID)'), + help=_( + 'Project which limits the scope of ' + 'the credential (name or ID)' + ), ) return parser def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - user_id = utils.find_resource(identity_client.users, - parsed_args.user).id + user_id = utils.find_resource( + identity_client.users, parsed_args.user + ).id if parsed_args.project: - project = utils.find_resource(identity_client.projects, - parsed_args.project).id + project = utils.find_resource( + identity_client.projects, parsed_args.project + ).id else: project = None credential = identity_client.credentials.create( user=user_id, type=parsed_args.type, blob=parsed_args.data, - project=project) + project=project, + ) credential._info.pop('links') return zip(*sorted(credential._info.items())) @@ -97,14 +102,19 @@ class DeleteCredential(command.Command): identity_client.credentials.delete(i) except Exception as e: result += 1 - LOG.error(_("Failed to delete credentials with " - "ID '%(credential)s': %(e)s"), - {'credential': i, 'e': e}) + LOG.error( + _( + "Failed to delete credentials with " + "ID '%(credential)s': %(e)s" + ), + {'credential': i, 'e': e}, + ) if result > 0: total = len(parsed_args.credential) - msg = (_("%(result)s of %(total)s credential failed " - "to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s credential failed " "to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -144,11 +154,17 @@ class ListCredential(command.Lister): columns = ('ID', 'Type', 'User ID', 'Blob', 'Project ID') column_headers = ('ID', 'Type', 'User ID', 'Data', 'Project ID') data = self.app.client_manager.identity.credentials.list(**kwargs) - return (column_headers, - (utils.get_item_properties( - s, columns, + return ( + column_headers, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class SetCredential(command.Command): @@ -182,28 +198,34 @@ class SetCredential(command.Command): parser.add_argument( '--project', metavar='', - help=_('Project which limits the scope of ' - 'the credential (name or ID)'), + help=_( + 'Project which limits the scope of ' + 'the credential (name or ID)' + ), ) return parser def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - user_id = utils.find_resource(identity_client.users, - parsed_args.user).id + user_id = utils.find_resource( + identity_client.users, parsed_args.user + ).id if parsed_args.project: - project = utils.find_resource(identity_client.projects, - parsed_args.project).id + project = utils.find_resource( + identity_client.projects, parsed_args.project + ).id else: project = None - identity_client.credentials.update(parsed_args.credential, - user=user_id, - type=parsed_args.type, - blob=parsed_args.data, - project=project) + identity_client.credentials.update( + parsed_args.credential, + user=user_id, + type=parsed_args.type, + blob=parsed_args.data, + project=project, + ) class ShowCredential(command.ShowOne): @@ -220,8 +242,9 @@ class ShowCredential(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - credential = utils.find_resource(identity_client.credentials, - parsed_args.credential) + credential = utils.find_resource( + identity_client.credentials, parsed_args.credential + ) credential._info.pop('links') return zip(*sorted(credential._info.items())) diff --git a/openstackclient/identity/v3/domain.py b/openstackclient/identity/v3/domain.py index e0bd10202..1fcf245c8 100644 --- a/openstackclient/identity/v3/domain.py +++ b/openstackclient/identity/v3/domain.py @@ -81,8 +81,9 @@ class CreateDomain(command.ShowOne): ) except ks_exc.Conflict: if parsed_args.or_show: - domain = utils.find_resource(identity_client.domains, - parsed_args.name) + domain = utils.find_resource( + identity_client.domains, parsed_args.name + ) LOG.info(_('Returning existing domain %s'), domain.name) else: raise @@ -113,13 +114,20 @@ class DeleteDomain(command.Command): identity_client.domains.delete(domain.id) except Exception as e: result += 1 - LOG.error(_("Failed to delete domain with name or " - "ID '%(domain)s': %(e)s"), {'domain': i, 'e': e}) + LOG.error( + _( + "Failed to delete domain with name or " + "ID '%(domain)s': %(e)s" + ), + {'domain': i, 'e': e}, + ) if result > 0: total = len(parsed_args.domain) - msg = (_("%(result)s of %(total)s domains failed " - "to delete.") % {'result': result, 'total': total}) + msg = _("%(result)s of %(total)s domains failed " "to delete.") % { + 'result': result, + 'total': total, + } raise exceptions.CommandError(msg) @@ -150,11 +158,17 @@ class ListDomain(command.Lister): columns = ('ID', 'Name', 'Enabled', 'Description') data = self.app.client_manager.identity.domains.list(**kwargs) - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class SetDomain(command.Command): @@ -193,8 +207,9 @@ class SetDomain(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - domain = utils.find_resource(identity_client.domains, - parsed_args.domain) + domain = utils.find_resource( + identity_client.domains, parsed_args.domain + ) kwargs = {} if parsed_args.name: kwargs['name'] = parsed_args.name @@ -228,11 +243,11 @@ class ShowDomain(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - domain_str = common._get_token_resource(identity_client, 'domain', - parsed_args.domain) + domain_str = common._get_token_resource( + identity_client, 'domain', parsed_args.domain + ) - domain = utils.find_resource(identity_client.domains, - domain_str) + domain = utils.find_resource(identity_client.domains, domain_str) domain._info.pop('links') return zip(*sorted(domain._info.items())) diff --git a/openstackclient/identity/v3/ec2creds.py b/openstackclient/identity/v3/ec2creds.py index 921b9168b..49bedc746 100644 --- a/openstackclient/identity/v3/ec2creds.py +++ b/openstackclient/identity/v3/ec2creds.py @@ -36,17 +36,20 @@ def _determine_ec2_user(parsed_args, client_manager): user_domain = None if parsed_args.user_domain: - user_domain = common.find_domain(client_manager.identity, - parsed_args.user_domain) + user_domain = common.find_domain( + client_manager.identity, parsed_args.user_domain + ) if parsed_args.user: if user_domain is not None: - user = utils.find_resource(client_manager.identity.users, - parsed_args.user, - domain_id=user_domain.id).id - else: user = utils.find_resource( client_manager.identity.users, - parsed_args.user).id + parsed_args.user, + domain_id=user_domain.id, + ).id + else: + user = utils.find_resource( + client_manager.identity.users, parsed_args.user + ).id else: # Get the user from the current auth user = client_manager.auth_ref.user_id @@ -61,14 +64,18 @@ class CreateEC2Creds(command.ShowOne): parser.add_argument( '--project', metavar='', - help=_('Create credentials in project ' - '(name or ID; default: current authenticated project)'), + help=_( + 'Create credentials in project ' + '(name or ID; default: current authenticated project)' + ), ) parser.add_argument( '--user', metavar='', - help=_('Create credentials for user ' - '(name or ID; default: current authenticated user)'), + help=_( + 'Create credentials for user ' + '(name or ID; default: current authenticated user)' + ), ) common.add_user_domain_option_to_parser(parser) common.add_project_domain_option_to_parser(parser) @@ -81,18 +88,21 @@ class CreateEC2Creds(command.ShowOne): project_domain = None if parsed_args.project_domain: - project_domain = common.find_domain(identity_client, - parsed_args.project_domain) + project_domain = common.find_domain( + identity_client, parsed_args.project_domain + ) if parsed_args.project: if project_domain is not None: - project = utils.find_resource(identity_client.projects, - parsed_args.project, - domain_id=project_domain.id).id - else: project = utils.find_resource( identity_client.projects, - parsed_args.project).id + parsed_args.project, + domain_id=project_domain.id, + ).id + else: + project = utils.find_resource( + identity_client.projects, parsed_args.project + ).id else: # Get the project from the current auth project = self.app.client_manager.auth_ref.project_id @@ -103,9 +113,7 @@ class CreateEC2Creds(command.ShowOne): info.update(creds._info) if 'tenant_id' in info: - info.update( - {'project_id': info.pop('tenant_id')} - ) + info.update({'project_id': info.pop('tenant_id')}) return zip(*sorted(info.items())) @@ -138,14 +146,19 @@ class DeleteEC2Creds(command.Command): client_manager.identity.ec2.delete(user, i) except Exception as e: result += 1 - LOG.error(_("Failed to delete EC2 credentials with " - "access key '%(access_key)s': %(e)s"), - {'access_key': i, 'e': e}) + LOG.error( + _( + "Failed to delete EC2 credentials with " + "access key '%(access_key)s': %(e)s" + ), + {'access_key': i, 'e': e}, + ) if result > 0: total = len(parsed_args.access_key) - msg = (_("%(result)s of %(total)s EC2 keys failed " - "to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s EC2 keys failed " "to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -170,11 +183,17 @@ class ListEC2Creds(command.Lister): column_headers = ('Access', 'Secret', 'Project ID', 'User ID') data = client_manager.identity.ec2.list(user) - return (column_headers, - (utils.get_item_properties( - s, columns, + return ( + column_headers, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class ShowEC2Creds(command.ShowOne): @@ -204,8 +223,6 @@ class ShowEC2Creds(command.ShowOne): info.update(creds._info) if 'tenant_id' in info: - info.update( - {'project_id': info.pop('tenant_id')} - ) + info.update({'project_id': info.pop('tenant_id')}) return zip(*sorted(info.items())) diff --git a/openstackclient/identity/v3/endpoint.py b/openstackclient/identity/v3/endpoint.py index a3bd2683e..7d954ce12 100644 --- a/openstackclient/identity/v3/endpoint.py +++ b/openstackclient/identity/v3/endpoint.py @@ -39,19 +39,20 @@ class AddProjectToEndpoint(command.Command): _description = _("Associate a project to an endpoint") def get_parser(self, prog_name): - parser = super( - AddProjectToEndpoint, self).get_parser(prog_name) + parser = super(AddProjectToEndpoint, self).get_parser(prog_name) parser.add_argument( 'endpoint', metavar='', - help=_('Endpoint to associate with ' - 'specified project (name or ID)'), + help=_( + 'Endpoint to associate with ' 'specified project (name or ID)' + ), ) parser.add_argument( 'project', metavar='', - help=_('Project to associate with ' - 'specified endpoint name or ID)'), + help=_( + 'Project to associate with ' 'specified endpoint name or ID)' + ), ) common.add_project_domain_option_to_parser(parser) return parser @@ -59,16 +60,15 @@ class AddProjectToEndpoint(command.Command): def take_action(self, parsed_args): client = self.app.client_manager.identity - endpoint = utils.find_resource(client.endpoints, - parsed_args.endpoint) + endpoint = utils.find_resource(client.endpoints, parsed_args.endpoint) - project = common.find_project(client, - parsed_args.project, - parsed_args.project_domain) + project = common.find_project( + client, parsed_args.project, parsed_args.project_domain + ) client.endpoint_filter.add_endpoint_to_project( - project=project.id, - endpoint=endpoint.id) + project=project.id, endpoint=endpoint.id + ) class CreateEndpoint(command.ShowOne): @@ -122,7 +122,7 @@ class CreateEndpoint(command.ShowOne): url=parsed_args.url, interface=parsed_args.interface, region=parsed_args.region, - enabled=parsed_args.enabled + enabled=parsed_args.enabled, ) info = {} @@ -152,17 +152,24 @@ class DeleteEndpoint(command.Command): for i in parsed_args.endpoint: try: endpoint_id = utils.find_resource( - identity_client.endpoints, i).id + identity_client.endpoints, i + ).id identity_client.endpoints.delete(endpoint_id) except Exception as e: result += 1 - LOG.error(_("Failed to delete endpoint with " - "ID '%(endpoint)s': %(e)s"), {'endpoint': i, 'e': e}) + LOG.error( + _( + "Failed to delete endpoint with " + "ID '%(endpoint)s': %(e)s" + ), + {'endpoint': i, 'e': e}, + ) if result > 0: total = len(parsed_args.endpoint) - msg = (_("%(result)s of %(total)s endpoints failed " - "to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s endpoints failed " "to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -206,27 +213,37 @@ class ListEndpoint(command.Lister): endpoint = None if parsed_args.endpoint: - endpoint = utils.find_resource(identity_client.endpoints, - parsed_args.endpoint) + endpoint = utils.find_resource( + identity_client.endpoints, parsed_args.endpoint + ) project = None if parsed_args.project: - project = common.find_project(identity_client, - parsed_args.project, - parsed_args.project_domain) + project = common.find_project( + identity_client, + parsed_args.project, + parsed_args.project_domain, + ) if endpoint: columns = ('ID', 'Name') - data = ( - identity_client.endpoint_filter - .list_projects_for_endpoint(endpoint=endpoint.id) + data = identity_client.endpoint_filter.list_projects_for_endpoint( + endpoint=endpoint.id ) else: - columns = ('ID', 'Region', 'Service Name', 'Service Type', - 'Enabled', 'Interface', 'URL') + columns = ( + 'ID', + 'Region', + 'Service Name', + 'Service Type', + 'Enabled', + 'Interface', + 'URL', + ) kwargs = {} if parsed_args.service: - service = common.find_service(identity_client, - parsed_args.service) + service = common.find_service( + identity_client, parsed_args.service + ) kwargs['service'] = service.id if parsed_args.interface: kwargs['interface'] = parsed_args.interface @@ -235,8 +252,9 @@ class ListEndpoint(command.Lister): if project: data = ( - identity_client.endpoint_filter - .list_endpoints_for_project(project=project.id) + identity_client.endpoint_filter.list_endpoints_for_project( + project=project.id + ) ) else: data = identity_client.endpoints.list(**kwargs) @@ -244,35 +262,43 @@ class ListEndpoint(command.Lister): service_list = identity_client.services.list() for ep in data: - service = common.find_service_in_list(service_list, - ep.service_id) + service = common.find_service_in_list( + service_list, ep.service_id + ) ep.service_name = get_service_name(service) ep.service_type = service.type - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class RemoveProjectFromEndpoint(command.Command): _description = _("Dissociate a project from an endpoint") def get_parser(self, prog_name): - parser = super( - RemoveProjectFromEndpoint, self).get_parser(prog_name) + parser = super(RemoveProjectFromEndpoint, self).get_parser(prog_name) parser.add_argument( 'endpoint', metavar='', - help=_('Endpoint to dissociate from ' - 'specified project (name or ID)'), + help=_( + 'Endpoint to dissociate from ' 'specified project (name or ID)' + ), ) parser.add_argument( 'project', metavar='', - help=_('Project to dissociate from ' - 'specified endpoint name or ID)'), + help=_( + 'Project to dissociate from ' 'specified endpoint name or ID)' + ), ) common.add_project_domain_option_to_parser(parser) return parser @@ -280,16 +306,15 @@ class RemoveProjectFromEndpoint(command.Command): def take_action(self, parsed_args): client = self.app.client_manager.identity - endpoint = utils.find_resource(client.endpoints, - parsed_args.endpoint) + endpoint = utils.find_resource(client.endpoints, parsed_args.endpoint) - project = common.find_project(client, - parsed_args.project, - parsed_args.project_domain) + project = common.find_project( + client, parsed_args.project, parsed_args.project_domain + ) client.endpoint_filter.delete_endpoint_from_project( - project=project.id, - endpoint=endpoint.id) + project=project.id, endpoint=endpoint.id + ) class SetEndpoint(command.Command): @@ -340,8 +365,9 @@ class SetEndpoint(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - endpoint = utils.find_resource(identity_client.endpoints, - parsed_args.endpoint) + endpoint = utils.find_resource( + identity_client.endpoints, parsed_args.endpoint + ) service_id = None if parsed_args.service: @@ -359,7 +385,7 @@ class SetEndpoint(command.Command): url=parsed_args.url, interface=parsed_args.interface, region=parsed_args.region, - enabled=enabled + enabled=enabled, ) @@ -371,15 +397,18 @@ class ShowEndpoint(command.ShowOne): parser.add_argument( 'endpoint', metavar='', - help=_('Endpoint to display (endpoint ID, service ID,' - ' service name, service type)'), + help=_( + 'Endpoint to display (endpoint ID, service ID,' + ' service name, service type)' + ), ) return parser def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - endpoint = utils.find_resource(identity_client.endpoints, - parsed_args.endpoint) + endpoint = utils.find_resource( + identity_client.endpoints, parsed_args.endpoint + ) service = common.find_service(identity_client, endpoint.service_id) diff --git a/openstackclient/identity/v3/endpoint_group.py b/openstackclient/identity/v3/endpoint_group.py index 9bb026a9b..1d3e5ddde 100644 --- a/openstackclient/identity/v3/endpoint_group.py +++ b/openstackclient/identity/v3/endpoint_group.py @@ -50,8 +50,10 @@ class _FiltersReader(object): try: rules = json.loads(blob) except ValueError as e: - msg = _("An error occurred when reading filters from file " - "%(path)s: %(error)s") % {"path": path, "error": e} + msg = _( + "An error occurred when reading filters from file " + "%(path)s: %(error)s" + ) % {"path": path, "error": e} raise exceptions.CommandError(msg) else: return rules @@ -61,8 +63,7 @@ class AddProjectToEndpointGroup(command.Command): _description = _("Add a project to an endpoint group") def get_parser(self, prog_name): - parser = super( - AddProjectToEndpointGroup, self).get_parser(prog_name) + parser = super(AddProjectToEndpointGroup, self).get_parser(prog_name) parser.add_argument( 'endpointgroup', metavar='', @@ -79,16 +80,17 @@ class AddProjectToEndpointGroup(command.Command): def take_action(self, parsed_args): client = self.app.client_manager.identity - endpointgroup = utils.find_resource(client.endpoint_groups, - parsed_args.endpointgroup) + endpointgroup = utils.find_resource( + client.endpoint_groups, parsed_args.endpointgroup + ) - project = common.find_project(client, - parsed_args.project, - parsed_args.project_domain) + project = common.find_project( + client, parsed_args.project, parsed_args.project_domain + ) client.endpoint_filter.add_endpoint_group_to_project( - endpoint_group=endpointgroup.id, - project=project.id) + endpoint_group=endpointgroup.id, project=project.id + ) class CreateEndpointGroup(command.ShowOne, _FiltersReader): @@ -122,7 +124,7 @@ class CreateEndpointGroup(command.ShowOne, _FiltersReader): endpoint_group = identity_client.endpoint_groups.create( name=parsed_args.name, filters=filters, - description=parsed_args.description + description=parsed_args.description, ) info = {} @@ -150,18 +152,24 @@ class DeleteEndpointGroup(command.Command): for i in parsed_args.endpointgroup: try: endpoint_id = utils.find_resource( - identity_client.endpoint_groups, i).id + identity_client.endpoint_groups, i + ).id identity_client.endpoint_groups.delete(endpoint_id) except Exception as e: result += 1 - LOG.error(_("Failed to delete endpoint group with " - "ID '%(endpointgroup)s': %(e)s"), - {'endpointgroup': i, 'e': e}) + LOG.error( + _( + "Failed to delete endpoint group with " + "ID '%(endpointgroup)s': %(e)s" + ), + {'endpointgroup': i, 'e': e}, + ) if result > 0: total = len(parsed_args.endpointgroup) - msg = (_("%(result)s of %(total)s endpointgroups failed " - "to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s endpointgroups failed " "to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -193,40 +201,50 @@ class ListEndpointGroup(command.Lister): endpointgroup = None if parsed_args.endpointgroup: - endpointgroup = utils.find_resource(client.endpoint_groups, - parsed_args.endpointgroup) + endpointgroup = utils.find_resource( + client.endpoint_groups, parsed_args.endpointgroup + ) project = None if parsed_args.project: - project = common.find_project(client, - parsed_args.project, - parsed_args.domain) + project = common.find_project( + client, parsed_args.project, parsed_args.domain + ) if endpointgroup: # List projects associated to the endpoint group columns = ('ID', 'Name', 'Description') data = client.endpoint_filter.list_projects_for_endpoint_group( - endpoint_group=endpointgroup.id) + endpoint_group=endpointgroup.id + ) elif project: columns = ('ID', 'Name', 'Description') data = client.endpoint_filter.list_endpoint_groups_for_project( - project=project.id) + project=project.id + ) else: columns = ('ID', 'Name', 'Description') data = client.endpoint_groups.list() - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class RemoveProjectFromEndpointGroup(command.Command): _description = _("Remove project from endpoint group") def get_parser(self, prog_name): - parser = super( - RemoveProjectFromEndpointGroup, self).get_parser(prog_name) + parser = super(RemoveProjectFromEndpointGroup, self).get_parser( + prog_name + ) parser.add_argument( 'endpointgroup', metavar='', @@ -243,16 +261,17 @@ class RemoveProjectFromEndpointGroup(command.Command): def take_action(self, parsed_args): client = self.app.client_manager.identity - endpointgroup = utils.find_resource(client.endpoint_groups, - parsed_args.endpointgroup) + endpointgroup = utils.find_resource( + client.endpoint_groups, parsed_args.endpointgroup + ) - project = common.find_project(client, - parsed_args.project, - parsed_args.project_domain) + project = common.find_project( + client, parsed_args.project, parsed_args.project_domain + ) client.endpoint_filter.delete_endpoint_group_from_project( - endpoint_group=endpointgroup.id, - project=project.id) + endpoint_group=endpointgroup.id, project=project.id + ) class SetEndpointGroup(command.Command, _FiltersReader): @@ -285,8 +304,9 @@ class SetEndpointGroup(command.Command, _FiltersReader): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - endpointgroup = utils.find_resource(identity_client.endpoint_groups, - parsed_args.endpointgroup) + endpointgroup = utils.find_resource( + identity_client.endpoint_groups, parsed_args.endpointgroup + ) filters = None if parsed_args.filters: @@ -296,7 +316,7 @@ class SetEndpointGroup(command.Command, _FiltersReader): endpointgroup.id, name=parsed_args.name, filters=filters, - description=parsed_args.description + description=parsed_args.description, ) @@ -314,8 +334,9 @@ class ShowEndpointGroup(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - endpoint_group = utils.find_resource(identity_client.endpoint_groups, - parsed_args.endpointgroup) + endpoint_group = utils.find_resource( + identity_client.endpoint_groups, parsed_args.endpointgroup + ) info = {} endpoint_group._info.pop('links') diff --git a/openstackclient/identity/v3/federation_protocol.py b/openstackclient/identity/v3/federation_protocol.py index 0929469e7..ae62390df 100644 --- a/openstackclient/identity/v3/federation_protocol.py +++ b/openstackclient/identity/v3/federation_protocol.py @@ -34,15 +34,19 @@ class CreateProtocol(command.ShowOne): parser.add_argument( 'federation_protocol', metavar='', - help=_('New federation protocol name (must be unique ' - 'per identity provider)'), + help=_( + 'New federation protocol name (must be unique ' + 'per identity provider)' + ), ) parser.add_argument( '--identity-provider', metavar='', required=True, - help=_('Identity provider that will support the new federation ' - ' protocol (name or ID) (required)'), + help=_( + 'Identity provider that will support the new federation ' + ' protocol (name or ID) (required)' + ), ) parser.add_argument( '--mapping', @@ -58,7 +62,8 @@ class CreateProtocol(command.ShowOne): protocol = identity_client.federation.protocols.create( protocol_id=parsed_args.federation_protocol, identity_provider=parsed_args.identity_provider, - mapping=parsed_args.mapping) + mapping=parsed_args.mapping, + ) info = dict(protocol._info) # NOTE(marek-denis): Identity provider is not included in a response # from Keystone, however it should be listed to the user. Add it @@ -85,8 +90,10 @@ class DeleteProtocol(command.Command): '--identity-provider', metavar='', required=True, - help=_('Identity provider that supports ' - '(name or ID) (required)'), + help=_( + 'Identity provider that supports ' + '(name or ID) (required)' + ), ) return parser @@ -97,17 +104,24 @@ class DeleteProtocol(command.Command): for i in parsed_args.federation_protocol: try: identity_client.federation.protocols.delete( - parsed_args.identity_provider, i) + parsed_args.identity_provider, i + ) except Exception as e: result += 1 - LOG.error(_("Failed to delete federation protocol " - "with name or ID '%(protocol)s': %(e)s"), - {'protocol': i, 'e': e}) + LOG.error( + _( + "Failed to delete federation protocol " + "with name or ID '%(protocol)s': %(e)s" + ), + {'protocol': i, 'e': e}, + ) if result > 0: total = len(parsed_args.federation_protocol) - msg = (_("%(result)s of %(total)s federation protocols failed" - " to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s federation protocols failed" + " to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -129,11 +143,14 @@ class ListProtocols(command.Lister): identity_client = self.app.client_manager.identity protocols = identity_client.federation.protocols.list( - parsed_args.identity_provider) + parsed_args.identity_provider + ) columns = ('id', 'mapping') response_attributes = ('id', 'mapping_id') - items = [utils.get_item_properties(s, response_attributes) - for s in protocols] + items = [ + utils.get_item_properties(s, response_attributes) + for s in protocols + ] return (columns, items) @@ -151,8 +168,10 @@ class SetProtocol(command.Command): '--identity-provider', metavar='', required=True, - help=_('Identity provider that supports ' - '(name or ID) (required)'), + help=_( + 'Identity provider that supports ' + '(name or ID) (required)' + ), ) parser.add_argument( '--mapping', @@ -165,8 +184,10 @@ class SetProtocol(command.Command): identity_client = self.app.client_manager.identity protocol = identity_client.federation.protocols.update( - parsed_args.identity_provider, parsed_args.federation_protocol, - parsed_args.mapping) + parsed_args.identity_provider, + parsed_args.federation_protocol, + parsed_args.mapping, + ) info = dict(protocol._info) # NOTE(marek-denis): Identity provider is not included in a response # from Keystone, however it should be listed to the user. Add it @@ -191,8 +212,10 @@ class ShowProtocol(command.ShowOne): '--identity-provider', metavar='', required=True, - help=_('Identity provider that supports ' - '(name or ID) (required)'), + help=_( + 'Identity provider that supports ' + '(name or ID) (required)' + ), ) return parser @@ -200,7 +223,8 @@ class ShowProtocol(command.ShowOne): identity_client = self.app.client_manager.identity protocol = identity_client.federation.protocols.get( - parsed_args.identity_provider, parsed_args.federation_protocol) + parsed_args.identity_provider, parsed_args.federation_protocol + ) info = dict(protocol._info) info['mapping'] = info.pop('mapping_id') info.pop('links', None) diff --git a/openstackclient/identity/v3/group.py b/openstackclient/identity/v3/group.py index 46c3142cd..65eb261a1 100644 --- a/openstackclient/identity/v3/group.py +++ b/openstackclient/identity/v3/group.py @@ -43,8 +43,10 @@ class AddUserToGroup(command.Command): 'user', metavar='', nargs='+', - help=_('User(s) to add to (name or ID) ' - '(repeat option to add multiple users)'), + help=_( + 'User(s) to add to (name or ID) ' + '(repeat option to add multiple users)' + ), ) common.add_group_domain_option_to_parser(parser) common.add_user_domain_option_to_parser(parser) @@ -53,16 +55,16 @@ class AddUserToGroup(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - group_id = common.find_group(identity_client, - parsed_args.group, - parsed_args.group_domain).id + group_id = common.find_group( + identity_client, parsed_args.group, parsed_args.group_domain + ).id result = 0 for i in parsed_args.user: try: - user_id = common.find_user(identity_client, - i, - parsed_args.user_domain).id + user_id = common.find_user( + identity_client, i, parsed_args.user_domain + ).id identity_client.users.add_to_group(user_id, group_id) except Exception as e: result += 1 @@ -74,8 +76,12 @@ class AddUserToGroup(command.Command): LOG.error(msg) if result > 0: total = len(parsed_args.user) - msg = (_("%(result)s of %(total)s users not added to group " - "%(group)s.")) % { + msg = ( + _( + "%(result)s of %(total)s users not added to group " + "%(group)s." + ) + ) % { 'result': result, 'total': total, 'group': parsed_args.group, @@ -105,12 +111,12 @@ class CheckUserInGroup(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - user_id = common.find_user(identity_client, - parsed_args.user, - parsed_args.user_domain).id - group_id = common.find_group(identity_client, - parsed_args.group, - parsed_args.group_domain).id + user_id = common.find_user( + identity_client, parsed_args.user, parsed_args.user_domain + ).id + group_id = common.find_group( + identity_client, parsed_args.group, parsed_args.group_domain + ).id try: identity_client.users.check_in_group(user_id, group_id) @@ -163,19 +169,19 @@ class CreateGroup(command.ShowOne): domain = None if parsed_args.domain: - domain = common.find_domain(identity_client, - parsed_args.domain).id + domain = common.find_domain(identity_client, parsed_args.domain).id try: group = identity_client.groups.create( name=parsed_args.name, domain=domain, - description=parsed_args.description) + description=parsed_args.description, + ) except ks_exc.Conflict: if parsed_args.or_show: - group = utils.find_resource(identity_client.groups, - parsed_args.name, - domain_id=domain) + group = utils.find_resource( + identity_client.groups, parsed_args.name, domain_id=domain + ) LOG.info(_('Returning existing group %s'), group.name) else: raise @@ -208,20 +214,26 @@ class DeleteGroup(command.Command): errors = 0 for group in parsed_args.groups: try: - group_obj = common.find_group(identity_client, - group, - parsed_args.domain) + group_obj = common.find_group( + identity_client, group, parsed_args.domain + ) identity_client.groups.delete(group_obj.id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete group with " - "name or ID '%(group)s': %(e)s"), - {'group': group, 'e': e}) + LOG.error( + _( + "Failed to delete group with " + "name or ID '%(group)s': %(e)s" + ), + {'group': group, 'e': e}, + ) if errors > 0: total = len(parsed_args.groups) - msg = (_("%(errors)s of %(total)s groups failed " - "to delete.") % {'errors': errors, 'total': total}) + msg = _("%(errors)s of %(total)s groups failed " "to delete.") % { + 'errors': errors, + 'total': total, + } raise exceptions.CommandError(msg) @@ -254,8 +266,7 @@ class ListGroup(command.Lister): domain = None if parsed_args.domain: - domain = common.find_domain(identity_client, - parsed_args.domain).id + domain = common.find_domain(identity_client, parsed_args.domain).id if parsed_args.user: user = common.find_user( @@ -278,10 +289,14 @@ class ListGroup(command.Lister): return ( columns, - (utils.get_item_properties( - s, columns, - formatters={}, - ) for s in data) + ( + utils.get_item_properties( + s, + columns, + formatters={}, + ) + for s in data + ), ) @@ -299,8 +314,10 @@ class RemoveUserFromGroup(command.Command): 'user', metavar='', nargs='+', - help=_('User(s) to remove from (name or ID) ' - '(repeat option to remove multiple users)'), + help=_( + 'User(s) to remove from (name or ID) ' + '(repeat option to remove multiple users)' + ), ) common.add_group_domain_option_to_parser(parser) common.add_user_domain_option_to_parser(parser) @@ -309,16 +326,16 @@ class RemoveUserFromGroup(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - group_id = common.find_group(identity_client, - parsed_args.group, - parsed_args.group_domain).id + group_id = common.find_group( + identity_client, parsed_args.group, parsed_args.group_domain + ).id result = 0 for i in parsed_args.user: try: - user_id = common.find_user(identity_client, - i, - parsed_args.user_domain).id + user_id = common.find_user( + identity_client, i, parsed_args.user_domain + ).id identity_client.users.remove_from_group(user_id, group_id) except Exception as e: result += 1 @@ -330,8 +347,12 @@ class RemoveUserFromGroup(command.Command): LOG.error(msg) if result > 0: total = len(parsed_args.user) - msg = (_("%(result)s of %(total)s users not removed from group " - "%(group)s.")) % { + msg = ( + _( + "%(result)s of %(total)s users not removed from group " + "%(group)s." + ) + ) % { 'result': result, 'total': total, 'group': parsed_args.group, @@ -368,8 +389,9 @@ class SetGroup(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - group = common.find_group(identity_client, parsed_args.group, - parsed_args.domain) + group = common.find_group( + identity_client, parsed_args.group, parsed_args.domain + ) kwargs = {} if parsed_args.name: kwargs['name'] = parsed_args.name @@ -399,9 +421,11 @@ class ShowGroup(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - group = common.find_group(identity_client, - parsed_args.group, - domain_name_or_id=parsed_args.domain) + group = common.find_group( + identity_client, + parsed_args.group, + domain_name_or_id=parsed_args.domain, + ) group._info.pop('links') return zip(*sorted(group._info.items())) diff --git a/openstackclient/identity/v3/identity_provider.py b/openstackclient/identity/v3/identity_provider.py index 19a621448..230f81985 100644 --- a/openstackclient/identity/v3/identity_provider.py +++ b/openstackclient/identity/v3/identity_provider.py @@ -42,14 +42,18 @@ class CreateIdentityProvider(command.ShowOne): '--remote-id', metavar='', action='append', - help=_('Remote IDs to associate with the Identity Provider ' - '(repeat option to provide multiple values)'), + help=_( + 'Remote IDs to associate with the Identity Provider ' + '(repeat option to provide multiple values)' + ), ) identity_remote_id_provider.add_argument( '--remote-id-file', metavar='', - help=_('Name of a file that contains many remote IDs to associate ' - 'with the identity provider, one per line'), + help=_( + 'Name of a file that contains many remote IDs to associate ' + 'with the identity provider, one per line' + ), ) parser.add_argument( '--description', @@ -59,19 +63,23 @@ class CreateIdentityProvider(command.ShowOne): parser.add_argument( '--domain', metavar='', - help=_('Domain to associate with the identity provider. If not ' - 'specified, a domain will be created automatically. ' - '(Name or ID)'), + help=_( + 'Domain to associate with the identity provider. If not ' + 'specified, a domain will be created automatically. ' + '(Name or ID)' + ), ) parser.add_argument( '--authorization-ttl', metavar='', type=int, - help=_('Time to keep the role assignments for users ' - 'authenticating via this identity provider. ' - 'When not provided, global default configured in the ' - 'Identity service will be used. ' - 'Available since Identity API version 3.14 (Ussuri).'), + help=_( + 'Time to keep the role assignments for users ' + 'authenticating via this identity provider. ' + 'When not provided, global default configured in the ' + 'Identity service will be used. ' + 'Available since Identity API version 3.14 (Ussuri).' + ), ) enable_identity_provider = parser.add_mutually_exclusive_group() enable_identity_provider.add_argument( @@ -93,25 +101,29 @@ class CreateIdentityProvider(command.ShowOne): identity_client = self.app.client_manager.identity if parsed_args.remote_id_file: file_content = utils.read_blob_file_contents( - parsed_args.remote_id_file) + parsed_args.remote_id_file + ) remote_ids = file_content.splitlines() remote_ids = list(map(str.strip, remote_ids)) else: - remote_ids = (parsed_args.remote_id - if parsed_args.remote_id else None) + remote_ids = ( + parsed_args.remote_id if parsed_args.remote_id else None + ) domain_id = None if parsed_args.domain: - domain_id = common.find_domain(identity_client, - parsed_args.domain).id + domain_id = common.find_domain( + identity_client, parsed_args.domain + ).id # TODO(pas-ha) actually check for 3.14 microversion kwargs = {} auth_ttl = parsed_args.authorization_ttl if auth_ttl is not None: if auth_ttl < 0: - msg = (_("%(param)s must be positive integer or zero." - ) % {"param": "authorization-ttl"}) + msg = _("%(param)s must be positive integer or zero.") % { + "param": "authorization-ttl" + } raise exceptions.CommandError(msg) kwargs['authorization_ttl'] = auth_ttl @@ -121,7 +133,8 @@ class CreateIdentityProvider(command.ShowOne): description=parsed_args.description, domain_id=domain_id, enabled=parsed_args.enabled, - **kwargs) + **kwargs + ) idp._info.pop('links', None) remote_ids = format_columns.ListColumn(idp._info.pop('remote_ids', [])) @@ -150,14 +163,20 @@ class DeleteIdentityProvider(command.Command): identity_client.federation.identity_providers.delete(i) except Exception as e: result += 1 - LOG.error(_("Failed to delete identity providers with " - "name or ID '%(provider)s': %(e)s"), - {'provider': i, 'e': e}) + LOG.error( + _( + "Failed to delete identity providers with " + "name or ID '%(provider)s': %(e)s" + ), + {'provider': i, 'e': e}, + ) if result > 0: total = len(parsed_args.identity_provider) - msg = (_("%(result)s of %(total)s identity providers failed" - " to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s identity providers failed" + " to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -190,11 +209,17 @@ class ListIdentityProvider(command.Lister): kwargs['enabled'] = True data = identity_client.federation.identity_providers.list(**kwargs) - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class SetIdentityProvider(command.Command): @@ -217,22 +242,28 @@ class SetIdentityProvider(command.Command): '--remote-id', metavar='', action='append', - help=_('Remote IDs to associate with the Identity Provider ' - '(repeat option to provide multiple values)'), + help=_( + 'Remote IDs to associate with the Identity Provider ' + '(repeat option to provide multiple values)' + ), ) identity_remote_id_provider.add_argument( '--remote-id-file', metavar='', - help=_('Name of a file that contains many remote IDs to associate ' - 'with the identity provider, one per line'), + help=_( + 'Name of a file that contains many remote IDs to associate ' + 'with the identity provider, one per line' + ), ) parser.add_argument( '--authorization-ttl', metavar='', type=int, - help=_('Time to keep the role assignments for users ' - 'authenticating via this identity provider. ' - 'Available since Identity API version 3.14 (Ussuri).'), + help=_( + 'Time to keep the role assignments for users ' + 'authenticating via this identity provider. ' + 'Available since Identity API version 3.14 (Ussuri).' + ), ) enable_identity_provider = parser.add_mutually_exclusive_group() enable_identity_provider.add_argument( @@ -253,7 +284,8 @@ class SetIdentityProvider(command.Command): # Always set remote_ids if either is passed in if parsed_args.remote_id_file: file_content = utils.read_blob_file_contents( - parsed_args.remote_id_file) + parsed_args.remote_id_file + ) remote_ids = file_content.splitlines() remote_ids = list(map(str.strip, remote_ids)) elif parsed_args.remote_id: @@ -279,14 +311,14 @@ class SetIdentityProvider(command.Command): auth_ttl = parsed_args.authorization_ttl if auth_ttl is not None: if auth_ttl < 0: - msg = (_("%(param)s must be positive integer or zero." - ) % {"param": "authorization-ttl"}) + msg = _("%(param)s must be positive integer or zero.") % { + "param": "authorization-ttl" + } raise exceptions.CommandError(msg) kwargs['authorization_ttl'] = auth_ttl federation_client.identity_providers.update( - parsed_args.identity_provider, - **kwargs + parsed_args.identity_provider, **kwargs ) @@ -307,7 +339,8 @@ class ShowIdentityProvider(command.ShowOne): idp = utils.find_resource( identity_client.federation.identity_providers, parsed_args.identity_provider, - id=parsed_args.identity_provider) + id=parsed_args.identity_provider, + ) idp._info.pop('links', None) remote_ids = format_columns.ListColumn(idp._info.pop('remote_ids', [])) diff --git a/openstackclient/identity/v3/implied_role.py b/openstackclient/identity/v3/implied_role.py index 054f30285..9d26ccd3f 100644 --- a/openstackclient/identity/v3/implied_role.py +++ b/openstackclient/identity/v3/implied_role.py @@ -48,7 +48,6 @@ def _get_role_ids(identity_client, parsed_args): class CreateImpliedRole(command.ShowOne): - _description = _("Creates an association between prior and implied roles") def get_parser(self, prog_name): @@ -69,16 +68,16 @@ class CreateImpliedRole(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity (prior_role_id, implied_role_id) = _get_role_ids( - identity_client, parsed_args) + identity_client, parsed_args + ) response = identity_client.inference_rules.create( - prior_role_id, implied_role_id) + prior_role_id, implied_role_id + ) response._info.pop('links', None) - return zip(*sorted([(k, v['id']) - for k, v in response._info.items()])) + return zip(*sorted([(k, v['id']) for k, v in response._info.items()])) class DeleteImpliedRole(command.Command): - _description = _("Deletes an association between prior and implied roles") def get_parser(self, prog_name): @@ -99,16 +98,19 @@ class DeleteImpliedRole(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity (prior_role_id, implied_role_id) = _get_role_ids( - identity_client, parsed_args) - identity_client.inference_rules.delete( - prior_role_id, implied_role_id) + identity_client, parsed_args + ) + identity_client.inference_rules.delete(prior_role_id, implied_role_id) class ListImpliedRole(command.Lister): - _description = _("List implied roles") - _COLUMNS = ['Prior Role ID', 'Prior Role Name', - 'Implied Role ID', 'Implied Role Name'] + _COLUMNS = [ + 'Prior Role ID', + 'Prior Role Name', + 'Implied Role ID', + 'Implied Role Name', + ] def get_parser(self, prog_name): parser = super(ListImpliedRole, self).get_parser(prog_name) @@ -118,10 +120,12 @@ class ListImpliedRole(command.Lister): def _list_implied(response): for rule in response: for implies in rule.implies: - yield (rule.prior_role['id'], - rule.prior_role['name'], - implies['id'], - implies['name']) + yield ( + rule.prior_role['id'], + rule.prior_role['name'], + implies['id'], + implies['name'], + ) identity_client = self.app.client_manager.identity response = identity_client.inference_rules.list_inference_roles() diff --git a/openstackclient/identity/v3/limit.py b/openstackclient/identity/v3/limit.py index b155cbd86..1610b68d6 100644 --- a/openstackclient/identity/v3/limit.py +++ b/openstackclient/identity/v3/limit.py @@ -97,7 +97,7 @@ class CreateLimit(command.ShowOne): parsed_args.resource_name, parsed_args.resource_limit, description=parsed_args.description, - region=region + region=region, ) limit._info.pop('links', None) @@ -168,12 +168,17 @@ class ListLimit(command.Lister): service=service, resource_name=parsed_args.resource_name, region=region, - project=project + project=project, ) columns = ( - 'ID', 'Project ID', 'Service ID', 'Resource Name', - 'Resource Limit', 'Description', 'Region ID' + 'ID', + 'Project ID', + 'Service ID', + 'Resource Name', + 'Resource Limit', + 'Description', + 'Region ID', ) return ( columns, @@ -230,7 +235,7 @@ class SetLimit(command.ShowOne): limit = identity_client.limits.update( parsed_args.limit_id, description=parsed_args.description, - resource_limit=parsed_args.resource_limit + resource_limit=parsed_args.resource_limit, ) limit._info.pop('links', None) @@ -260,12 +265,15 @@ class DeleteLimit(command.Command): identity_client.limits.delete(limit_id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete limit with ID " - "'%(id)s': %(e)s"), - {'id': limit_id, 'e': e}) + LOG.error( + _("Failed to delete limit with ID " "'%(id)s': %(e)s"), + {'id': limit_id, 'e': e}, + ) if errors > 0: total = len(parsed_args.limit_id) - msg = (_("%(errors)s of %(total)s limits failed to " - "delete.") % {'errors': errors, 'total': total}) + msg = _("%(errors)s of %(total)s limits failed to " "delete.") % { + 'errors': errors, + 'total': total, + } raise exceptions.CommandError(msg) diff --git a/openstackclient/identity/v3/mapping.py b/openstackclient/identity/v3/mapping.py index 7d40a2b7f..0a5925de6 100644 --- a/openstackclient/identity/v3/mapping.py +++ b/openstackclient/identity/v3/mapping.py @@ -73,8 +73,10 @@ class _RulesReader(object): try: rules = json.loads(blob) except ValueError as e: - msg = _("An error occurred when reading rules from file " - "%(path)s: %(error)s") % {"path": path, "error": e} + msg = _( + "An error occurred when reading rules from file " + "%(path)s: %(error)s" + ) % {"path": path, "error": e} raise exceptions.CommandError(msg) else: return rules @@ -92,7 +94,8 @@ class CreateMapping(command.ShowOne, _RulesReader): ) parser.add_argument( '--rules', - metavar='', required=True, + metavar='', + required=True, help=_('Filename that contains a set of mapping rules (required)'), ) return parser @@ -102,8 +105,8 @@ class CreateMapping(command.ShowOne, _RulesReader): rules = self._read_rules(parsed_args.rules) mapping = identity_client.federation.mappings.create( - mapping_id=parsed_args.mapping, - rules=rules) + mapping_id=parsed_args.mapping, rules=rules + ) mapping._info.pop('links', None) return zip(*sorted(mapping._info.items())) @@ -130,13 +133,19 @@ class DeleteMapping(command.Command): identity_client.federation.mappings.delete(i) except Exception as e: result += 1 - LOG.error(_("Failed to delete mapping with name or " - "ID '%(mapping)s': %(e)s"), {'mapping': i, 'e': e}) + LOG.error( + _( + "Failed to delete mapping with name or " + "ID '%(mapping)s': %(e)s" + ), + {'mapping': i, 'e': e}, + ) if result > 0: total = len(parsed_args.mapping) - msg = (_("%(result)s of %(total)s mappings failed " - "to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s mappings failed " "to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -177,8 +186,8 @@ class SetMapping(command.Command, _RulesReader): rules = self._read_rules(parsed_args.rules) mapping = identity_client.federation.mappings.update( - mapping=parsed_args.mapping, - rules=rules) + mapping=parsed_args.mapping, rules=rules + ) mapping._info.pop('links', None) diff --git a/openstackclient/identity/v3/policy.py b/openstackclient/identity/v3/policy.py index 45674210f..2504a467f 100644 --- a/openstackclient/identity/v3/policy.py +++ b/openstackclient/identity/v3/policy.py @@ -36,8 +36,10 @@ class CreatePolicy(command.ShowOne): '--type', metavar='', default="application/json", - help=_('New MIME type of the policy rules file ' - '(defaults to application/json)'), + help=_( + 'New MIME type of the policy rules file ' + '(defaults to application/json)' + ), ) parser.add_argument( 'rules', @@ -80,13 +82,20 @@ class DeletePolicy(command.Command): identity_client.policies.delete(i) except Exception as e: result += 1 - LOG.error(_("Failed to delete policy with name or " - "ID '%(policy)s': %(e)s"), {'policy': i, 'e': e}) + LOG.error( + _( + "Failed to delete policy with name or " + "ID '%(policy)s': %(e)s" + ), + {'policy': i, 'e': e}, + ) if result > 0: total = len(parsed_args.policy) - msg = (_("%(result)s of %(total)s policys failed " - "to delete.") % {'result': result, 'total': total}) + msg = _("%(result)s of %(total)s policys failed " "to delete.") % { + 'result': result, + 'total': total, + } raise exceptions.CommandError(msg) @@ -111,11 +120,17 @@ class ListPolicy(command.Lister): columns = ('ID', 'Type') column_headers = columns data = self.app.client_manager.identity.policies.list() - return (column_headers, - (utils.get_item_properties( - s, columns, + return ( + column_headers, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class SetPolicy(command.Command): @@ -170,8 +185,9 @@ class ShowPolicy(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - policy = utils.find_resource(identity_client.policies, - parsed_args.policy) + policy = utils.find_resource( + identity_client.policies, parsed_args.policy + ) policy._info.pop('links') policy._info.update({'rules': policy._info.pop('blob')}) diff --git a/openstackclient/identity/v3/project.py b/openstackclient/identity/v3/project.py index 5e8ce8298..6ff264aea 100644 --- a/openstackclient/identity/v3/project.py +++ b/openstackclient/identity/v3/project.py @@ -70,8 +70,10 @@ class CreateProject(command.ShowOne): '--property', metavar='', action=parseractions.KeyValueAction, - help=_('Add a property to ' - '(repeat option to set multiple properties)'), + help=_( + 'Add a property to ' + '(repeat option to set multiple properties)' + ), ) parser.add_argument( '--or-show', @@ -87,8 +89,7 @@ class CreateProject(command.ShowOne): domain = None if parsed_args.domain: - domain = common.find_domain(identity_client, - parsed_args.domain).id + domain = common.find_domain(identity_client, parsed_args.domain).id parent = None if parsed_args.parent: @@ -128,9 +129,11 @@ class CreateProject(command.ShowOne): ) except ks_exc.Conflict: if parsed_args.or_show: - project = utils.find_resource(identity_client.projects, - parsed_args.name, - domain_id=domain) + project = utils.find_resource( + identity_client.projects, + parsed_args.name, + domain_id=domain, + ) LOG.info(_('Returning existing project %s'), project.name) else: raise @@ -167,23 +170,29 @@ class DeleteProject(command.Command): for project in parsed_args.projects: try: if domain is not None: - project_obj = utils.find_resource(identity_client.projects, - project, - domain_id=domain.id) + project_obj = utils.find_resource( + identity_client.projects, project, domain_id=domain.id + ) else: - project_obj = utils.find_resource(identity_client.projects, - project) + project_obj = utils.find_resource( + identity_client.projects, project + ) identity_client.projects.delete(project_obj.id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete project with " - "name or ID '%(project)s': %(e)s"), - {'project': project, 'e': e}) + LOG.error( + _( + "Failed to delete project with " + "name or ID '%(project)s': %(e)s" + ), + {'project': project, 'e': e}, + ) if errors > 0: total = len(parsed_args.projects) - msg = (_("%(errors)s of %(total)s projects failed " - "to delete.") % {'errors': errors, 'total': total}) + msg = _( + "%(errors)s of %(total)s projects failed " "to delete." + ) % {'errors': errors, 'total': total} raise exceptions.CommandError(msg) @@ -210,8 +219,10 @@ class ListProject(command.Lister): parser.add_argument( '--my-projects', action='store_true', - help=_('List projects for the authenticated user. ' - 'Supersedes other filters.'), + help=_( + 'List projects for the authenticated user. ' + 'Supersedes other filters.' + ), ) parser.add_argument( '--long', @@ -222,9 +233,11 @@ class ListProject(command.Lister): parser.add_argument( '--sort', metavar='[:]', - help=_('Sort output by selected keys and directions (asc or desc) ' - '(default: asc), repeat this option to specify multiple ' - 'keys and directions.'), + help=_( + 'Sort output by selected keys and directions (asc or desc) ' + '(default: asc), repeat this option to specify multiple ' + 'keys and directions.' + ), ) tag.add_tag_filtering_option_to_parser(parser, _('projects')) return parser @@ -239,23 +252,28 @@ class ListProject(command.Lister): domain_id = None if parsed_args.domain: - domain_id = common.find_domain(identity_client, - parsed_args.domain).id + domain_id = common.find_domain( + identity_client, parsed_args.domain + ).id kwargs['domain'] = domain_id if parsed_args.parent: - parent_id = common.find_project(identity_client, - parsed_args.parent).id + parent_id = common.find_project( + identity_client, parsed_args.parent + ).id kwargs['parent'] = parent_id if parsed_args.user: if parsed_args.domain: - user_id = utils.find_resource(identity_client.users, - parsed_args.user, - domain_id=domain_id).id + user_id = utils.find_resource( + identity_client.users, + parsed_args.user, + domain_id=domain_id, + ).id else: - user_id = utils.find_resource(identity_client.users, - parsed_args.user).id + user_id = utils.find_resource( + identity_client.users, parsed_args.user + ).id kwargs['user'] = user_id @@ -272,19 +290,24 @@ class ListProject(command.Lister): # wanting their own project list. if not kwargs: user = self.app.client_manager.auth_ref.user_id - data = identity_client.projects.list( - user=user) + data = identity_client.projects.list(user=user) else: raise if parsed_args.sort: data = utils.sort_items(data, parsed_args.sort) - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class SetProject(command.Command): @@ -327,8 +350,10 @@ class SetProject(command.Command): '--property', metavar='', action=parseractions.KeyValueAction, - help=_('Set a property on ' - '(repeat option to set multiple properties)'), + help=_( + 'Set a property on ' + '(repeat option to set multiple properties)' + ), ) common.add_resource_option_to_parser(parser) tag.add_tag_option_to_parser_for_set(parser, _('project')) @@ -337,9 +362,9 @@ class SetProject(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - project = common.find_project(identity_client, - parsed_args.project, - parsed_args.domain) + project = common.find_project( + identity_client, parsed_args.project, parsed_args.domain + ) kwargs = {} if parsed_args.name: @@ -392,20 +417,19 @@ class ShowProject(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - project_str = common._get_token_resource(identity_client, 'project', - parsed_args.project, - parsed_args.domain) + project_str = common._get_token_resource( + identity_client, 'project', parsed_args.project, parsed_args.domain + ) if parsed_args.domain: domain = common.find_domain(identity_client, parsed_args.domain) project = utils.find_resource( - identity_client.projects, - project_str, - domain_id=domain.id) + identity_client.projects, project_str, domain_id=domain.id + ) else: project = utils.find_resource( - identity_client.projects, - project_str) + identity_client.projects, project_str + ) if parsed_args.parents or parsed_args.children: # NOTE(RuiChen): utils.find_resource() can't pass kwargs, @@ -414,7 +438,8 @@ class ShowProject(command.ShowOne): project = identity_client.projects.get( project.id, parents_as_ids=parsed_args.parents, - subtree_as_ids=parsed_args.children) + subtree_as_ids=parsed_args.children, + ) project._info.pop('links') return zip(*sorted(project._info.items())) diff --git a/openstackclient/identity/v3/region.py b/openstackclient/identity/v3/region.py index 20ee073c3..21a80b94f 100644 --- a/openstackclient/identity/v3/region.py +++ b/openstackclient/identity/v3/region.py @@ -85,13 +85,20 @@ class DeleteRegion(command.Command): identity_client.regions.delete(i) except Exception as e: result += 1 - LOG.error(_("Failed to delete region with " - "ID '%(region)s': %(e)s"), {'region': i, 'e': e}) + LOG.error( + _( + "Failed to delete region with " + "ID '%(region)s': %(e)s" + ), + {'region': i, 'e': e}, + ) if result > 0: total = len(parsed_args.region) - msg = (_("%(result)s of %(total)s regions failed " - "to delete.") % {'result': result, 'total': total}) + msg = _("%(result)s of %(total)s regions failed " "to delete.") % { + 'result': result, + 'total': total, + } raise exceptions.CommandError(msg) @@ -118,11 +125,17 @@ class ListRegion(command.Lister): columns = ('ID', 'Parent Region Id', 'Description') data = identity_client.regions.list(**kwargs) - return (columns_headers, - (utils.get_item_properties( - s, columns, + return ( + columns_headers, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class SetRegion(command.Command): @@ -174,8 +187,9 @@ class ShowRegion(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - region = utils.find_resource(identity_client.regions, - parsed_args.region) + region = utils.find_resource( + identity_client.regions, parsed_args.region + ) region._info['region'] = region._info.pop('id') region._info['parent_region'] = region._info.pop('parent_region_id') diff --git a/openstackclient/identity/v3/registered_limit.py b/openstackclient/identity/v3/registered_limit.py index 53117c71a..251eb2dbe 100644 --- a/openstackclient/identity/v3/registered_limit.py +++ b/openstackclient/identity/v3/registered_limit.py @@ -87,7 +87,7 @@ class CreateRegisteredLimit(command.ShowOne): parsed_args.resource_name, parsed_args.default_limit, description=parsed_args.description, - region=region + region=region, ) registered_limit._info.pop('links', None) @@ -117,15 +117,22 @@ class DeleteRegisteredLimit(command.Command): except Exception as e: errors += 1 from pprint import pprint + pprint(type(e)) - LOG.error(_("Failed to delete registered limit with ID " - "'%(id)s': %(e)s"), - {'id': registered_limit_id, 'e': e}) + LOG.error( + _( + "Failed to delete registered limit with ID " + "'%(id)s': %(e)s" + ), + {'id': registered_limit_id, 'e': e}, + ) if errors > 0: total = len(parsed_args.registered_limit_id) - msg = (_("%(errors)s of %(total)s registered limits failed to " - "delete.") % {'errors': errors, 'total': total}) + msg = _( + "%(errors)s of %(total)s registered limits failed to " + "delete." + ) % {'errors': errors, 'total': total} raise exceptions.CommandError(msg) @@ -179,12 +186,16 @@ class ListRegisteredLimit(command.Lister): registered_limits = identity_client.registered_limits.list( service=service, resource_name=parsed_args.resource_name, - region=region + region=region, ) columns = ( - 'ID', 'Service ID', 'Resource Name', 'Default Limit', - 'Description', 'Region ID' + 'ID', + 'Service ID', + 'Resource Name', + 'Default Limit', + 'Description', + 'Region ID', ) return ( columns, @@ -205,18 +216,22 @@ class SetRegisteredLimit(command.ShowOne): parser.add_argument( '--service', metavar='', - help=_('Service to be updated responsible for the resource to ' - 'limit. Either --service, --resource-name or --region must ' - 'be different than existing value otherwise it will be ' - 'duplicate entry') + help=_( + 'Service to be updated responsible for the resource to ' + 'limit. Either --service, --resource-name or --region must ' + 'be different than existing value otherwise it will be ' + 'duplicate entry' + ), ) parser.add_argument( '--resource-name', metavar='', - help=_('Resource to be updated responsible for the resource to ' - 'limit. Either --service, --resource-name or --region must ' - 'be different than existing value otherwise it will be ' - 'duplicate entry'), + help=_( + 'Resource to be updated responsible for the resource to ' + 'limit. Either --service, --resource-name or --region must ' + 'be different than existing value otherwise it will be ' + 'duplicate entry' + ), ) parser.add_argument( '--default-limit', @@ -232,10 +247,12 @@ class SetRegisteredLimit(command.ShowOne): parser.add_argument( '--region', metavar='', - help=_('Region for the registered limit to affect. Either ' - '--service, --resource-name or --region must be ' - 'different than existing value otherwise it will be ' - 'duplicate entry'), + help=_( + 'Region for the registered limit to affect. Either ' + '--service, --resource-name or --region must be ' + 'different than existing value otherwise it will be ' + 'duplicate entry' + ), ) return parser @@ -270,7 +287,7 @@ class SetRegisteredLimit(command.ShowOne): resource_name=parsed_args.resource_name, default_limit=parsed_args.default_limit, description=parsed_args.description, - region=region + region=region, ) registered_limit._info.pop('links', None) diff --git a/openstackclient/identity/v3/role.py b/openstackclient/identity/v3/role.py index a674564fe..4c4358851 100644 --- a/openstackclient/identity/v3/role.py +++ b/openstackclient/identity/v3/role.py @@ -63,16 +63,15 @@ def _add_identity_and_resource_options_to_parser(parser): common.add_inherited_option_to_parser(parser) -def _process_identity_and_resource_options(parsed_args, - identity_client_manager, - validate_actor_existence=True): - +def _process_identity_and_resource_options( + parsed_args, identity_client_manager, validate_actor_existence=True +): def _find_user(): try: return common.find_user( identity_client_manager, parsed_args.user, - parsed_args.user_domain + parsed_args.user_domain, ).id except exceptions.CommandError: if not validate_actor_existence: @@ -84,7 +83,7 @@ def _process_identity_and_resource_options(parsed_args, return common.find_group( identity_client_manager, parsed_args.group, - parsed_args.group_domain + parsed_args.group_domain, ).id except exceptions.CommandError: if not validate_actor_existence: @@ -129,8 +128,10 @@ def _process_identity_and_resource_options(parsed_args, class AddRole(command.Command): - _description = _("Adds a role assignment to a user or group on the " - "system, a domain, or a project") + _description = _( + "Adds a role assignment to a user or group on the " + "system, a domain, or a project" + ) def get_parser(self, prog_name): parser = super(AddRole, self).get_parser(prog_name) @@ -146,24 +147,30 @@ class AddRole(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - if (not parsed_args.user and not parsed_args.domain and - not parsed_args.group and not parsed_args.project): - msg = _("Role not added, incorrect set of arguments " - "provided. See openstack --help for more details") + if ( + not parsed_args.user + and not parsed_args.domain + and not parsed_args.group + and not parsed_args.project + ): + msg = _( + "Role not added, incorrect set of arguments " + "provided. See openstack --help for more details" + ) raise exceptions.CommandError(msg) domain_id = None if parsed_args.role_domain: - domain_id = common.find_domain(identity_client, - parsed_args.role_domain).id + domain_id = common.find_domain( + identity_client, parsed_args.role_domain + ).id role = utils.find_resource( - identity_client.roles, - parsed_args.role, - domain_id=domain_id + identity_client.roles, parsed_args.role, domain_id=domain_id ) kwargs = _process_identity_and_resource_options( - parsed_args, self.app.client_manager.identity) + parsed_args, self.app.client_manager.identity + ) identity_client.roles.grant(role.id, **kwargs) @@ -201,21 +208,27 @@ class CreateRole(command.ShowOne): domain_id = None if parsed_args.domain: - domain_id = common.find_domain(identity_client, - parsed_args.domain).id + domain_id = common.find_domain( + identity_client, parsed_args.domain + ).id options = common.get_immutable_options(parsed_args) try: role = identity_client.roles.create( - name=parsed_args.name, domain=domain_id, - description=parsed_args.description, options=options) + name=parsed_args.name, + domain=domain_id, + description=parsed_args.description, + options=options, + ) except ks_exc.Conflict: if parsed_args.or_show: - role = utils.find_resource(identity_client.roles, - parsed_args.name, - domain_id=domain_id) + role = utils.find_resource( + identity_client.roles, + parsed_args.name, + domain_id=domain_id, + ) LOG.info(_('Returning existing role %s'), role.name) else: raise @@ -247,27 +260,32 @@ class DeleteRole(command.Command): domain_id = None if parsed_args.domain: - domain_id = common.find_domain(identity_client, - parsed_args.domain).id + domain_id = common.find_domain( + identity_client, parsed_args.domain + ).id errors = 0 for role in parsed_args.roles: try: role_obj = utils.find_resource( - identity_client.roles, - role, - domain_id=domain_id + identity_client.roles, role, domain_id=domain_id ) identity_client.roles.delete(role_obj.id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete role with " - "name or ID '%(role)s': %(e)s"), - {'role': role, 'e': e}) + LOG.error( + _( + "Failed to delete role with " + "name or ID '%(role)s': %(e)s" + ), + {'role': role, 'e': e}, + ) if errors > 0: total = len(parsed_args.roles) - msg = (_("%(errors)s of %(total)s roles failed " - "to delete.") % {'errors': errors, 'total': total}) + msg = _("%(errors)s of %(total)s roles failed " "to delete.") % { + 'errors': errors, + 'total': total, + } raise exceptions.CommandError(msg) @@ -299,16 +317,23 @@ class ListRole(command.Lister): columns = ('ID', 'Name') data = identity_client.roles.list() - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class RemoveRole(command.Command): - _description = _("Removes a role assignment from system/domain/project : " - "user/group") + _description = _( + "Removes a role assignment from system/domain/project : " "user/group" + ) def get_parser(self, prog_name): parser = super(RemoveRole, self).get_parser(prog_name) @@ -325,25 +350,31 @@ class RemoveRole(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - if (not parsed_args.user and not parsed_args.domain and - not parsed_args.group and not parsed_args.project): - msg = _("Incorrect set of arguments provided. " - "See openstack --help for more details") + if ( + not parsed_args.user + and not parsed_args.domain + and not parsed_args.group + and not parsed_args.project + ): + msg = _( + "Incorrect set of arguments provided. " + "See openstack --help for more details" + ) raise exceptions.CommandError(msg) domain_id = None if parsed_args.role_domain: - domain_id = common.find_domain(identity_client, - parsed_args.role_domain).id + domain_id = common.find_domain( + identity_client, parsed_args.role_domain + ).id role = utils.find_resource( - identity_client.roles, - parsed_args.role, - domain_id=domain_id + identity_client.roles, parsed_args.role, domain_id=domain_id ) kwargs = _process_identity_and_resource_options( - parsed_args, self.app.client_manager.identity, - validate_actor_existence=False + parsed_args, + self.app.client_manager.identity, + validate_actor_existence=False, ) identity_client.roles.revoke(role.id, **kwargs) @@ -381,17 +412,21 @@ class SetRole(command.Command): domain_id = None if parsed_args.domain: - domain_id = common.find_domain(identity_client, - parsed_args.domain).id + domain_id = common.find_domain( + identity_client, parsed_args.domain + ).id options = common.get_immutable_options(parsed_args) - role = utils.find_resource(identity_client.roles, - parsed_args.role, - domain_id=domain_id) + role = utils.find_resource( + identity_client.roles, parsed_args.role, domain_id=domain_id + ) - identity_client.roles.update(role.id, name=parsed_args.name, - description=parsed_args.description, - options=options) + identity_client.roles.update( + role.id, + name=parsed_args.name, + description=parsed_args.description, + options=options, + ) class ShowRole(command.ShowOne): @@ -416,12 +451,13 @@ class ShowRole(command.ShowOne): domain_id = None if parsed_args.domain: - domain_id = common.find_domain(identity_client, - parsed_args.domain).id + domain_id = common.find_domain( + identity_client, parsed_args.domain + ).id - role = utils.find_resource(identity_client.roles, - parsed_args.role, - domain_id=domain_id) + role = utils.find_resource( + identity_client.roles, parsed_args.role, domain_id=domain_id + ) role._info.pop('links') return zip(*sorted(role._info.items())) diff --git a/openstackclient/identity/v3/role_assignment.py b/openstackclient/identity/v3/role_assignment.py index 9c2f3d249..0be6aafb6 100644 --- a/openstackclient/identity/v3/role_assignment.py +++ b/openstackclient/identity/v3/role_assignment.py @@ -84,14 +84,20 @@ class ListRoleAssignment(command.Lister): action="store_true", dest='authproject', help='Only list assignments for the project to which the ' - 'authenticated user\'s token is scoped', + 'authenticated user\'s token is scoped', ) return parser def _as_tuple(self, assignment): - return (assignment.role, assignment.user, assignment.group, - assignment.project, assignment.domain, assignment.system, - assignment.inherited) + return ( + assignment.role, + assignment.user, + assignment.group, + assignment.project, + assignment.domain, + assignment.system, + assignment.inherited, + ) def take_action(self, parsed_args): identity_client = self.app.client_manager.identity @@ -100,13 +106,14 @@ class ListRoleAssignment(command.Lister): role = None role_domain_id = None if parsed_args.role_domain: - role_domain_id = common.find_domain(identity_client, - parsed_args.role_domain).id + role_domain_id = common.find_domain( + identity_client, parsed_args.role_domain + ).id if parsed_args.role: role = utils.find_resource( identity_client.roles, parsed_args.role, - domain_id=role_domain_id + domain_id=role_domain_id, ) user = None @@ -118,10 +125,7 @@ class ListRoleAssignment(command.Lister): ) elif parsed_args.authuser: if auth_ref: - user = common.find_user( - identity_client, - auth_ref.user_id - ) + user = common.find_user(identity_client, auth_ref.user_id) system = None if parsed_args.system: @@ -138,15 +142,15 @@ class ListRoleAssignment(command.Lister): if parsed_args.project: project = common.find_project( identity_client, - common._get_token_resource(identity_client, 'project', - parsed_args.project), + common._get_token_resource( + identity_client, 'project', parsed_args.project + ), parsed_args.project_domain, ) elif parsed_args.authproject: if auth_ref: project = common.find_project( - identity_client, - auth_ref.project_id + identity_client, auth_ref.project_id ) group = None @@ -160,7 +164,13 @@ class ListRoleAssignment(command.Lister): include_names = True if parsed_args.names else False effective = True if parsed_args.effective else False columns = ( - 'Role', 'User', 'Group', 'Project', 'Domain', 'System', 'Inherited' + 'Role', + 'User', + 'Group', + 'Project', + 'Domain', + 'System', + 'Inherited', ) inherited_to = 'projects' if parsed_args.inherited else None @@ -173,7 +183,8 @@ class ListRoleAssignment(command.Lister): role=role, effective=effective, os_inherit_extension_inherited_to=inherited_to, - include_names=include_names) + include_names=include_names, + ) data_parsed = [] for assignment in data: @@ -181,8 +192,12 @@ class ListRoleAssignment(command.Lister): scope = assignment.scope if 'project' in scope: if include_names: - prj = '@'.join([scope['project']['name'], - scope['project']['domain']['name']]) + prj = '@'.join( + [ + scope['project']['name'], + scope['project']['domain']['name'], + ] + ) setattr(assignment, 'project', prj) else: setattr(assignment, 'project', scope['project']['id']) @@ -215,16 +230,24 @@ class ListRoleAssignment(command.Lister): if hasattr(assignment, 'user'): if include_names: - usr = '@'.join([assignment.user['name'], - assignment.user['domain']['name']]) + usr = '@'.join( + [ + assignment.user['name'], + assignment.user['domain']['name'], + ] + ) setattr(assignment, 'user', usr) else: setattr(assignment, 'user', assignment.user['id']) assignment.group = '' elif hasattr(assignment, 'group'): if include_names: - grp = '@'.join([assignment.group['name'], - assignment.group['domain']['name']]) + grp = '@'.join( + [ + assignment.group['name'], + assignment.group['domain']['name'], + ] + ) setattr(assignment, 'group', grp) else: setattr(assignment, 'group', assignment.group['id']) diff --git a/openstackclient/identity/v3/service.py b/openstackclient/identity/v3/service.py index 9dc669625..fde1799c1 100644 --- a/openstackclient/identity/v3/service.py +++ b/openstackclient/identity/v3/service.py @@ -101,14 +101,19 @@ class DeleteService(command.Command): identity_client.services.delete(service.id) except Exception as e: result += 1 - LOG.error(_("Failed to delete consumer with type, " - "name or ID '%(service)s': %(e)s"), - {'service': i, 'e': e}) + LOG.error( + _( + "Failed to delete consumer with type, " + "name or ID '%(service)s': %(e)s" + ), + {'service': i, 'e': e}, + ) if result > 0: total = len(parsed_args.service) - msg = (_("%(result)s of %(total)s services failed " - "to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s services failed " "to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -126,7 +131,6 @@ class ListService(command.Lister): return parser def take_action(self, parsed_args): - if parsed_args.long: columns = ('ID', 'Name', 'Type', 'Description', 'Enabled') else: @@ -179,8 +183,7 @@ class SetService(command.Command): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - service = common.find_service(identity_client, - parsed_args.service) + service = common.find_service(identity_client, parsed_args.service) kwargs = {} if parsed_args.type: kwargs['type'] = parsed_args.type @@ -193,10 +196,7 @@ class SetService(command.Command): if parsed_args.disable: kwargs['enabled'] = False - identity_client.services.update( - service.id, - **kwargs - ) + identity_client.services.update(service.id, **kwargs) class ShowService(command.ShowOne): diff --git a/openstackclient/identity/v3/service_provider.py b/openstackclient/identity/v3/service_provider.py index e106c787b..e5af74926 100644 --- a/openstackclient/identity/v3/service_provider.py +++ b/openstackclient/identity/v3/service_provider.py @@ -39,8 +39,10 @@ class CreateServiceProvider(command.ShowOne): '--auth-url', metavar='', required=True, - help=_('Authentication URL of remote federated service provider ' - '(required)'), + help=_( + 'Authentication URL of remote federated service provider ' + '(required)' + ), ) parser.add_argument( '--description', @@ -51,8 +53,10 @@ class CreateServiceProvider(command.ShowOne): '--service-provider-url', metavar='', required=True, - help=_('A service URL where SAML assertions are being sent ' - '(required)'), + help=_( + 'A service URL where SAML assertions are being sent ' + '(required)' + ), ) enable_service_provider = parser.add_mutually_exclusive_group() @@ -79,7 +83,8 @@ class CreateServiceProvider(command.ShowOne): auth_url=parsed_args.auth_url, description=parsed_args.description, enabled=parsed_args.enabled, - sp_url=parsed_args.service_provider_url) + sp_url=parsed_args.service_provider_url, + ) sp._info.pop('links', None) return zip(*sorted(sp._info.items())) @@ -106,14 +111,20 @@ class DeleteServiceProvider(command.Command): service_client.federation.service_providers.delete(i) except Exception as e: result += 1 - LOG.error(_("Failed to delete service provider with " - "name or ID '%(provider)s': %(e)s"), - {'provider': i, 'e': e}) + LOG.error( + _( + "Failed to delete service provider with " + "name or ID '%(provider)s': %(e)s" + ), + {'provider': i, 'e': e}, + ) if result > 0: total = len(parsed_args.service_provider) - msg = (_("%(result)s of %(total)s service providers failed" - " to delete.") % {'result': result, 'total': total}) + msg = _( + "%(result)s of %(total)s service providers failed" + " to delete." + ) % {'result': result, 'total': total} raise exceptions.CommandError(msg) @@ -125,11 +136,17 @@ class ListServiceProvider(command.Lister): data = service_client.federation.service_providers.list() column_headers = ('ID', 'Enabled', 'Description', 'Auth URL') - return (column_headers, - (utils.get_item_properties( - s, column_headers, + return ( + column_headers, + ( + utils.get_item_properties( + s, + column_headers, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class SetServiceProvider(command.Command): @@ -145,8 +162,10 @@ class SetServiceProvider(command.Command): parser.add_argument( '--auth-url', metavar='', - help=_('New Authentication URL of remote ' - 'federated service provider'), + help=_( + 'New Authentication URL of remote ' + 'federated service provider' + ), ) parser.add_argument( @@ -207,7 +226,8 @@ class ShowServiceProvider(command.ShowOne): service_provider = utils.find_resource( service_client.federation.service_providers, parsed_args.service_provider, - id=parsed_args.service_provider) + id=parsed_args.service_provider, + ) service_provider._info.pop('links', None) return zip(*sorted(service_provider._info.items())) diff --git a/openstackclient/identity/v3/tag.py b/openstackclient/identity/v3/tag.py index abf022d48..60cfb4be9 100644 --- a/openstackclient/identity/v3/tag.py +++ b/openstackclient/identity/v3/tag.py @@ -16,7 +16,6 @@ from openstackclient.i18n import _ class _CommaListAction(argparse.Action): - def __call__(self, parser, namespace, values, option_string=None): setattr(namespace, self.dest, values.split(',')) @@ -26,29 +25,41 @@ def add_tag_filtering_option_to_parser(parser, collection_name): '--tags', metavar='[,,...]', action=_CommaListAction, - help=_('List %s which have all given tag(s) ' - '(Comma-separated list of tags)') % collection_name + help=_( + 'List %s which have all given tag(s) ' + '(Comma-separated list of tags)' + ) + % collection_name, ) parser.add_argument( '--tags-any', metavar='[,,...]', action=_CommaListAction, - help=_('List %s which have any given tag(s) ' - '(Comma-separated list of tags)') % collection_name + help=_( + 'List %s which have any given tag(s) ' + '(Comma-separated list of tags)' + ) + % collection_name, ) parser.add_argument( '--not-tags', metavar='[,,...]', action=_CommaListAction, - help=_('Exclude %s which have all given tag(s) ' - '(Comma-separated list of tags)') % collection_name + help=_( + 'Exclude %s which have all given tag(s) ' + '(Comma-separated list of tags)' + ) + % collection_name, ) parser.add_argument( '--not-tags-any', metavar='[,,...]', action=_CommaListAction, - help=_('Exclude %s which have any given tag(s) ' - '(Comma-separated list of tags)') % collection_name + help=_( + 'Exclude %s which have any given tag(s) ' + '(Comma-separated list of tags)' + ) + % collection_name, ) @@ -71,8 +82,10 @@ def add_tag_option_to_parser_for_create(parser, resource_name): dest='tags', metavar='', default=[], - help=_('Tag to be added to the %s ' - '(repeat option to set multiple tags)') % resource_name + help=_( + 'Tag to be added to the %s ' '(repeat option to set multiple tags)' + ) + % resource_name, ) @@ -83,22 +96,30 @@ def add_tag_option_to_parser_for_set(parser, resource_name): dest='tags', metavar='', default=[], - help=_('Tag to be added to the %s ' - '(repeat option to set multiple tags)') % resource_name + help=_( + 'Tag to be added to the %s ' '(repeat option to set multiple tags)' + ) + % resource_name, ) parser.add_argument( '--clear-tags', action='store_true', - help=_('Clear tags associated with the %s. Specify ' - 'both --tag and --clear-tags to overwrite ' - 'current tags') % resource_name + help=_( + 'Clear tags associated with the %s. Specify ' + 'both --tag and --clear-tags to overwrite ' + 'current tags' + ) + % resource_name, ) parser.add_argument( '--remove-tag', metavar='', default=[], - help=_('Tag to be deleted from the %s ' - '(repeat option to delete multiple tags)') % resource_name + help=_( + 'Tag to be deleted from the %s ' + '(repeat option to delete multiple tags)' + ) + % resource_name, ) @@ -112,5 +133,4 @@ def update_tags_in_args(parsed_args, obj, args): args['tags'] = list(set(obj.tags)) return if parsed_args.tags: - args['tags'] = list(set(obj.tags).union( - set(parsed_args.tags))) + args['tags'] = list(set(obj.tags).union(set(parsed_args.tags))) diff --git a/openstackclient/identity/v3/token.py b/openstackclient/identity/v3/token.py index f14dd8bc3..c11de358a 100644 --- a/openstackclient/identity/v3/token.py +++ b/openstackclient/identity/v3/token.py @@ -40,8 +40,10 @@ class AuthorizeRequestToken(command.ShowOne): action='append', default=[], required=True, - help=_('Roles to authorize (name or ID) ' - '(repeat option to set multiple values) (required)'), + help=_( + 'Roles to authorize (name or ID) ' + '(repeat option to set multiple values) (required)' + ), ) return parser @@ -58,8 +60,8 @@ class AuthorizeRequestToken(command.ShowOne): roles.append(role_id) verifier_pin = identity_client.oauth1.request_tokens.authorize( - parsed_args.request_key, - roles) + parsed_args.request_key, roles + ) return zip(*sorted(verifier_pin._info.items())) @@ -73,40 +75,43 @@ class CreateAccessToken(command.ShowOne): '--consumer-key', metavar='', help=_('Consumer key (required)'), - required=True + required=True, ) parser.add_argument( '--consumer-secret', metavar='', help=_('Consumer secret (required)'), - required=True + required=True, ) parser.add_argument( '--request-key', metavar='', help=_('Request token to exchange for access token (required)'), - required=True + required=True, ) parser.add_argument( '--request-secret', metavar='', help=_('Secret associated with (required)'), - required=True + required=True, ) parser.add_argument( '--verifier', metavar='', help=_('Verifier associated with (required)'), - required=True + required=True, ) return parser def take_action(self, parsed_args): token_client = self.app.client_manager.identity.oauth1.access_tokens access_token = token_client.create( - parsed_args.consumer_key, parsed_args.consumer_secret, - parsed_args.request_key, parsed_args.request_secret, - parsed_args.verifier) + parsed_args.consumer_key, + parsed_args.consumer_secret, + parsed_args.request_key, + parsed_args.request_secret, + parsed_args.verifier, + ) return zip(*sorted(access_token._info.items())) @@ -119,20 +124,22 @@ class CreateRequestToken(command.ShowOne): '--consumer-key', metavar='', help=_('Consumer key (required)'), - required=True + required=True, ) parser.add_argument( '--consumer-secret', metavar='', help=_('Consumer secret (required)'), - required=True + required=True, ) parser.add_argument( '--project', metavar='', - help=_('Project that consumer wants to access (name or ID)' - ' (required)'), - required=True + help=_( + 'Project that consumer wants to access (name or ID)' + ' (required)' + ), + required=True, ) parser.add_argument( '--domain', @@ -146,19 +153,21 @@ class CreateRequestToken(command.ShowOne): if parsed_args.domain: domain = common.find_domain(identity_client, parsed_args.domain) - project = utils.find_resource(identity_client.projects, - parsed_args.project, - domain_id=domain.id) + project = utils.find_resource( + identity_client.projects, + parsed_args.project, + domain_id=domain.id, + ) else: - project = utils.find_resource(identity_client.projects, - parsed_args.project) + project = utils.find_resource( + identity_client.projects, parsed_args.project + ) token_client = identity_client.oauth1.request_tokens request_token = token_client.create( - parsed_args.consumer_key, - parsed_args.consumer_secret, - project.id) + parsed_args.consumer_key, parsed_args.consumer_secret, project.id + ) return zip(*sorted(request_token._info.items())) @@ -176,7 +185,8 @@ class IssueToken(command.ShowOne): auth_ref = self.app.client_manager.auth_ref if not auth_ref: raise exceptions.AuthorizationFailure( - _("Only an authorized user may issue a new token.")) + _("Only an authorized user may issue a new token.") + ) data = {} if auth_ref.auth_token: diff --git a/openstackclient/identity/v3/trust.py b/openstackclient/identity/v3/trust.py index 61273f410..f2899d594 100644 --- a/openstackclient/identity/v3/trust.py +++ b/openstackclient/identity/v3/trust.py @@ -54,23 +54,29 @@ class CreateTrust(command.ShowOne): metavar='', action='append', default=[], - help=_('Roles to authorize (name or ID) ' - '(repeat option to set multiple values, required)'), - required=True + help=_( + 'Roles to authorize (name or ID) ' + '(repeat option to set multiple values, required)' + ), + required=True, ) parser.add_argument( '--impersonate', dest='impersonate', action='store_true', default=False, - help=_('Tokens generated from the trust will represent ' - ' (defaults to False)'), + help=_( + 'Tokens generated from the trust will represent ' + ' (defaults to False)' + ), ) parser.add_argument( '--expiration', metavar='', - help=_('Sets an expiration date for the trust' - ' (format of YYYY-mm-ddTHH:MM:SS)'), + help=_( + 'Sets an expiration date for the trust' + ' (format of YYYY-mm-ddTHH:MM:SS)' + ), ) common.add_project_domain_option_to_parser(parser) parser.add_argument( @@ -93,15 +99,15 @@ class CreateTrust(command.ShowOne): # trustee, project and role are optional, but that makes the trust # pointless, and trusts are immutable, so let's enforce it at the # client level. - trustor_id = common.find_user(identity_client, - parsed_args.trustor, - parsed_args.trustor_domain).id - trustee_id = common.find_user(identity_client, - parsed_args.trustee, - parsed_args.trustee_domain).id - project_id = common.find_project(identity_client, - parsed_args.project, - parsed_args.project_domain).id + trustor_id = common.find_user( + identity_client, parsed_args.trustor, parsed_args.trustor_domain + ).id + trustee_id = common.find_user( + identity_client, parsed_args.trustee, parsed_args.trustee_domain + ).id + project_id = common.find_project( + identity_client, parsed_args.project, parsed_args.project_domain + ).id role_ids = [] for role in parsed_args.role: @@ -116,11 +122,13 @@ class CreateTrust(command.ShowOne): expires_at = None if parsed_args.expiration: - expires_at = datetime.datetime.strptime(parsed_args.expiration, - '%Y-%m-%dT%H:%M:%S') + expires_at = datetime.datetime.strptime( + parsed_args.expiration, '%Y-%m-%dT%H:%M:%S' + ) trust = identity_client.trusts.create( - trustee_id, trustor_id, + trustee_id, + trustor_id, impersonation=parsed_args.impersonate, project=project_id, role_ids=role_ids, @@ -157,19 +165,24 @@ class DeleteTrust(command.Command): errors = 0 for trust in parsed_args.trust: try: - trust_obj = utils.find_resource(identity_client.trusts, - trust) + trust_obj = utils.find_resource(identity_client.trusts, trust) identity_client.trusts.delete(trust_obj.id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete trust with " - "name or ID '%(trust)s': %(e)s"), - {'trust': trust, 'e': e}) + LOG.error( + _( + "Failed to delete trust with " + "name or ID '%(trust)s': %(e)s" + ), + {'trust': trust, 'e': e}, + ) if errors > 0: total = len(parsed_args.trust) - msg = (_("%(errors)s of %(total)s trusts failed " - "to delete.") % {'errors': errors, 'total': total}) + msg = _("%(errors)s of %(total)s trusts failed " "to delete.") % { + 'errors': errors, + 'total': total, + } raise exceptions.CommandError(msg) @@ -210,12 +223,14 @@ class ListTrust(command.Lister): identity_client = self.app.client_manager.identity auth_ref = self.app.client_manager.auth_ref - if parsed_args.authuser and any([ - parsed_args.trustor, - parsed_args.trustor_domain, - parsed_args.trustee, - parsed_args.trustee_domain, - ]): + if parsed_args.authuser and any( + [ + parsed_args.trustor, + parsed_args.trustor_domain, + parsed_args.trustee, + parsed_args.trustee_domain, + ] + ): msg = _("--authuser cannot be used with --trustee or --trustor") raise exceptions.CommandError(msg) @@ -229,10 +244,7 @@ class ListTrust(command.Lister): if parsed_args.authuser: if auth_ref: - user = common.find_user( - identity_client, - auth_ref.user_id - ) + user = common.find_user(identity_client, auth_ref.user_id) # We need two calls here as we want trusts with # either the trustor or the trustee set to current user # using a single call would give us trusts with both @@ -262,14 +274,26 @@ class ListTrust(command.Lister): trustee_user=trustee, ) - columns = ('ID', 'Expires At', 'Impersonation', 'Project ID', - 'Trustee User ID', 'Trustor User ID') + columns = ( + 'ID', + 'Expires At', + 'Impersonation', + 'Project ID', + 'Trustee User ID', + 'Trustor User ID', + ) - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class ShowTrust(command.ShowOne): @@ -286,8 +310,7 @@ class ShowTrust(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - trust = utils.find_resource(identity_client.trusts, - parsed_args.trust) + trust = utils.find_resource(identity_client.trusts, parsed_args.trust) trust._info.pop('roles_links', None) trust._info.pop('links', None) diff --git a/openstackclient/identity/v3/unscoped_saml.py b/openstackclient/identity/v3/unscoped_saml.py index f7598f178..d26035d35 100644 --- a/openstackclient/identity/v3/unscoped_saml.py +++ b/openstackclient/identity/v3/unscoped_saml.py @@ -30,11 +30,17 @@ class ListAccessibleDomains(command.Lister): columns = ('ID', 'Enabled', 'Name', 'Description') identity_client = self.app.client_manager.identity data = identity_client.federation.domains.list() - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) class ListAccessibleProjects(command.Lister): @@ -44,8 +50,14 @@ class ListAccessibleProjects(command.Lister): columns = ('ID', 'Domain ID', 'Enabled', 'Name') identity_client = self.app.client_manager.identity data = identity_client.federation.projects.list() - return (columns, - (utils.get_item_properties( - s, columns, + return ( + columns, + ( + utils.get_item_properties( + s, + columns, formatters={}, - ) for s in data)) + ) + for s in data + ), + ) diff --git a/openstackclient/identity/v3/user.py b/openstackclient/identity/v3/user.py index cbc112a05..dfc66b3de 100644 --- a/openstackclient/identity/v3/user.py +++ b/openstackclient/identity/v3/user.py @@ -53,8 +53,9 @@ def _get_options_for_user(identity_client, parsed_args): if parsed_args.disable_multi_factor_auth: options['multi_factor_auth_enabled'] = False if parsed_args.multi_factor_auth_rule: - auth_rules = [rule.split(",") for rule in - parsed_args.multi_factor_auth_rule] + auth_rules = [ + rule.split(",") for rule in parsed_args.multi_factor_auth_rule + ] if auth_rules: options['multi_factor_auth_rules'] = auth_rules return options @@ -66,54 +67,70 @@ def _add_user_options(parser): parser.add_argument( '--ignore-lockout-failure-attempts', action="store_true", - help=_('Opt into ignoring the number of times a user has ' - 'authenticated and locking out the user as a result'), + help=_( + 'Opt into ignoring the number of times a user has ' + 'authenticated and locking out the user as a result' + ), ) parser.add_argument( '--no-ignore-lockout-failure-attempts', action="store_true", - help=_('Opt out of ignoring the number of times a user has ' - 'authenticated and locking out the user as a result'), + help=_( + 'Opt out of ignoring the number of times a user has ' + 'authenticated and locking out the user as a result' + ), ) parser.add_argument( '--ignore-password-expiry', action="store_true", - help=_('Opt into allowing user to continue using passwords that ' - 'may be expired'), + help=_( + 'Opt into allowing user to continue using passwords that ' + 'may be expired' + ), ) parser.add_argument( '--no-ignore-password-expiry', action="store_true", - help=_('Opt out of allowing user to continue using passwords ' - 'that may be expired'), + help=_( + 'Opt out of allowing user to continue using passwords ' + 'that may be expired' + ), ) parser.add_argument( '--ignore-change-password-upon-first-use', action="store_true", - help=_('Control if a user should be forced to change their password ' - 'immediately after they log into keystone for the first time. ' - 'Opt into ignoring the user to change their password during ' - 'first time login in keystone'), + help=_( + 'Control if a user should be forced to change their password ' + 'immediately after they log into keystone for the first time. ' + 'Opt into ignoring the user to change their password during ' + 'first time login in keystone' + ), ) parser.add_argument( '--no-ignore-change-password-upon-first-use', action="store_true", - help=_('Control if a user should be forced to change their password ' - 'immediately after they log into keystone for the first time. ' - 'Opt out of ignoring the user to change their password during ' - 'first time login in keystone'), + help=_( + 'Control if a user should be forced to change their password ' + 'immediately after they log into keystone for the first time. ' + 'Opt out of ignoring the user to change their password during ' + 'first time login in keystone' + ), ) parser.add_argument( '--enable-lock-password', action="store_true", - help=_('Disables the ability for a user to change its password ' - 'through self-service APIs'), + help=_( + 'Disables the ability for a user to change its password ' + 'through self-service APIs' + ), ) parser.add_argument( '--disable-lock-password', action="store_true", - help=_('Enables the ability for a user to change its password ' - 'through self-service APIs'), + help=_( + 'Enables the ability for a user to change its password ' + 'through self-service APIs' + ), ) parser.add_argument( '--enable-multi-factor-auth', @@ -130,11 +147,13 @@ def _add_user_options(parser): metavar='', action="append", default=[], - help=_('Set multi-factor auth rules. For example, to set a rule ' - 'requiring the "password" and "totp" auth methods to be ' - 'provided, use: "--multi-factor-auth-rule password,totp". ' - 'May be provided multiple times to set different rule ' - 'combinations.') + help=_( + 'Set multi-factor auth rules. For example, to set a rule ' + 'requiring the "password" and "totp" auth methods to be ' + 'provided, use: "--multi-factor-auth-rule password,totp". ' + 'May be provided multiple times to set different rule ' + 'combinations.' + ), ) @@ -205,14 +224,17 @@ class CreateUser(command.ShowOne): project_id = None if parsed_args.project: - project_id = common.find_project(identity_client, - parsed_args.project, - parsed_args.project_domain).id + project_id = common.find_project( + identity_client, + parsed_args.project, + parsed_args.project_domain, + ).id domain_id = None if parsed_args.domain: - domain_id = common.find_domain(identity_client, - parsed_args.domain).id + domain_id = common.find_domain( + identity_client, parsed_args.domain + ).id enabled = True if parsed_args.disable: @@ -221,8 +243,12 @@ class CreateUser(command.ShowOne): parsed_args.password = utils.get_password(self.app.stdin) if not parsed_args.password: - LOG.warning(_("No password was supplied, authentication will fail " - "when a user does not have a password.")) + LOG.warning( + _( + "No password was supplied, authentication will fail " + "when a user does not have a password." + ) + ) options = _get_options_for_user(identity_client, parsed_args) try: @@ -238,9 +264,11 @@ class CreateUser(command.ShowOne): ) except ks_exc.Conflict: if parsed_args.or_show: - user = utils.find_resource(identity_client.users, - parsed_args.name, - domain_id=domain_id) + user = utils.find_resource( + identity_client.users, + parsed_args.name, + domain_id=domain_id, + ) LOG.info(_('Returning existing user %s'), user.name) else: raise @@ -277,23 +305,28 @@ class DeleteUser(command.Command): for user in parsed_args.users: try: if domain is not None: - user_obj = utils.find_resource(identity_client.users, - user, - domain_id=domain.id) + user_obj = utils.find_resource( + identity_client.users, user, domain_id=domain.id + ) else: - user_obj = utils.find_resource(identity_client.users, - user) + user_obj = utils.find_resource(identity_client.users, user) identity_client.users.delete(user_obj.id) except Exception as e: errors += 1 - LOG.error(_("Failed to delete user with " - "name or ID '%(user)s': %(e)s"), - {'user': user, 'e': e}) + LOG.error( + _( + "Failed to delete user with " + "name or ID '%(user)s': %(e)s" + ), + {'user': user, 'e': e}, + ) if errors > 0: total = len(parsed_args.users) - msg = (_("%(errors)s of %(total)s users failed " - "to delete.") % {'errors': errors, 'total': total}) + msg = _("%(errors)s of %(total)s users failed " "to delete.") % { + 'errors': errors, + 'total': total, + } raise exceptions.CommandError(msg) @@ -331,21 +364,20 @@ class ListUser(command.Lister): domain = None if parsed_args.domain: - domain = common.find_domain(identity_client, - parsed_args.domain).id + domain = common.find_domain(identity_client, parsed_args.domain).id group = None if parsed_args.group: - group = common.find_group(identity_client, - parsed_args.group, - parsed_args.domain).id + group = common.find_group( + identity_client, parsed_args.group, parsed_args.domain + ).id if parsed_args.project: if domain is not None: project = utils.find_resource( identity_client.projects, parsed_args.project, - domain_id=domain + domain_id=domain, ).id else: project = utils.find_resource( @@ -354,7 +386,8 @@ class ListUser(command.Lister): ).id assignments = identity_client.role_assignments.list( - project=project) + project=project + ) # NOTE(stevemar): If a user has more than one role on a project # then they will have two entries in the returned data. Since we @@ -379,8 +412,15 @@ class ListUser(command.Lister): # Column handling if parsed_args.long: - columns = ['ID', 'Name', 'Default Project Id', 'Domain Id', - 'Description', 'Email', 'Enabled'] + columns = [ + 'ID', + 'Name', + 'Default Project Id', + 'Domain Id', + 'Description', + 'Email', + 'Enabled', + ] column_headers = copy.deepcopy(columns) column_headers[2] = 'Project' column_headers[3] = 'Domain' @@ -390,10 +430,14 @@ class ListUser(command.Lister): return ( column_headers, - (utils.get_item_properties( - s, columns, - formatters={}, - ) for s in data) + ( + utils.get_item_properties( + s, + columns, + formatters={}, + ) + for s in data + ), ) @@ -415,8 +459,10 @@ class SetUser(command.Command): parser.add_argument( '--domain', metavar='', - help=_('Domain the user belongs to (name or ID). This can be ' - 'used in case collisions between user names exist.'), + help=_( + 'Domain the user belongs to (name or ID). This can be ' + 'used in case collisions between user names exist.' + ), ) parser.add_argument( '--project', @@ -467,17 +513,21 @@ class SetUser(command.Command): parsed_args.password = utils.get_password(self.app.stdin) if '' == parsed_args.password: - LOG.warning(_("No password was supplied, authentication will fail " - "when a user does not have a password.")) + LOG.warning( + _( + "No password was supplied, authentication will fail " + "when a user does not have a password." + ) + ) - user_str = common._get_token_resource(identity_client, 'user', - parsed_args.user, - parsed_args.domain) + user_str = common._get_token_resource( + identity_client, 'user', parsed_args.user, parsed_args.domain + ) if parsed_args.domain: domain = common.find_domain(identity_client, parsed_args.domain) - user = utils.find_resource(identity_client.users, - user_str, - domain_id=domain.id) + user = utils.find_resource( + identity_client.users, user_str, domain_id=domain.id + ) else: user = utils.find_resource( identity_client.users, @@ -494,9 +544,11 @@ class SetUser(command.Command): if parsed_args.description: kwargs['description'] = parsed_args.description if parsed_args.project: - project_id = common.find_project(identity_client, - parsed_args.project, - parsed_args.project_domain).id + project_id = common.find_project( + identity_client, + parsed_args.project, + parsed_args.project_domain, + ).id kwargs['default_project'] = project_id kwargs['enabled'] = user.enabled if parsed_args.enable: @@ -556,16 +608,22 @@ class SetPasswordUser(command.Command): current_password = parsed_args.original_password if current_password is None: current_password = utils.get_password( - self.app.stdin, prompt="Current Password:", confirm=False) + self.app.stdin, prompt="Current Password:", confirm=False + ) password = parsed_args.password if password is None: password = utils.get_password( - self.app.stdin, prompt="New Password:") + self.app.stdin, prompt="New Password:" + ) if '' == password: - LOG.warning(_("No password was supplied, authentication will fail " - "when a user does not have a password.")) + LOG.warning( + _( + "No password was supplied, authentication will fail " + "when a user does not have a password." + ) + ) identity_client.users.update_password(current_password, password) @@ -590,17 +648,16 @@ class ShowUser(command.ShowOne): def take_action(self, parsed_args): identity_client = self.app.client_manager.identity - user_str = common._get_token_resource(identity_client, 'user', - parsed_args.user, - parsed_args.domain) + user_str = common._get_token_resource( + identity_client, 'user', parsed_args.user, parsed_args.domain + ) if parsed_args.domain: domain = common.find_domain(identity_client, parsed_args.domain) - user = utils.find_resource(identity_client.users, - user_str, - domain_id=domain.id) + user = utils.find_resource( + identity_client.users, user_str, domain_id=domain.id + ) else: - user = utils.find_resource(identity_client.users, - user_str) + user = utils.find_resource(identity_client.users, user_str) user._info.pop('links') return zip(*sorted(user._info.items())) diff --git a/openstackclient/tests/functional/identity/v2/common.py b/openstackclient/tests/functional/identity/v2/common.py index 43c0cbf27..9d3601eb3 100644 --- a/openstackclient/tests/functional/identity/v2/common.py +++ b/openstackclient/tests/functional/identity/v2/common.py @@ -23,21 +23,37 @@ BASIC_LIST_HEADERS = ['ID', 'Name'] class IdentityTests(base.TestCase): - """Functional tests for Identity commands. """ + """Functional tests for Identity commands.""" USER_FIELDS = ['email', 'enabled', 'id', 'name', 'project_id', 'username'] PROJECT_FIELDS = ['enabled', 'id', 'name', 'description'] TOKEN_FIELDS = ['expires', 'id', 'project_id', 'user_id'] ROLE_FIELDS = ['id', 'name', 'domain_id'] SERVICE_FIELDS = ['id', 'enabled', 'name', 'type', 'description'] - ENDPOINT_FIELDS = ['id', 'region', 'service_id', 'service_name', - 'service_type', 'publicurl', - 'adminurl', 'internalurl'] + ENDPOINT_FIELDS = [ + 'id', + 'region', + 'service_id', + 'service_name', + 'service_type', + 'publicurl', + 'adminurl', + 'internalurl', + ] - EC2_CREDENTIALS_FIELDS = ['access', 'project_id', 'secret', - 'trust_id', 'user_id'] - EC2_CREDENTIALS_LIST_HEADERS = ['Access', 'Secret', - 'Project ID', 'User ID'] + EC2_CREDENTIALS_FIELDS = [ + 'access', + 'project_id', + 'secret', + 'trust_id', + 'user_id', + ] + EC2_CREDENTIALS_LIST_HEADERS = [ + 'Access', + 'Secret', + 'Project ID', + 'User ID', + ] CATALOG_LIST_HEADERS = ['Name', 'Type', 'Endpoints'] ENDPOINT_LIST_HEADERS = ['ID', 'Region', 'Service Name', 'Service Type'] @@ -53,7 +69,8 @@ class IdentityTests(base.TestCase): 'project create ' '--description %(description)s ' '--enable ' - '%(name)s' % { + '%(name)s' + % { 'description': cls.project_description, 'name': cls.project_name, } @@ -70,7 +87,8 @@ class IdentityTests(base.TestCase): try: cls.openstack( '--os-identity-api-version 2 ' - 'project delete %s' % cls.project_name) + 'project delete %s' % cls.project_name + ) finally: super(IdentityTests, cls).tearDownClass() @@ -78,7 +96,8 @@ class IdentityTests(base.TestCase): super(IdentityTests, self).setUp() # prepare v2 env ver_fixture = fixtures.EnvironmentVariable( - 'OS_IDENTITY_API_VERSION', '2.0') + 'OS_IDENTITY_API_VERSION', '2.0' + ) self.useFixture(ver_fixture) auth_url = os.environ.get('OS_AUTH_URL') if auth_url: @@ -93,13 +112,14 @@ class IdentityTests(base.TestCase): raw_output = self.openstack( 'project create ' '--description %(description)s ' - '--enable %(name)s' % {'description': project_description, - 'name': project_name}) + '--enable %(name)s' + % {'description': project_description, 'name': project_name} + ) project = self.parse_show_as_object(raw_output) if add_clean_up: self.addCleanup( - self.openstack, - 'project delete %s' % project['id']) + self.openstack, 'project delete %s' % project['id'] + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.PROJECT_FIELDS) return project_name @@ -114,14 +134,19 @@ class IdentityTests(base.TestCase): '--password %(password)s ' '--email %(email)s ' '--enable ' - '%(name)s' % {'project': self.project_name, - 'email': email, - 'password': password, - 'name': username}) + '%(name)s' + % { + 'project': self.project_name, + 'email': email, + 'password': password, + 'name': username, + } + ) if add_clean_up: self.addCleanup( self.openstack, - 'user delete %s' % self.parse_show_as_object(raw_output)['id']) + 'user delete %s' % self.parse_show_as_object(raw_output)['id'], + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.USER_FIELDS) return username @@ -131,9 +156,7 @@ class IdentityTests(base.TestCase): raw_output = self.openstack('role create %s' % role_name) role = self.parse_show_as_object(raw_output) if add_clean_up: - self.addCleanup( - self.openstack, - 'role delete %s' % role['id']) + self.addCleanup(self.openstack, 'role delete %s' % role['id']) items = self.parse_show(raw_output) self.assert_show_fields(items, self.ROLE_FIELDS) self.assertEqual(role_name, role['name']) @@ -145,8 +168,8 @@ class IdentityTests(base.TestCase): access_key = ec2_credentials['access'] if add_clean_up: self.addCleanup( - self.openstack, - 'ec2 credentials delete %s' % access_key) + self.openstack, 'ec2 credentials delete %s' % access_key + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.EC2_CREDENTIALS_FIELDS) return access_key @@ -155,8 +178,7 @@ class IdentityTests(base.TestCase): raw_output = self.openstack('token issue') token = self.parse_show_as_object(raw_output) if add_clean_up: - self.addCleanup(self.openstack, - 'token revoke %s' % token['id']) + self.addCleanup(self.openstack, 'token revoke %s' % token['id']) items = self.parse_show(raw_output) self.assert_show_fields(items, self.TOKEN_FIELDS) return token['id'] @@ -169,13 +191,18 @@ class IdentityTests(base.TestCase): 'service create ' '--name %(name)s ' '--description %(description)s ' - '%(type)s' % {'name': service_name, - 'description': description, - 'type': type_name}) + '%(type)s' + % { + 'name': service_name, + 'description': description, + 'type': type_name, + } + ) if add_clean_up: service = self.parse_show_as_object(raw_output) - self.addCleanup(self.openstack, - 'service delete %s' % service['id']) + self.addCleanup( + self.openstack, 'service delete %s' % service['id'] + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.SERVICE_FIELDS) return service_name @@ -192,16 +219,20 @@ class IdentityTests(base.TestCase): '--adminurl %(adminurl)s ' '--internalurl %(internalurl)s ' '--region %(region)s ' - '%(service)s' % {'publicurl': public_url, - 'adminurl': admin_url, - 'internalurl': internal_url, - 'region': region_id, - 'service': service_name}) + '%(service)s' + % { + 'publicurl': public_url, + 'adminurl': admin_url, + 'internalurl': internal_url, + 'region': region_id, + 'service': service_name, + } + ) endpoint = self.parse_show_as_object(raw_output) if add_clean_up: self.addCleanup( - self.openstack, - 'endpoint delete %s' % endpoint['id']) + self.openstack, 'endpoint delete %s' % endpoint['id'] + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.ENDPOINT_FIELDS) return endpoint['id'] diff --git a/openstackclient/tests/functional/identity/v2/test_catalog.py b/openstackclient/tests/functional/identity/v2/test_catalog.py index f403fbfc7..1cef314f7 100644 --- a/openstackclient/tests/functional/identity/v2/test_catalog.py +++ b/openstackclient/tests/functional/identity/v2/test_catalog.py @@ -14,7 +14,6 @@ from openstackclient.tests.functional.identity.v2 import common class CatalogTests(common.IdentityTests): - def test_catalog_list(self): raw_output = self.openstack('catalog list') items = self.parse_listing(raw_output) diff --git a/openstackclient/tests/functional/identity/v2/test_ec2_credentials.py b/openstackclient/tests/functional/identity/v2/test_ec2_credentials.py index 43dff91f2..6d25bdae2 100644 --- a/openstackclient/tests/functional/identity/v2/test_ec2_credentials.py +++ b/openstackclient/tests/functional/identity/v2/test_ec2_credentials.py @@ -14,7 +14,6 @@ from openstackclient.tests.functional.identity.v2 import common class EC2CredentialsTests(common.IdentityTests): - def test_ec2_credentials_create(self): self._create_dummy_ec2_credentials() diff --git a/openstackclient/tests/functional/identity/v2/test_endpoint.py b/openstackclient/tests/functional/identity/v2/test_endpoint.py index 9df5ca8aa..bafbfdaed 100644 --- a/openstackclient/tests/functional/identity/v2/test_endpoint.py +++ b/openstackclient/tests/functional/identity/v2/test_endpoint.py @@ -14,21 +14,20 @@ from openstackclient.tests.functional.identity.v2 import common class EndpointTests(common.IdentityTests): - def test_endpoint_create(self): self._create_dummy_endpoint() def test_endpoint_delete(self): endpoint_id = self._create_dummy_endpoint(add_clean_up=False) - raw_output = self.openstack( - 'endpoint delete %s' % endpoint_id) + raw_output = self.openstack('endpoint delete %s' % endpoint_id) self.assertEqual(0, len(raw_output)) def test_endpoint_multi_delete(self): endpoint_id_1 = self._create_dummy_endpoint(add_clean_up=False) endpoint_id_2 = self._create_dummy_endpoint(add_clean_up=False) raw_output = self.openstack( - 'endpoint delete ' + endpoint_id_1 + ' ' + endpoint_id_2) + 'endpoint delete ' + endpoint_id_1 + ' ' + endpoint_id_2 + ) self.assertEqual(0, len(raw_output)) def test_endpoint_list(self): diff --git a/openstackclient/tests/functional/identity/v2/test_project.py b/openstackclient/tests/functional/identity/v2/test_project.py index 38777c36c..1ad0edaa3 100644 --- a/openstackclient/tests/functional/identity/v2/test_project.py +++ b/openstackclient/tests/functional/identity/v2/test_project.py @@ -16,7 +16,6 @@ from openstackclient.tests.functional.identity.v2 import common class ProjectTests(common.IdentityTests): - def test_project_create(self): project_name = data_utils.rand_name('TestProject') description = data_utils.rand_name('description') @@ -26,12 +25,9 @@ class ProjectTests(common.IdentityTests): '--enable ' '--property k1=v1 ' '--property k2=v2 ' - '%(name)s' % {'description': description, - 'name': project_name}) - self.addCleanup( - self.openstack, - 'project delete %s' % project_name + '%(name)s' % {'description': description, 'name': project_name} ) + self.addCleanup(self.openstack, 'project delete %s' % project_name) items = self.parse_show(raw_output) show_fields = list(self.PROJECT_FIELDS) show_fields.extend(['k1', 'k2']) @@ -42,8 +38,7 @@ class ProjectTests(common.IdentityTests): def test_project_delete(self): project_name = self._create_dummy_project(add_clean_up=False) - raw_output = self.openstack( - 'project delete %s' % project_name) + raw_output = self.openstack('project delete %s' % project_name) self.assertEqual(0, len(raw_output)) def test_project_list(self): @@ -59,13 +54,11 @@ class ProjectTests(common.IdentityTests): '--name %(new_name)s ' '--disable ' '--property k0=v0 ' - '%(name)s' % {'new_name': new_project_name, - 'name': project_name}) + '%(name)s' % {'new_name': new_project_name, 'name': project_name} + ) self.assertEqual(0, len(raw_output)) # check project details - raw_output = self.openstack( - 'project show %s' % new_project_name - ) + raw_output = self.openstack('project show %s' % new_project_name) items = self.parse_show(raw_output) fields = list(self.PROJECT_FIELDS) fields.extend(['properties']) @@ -77,9 +70,7 @@ class ProjectTests(common.IdentityTests): def test_project_show(self): project_name = self._create_dummy_project() - raw_output = self.openstack( - 'project show %s' % project_name - ) + raw_output = self.openstack('project show %s' % project_name) items = self.parse_show(raw_output) fields = list(self.PROJECT_FIELDS) fields.extend(['properties']) diff --git a/openstackclient/tests/functional/identity/v2/test_role.py b/openstackclient/tests/functional/identity/v2/test_role.py index 124603d8b..fb22f0181 100644 --- a/openstackclient/tests/functional/identity/v2/test_role.py +++ b/openstackclient/tests/functional/identity/v2/test_role.py @@ -14,7 +14,6 @@ from openstackclient.tests.functional.identity.v2 import common class RoleTests(common.IdentityTests): - def test_role_create(self): self._create_dummy_role() @@ -42,17 +41,25 @@ class RoleTests(common.IdentityTests): 'role add ' '--project %(project)s ' '--user %(user)s ' - '%(role)s' % {'project': self.project_name, - 'user': username, - 'role': role_name}) + '%(role)s' + % { + 'project': self.project_name, + 'user': username, + 'role': role_name, + } + ) self.addCleanup( self.openstack, 'role remove ' '--project %(project)s ' '--user %(user)s ' - '%(role)s' % {'project': self.project_name, - 'user': username, - 'role': role_name}) + '%(role)s' + % { + 'project': self.project_name, + 'user': username, + 'role': role_name, + }, + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.ROLE_FIELDS) @@ -63,16 +70,24 @@ class RoleTests(common.IdentityTests): 'role add ' '--project %(project)s ' '--user %(user)s ' - '%(role)s' % {'project': self.project_name, - 'user': username, - 'role': role_name}) + '%(role)s' + % { + 'project': self.project_name, + 'user': username, + 'role': role_name, + } + ) del_raw_output = self.openstack( 'role remove ' '--project %(project)s ' '--user %(user)s ' - '%(role)s' % {'project': self.project_name, - 'user': username, - 'role': role_name}) + '%(role)s' + % { + 'project': self.project_name, + 'user': username, + 'role': role_name, + } + ) items = self.parse_show(add_raw_output) self.assert_show_fields(items, self.ROLE_FIELDS) self.assertEqual(0, len(del_raw_output)) diff --git a/openstackclient/tests/functional/identity/v2/test_service.py b/openstackclient/tests/functional/identity/v2/test_service.py index d0e038040..7afa967d4 100644 --- a/openstackclient/tests/functional/identity/v2/test_service.py +++ b/openstackclient/tests/functional/identity/v2/test_service.py @@ -14,7 +14,6 @@ from openstackclient.tests.functional.identity.v2 import common class ServiceTests(common.IdentityTests): - def test_service_create(self): self._create_dummy_service() @@ -27,7 +26,8 @@ class ServiceTests(common.IdentityTests): service_name_1 = self._create_dummy_service(add_clean_up=False) service_name_2 = self._create_dummy_service(add_clean_up=False) raw_output = self.openstack( - 'service delete ' + service_name_1 + ' ' + service_name_2) + 'service delete ' + service_name_1 + ' ' + service_name_2 + ) self.assertEqual(0, len(raw_output)) def test_service_list(self): @@ -38,7 +38,6 @@ class ServiceTests(common.IdentityTests): def test_service_show(self): service_name = self._create_dummy_service() - raw_output = self.openstack( - 'service show %s' % service_name) + raw_output = self.openstack('service show %s' % service_name) items = self.parse_show(raw_output) self.assert_show_fields(items, self.SERVICE_FIELDS) diff --git a/openstackclient/tests/functional/identity/v2/test_token.py b/openstackclient/tests/functional/identity/v2/test_token.py index f85697448..d2ef78e38 100644 --- a/openstackclient/tests/functional/identity/v2/test_token.py +++ b/openstackclient/tests/functional/identity/v2/test_token.py @@ -14,7 +14,6 @@ from openstackclient.tests.functional.identity.v2 import common class TokenTests(common.IdentityTests): - def test_token_issue(self): self._create_dummy_token() diff --git a/openstackclient/tests/functional/identity/v2/test_user.py b/openstackclient/tests/functional/identity/v2/test_user.py index ac609b94c..d30e3c456 100644 --- a/openstackclient/tests/functional/identity/v2/test_user.py +++ b/openstackclient/tests/functional/identity/v2/test_user.py @@ -17,7 +17,6 @@ from openstackclient.tests.functional.identity.v2 import common class UserTests(common.IdentityTests): - def test_user_create(self): self._create_dummy_user() @@ -37,12 +36,13 @@ class UserTests(common.IdentityTests): user = self.parse_show_as_object(raw_output) new_username = data_utils.rand_name('NewTestUser') new_email = data_utils.rand_name() + '@example.com' - raw_output = self.openstack('user set ' - '--email %(email)s ' - '--name %(new_name)s ' - '%(id)s' % {'email': new_email, - 'new_name': new_username, - 'id': user['id']}) + raw_output = self.openstack( + 'user set ' + '--email %(email)s ' + '--name %(new_name)s ' + '%(id)s' + % {'email': new_email, 'new_name': new_username, 'id': user['id']} + ) self.assertEqual(0, len(raw_output)) raw_output = self.openstack('user show %s' % new_username) new_user = self.parse_show_as_object(raw_output) @@ -56,5 +56,6 @@ class UserTests(common.IdentityTests): self.assert_show_fields(items, self.USER_FIELDS) def test_bad_user_command(self): - self.assertRaises(exceptions.CommandFailed, - self.openstack, 'user unlist') + self.assertRaises( + exceptions.CommandFailed, self.openstack, 'user unlist' + ) diff --git a/openstackclient/tests/functional/identity/v3/common.py b/openstackclient/tests/functional/identity/v3/common.py index a5edd9a54..67eccddda 100644 --- a/openstackclient/tests/functional/identity/v3/common.py +++ b/openstackclient/tests/functional/identity/v3/common.py @@ -23,47 +23,121 @@ SYSTEM_CLOUD = os.environ.get('OS_SYSTEM_CLOUD', 'devstack-system-admin') class IdentityTests(base.TestCase): - """Functional tests for Identity commands. """ + """Functional tests for Identity commands.""" DOMAIN_FIELDS = ['description', 'enabled', 'id', 'name'] GROUP_FIELDS = ['description', 'domain_id', 'id', 'name'] TOKEN_FIELDS = ['expires', 'id', 'project_id', 'user_id'] - USER_FIELDS = ['email', 'enabled', 'id', 'name', 'name', - 'domain_id', 'default_project_id', 'description', - 'password_expires_at'] - PROJECT_FIELDS = ['description', 'id', 'domain_id', 'is_domain', - 'enabled', 'name', 'parent_id'] + USER_FIELDS = [ + 'email', + 'enabled', + 'id', + 'name', + 'name', + 'domain_id', + 'default_project_id', + 'description', + 'password_expires_at', + ] + PROJECT_FIELDS = [ + 'description', + 'id', + 'domain_id', + 'is_domain', + 'enabled', + 'name', + 'parent_id', + ] ROLE_FIELDS = ['id', 'name', 'domain_id', 'description'] SERVICE_FIELDS = ['id', 'enabled', 'name', 'type', 'description'] REGION_FIELDS = ['description', 'enabled', 'parent_region', 'region'] - ENDPOINT_FIELDS = ['id', 'region', 'region_id', 'service_id', - 'service_name', 'service_type', 'enabled', - 'interface', 'url'] + ENDPOINT_FIELDS = [ + 'id', + 'region', + 'region_id', + 'service_id', + 'service_name', + 'service_type', + 'enabled', + 'interface', + 'url', + ] REGION_LIST_HEADERS = ['Region', 'Parent Region', 'Description'] - ENDPOINT_LIST_HEADERS = ['ID', 'Region', 'Service Name', 'Service Type', - 'Enabled', 'Interface', 'URL'] + ENDPOINT_LIST_HEADERS = [ + 'ID', + 'Region', + 'Service Name', + 'Service Type', + 'Enabled', + 'Interface', + 'URL', + ] ENDPOINT_LIST_PROJECT_HEADERS = ['ID', 'Name'] - IDENTITY_PROVIDER_FIELDS = ['description', 'enabled', 'id', 'remote_ids', - 'domain_id'] + IDENTITY_PROVIDER_FIELDS = [ + 'description', + 'enabled', + 'id', + 'remote_ids', + 'domain_id', + ] IDENTITY_PROVIDER_LIST_HEADERS = ['ID', 'Enabled', 'Description'] - SERVICE_PROVIDER_FIELDS = ['auth_url', 'description', 'enabled', - 'id', 'relay_state_prefix', 'sp_url'] - SERVICE_PROVIDER_LIST_HEADERS = ['ID', 'Enabled', 'Description', - 'Auth URL'] - IMPLIED_ROLE_LIST_HEADERS = ['Prior Role ID', 'Prior Role Name', - 'Implied Role ID', 'Implied Role Name'] - REGISTERED_LIMIT_FIELDS = ['id', 'service_id', 'resource_name', - 'default_limit', 'description', 'region_id'] - REGISTERED_LIMIT_LIST_HEADERS = ['ID', 'Service ID', 'Resource Name', - 'Default Limit', 'Description', - 'Region ID'] - LIMIT_FIELDS = ['id', 'project_id', 'service_id', 'resource_name', - 'resource_limit', 'description', 'region_id'] - LIMIT_LIST_HEADERS = ['ID', 'Project ID', 'Service ID', 'Resource Name', - 'Resource Limit', 'Description', 'Region ID'] + SERVICE_PROVIDER_FIELDS = [ + 'auth_url', + 'description', + 'enabled', + 'id', + 'relay_state_prefix', + 'sp_url', + ] + SERVICE_PROVIDER_LIST_HEADERS = [ + 'ID', + 'Enabled', + 'Description', + 'Auth URL', + ] + IMPLIED_ROLE_LIST_HEADERS = [ + 'Prior Role ID', + 'Prior Role Name', + 'Implied Role ID', + 'Implied Role Name', + ] + REGISTERED_LIMIT_FIELDS = [ + 'id', + 'service_id', + 'resource_name', + 'default_limit', + 'description', + 'region_id', + ] + REGISTERED_LIMIT_LIST_HEADERS = [ + 'ID', + 'Service ID', + 'Resource Name', + 'Default Limit', + 'Description', + 'Region ID', + ] + LIMIT_FIELDS = [ + 'id', + 'project_id', + 'service_id', + 'resource_name', + 'resource_limit', + 'description', + 'region_id', + ] + LIMIT_LIST_HEADERS = [ + 'ID', + 'Project ID', + 'Service ID', + 'Resource Name', + 'Resource Limit', + 'Description', + 'Region ID', + ] @classmethod def setUpClass(cls): @@ -76,8 +150,9 @@ class IdentityTests(base.TestCase): 'domain create ' '--description %(description)s ' '--enable ' - '%(name)s' % {'description': cls.domain_description, - 'name': cls.domain_name}) + '%(name)s' + % {'description': cls.domain_description, 'name': cls.domain_name} + ) # create dummy project cls.project_name = data_utils.rand_name('TestProject') @@ -88,21 +163,31 @@ class IdentityTests(base.TestCase): '--domain %(domain)s ' '--description %(description)s ' '--enable ' - '%(name)s' % {'domain': cls.domain_name, - 'description': cls.project_description, - 'name': cls.project_name}) + '%(name)s' + % { + 'domain': cls.domain_name, + 'description': cls.project_description, + 'name': cls.project_name, + } + ) @classmethod def tearDownClass(cls): try: # delete dummy project - cls.openstack('--os-identity-api-version 3 ' - 'project delete %s' % cls.project_name) + cls.openstack( + '--os-identity-api-version 3 ' + 'project delete %s' % cls.project_name + ) # disable and delete dummy domain - cls.openstack('--os-identity-api-version 3 ' - 'domain set --disable %s' % cls.domain_name) - cls.openstack('--os-identity-api-version 3 ' - 'domain delete %s' % cls.domain_name) + cls.openstack( + '--os-identity-api-version 3 ' + 'domain set --disable %s' % cls.domain_name + ) + cls.openstack( + '--os-identity-api-version 3 ' + 'domain delete %s' % cls.domain_name + ) finally: super(IdentityTests, cls).tearDownClass() @@ -110,7 +195,8 @@ class IdentityTests(base.TestCase): super(IdentityTests, self).setUp() # prepare v3 env ver_fixture = fixtures.EnvironmentVariable( - 'OS_IDENTITY_API_VERSION', '3') + 'OS_IDENTITY_API_VERSION', '3' + ) self.useFixture(ver_fixture) auth_url = os.environ.get('OS_AUTH_URL') if auth_url: @@ -133,17 +219,22 @@ class IdentityTests(base.TestCase): '--email %(email)s ' '--description %(description)s ' '--enable ' - '%(name)s' % {'domain': self.domain_name, - 'project': self.project_name, - 'project_domain': self.domain_name, - 'email': email, - 'password': password, - 'description': description, - 'name': username}) + '%(name)s' + % { + 'domain': self.domain_name, + 'project': self.project_name, + 'project_domain': self.domain_name, + 'email': email, + 'password': password, + 'description': description, + 'name': username, + } + ) if add_clean_up: self.addCleanup( self.openstack, - 'user delete %s' % self.parse_show_as_object(raw_output)['id']) + 'user delete %s' % self.parse_show_as_object(raw_output)['id'], + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.USER_FIELDS) return username @@ -153,9 +244,7 @@ class IdentityTests(base.TestCase): raw_output = self.openstack('role create %s' % role_name) role = self.parse_show_as_object(raw_output) if add_clean_up: - self.addCleanup( - self.openstack, - 'role delete %s' % role['id']) + self.addCleanup(self.openstack, 'role delete %s' % role['id']) items = self.parse_show(raw_output) self.assert_show_fields(items, self.ROLE_FIELDS) self.assertEqual(role_name, role['name']) @@ -167,8 +256,8 @@ class IdentityTests(base.TestCase): self.openstack( 'implied role create ' '--implied-role %(implied_role)s ' - '%(role)s' % {'implied_role': implied_role_name, - 'role': role_name}) + '%(role)s' % {'implied_role': implied_role_name, 'role': role_name} + ) return implied_role_name, role_name @@ -179,16 +268,20 @@ class IdentityTests(base.TestCase): 'group create ' '--domain %(domain)s ' '--description %(description)s ' - '%(name)s' % {'domain': self.domain_name, - 'description': description, - 'name': group_name}) + '%(name)s' + % { + 'domain': self.domain_name, + 'description': description, + 'name': group_name, + } + ) if add_clean_up: self.addCleanup( self.openstack, 'group delete ' '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': group_name}) + '%(name)s' % {'domain': self.domain_name, 'name': group_name}, + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.GROUP_FIELDS) return group_name @@ -199,16 +292,13 @@ class IdentityTests(base.TestCase): self.openstack( 'domain create ' '--description %(description)s ' - '--enable %(name)s' % {'description': domain_description, - 'name': domain_name}) + '--enable %(name)s' + % {'description': domain_description, 'name': domain_name} + ) if add_clean_up: + self.addCleanup(self.openstack, 'domain delete %s' % domain_name) self.addCleanup( - self.openstack, - 'domain delete %s' % domain_name - ) - self.addCleanup( - self.openstack, - 'domain set --disable %s' % domain_name + self.openstack, 'domain set --disable %s' % domain_name ) return domain_name @@ -219,16 +309,21 @@ class IdentityTests(base.TestCase): 'project create ' '--domain %(domain)s ' '--description %(description)s ' - '--enable %(name)s' % {'domain': self.domain_name, - 'description': project_description, - 'name': project_name}) + '--enable %(name)s' + % { + 'domain': self.domain_name, + 'description': project_description, + 'name': project_name, + } + ) if add_clean_up: self.addCleanup( self.openstack, 'project delete ' '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': project_name}) + '%(name)s' + % {'domain': self.domain_name, 'name': project_name}, + ) return project_name def _create_dummy_region(self, parent_region=None, add_clean_up=True): @@ -241,12 +336,15 @@ class IdentityTests(base.TestCase): 'region create ' '%(parent_region_arg)s ' '--description %(description)s ' - '%(id)s' % {'parent_region_arg': parent_region_arg, - 'description': description, - 'id': region_id}) + '%(id)s' + % { + 'parent_region_arg': parent_region_arg, + 'description': description, + 'id': region_id, + } + ) if add_clean_up: - self.addCleanup(self.openstack, - 'region delete %s' % region_id) + self.addCleanup(self.openstack, 'region delete %s' % region_id) items = self.parse_show(raw_output) self.assert_show_fields(items, self.REGION_FIELDS) return region_id @@ -260,13 +358,18 @@ class IdentityTests(base.TestCase): '--name %(name)s ' '--description %(description)s ' '--enable ' - '%(type)s' % {'name': service_name, - 'description': description, - 'type': type_name}) + '%(type)s' + % { + 'name': service_name, + 'description': description, + 'type': type_name, + } + ) if add_clean_up: service = self.parse_show_as_object(raw_output) - self.addCleanup(self.openstack, - 'service delete %s' % service['id']) + self.addCleanup( + self.openstack, 'service delete %s' % service['id'] + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.SERVICE_FIELDS) return service_name @@ -281,15 +384,19 @@ class IdentityTests(base.TestCase): '--enable ' '%(service)s ' '%(interface)s ' - '%(url)s' % {'region': region_id, - 'service': service_name, - 'interface': interface, - 'url': endpoint_url}) + '%(url)s' + % { + 'region': region_id, + 'service': service_name, + 'interface': interface, + 'url': endpoint_url, + } + ) endpoint = self.parse_show_as_object(raw_output) if add_clean_up: self.addCleanup( - self.openstack, - 'endpoint delete %s' % endpoint['id']) + self.openstack, 'endpoint delete %s' % endpoint['id'] + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.ENDPOINT_FIELDS) return endpoint['id'] @@ -301,12 +408,14 @@ class IdentityTests(base.TestCase): 'identity provider create ' ' %(name)s ' '--description %(description)s ' - '--enable ' % {'name': identity_provider, - 'description': description}) + '--enable ' + % {'name': identity_provider, 'description': description} + ) if add_clean_up: self.addCleanup( self.openstack, - 'identity provider delete %s' % identity_provider) + 'identity provider delete %s' % identity_provider, + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.IDENTITY_PROVIDER_FIELDS) return identity_provider @@ -320,12 +429,13 @@ class IdentityTests(base.TestCase): '--description %(description)s ' '--auth-url https://sp.example.com:35357 ' '--service-provider-url https://sp.example.com:5000 ' - '--enable ' % {'name': service_provider, - 'description': description}) + '--enable ' + % {'name': service_provider, 'description': description} + ) if add_clean_up: self.addCleanup( - self.openstack, - 'service provider delete %s' % service_provider) + self.openstack, 'service provider delete %s' % service_provider + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.SERVICE_PROVIDER_FIELDS) return service_provider @@ -336,14 +446,14 @@ class IdentityTests(base.TestCase): params = { 'service_name': service_name, 'default_limit': 10, - 'resource_name': resource_name + 'resource_name': resource_name, } raw_output = self.openstack( 'registered limit create' ' --service %(service_name)s' ' --default-limit %(default_limit)s' ' %(resource_name)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) registered_limit_id = self._extract_value_from_items('id', items) @@ -352,7 +462,7 @@ class IdentityTests(base.TestCase): self.addCleanup( self.openstack, 'registered limit delete %s' % registered_limit_id, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) self.assert_show_fields(items, self.REGISTERED_LIMIT_FIELDS) @@ -369,7 +479,7 @@ class IdentityTests(base.TestCase): raw_output = self.openstack( 'registered limit show %s' % registered_limit_id, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) resource_name = self._extract_value_from_items('resource_name', items) @@ -385,7 +495,7 @@ class IdentityTests(base.TestCase): 'project_id': project_id, 'service_id': service_id, 'resource_name': resource_name, - 'resource_limit': resource_limit + 'resource_limit': resource_limit, } raw_output = self.openstack( @@ -394,15 +504,16 @@ class IdentityTests(base.TestCase): ' --service %(service_id)s' ' --resource-limit %(resource_limit)s' ' %(resource_name)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) limit_id = self._extract_value_from_items('id', items) if add_clean_up: self.addCleanup( - self.openstack, 'limit delete %s' % limit_id, - cloud=SYSTEM_CLOUD + self.openstack, + 'limit delete %s' % limit_id, + cloud=SYSTEM_CLOUD, ) self.assert_show_fields(items, self.LIMIT_FIELDS) diff --git a/openstackclient/tests/functional/identity/v3/test_application_credential.py b/openstackclient/tests/functional/identity/v3/test_application_credential.py index daf646078..dbec1cb24 100644 --- a/openstackclient/tests/functional/identity/v3/test_application_credential.py +++ b/openstackclient/tests/functional/identity/v3/test_application_credential.py @@ -20,124 +20,164 @@ from openstackclient.tests.functional.identity.v3 import common class ApplicationCredentialTests(common.IdentityTests): - - APPLICATION_CREDENTIAL_FIELDS = ['id', 'name', 'project_id', - 'description', 'roles', 'expires_at', - 'unrestricted'] - APPLICATION_CREDENTIAL_LIST_HEADERS = ['ID', 'Name', 'Project ID', - 'Description', 'Expires At'] + APPLICATION_CREDENTIAL_FIELDS = [ + 'id', + 'name', + 'project_id', + 'description', + 'roles', + 'expires_at', + 'unrestricted', + ] + APPLICATION_CREDENTIAL_LIST_HEADERS = [ + 'ID', + 'Name', + 'Project ID', + 'Description', + 'Expires At', + ] def test_application_credential_create(self): name = data_utils.rand_name('name') - raw_output = self.openstack('application credential create %(name)s' - % {'name': name}) + raw_output = self.openstack( + 'application credential create %(name)s' % {'name': name} + ) self.addCleanup( self.openstack, - 'application credential delete %(name)s' % {'name': name}) + 'application credential delete %(name)s' % {'name': name}, + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.APPLICATION_CREDENTIAL_FIELDS) def _create_role_assignments(self): try: - user = self.openstack('configuration show -f value' - ' -c auth.username') + user = self.openstack( + 'configuration show -f value' ' -c auth.username' + ) except Exception: - user = self.openstack('configuration show -f value' - ' -c auth.user_id') + user = self.openstack( + 'configuration show -f value' ' -c auth.user_id' + ) try: - user_domain = self.openstack('configuration show -f value' - ' -c auth.user_domain_name') + user_domain = self.openstack( + 'configuration show -f value' ' -c auth.user_domain_name' + ) except Exception: - user_domain = self.openstack('configuration show -f value' - ' -c auth.user_domain_id') + user_domain = self.openstack( + 'configuration show -f value' ' -c auth.user_domain_id' + ) try: - project = self.openstack('configuration show -f value' - ' -c auth.project_name') + project = self.openstack( + 'configuration show -f value' ' -c auth.project_name' + ) except Exception: - project = self.openstack('configuration show -f value' - ' -c auth.project_id') + project = self.openstack( + 'configuration show -f value' ' -c auth.project_id' + ) try: - project_domain = self.openstack('configuration show -f value' - ' -c auth.project_domain_name') + project_domain = self.openstack( + 'configuration show -f value' ' -c auth.project_domain_name' + ) except Exception: - project_domain = self.openstack('configuration show -f value' - ' -c auth.project_domain_id') + project_domain = self.openstack( + 'configuration show -f value' ' -c auth.project_domain_id' + ) role1 = self._create_dummy_role() role2 = self._create_dummy_role() for role in role1, role2: - self.openstack('role add' - ' --user %(user)s' - ' --user-domain %(user_domain)s' - ' --project %(project)s' - ' --project-domain %(project_domain)s' - ' %(role)s' - % {'user': user, - 'user_domain': user_domain, - 'project': project, - 'project_domain': project_domain, - 'role': role}) - self.addCleanup(self.openstack, - 'role remove' - ' --user %(user)s' - ' --user-domain %(user_domain)s' - ' --project %(project)s' - ' --project-domain %(project_domain)s' - ' %(role)s' - % {'user': user, - 'user_domain': user_domain, - 'project': project, - 'project_domain': project_domain, - 'role': role}) + self.openstack( + 'role add' + ' --user %(user)s' + ' --user-domain %(user_domain)s' + ' --project %(project)s' + ' --project-domain %(project_domain)s' + ' %(role)s' + % { + 'user': user, + 'user_domain': user_domain, + 'project': project, + 'project_domain': project_domain, + 'role': role, + } + ) + self.addCleanup( + self.openstack, + 'role remove' + ' --user %(user)s' + ' --user-domain %(user_domain)s' + ' --project %(project)s' + ' --project-domain %(project_domain)s' + ' %(role)s' + % { + 'user': user, + 'user_domain': user_domain, + 'project': project, + 'project_domain': project_domain, + 'role': role, + }, + ) return role1, role2 def test_application_credential_create_with_options(self): name = data_utils.rand_name('name') secret = data_utils.rand_name('secret') description = data_utils.rand_name('description') - tomorrow = (datetime.datetime.utcnow() + - datetime.timedelta(days=1)).strftime('%Y-%m-%dT%H:%M:%S%z') + tomorrow = ( + datetime.datetime.utcnow() + datetime.timedelta(days=1) + ).strftime('%Y-%m-%dT%H:%M:%S%z') role1, role2 = self._create_role_assignments() - raw_output = self.openstack('application credential create %(name)s' - ' --secret %(secret)s' - ' --description %(description)s' - ' --expiration %(tomorrow)s' - ' --role %(role1)s' - ' --role %(role2)s' - ' --unrestricted' - % {'name': name, - 'secret': secret, - 'description': description, - 'tomorrow': tomorrow, - 'role1': role1, - 'role2': role2}) + raw_output = self.openstack( + 'application credential create %(name)s' + ' --secret %(secret)s' + ' --description %(description)s' + ' --expiration %(tomorrow)s' + ' --role %(role1)s' + ' --role %(role2)s' + ' --unrestricted' + % { + 'name': name, + 'secret': secret, + 'description': description, + 'tomorrow': tomorrow, + 'role1': role1, + 'role2': role2, + } + ) self.addCleanup( self.openstack, - 'application credential delete %(name)s' % {'name': name}) + 'application credential delete %(name)s' % {'name': name}, + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.APPLICATION_CREDENTIAL_FIELDS) def test_application_credential_delete(self): name = data_utils.rand_name('name') - self.openstack('application credential create %(name)s' - % {'name': name}) - raw_output = self.openstack('application credential delete ' - '%(name)s' % {'name': name}) + self.openstack( + 'application credential create %(name)s' % {'name': name} + ) + raw_output = self.openstack( + 'application credential delete ' '%(name)s' % {'name': name} + ) self.assertEqual(0, len(raw_output)) def test_application_credential_list(self): raw_output = self.openstack('application credential list') items = self.parse_listing(raw_output) self.assert_table_structure( - items, self.APPLICATION_CREDENTIAL_LIST_HEADERS) + items, self.APPLICATION_CREDENTIAL_LIST_HEADERS + ) def test_application_credential_show(self): name = data_utils.rand_name('name') - raw_output = self.openstack('application credential create %(name)s' - % {'name': name}) + raw_output = self.openstack( + 'application credential create %(name)s' % {'name': name} + ) self.addCleanup( self.openstack, - 'application credential delete %(name)s' % {'name': name}) - raw_output = self.openstack('application credential show ' - '%(name)s' % {'name': name}) + 'application credential delete %(name)s' % {'name': name}, + ) + raw_output = self.openstack( + 'application credential show ' '%(name)s' % {'name': name} + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.APPLICATION_CREDENTIAL_FIELDS) diff --git a/openstackclient/tests/functional/identity/v3/test_catalog.py b/openstackclient/tests/functional/identity/v3/test_catalog.py index c8361406b..9b6df2d19 100644 --- a/openstackclient/tests/functional/identity/v3/test_catalog.py +++ b/openstackclient/tests/functional/identity/v3/test_catalog.py @@ -14,7 +14,6 @@ from openstackclient.tests.functional.identity.v3 import common class CatalogTests(common.IdentityTests): - def test_catalog_list(self): raw_output = self.openstack('catalog list') items = self.parse_listing(raw_output) diff --git a/openstackclient/tests/functional/identity/v3/test_domain.py b/openstackclient/tests/functional/identity/v3/test_domain.py index d8946d1ef..bf5020ca6 100644 --- a/openstackclient/tests/functional/identity/v3/test_domain.py +++ b/openstackclient/tests/functional/identity/v3/test_domain.py @@ -17,15 +17,14 @@ from openstackclient.tests.functional.identity.v3 import common class DomainTests(common.IdentityTests): - def test_domain_create(self): domain_name = data_utils.rand_name('TestDomain') raw_output = self.openstack('domain create %s' % domain_name) # disable domain first before deleting it - self.addCleanup(self.openstack, - 'domain delete %s' % domain_name) - self.addCleanup(self.openstack, - 'domain set --disable %s' % domain_name) + self.addCleanup(self.openstack, 'domain delete %s' % domain_name) + self.addCleanup( + self.openstack, 'domain set --disable %s' % domain_name + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.DOMAIN_FIELDS) @@ -52,15 +51,18 @@ class DomainTests(common.IdentityTests): raw_output = self.openstack('domain set --disable %s' % domain_2) self.assertEqual(0, len(raw_output)) raw_output = self.openstack( - 'domain delete %s %s' % (domain_1, domain_2)) + 'domain delete %s %s' % (domain_1, domain_2) + ) self.assertEqual(0, len(raw_output)) def test_domain_delete_failure(self): domain_name = self._create_dummy_domain() # cannot delete enabled domain - self.assertRaises(exceptions.CommandFailed, - self.openstack, - 'domain delete %s' % domain_name) + self.assertRaises( + exceptions.CommandFailed, + self.openstack, + 'domain delete %s' % domain_name, + ) def test_domain_show(self): domain_name = self._create_dummy_domain() diff --git a/openstackclient/tests/functional/identity/v3/test_endpoint.py b/openstackclient/tests/functional/identity/v3/test_endpoint.py index 41f0b4c80..53f2bd22b 100644 --- a/openstackclient/tests/functional/identity/v3/test_endpoint.py +++ b/openstackclient/tests/functional/identity/v3/test_endpoint.py @@ -16,7 +16,6 @@ from openstackclient.tests.functional.identity.v3 import common class EndpointTests(common.IdentityTests): - def test_endpoint_create(self): self._create_dummy_endpoint(interface='public') self._create_dummy_endpoint(interface='admin') @@ -24,15 +23,15 @@ class EndpointTests(common.IdentityTests): def test_endpoint_delete(self): endpoint_id = self._create_dummy_endpoint(add_clean_up=False) - raw_output = self.openstack( - 'endpoint delete %s' % endpoint_id) + raw_output = self.openstack('endpoint delete %s' % endpoint_id) self.assertEqual(0, len(raw_output)) def test_endpoint_multi_delete(self): endpoint_1 = self._create_dummy_endpoint(add_clean_up=False) endpoint_2 = self._create_dummy_endpoint(add_clean_up=False) raw_output = self.openstack( - 'endpoint delete %s %s' % (endpoint_1, endpoint_2)) + 'endpoint delete %s %s' % (endpoint_1, endpoint_2) + ) self.assertEqual(0, len(raw_output)) def test_endpoint_list(self): @@ -48,19 +47,18 @@ class EndpointTests(common.IdentityTests): raw_output = self.openstack( 'endpoint add project ' '%(endpoint_id)s ' - '%(project_id)s' % { - 'project_id': project_id, - 'endpoint_id': endpoint_id}) + '%(project_id)s' + % {'project_id': project_id, 'endpoint_id': endpoint_id} + ) self.assertEqual(0, len(raw_output)) raw_output = self.openstack( - 'endpoint list --endpoint %s' % endpoint_id) + 'endpoint list --endpoint %s' % endpoint_id + ) self.assertIn(project_id, raw_output) items = self.parse_listing(raw_output) - self.assert_table_structure(items, - self.ENDPOINT_LIST_PROJECT_HEADERS) + self.assert_table_structure(items, self.ENDPOINT_LIST_PROJECT_HEADERS) - raw_output = self.openstack( - 'endpoint list --project %s' % project_id) + raw_output = self.openstack('endpoint list --project %s' % project_id) self.assertIn(endpoint_id, raw_output) items = self.parse_listing(raw_output) self.assert_table_structure(items, self.ENDPOINT_LIST_HEADERS) @@ -73,9 +71,13 @@ class EndpointTests(common.IdentityTests): '--interface %(interface)s ' '--url %(url)s ' '--disable ' - '%(endpoint_id)s' % {'interface': 'admin', - 'url': new_endpoint_url, - 'endpoint_id': endpoint_id}) + '%(endpoint_id)s' + % { + 'interface': 'admin', + 'url': new_endpoint_url, + 'endpoint_id': endpoint_id, + } + ) self.assertEqual(0, len(raw_output)) raw_output = self.openstack('endpoint show %s' % endpoint_id) endpoint = self.parse_show_as_object(raw_output) @@ -95,15 +97,15 @@ class EndpointTests(common.IdentityTests): raw_output = self.openstack( 'endpoint add project ' '%(endpoint_id)s ' - '%(project_id)s' % { - 'project_id': project_id, - 'endpoint_id': endpoint_id}) + '%(project_id)s' + % {'project_id': project_id, 'endpoint_id': endpoint_id} + ) self.assertEqual(0, len(raw_output)) raw_output = self.openstack( 'endpoint remove project ' '%(endpoint_id)s ' - '%(project_id)s' % { - 'project_id': project_id, - 'endpoint_id': endpoint_id}) + '%(project_id)s' + % {'project_id': project_id, 'endpoint_id': endpoint_id} + ) self.assertEqual(0, len(raw_output)) diff --git a/openstackclient/tests/functional/identity/v3/test_group.py b/openstackclient/tests/functional/identity/v3/test_group.py index 917d5df04..95d74cb76 100644 --- a/openstackclient/tests/functional/identity/v3/test_group.py +++ b/openstackclient/tests/functional/identity/v3/test_group.py @@ -16,7 +16,6 @@ from openstackclient.tests.functional.identity.v3 import common class GroupTests(common.IdentityTests): - def test_group_create(self): self._create_dummy_group() @@ -30,7 +29,8 @@ class GroupTests(common.IdentityTests): def test_group_list_with_domain(self): group_name = self._create_dummy_group() raw_output = self.openstack( - 'group list --domain %s' % self.domain_name) + 'group list --domain %s' % self.domain_name + ) items = self.parse_listing(raw_output) self.assert_table_structure(items, common.BASIC_LIST_HEADERS) self.assertIn(group_name, raw_output) @@ -40,8 +40,8 @@ class GroupTests(common.IdentityTests): raw_output = self.openstack( 'group delete ' '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': group_name}) + '%(name)s' % {'domain': self.domain_name, 'name': group_name} + ) self.assertEqual(0, len(raw_output)) def test_group_show(self): @@ -49,8 +49,8 @@ class GroupTests(common.IdentityTests): raw_output = self.openstack( 'group show ' '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': group_name}) + '%(name)s' % {'domain': self.domain_name, 'name': group_name} + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.GROUP_FIELDS) @@ -61,15 +61,19 @@ class GroupTests(common.IdentityTests): 'group set ' '--domain %(domain)s ' '--name %(new_group)s ' - '%(group)s' % {'domain': self.domain_name, - 'new_group': new_group_name, - 'group': group_name}) + '%(group)s' + % { + 'domain': self.domain_name, + 'new_group': new_group_name, + 'group': group_name, + } + ) self.assertEqual(0, len(raw_output)) raw_output = self.openstack( 'group show ' '--domain %(domain)s ' - '%(group)s' % {'domain': self.domain_name, - 'group': new_group_name}) + '%(group)s' % {'domain': self.domain_name, 'group': new_group_name} + ) group = self.parse_show_as_object(raw_output) self.assertEqual(new_group_name, group['name']) # reset group name to make sure it will be cleaned up @@ -77,9 +81,13 @@ class GroupTests(common.IdentityTests): 'group set ' '--domain %(domain)s ' '--name %(new_group)s ' - '%(group)s' % {'domain': self.domain_name, - 'new_group': group_name, - 'group': new_group_name}) + '%(group)s' + % { + 'domain': self.domain_name, + 'new_group': group_name, + 'group': new_group_name, + } + ) self.assertEqual(0, len(raw_output)) def test_group_add_user(self): @@ -89,19 +97,27 @@ class GroupTests(common.IdentityTests): 'group add user ' '--group-domain %(group_domain)s ' '--user-domain %(user_domain)s ' - '%(group)s %(user)s' % {'group_domain': self.domain_name, - 'user_domain': self.domain_name, - 'group': group_name, - 'user': username}) + '%(group)s %(user)s' + % { + 'group_domain': self.domain_name, + 'user_domain': self.domain_name, + 'group': group_name, + 'user': username, + } + ) self.addCleanup( self.openstack, 'group remove user ' '--group-domain %(group_domain)s ' '--user-domain %(user_domain)s ' - '%(group)s %(user)s' % {'group_domain': self.domain_name, - 'user_domain': self.domain_name, - 'group': group_name, - 'user': username}) + '%(group)s %(user)s' + % { + 'group_domain': self.domain_name, + 'user_domain': self.domain_name, + 'group': group_name, + 'user': username, + }, + ) self.assertOutput('', raw_output) def test_group_contains_user(self): @@ -111,32 +127,45 @@ class GroupTests(common.IdentityTests): 'group add user ' '--group-domain %(group_domain)s ' '--user-domain %(user_domain)s ' - '%(group)s %(user)s' % {'group_domain': self.domain_name, - 'user_domain': self.domain_name, - 'group': group_name, - 'user': username}) + '%(group)s %(user)s' + % { + 'group_domain': self.domain_name, + 'user_domain': self.domain_name, + 'group': group_name, + 'user': username, + } + ) self.addCleanup( self.openstack, 'group remove user ' '--group-domain %(group_domain)s ' '--user-domain %(user_domain)s ' - '%(group)s %(user)s' % {'group_domain': self.domain_name, - 'user_domain': self.domain_name, - 'group': group_name, - 'user': username}) + '%(group)s %(user)s' + % { + 'group_domain': self.domain_name, + 'user_domain': self.domain_name, + 'group': group_name, + 'user': username, + }, + ) self.assertOutput('', raw_output) raw_output = self.openstack( 'group contains user ' '--group-domain %(group_domain)s ' '--user-domain %(user_domain)s ' - '%(group)s %(user)s' % {'group_domain': self.domain_name, - 'user_domain': self.domain_name, - 'group': group_name, - 'user': username}) + '%(group)s %(user)s' + % { + 'group_domain': self.domain_name, + 'user_domain': self.domain_name, + 'group': group_name, + 'user': username, + } + ) self.assertEqual( - '%(user)s in group %(group)s\n' % {'user': username, - 'group': group_name}, - raw_output) + '%(user)s in group %(group)s\n' + % {'user': username, 'group': group_name}, + raw_output, + ) def test_group_remove_user(self): group_name = self._create_dummy_group() @@ -145,17 +174,25 @@ class GroupTests(common.IdentityTests): 'group add user ' '--group-domain %(group_domain)s ' '--user-domain %(user_domain)s ' - '%(group)s %(user)s' % {'group_domain': self.domain_name, - 'user_domain': self.domain_name, - 'group': group_name, - 'user': username}) + '%(group)s %(user)s' + % { + 'group_domain': self.domain_name, + 'user_domain': self.domain_name, + 'group': group_name, + 'user': username, + } + ) remove_raw_output = self.openstack( 'group remove user ' '--group-domain %(group_domain)s ' '--user-domain %(user_domain)s ' - '%(group)s %(user)s' % {'group_domain': self.domain_name, - 'user_domain': self.domain_name, - 'group': group_name, - 'user': username}) + '%(group)s %(user)s' + % { + 'group_domain': self.domain_name, + 'user_domain': self.domain_name, + 'group': group_name, + 'user': username, + } + ) self.assertOutput('', add_raw_output) self.assertOutput('', remove_raw_output) diff --git a/openstackclient/tests/functional/identity/v3/test_idp.py b/openstackclient/tests/functional/identity/v3/test_idp.py index 5db3610a5..b359da7cd 100644 --- a/openstackclient/tests/functional/identity/v3/test_idp.py +++ b/openstackclient/tests/functional/identity/v3/test_idp.py @@ -23,21 +23,24 @@ class IdentityProviderTests(common.IdentityTests): def test_idp_delete(self): identity_provider = self._create_dummy_idp(add_clean_up=False) - raw_output = self.openstack('identity provider delete %s' - % identity_provider) + raw_output = self.openstack( + 'identity provider delete %s' % identity_provider + ) self.assertEqual(0, len(raw_output)) def test_idp_multi_delete(self): idp_1 = self._create_dummy_idp(add_clean_up=False) idp_2 = self._create_dummy_idp(add_clean_up=False) raw_output = self.openstack( - 'identity provider delete %s %s' % (idp_1, idp_2)) + 'identity provider delete %s %s' % (idp_1, idp_2) + ) self.assertEqual(0, len(raw_output)) def test_idp_show(self): identity_provider = self._create_dummy_idp(add_clean_up=True) - raw_output = self.openstack('identity provider show %s' - % identity_provider) + raw_output = self.openstack( + 'identity provider show %s' % identity_provider + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.IDENTITY_PROVIDER_FIELDS) @@ -50,13 +53,18 @@ class IdentityProviderTests(common.IdentityTests): def test_idp_set(self): identity_provider = self._create_dummy_idp(add_clean_up=True) new_remoteid = data_utils.rand_name('newRemoteId') - raw_output = self.openstack('identity provider set ' - '%(identity-provider)s ' - '--remote-id %(remote-id)s ' - % {'identity-provider': identity_provider, - 'remote-id': new_remoteid}) + raw_output = self.openstack( + 'identity provider set ' + '%(identity-provider)s ' + '--remote-id %(remote-id)s ' + % { + 'identity-provider': identity_provider, + 'remote-id': new_remoteid, + } + ) self.assertEqual(0, len(raw_output)) - raw_output = self.openstack('identity provider show %s' - % identity_provider) + raw_output = self.openstack( + 'identity provider show %s' % identity_provider + ) updated_value = self.parse_show_as_object(raw_output) self.assertIn(new_remoteid, updated_value['remote_ids']) diff --git a/openstackclient/tests/functional/identity/v3/test_limit.py b/openstackclient/tests/functional/identity/v3/test_limit.py index b03f0f282..32c65107d 100644 --- a/openstackclient/tests/functional/identity/v3/test_limit.py +++ b/openstackclient/tests/functional/identity/v3/test_limit.py @@ -20,12 +20,11 @@ SYSTEM_CLOUD = os.environ.get('OS_SYSTEM_CLOUD', 'devstack-system-admin') class LimitTestCase(common.IdentityTests): - def test_limit_create_with_service_name(self): registered_limit_id = self._create_dummy_registered_limit() raw_output = self.openstack( 'registered limit show %s' % registered_limit_id, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) service_id = self._extract_value_from_items('service_id', items) @@ -44,7 +43,7 @@ class LimitTestCase(common.IdentityTests): 'project_id': project_id, 'service_name': service_name, 'resource_name': resource_name, - 'resource_limit': 15 + 'resource_limit': 15, } raw_output = self.openstack( 'limit create' @@ -52,14 +51,12 @@ class LimitTestCase(common.IdentityTests): ' --service %(service_name)s' ' --resource-limit %(resource_limit)s' ' %(resource_name)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) limit_id = self._extract_value_from_items('id', items) self.addCleanup( - self.openstack, - 'limit delete %s' % limit_id, - cloud=SYSTEM_CLOUD + self.openstack, 'limit delete %s' % limit_id, cloud=SYSTEM_CLOUD ) self.assert_show_fields(items, self.LIMIT_FIELDS) @@ -68,7 +65,7 @@ class LimitTestCase(common.IdentityTests): registered_limit_id = self._create_dummy_registered_limit() raw_output = self.openstack( 'registered limit show %s' % registered_limit_id, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) service_id = self._extract_value_from_items('service_id', items) @@ -84,7 +81,7 @@ class LimitTestCase(common.IdentityTests): 'project_name': project_name, 'service_name': service_name, 'resource_name': resource_name, - 'resource_limit': 15 + 'resource_limit': 15, } raw_output = self.openstack( 'limit create' @@ -92,14 +89,12 @@ class LimitTestCase(common.IdentityTests): ' --service %(service_name)s' ' --resource-limit %(resource_limit)s' ' %(resource_name)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) limit_id = self._extract_value_from_items('id', items) self.addCleanup( - self.openstack, - 'limit delete %s' % limit_id, - cloud=SYSTEM_CLOUD + self.openstack, 'limit delete %s' % limit_id, cloud=SYSTEM_CLOUD ) self.assert_show_fields(items, self.LIMIT_FIELDS) @@ -117,14 +112,14 @@ class LimitTestCase(common.IdentityTests): params = { 'region_id': region_id, - 'registered_limit_id': registered_limit_id + 'registered_limit_id': registered_limit_id, } raw_output = self.openstack( 'registered limit set' ' %(registered_limit_id)s' ' --region %(region_id)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) service_id = self._extract_value_from_items('service_id', items) @@ -142,7 +137,7 @@ class LimitTestCase(common.IdentityTests): 'resource_name': resource_name, 'resource_limit': 15, 'region_id': region_id, - 'description': description + 'description': description, } raw_output = self.openstack( 'limit create' @@ -152,14 +147,12 @@ class LimitTestCase(common.IdentityTests): ' --region %(region_id)s' ' --description %(description)s' ' %(resource_name)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) limit_id = self._extract_value_from_items('id', items) self.addCleanup( - self.openstack, - 'limit delete %s' % limit_id, - cloud=SYSTEM_CLOUD + self.openstack, 'limit delete %s' % limit_id, cloud=SYSTEM_CLOUD ) self.assert_show_fields(items, self.LIMIT_FIELDS) @@ -167,8 +160,7 @@ class LimitTestCase(common.IdentityTests): def test_limit_show(self): limit_id = self._create_dummy_limit() raw_output = self.openstack( - 'limit show %s' % limit_id, - cloud=SYSTEM_CLOUD + 'limit show %s' % limit_id, cloud=SYSTEM_CLOUD ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.LIMIT_FIELDS) @@ -178,14 +170,14 @@ class LimitTestCase(common.IdentityTests): params = { 'description': data_utils.arbitrary_string(), - 'limit_id': limit_id + 'limit_id': limit_id, } raw_output = self.openstack( 'limit set' ' --description %(description)s' ' %(limit_id)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.LIMIT_FIELDS) @@ -193,16 +185,13 @@ class LimitTestCase(common.IdentityTests): def test_limit_set_resource_limit(self): limit_id = self._create_dummy_limit() - params = { - 'resource_limit': 5, - 'limit_id': limit_id - } + params = {'resource_limit': 5, 'limit_id': limit_id} raw_output = self.openstack( 'limit set' ' --resource-limit %(resource_limit)s' ' %(limit_id)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.LIMIT_FIELDS) @@ -216,6 +205,6 @@ class LimitTestCase(common.IdentityTests): def test_limit_delete(self): limit_id = self._create_dummy_limit(add_clean_up=False) raw_output = self.openstack( - 'limit delete %s' % limit_id, - cloud=SYSTEM_CLOUD) + 'limit delete %s' % limit_id, cloud=SYSTEM_CLOUD + ) self.assertEqual(0, len(raw_output)) diff --git a/openstackclient/tests/functional/identity/v3/test_project.py b/openstackclient/tests/functional/identity/v3/test_project.py index b3d31aa75..d91ba87a8 100644 --- a/openstackclient/tests/functional/identity/v3/test_project.py +++ b/openstackclient/tests/functional/identity/v3/test_project.py @@ -16,7 +16,6 @@ from openstackclient.tests.functional.identity.v3 import common class ProjectTests(common.IdentityTests): - def test_project_create(self): project_name = data_utils.rand_name('TestProject') description = data_utils.rand_name('description') @@ -27,15 +26,18 @@ class ProjectTests(common.IdentityTests): '--enable ' '--property k1=v1 ' '--property k2=v2 ' - '%(name)s' % {'domain': self.domain_name, - 'description': description, - 'name': project_name}) + '%(name)s' + % { + 'domain': self.domain_name, + 'description': description, + 'name': project_name, + } + ) self.addCleanup( self.openstack, 'project delete ' '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': project_name} + '%(name)s' % {'domain': self.domain_name, 'name': project_name}, ) items = self.parse_show(raw_output) show_fields = list(self.PROJECT_FIELDS) @@ -50,8 +52,8 @@ class ProjectTests(common.IdentityTests): raw_output = self.openstack( 'project delete ' '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': project_name}) + '%(name)s' % {'domain': self.domain_name, 'name': project_name} + ) self.assertEqual(0, len(raw_output)) def test_project_list(self): @@ -62,7 +64,8 @@ class ProjectTests(common.IdentityTests): def test_project_list_with_domain(self): project_name = self._create_dummy_project() raw_output = self.openstack( - 'project list --domain %s' % self.domain_name) + 'project list --domain %s' % self.domain_name + ) items = self.parse_listing(raw_output) self.assert_table_structure(items, common.BASIC_LIST_HEADERS) self.assertIn(project_name, raw_output) @@ -76,15 +79,14 @@ class ProjectTests(common.IdentityTests): '--name %(new_name)s ' '--disable ' '--property k0=v0 ' - '%(name)s' % {'new_name': new_project_name, - 'name': project_name}) + '%(name)s' % {'new_name': new_project_name, 'name': project_name} + ) self.assertEqual(0, len(raw_output)) # check project details raw_output = self.openstack( 'project show ' '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': new_project_name} + '%(name)s' % {'domain': self.domain_name, 'name': new_project_name} ) items = self.parse_show(raw_output) fields = list(self.PROJECT_FIELDS) @@ -99,15 +101,16 @@ class ProjectTests(common.IdentityTests): 'project set ' '--name %(new_name)s ' '--enable ' - '%(name)s' % {'new_name': project_name, - 'name': new_project_name}) + '%(name)s' % {'new_name': project_name, 'name': new_project_name} + ) def test_project_show(self): raw_output = self.openstack( 'project show ' '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': self.project_name}) + '%(name)s' + % {'domain': self.domain_name, 'name': self.project_name} + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.PROJECT_FIELDS) @@ -116,10 +119,10 @@ class ProjectTests(common.IdentityTests): 'project show ' '--parents --children ' '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': self.project_name}, + '%(name)s' + % {'domain': self.domain_name, 'name': self.project_name}, parse_output=True, ) - for attr_name in (self.PROJECT_FIELDS + ['parents', 'subtree']): + for attr_name in self.PROJECT_FIELDS + ['parents', 'subtree']: self.assertIn(attr_name, output) self.assertEqual(self.project_name, output.get('name')) diff --git a/openstackclient/tests/functional/identity/v3/test_region.py b/openstackclient/tests/functional/identity/v3/test_region.py index 2a402bd1a..bc014737d 100644 --- a/openstackclient/tests/functional/identity/v3/test_region.py +++ b/openstackclient/tests/functional/identity/v3/test_region.py @@ -14,7 +14,6 @@ from openstackclient.tests.functional.identity.v3 import common class RegionTests(common.IdentityTests): - def test_region_create(self): self._create_dummy_region() @@ -31,7 +30,8 @@ class RegionTests(common.IdentityTests): region_1 = self._create_dummy_region(add_clean_up=False) region_2 = self._create_dummy_region(add_clean_up=False) raw_output = self.openstack( - 'region delete %s %s' % (region_1, region_2)) + 'region delete %s %s' % (region_1, region_2) + ) self.assertEqual(0, len(raw_output)) def test_region_list(self): @@ -53,8 +53,9 @@ class RegionTests(common.IdentityTests): raw_output = self.openstack( 'region set ' '--parent-region %(parent_region)s ' - '%(region)s' % {'parent_region': new_parent_region_id, - 'region': region_id}) + '%(region)s' + % {'parent_region': new_parent_region_id, 'region': region_id} + ) self.assertEqual(0, len(raw_output)) # check updated region details raw_output = self.openstack('region show %s' % region_id) diff --git a/openstackclient/tests/functional/identity/v3/test_registered_limit.py b/openstackclient/tests/functional/identity/v3/test_registered_limit.py index 80f51ad99..6e3c30aeb 100644 --- a/openstackclient/tests/functional/identity/v3/test_registered_limit.py +++ b/openstackclient/tests/functional/identity/v3/test_registered_limit.py @@ -20,15 +20,13 @@ SYSTEM_CLOUD = os.environ.get('OS_SYSTEM_CLOUD', 'devstack-system-admin') class RegisteredLimitTestCase(common.IdentityTests): - def test_registered_limit_create_with_service_name(self): self._create_dummy_registered_limit() def test_registered_limit_create_with_service_id(self): service_name = self._create_dummy_service() raw_output = self.openstack( - 'service show' - ' %(service_name)s' % {'service_name': service_name} + 'service show' ' %(service_name)s' % {'service_name': service_name} ) service_items = self.parse_show(raw_output) service_id = self._extract_value_from_items('id', service_items) @@ -37,22 +35,22 @@ class RegisteredLimitTestCase(common.IdentityTests): 'registered limit create' ' --service %(service_id)s' ' --default-limit %(default_limit)s' - ' %(resource_name)s' % { + ' %(resource_name)s' + % { 'service_id': service_id, 'default_limit': 10, - 'resource_name': 'cores' + 'resource_name': 'cores', }, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) registered_limit_id = self._extract_value_from_items('id', items) self.addCleanup( self.openstack, 'registered limit delete' - ' %(registered_limit_id)s' % { - 'registered_limit_id': registered_limit_id - }, - cloud=SYSTEM_CLOUD + ' %(registered_limit_id)s' + % {'registered_limit_id': registered_limit_id}, + cloud=SYSTEM_CLOUD, ) self.assert_show_fields(items, self.REGISTERED_LIMIT_FIELDS) @@ -65,7 +63,7 @@ class RegisteredLimitTestCase(common.IdentityTests): 'resource_name': 'cores', 'default_limit': 10, 'description': 'default limit for cores', - 'region_id': region_id + 'region_id': region_id, } raw_output = self.openstack( @@ -75,16 +73,15 @@ class RegisteredLimitTestCase(common.IdentityTests): ' --service %(service_name)s' ' --default-limit %(default_limit)s' ' %(resource_name)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) registered_limit_id = self._extract_value_from_items('id', items) self.addCleanup( self.openstack, - 'registered limit delete %(registered_limit_id)s' % { - 'registered_limit_id': registered_limit_id - }, - cloud=SYSTEM_CLOUD + 'registered limit delete %(registered_limit_id)s' + % {'registered_limit_id': registered_limit_id}, + cloud=SYSTEM_CLOUD, ) self.assert_show_fields(items, self.REGISTERED_LIMIT_FIELDS) @@ -92,9 +89,8 @@ class RegisteredLimitTestCase(common.IdentityTests): def test_registered_limit_show(self): registered_limit_id = self._create_dummy_registered_limit() raw_output = self.openstack( - 'registered limit show %(registered_limit_id)s' % { - 'registered_limit_id': registered_limit_id - } + 'registered limit show %(registered_limit_id)s' + % {'registered_limit_id': registered_limit_id} ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.REGISTERED_LIMIT_FIELDS) @@ -105,13 +101,13 @@ class RegisteredLimitTestCase(common.IdentityTests): params = { 'registered_limit_id': registered_limit_id, - 'region_id': region_id + 'region_id': region_id, } raw_output = self.openstack( 'registered limit set' ' %(registered_limit_id)s' ' --region %(region_id)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.REGISTERED_LIMIT_FIELDS) @@ -120,13 +116,13 @@ class RegisteredLimitTestCase(common.IdentityTests): registered_limit_id = self._create_dummy_registered_limit() params = { 'registered_limit_id': registered_limit_id, - 'description': 'updated description' + 'description': 'updated description', } raw_output = self.openstack( 'registered limit set' ' %(registered_limit_id)s' ' --description \'%(description)s\'' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.REGISTERED_LIMIT_FIELDS) @@ -136,13 +132,13 @@ class RegisteredLimitTestCase(common.IdentityTests): service_name = self._create_dummy_service() params = { 'registered_limit_id': registered_limit_id, - 'service': service_name + 'service': service_name, } raw_output = self.openstack( 'registered limit set' ' %(registered_limit_id)s' ' --service %(service)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.REGISTERED_LIMIT_FIELDS) @@ -151,13 +147,13 @@ class RegisteredLimitTestCase(common.IdentityTests): registered_limit_id = self._create_dummy_registered_limit() params = { 'registered_limit_id': registered_limit_id, - 'default_limit': 20 + 'default_limit': 20, } raw_output = self.openstack( 'registered limit set' ' %(registered_limit_id)s' ' --default-limit %(default_limit)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.REGISTERED_LIMIT_FIELDS) @@ -167,13 +163,13 @@ class RegisteredLimitTestCase(common.IdentityTests): resource_name = data_utils.rand_name('resource_name') params = { 'registered_limit_id': registered_limit_id, - 'resource_name': resource_name + 'resource_name': resource_name, } raw_output = self.openstack( 'registered limit set' ' %(registered_limit_id)s' ' --resource-name %(resource_name)s' % params, - cloud=SYSTEM_CLOUD + cloud=SYSTEM_CLOUD, ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.REGISTERED_LIMIT_FIELDS) @@ -190,9 +186,8 @@ class RegisteredLimitTestCase(common.IdentityTests): ) raw_output = self.openstack( 'registered limit delete' - ' %(registered_limit_id)s' % { - 'registered_limit_id': registered_limit_id - }, - cloud=SYSTEM_CLOUD + ' %(registered_limit_id)s' + % {'registered_limit_id': registered_limit_id}, + cloud=SYSTEM_CLOUD, ) self.assertEqual(0, len(raw_output)) diff --git a/openstackclient/tests/functional/identity/v3/test_role.py b/openstackclient/tests/functional/identity/v3/test_role.py index 3954c4e30..328a14c34 100644 --- a/openstackclient/tests/functional/identity/v3/test_role.py +++ b/openstackclient/tests/functional/identity/v3/test_role.py @@ -16,7 +16,6 @@ from openstackclient.tests.functional.identity.v3 import common class RoleTests(common.IdentityTests): - def test_role_create(self): self._create_dummy_role() @@ -26,8 +25,8 @@ class RoleTests(common.IdentityTests): raw_output = self.openstack( 'role create ' '--description %(description)s ' - '%(name)s' % {'description': description, - 'name': role_name}) + '%(name)s' % {'description': description, 'name': role_name} + ) role = self.parse_show_as_object(raw_output) self.addCleanup(self.openstack, 'role delete %s' % role['id']) items = self.parse_show(raw_output) @@ -56,7 +55,8 @@ class RoleTests(common.IdentityTests): role_name = self._create_dummy_role() new_role_name = data_utils.rand_name('NewTestRole') raw_output = self.openstack( - 'role set --name %s %s' % (new_role_name, role_name)) + 'role set --name %s %s' % (new_role_name, role_name) + ) self.assertEqual(0, len(raw_output)) raw_output = self.openstack('role show %s' % new_role_name) role = self.parse_show_as_object(raw_output) @@ -65,8 +65,9 @@ class RoleTests(common.IdentityTests): def test_role_set_description(self): role_name = self._create_dummy_role() description = data_utils.rand_name("NewDescription") - raw_output = self.openstack('role set --description %s %s' - % (description, role_name)) + raw_output = self.openstack( + 'role set --description %s %s' % (description, role_name) + ) self.assertEqual(0, len(raw_output)) raw_output = self.openstack('role show %s' % role_name) role = self.parse_show_as_object(raw_output) @@ -81,11 +82,15 @@ class RoleTests(common.IdentityTests): '--project-domain %(project_domain)s ' '--user %(user)s ' '--user-domain %(user_domain)s ' - '%(role)s' % {'project': self.project_name, - 'project_domain': self.domain_name, - 'user': username, - 'user_domain': self.domain_name, - 'role': role_name}) + '%(role)s' + % { + 'project': self.project_name, + 'project_domain': self.domain_name, + 'user': username, + 'user_domain': self.domain_name, + 'role': role_name, + } + ) self.addCleanup( self.openstack, 'role remove ' @@ -93,11 +98,15 @@ class RoleTests(common.IdentityTests): '--project-domain %(project_domain)s ' '--user %(user)s ' '--user-domain %(user_domain)s ' - '%(role)s' % {'project': self.project_name, - 'project_domain': self.domain_name, - 'user': username, - 'user_domain': self.domain_name, - 'role': role_name}) + '%(role)s' + % { + 'project': self.project_name, + 'project_domain': self.domain_name, + 'user': username, + 'user_domain': self.domain_name, + 'role': role_name, + }, + ) self.assertEqual(0, len(raw_output)) def test_role_remove(self): @@ -109,22 +118,30 @@ class RoleTests(common.IdentityTests): '--project-domain %(project_domain)s ' '--user %(user)s ' '--user-domain %(user_domain)s ' - '%(role)s' % {'project': self.project_name, - 'project_domain': self.domain_name, - 'user': username, - 'user_domain': self.domain_name, - 'role': role_name}) + '%(role)s' + % { + 'project': self.project_name, + 'project_domain': self.domain_name, + 'user': username, + 'user_domain': self.domain_name, + 'role': role_name, + } + ) remove_raw_output = self.openstack( 'role remove ' '--project %(project)s ' '--project-domain %(project_domain)s ' '--user %(user)s ' '--user-domain %(user_domain)s ' - '%(role)s' % {'project': self.project_name, - 'project_domain': self.domain_name, - 'user': username, - 'user_domain': self.domain_name, - 'role': role_name}) + '%(role)s' + % { + 'project': self.project_name, + 'project_domain': self.domain_name, + 'user': username, + 'user_domain': self.domain_name, + 'role': role_name, + } + ) self.assertEqual(0, len(add_raw_output)) self.assertEqual(0, len(remove_raw_output)) @@ -141,14 +158,14 @@ class RoleTests(common.IdentityTests): self.openstack( 'implied role create ' '--implied-role %(implied_role)s ' - '%(role)s' % {'implied_role': implied_role_name, - 'role': role_name}) + '%(role)s' % {'implied_role': implied_role_name, 'role': role_name} + ) def test_implied_role_delete(self): implied_role_name, role_name = self._create_dummy_implied_role() raw_output = self.openstack( 'implied role delete ' '--implied-role %(implied_role)s ' - '%(role)s' % {'implied_role': implied_role_name, - 'role': role_name}) + '%(role)s' % {'implied_role': implied_role_name, 'role': role_name} + ) self.assertEqual(0, len(raw_output)) diff --git a/openstackclient/tests/functional/identity/v3/test_service.py b/openstackclient/tests/functional/identity/v3/test_service.py index 1ecda45af..5d59b65e9 100644 --- a/openstackclient/tests/functional/identity/v3/test_service.py +++ b/openstackclient/tests/functional/identity/v3/test_service.py @@ -16,7 +16,6 @@ from openstackclient.tests.functional.identity.v3 import common class ServiceTests(common.IdentityTests): - def test_service_create(self): self._create_dummy_service() @@ -29,7 +28,8 @@ class ServiceTests(common.IdentityTests): service_1 = self._create_dummy_service(add_clean_up=False) service_2 = self._create_dummy_service(add_clean_up=False) raw_output = self.openstack( - 'service delete %s %s' % (service_1, service_2)) + 'service delete %s %s' % (service_1, service_2) + ) self.assertEqual(0, len(raw_output)) def test_service_list(self): @@ -50,10 +50,14 @@ class ServiceTests(common.IdentityTests): '--name %(name)s ' '--description %(description)s ' '--disable ' - '%(service)s' % {'type': new_service_type, - 'name': new_service_name, - 'description': new_service_description, - 'service': service_name}) + '%(service)s' + % { + 'type': new_service_type, + 'name': new_service_name, + 'description': new_service_description, + 'service': service_name, + } + ) self.assertEqual(0, len(raw_output)) # get service details raw_output = self.openstack('service show %s' % new_service_name) @@ -65,7 +69,6 @@ class ServiceTests(common.IdentityTests): def test_service_show(self): service_name = self._create_dummy_service() - raw_output = self.openstack( - 'service show %s' % service_name) + raw_output = self.openstack('service show %s' % service_name) items = self.parse_show(raw_output) self.assert_show_fields(items, self.SERVICE_FIELDS) diff --git a/openstackclient/tests/functional/identity/v3/test_service_provider.py b/openstackclient/tests/functional/identity/v3/test_service_provider.py index 32b7a463d..d6750595d 100644 --- a/openstackclient/tests/functional/identity/v3/test_service_provider.py +++ b/openstackclient/tests/functional/identity/v3/test_service_provider.py @@ -23,21 +23,24 @@ class ServiceProviderTests(common.IdentityTests): def test_sp_delete(self): service_provider = self._create_dummy_sp(add_clean_up=False) - raw_output = self.openstack('service provider delete %s' - % service_provider) + raw_output = self.openstack( + 'service provider delete %s' % service_provider + ) self.assertEqual(0, len(raw_output)) def test_sp_multi_delete(self): sp1 = self._create_dummy_sp(add_clean_up=False) sp2 = self._create_dummy_sp(add_clean_up=False) raw_output = self.openstack( - 'service provider delete %s %s' % (sp1, sp2)) + 'service provider delete %s %s' % (sp1, sp2) + ) self.assertEqual(0, len(raw_output)) def test_sp_show(self): service_provider = self._create_dummy_sp(add_clean_up=True) - raw_output = self.openstack('service provider show %s' - % service_provider) + raw_output = self.openstack( + 'service provider show %s' % service_provider + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.SERVICE_PROVIDER_FIELDS) @@ -50,13 +53,18 @@ class ServiceProviderTests(common.IdentityTests): def test_sp_set(self): service_provider = self._create_dummy_sp(add_clean_up=True) new_description = data_utils.rand_name('newDescription') - raw_output = self.openstack('service provider set ' - '%(service-provider)s ' - '--description %(description)s ' - % {'service-provider': service_provider, - 'description': new_description}) + raw_output = self.openstack( + 'service provider set ' + '%(service-provider)s ' + '--description %(description)s ' + % { + 'service-provider': service_provider, + 'description': new_description, + } + ) self.assertEqual(0, len(raw_output)) - raw_output = self.openstack('service provider show %s' - % service_provider) + raw_output = self.openstack( + 'service provider show %s' % service_provider + ) updated_value = self.parse_show_as_object(raw_output) self.assertIn(new_description, updated_value['description']) diff --git a/openstackclient/tests/functional/identity/v3/test_token.py b/openstackclient/tests/functional/identity/v3/test_token.py index 62e90003f..b6b0d8b15 100644 --- a/openstackclient/tests/functional/identity/v3/test_token.py +++ b/openstackclient/tests/functional/identity/v3/test_token.py @@ -14,7 +14,6 @@ from openstackclient.tests.functional.identity.v3 import common class TokenTests(common.IdentityTests): - def test_token_issue(self): raw_output = self.openstack('token issue') items = self.parse_show(raw_output) diff --git a/openstackclient/tests/functional/identity/v3/test_user.py b/openstackclient/tests/functional/identity/v3/test_user.py index 9e9bde96c..917da4a3f 100644 --- a/openstackclient/tests/functional/identity/v3/test_user.py +++ b/openstackclient/tests/functional/identity/v3/test_user.py @@ -16,16 +16,16 @@ from openstackclient.tests.functional.identity.v3 import common class UserTests(common.IdentityTests): - def test_user_create(self): self._create_dummy_user() def test_user_delete(self): username = self._create_dummy_user(add_clean_up=False) - raw_output = self.openstack('user delete ' - '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': username}) + raw_output = self.openstack( + 'user delete ' + '--domain %(domain)s ' + '%(name)s' % {'domain': self.domain_name, 'name': username} + ) self.assertEqual(0, len(raw_output)) def test_user_list(self): @@ -35,24 +35,27 @@ class UserTests(common.IdentityTests): def test_user_set(self): username = self._create_dummy_user() - raw_output = self.openstack('user show ' - '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': username}) + raw_output = self.openstack( + 'user show ' + '--domain %(domain)s ' + '%(name)s' % {'domain': self.domain_name, 'name': username} + ) user = self.parse_show_as_object(raw_output) new_username = data_utils.rand_name('NewTestUser') new_email = data_utils.rand_name() + '@example.com' - raw_output = self.openstack('user set ' - '--email %(email)s ' - '--name %(new_name)s ' - '%(id)s' % {'email': new_email, - 'new_name': new_username, - 'id': user['id']}) + raw_output = self.openstack( + 'user set ' + '--email %(email)s ' + '--name %(new_name)s ' + '%(id)s' + % {'email': new_email, 'new_name': new_username, 'id': user['id']} + ) self.assertEqual(0, len(raw_output)) - raw_output = self.openstack('user show ' - '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': new_username}) + raw_output = self.openstack( + 'user show ' + '--domain %(domain)s ' + '%(name)s' % {'domain': self.domain_name, 'name': new_username} + ) updated_user = self.parse_show_as_object(raw_output) self.assertEqual(user['id'], updated_user['id']) self.assertEqual(new_email, updated_user['email']) @@ -61,31 +64,38 @@ class UserTests(common.IdentityTests): username = self._create_dummy_user() project_name = self._create_dummy_project() # get original user details - raw_output = self.openstack('user show ' - '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': username}) + raw_output = self.openstack( + 'user show ' + '--domain %(domain)s ' + '%(name)s' % {'domain': self.domain_name, 'name': username} + ) user = self.parse_show_as_object(raw_output) # update user - raw_output = self.openstack('user set ' - '--project %(project)s ' - '--project-domain %(project_domain)s ' - '%(id)s' % {'project': project_name, - 'project_domain': - self.domain_name, - 'id': user['id']}) + raw_output = self.openstack( + 'user set ' + '--project %(project)s ' + '--project-domain %(project_domain)s ' + '%(id)s' + % { + 'project': project_name, + 'project_domain': self.domain_name, + 'id': user['id'], + } + ) self.assertEqual(0, len(raw_output)) # get updated user details - raw_output = self.openstack('user show ' - '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': username}) + raw_output = self.openstack( + 'user show ' + '--domain %(domain)s ' + '%(name)s' % {'domain': self.domain_name, 'name': username} + ) updated_user = self.parse_show_as_object(raw_output) # get project details - raw_output = self.openstack('project show ' - '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': project_name}) + raw_output = self.openstack( + 'project show ' + '--domain %(domain)s ' + '%(name)s' % {'domain': self.domain_name, 'name': project_name} + ) project = self.parse_show_as_object(raw_output) # check updated user details self.assertEqual(user['id'], updated_user['id']) @@ -93,9 +103,10 @@ class UserTests(common.IdentityTests): def test_user_show(self): username = self._create_dummy_user() - raw_output = self.openstack('user show ' - '--domain %(domain)s ' - '%(name)s' % {'domain': self.domain_name, - 'name': username}) + raw_output = self.openstack( + 'user show ' + '--domain %(domain)s ' + '%(name)s' % {'domain': self.domain_name, 'name': username} + ) items = self.parse_show(raw_output) self.assert_show_fields(items, self.USER_FIELDS) diff --git a/openstackclient/tests/unit/identity/v2_0/fakes.py b/openstackclient/tests/unit/identity/v2_0/fakes.py index bd76a784a..708f9a835 100644 --- a/openstackclient/tests/unit/identity/v2_0/fakes.py +++ b/openstackclient/tests/unit/identity/v2_0/fakes.py @@ -155,7 +155,6 @@ def fake_auth_ref(fake_token, fake_service=None): class FakeIdentityv2Client(object): - def __init__(self, **kwargs): self.roles = mock.Mock() self.roles.resource_class = fakes.FakeResource(None, {}) @@ -185,7 +184,6 @@ class FakeIdentityv2Client(object): class TestIdentityv2(utils.TestCommand): - def setUp(self): super(TestIdentityv2, self).setUp() @@ -212,22 +210,25 @@ class FakeExtension(object): # Set default attributes. extension_info = { 'name': 'name-' + uuid.uuid4().hex, - 'namespace': ('http://docs.openstack.org/identity/' - 'api/ext/OS-KSCRUD/v1.0'), + 'namespace': ( + 'http://docs.openstack.org/identity/' 'api/ext/OS-KSCRUD/v1.0' + ), 'description': 'description-' + uuid.uuid4().hex, 'updated': '2013-07-07T12:00:0-00:00', 'alias': 'OS-KSCRUD', - 'links': ('[{"href":' - '"https://github.com/openstack/identity-api", "type":' - ' "text/html", "rel": "describedby"}]') + 'links': ( + '[{"href":' + '"https://github.com/openstack/identity-api", "type":' + ' "text/html", "rel": "describedby"}]' + ), } # Overwrite default attributes. extension_info.update(attrs) extension = fakes.FakeResource( - info=copy.deepcopy(extension_info), - loaded=True) + info=copy.deepcopy(extension_info), loaded=True + ) return extension @@ -275,8 +276,8 @@ class FakeCatalog(object): catalog_info.update(attrs) catalog = fakes.FakeResource( - info=copy.deepcopy(catalog_info), - loaded=True) + info=copy.deepcopy(catalog_info), loaded=True + ) return catalog @@ -305,8 +306,9 @@ class FakeProject(object): } project_info.update(attrs) - project = fakes.FakeResource(info=copy.deepcopy(project_info), - loaded=True) + project = fakes.FakeResource( + info=copy.deepcopy(project_info), loaded=True + ) return project @staticmethod @@ -352,12 +354,12 @@ class FakeEndpoint(object): 'id': 'endpoint-id-' + uuid.uuid4().hex, 'publicurl': 'http://endpoint_publicurl', 'service_id': 'service-name-' + uuid.uuid4().hex, - } endpoint_info.update(attrs) - endpoint = fakes.FakeResource(info=copy.deepcopy(endpoint_info), - loaded=True) + endpoint = fakes.FakeResource( + info=copy.deepcopy(endpoint_info), loaded=True + ) return endpoint @staticmethod @@ -399,12 +401,12 @@ class FakeService(object): 'name': 'service-name-' + uuid.uuid4().hex, 'description': 'service_description', 'type': 'service_type', - } service_info.update(attrs) - service = fakes.FakeResource(info=copy.deepcopy(service_info), - loaded=True) + service = fakes.FakeResource( + info=copy.deepcopy(service_info), loaded=True + ) return service @staticmethod @@ -447,8 +449,7 @@ class FakeRole(object): } role_info.update(attrs) - role = fakes.FakeResource(info=copy.deepcopy(role_info), - loaded=True) + role = fakes.FakeResource(info=copy.deepcopy(role_info), loaded=True) return role @staticmethod @@ -493,8 +494,7 @@ class FakeUser(object): } user_info.update(attrs) - user = fakes.FakeResource(info=copy.deepcopy(user_info), - loaded=True) + user = fakes.FakeResource(info=copy.deepcopy(user_info), loaded=True) return user @staticmethod diff --git a/openstackclient/tests/unit/identity/v2_0/test_catalog.py b/openstackclient/tests/unit/identity/v2_0/test_catalog.py index bfb28f696..c420d33c3 100644 --- a/openstackclient/tests/unit/identity/v2_0/test_catalog.py +++ b/openstackclient/tests/unit/identity/v2_0/test_catalog.py @@ -19,7 +19,6 @@ from openstackclient.tests.unit import utils class TestCatalog(utils.TestCommand): - service_catalog = identity_fakes.FakeCatalog.create_catalog() def setUp(self): @@ -37,7 +36,6 @@ class TestCatalog(utils.TestCommand): class TestCatalogList(TestCatalog): - columns = ( 'Name', 'Type', @@ -68,12 +66,15 @@ class TestCatalogList(TestCatalog): columns, data = self.cmd.take_action(parsed_args) self.assertEqual(self.columns, columns) - datalist = (( - 'supernova', - 'compute', - catalog.EndpointsColumn( - auth_ref.service_catalog.catalog[0]['endpoints']), - ), ) + datalist = ( + ( + 'supernova', + 'compute', + catalog.EndpointsColumn( + auth_ref.service_catalog.catalog[0]['endpoints'] + ), + ), + ) self.assertCountEqual(datalist, tuple(data)) def test_catalog_list_with_endpoint_url(self): @@ -111,17 +112,19 @@ class TestCatalogList(TestCatalog): columns, data = self.cmd.take_action(parsed_args) self.assertEqual(self.columns, columns) - datalist = (( - 'supernova', - 'compute', - catalog.EndpointsColumn( - auth_ref.service_catalog.catalog[0]['endpoints']), - ), ) + datalist = ( + ( + 'supernova', + 'compute', + catalog.EndpointsColumn( + auth_ref.service_catalog.catalog[0]['endpoints'] + ), + ), + ) self.assertCountEqual(datalist, tuple(data)) class TestCatalogShow(TestCatalog): - def setUp(self): super(TestCatalogShow, self).setUp() @@ -153,7 +156,8 @@ class TestCatalogShow(TestCatalog): self.assertEqual(collist, columns) datalist = ( catalog.EndpointsColumn( - auth_ref.service_catalog.catalog[0]['endpoints']), + auth_ref.service_catalog.catalog[0]['endpoints'] + ), self.service_catalog.id, 'supernova', 'compute', @@ -174,7 +178,8 @@ class TestFormatColumns(TestCatalog): '\n publicURL: https://public.none.example.com\n ' 'internalURL: https://internal.none.example.com\n ' 'adminURL: https://admin.none.example.com\n', - col.human_readable()) + col.human_readable(), + ) def test_endpoints_column_human_readable_with_partial_endpoint_urls(self): endpoints = [ @@ -193,4 +198,5 @@ class TestFormatColumns(TestCatalog): 'one\n publicURL: https://public.one.example.com\n' 'two\n publicURL: https://public.two.example.com\n ' 'internalURL: https://internal.two.example.com\n', - col.human_readable()) + col.human_readable(), + ) diff --git a/openstackclient/tests/unit/identity/v2_0/test_endpoint.py b/openstackclient/tests/unit/identity/v2_0/test_endpoint.py index 915e04a50..5de396c44 100644 --- a/openstackclient/tests/unit/identity/v2_0/test_endpoint.py +++ b/openstackclient/tests/unit/identity/v2_0/test_endpoint.py @@ -16,7 +16,6 @@ from openstackclient.tests.unit.identity.v2_0 import fakes as identity_fakes class TestEndpoint(identity_fakes.TestIdentityv2): - fake_service = identity_fakes.FakeService.create_one_service() attr = { 'service_name': fake_service.name, @@ -37,7 +36,6 @@ class TestEndpoint(identity_fakes.TestIdentityv2): class TestEndpointCreate(TestEndpoint): - def setUp(self): super(TestEndpointCreate, self).setUp() @@ -50,10 +48,14 @@ class TestEndpointCreate(TestEndpoint): def test_endpoint_create(self): arglist = [ - '--publicurl', self.fake_endpoint.publicurl, - '--internalurl', self.fake_endpoint.internalurl, - '--adminurl', self.fake_endpoint.adminurl, - '--region', self.fake_endpoint.region, + '--publicurl', + self.fake_endpoint.publicurl, + '--internalurl', + self.fake_endpoint.internalurl, + '--adminurl', + self.fake_endpoint.adminurl, + '--region', + self.fake_endpoint.region, self.fake_service.id, ] verifylist = [ @@ -80,8 +82,16 @@ class TestEndpointCreate(TestEndpoint): self.fake_endpoint.internalurl, ) - collist = ('adminurl', 'id', 'internalurl', 'publicurl', - 'region', 'service_id', 'service_name', 'service_type') + collist = ( + 'adminurl', + 'id', + 'internalurl', + 'publicurl', + 'region', + 'service_id', + 'service_name', + 'service_type', + ) self.assertEqual(collist, columns) datalist = ( self.fake_endpoint.adminurl, @@ -98,7 +108,6 @@ class TestEndpointCreate(TestEndpoint): class TestEndpointDelete(TestEndpoint): - def setUp(self): super(TestEndpointDelete, self).setUp() @@ -126,7 +135,6 @@ class TestEndpointDelete(TestEndpoint): class TestEndpointList(TestEndpoint): - def setUp(self): super(TestEndpointList, self).setUp() @@ -151,12 +159,14 @@ class TestEndpointList(TestEndpoint): collist = ('ID', 'Region', 'Service Name', 'Service Type') self.assertEqual(collist, columns) - datalist = (( - self.fake_endpoint.id, - self.fake_endpoint.region, - self.fake_endpoint.service_name, - self.fake_endpoint.service_type, - ), ) + datalist = ( + ( + self.fake_endpoint.id, + self.fake_endpoint.region, + self.fake_endpoint.service_name, + self.fake_endpoint.service_type, + ), + ) self.assertEqual(datalist, tuple(data)) def test_endpoint_list_long(self): @@ -175,23 +185,31 @@ class TestEndpointList(TestEndpoint): self.endpoints_mock.list.assert_called_with() - collist = ('ID', 'Region', 'Service Name', 'Service Type', - 'PublicURL', 'AdminURL', 'InternalURL') + collist = ( + 'ID', + 'Region', + 'Service Name', + 'Service Type', + 'PublicURL', + 'AdminURL', + 'InternalURL', + ) self.assertEqual(collist, columns) - datalist = (( - self.fake_endpoint.id, - self.fake_endpoint.region, - self.fake_endpoint.service_name, - self.fake_endpoint.service_type, - self.fake_endpoint.publicurl, - self.fake_endpoint.adminurl, - self.fake_endpoint.internalurl, - ), ) + datalist = ( + ( + self.fake_endpoint.id, + self.fake_endpoint.region, + self.fake_endpoint.service_name, + self.fake_endpoint.service_type, + self.fake_endpoint.publicurl, + self.fake_endpoint.adminurl, + self.fake_endpoint.internalurl, + ), + ) self.assertEqual(datalist, tuple(data)) class TestEndpointShow(TestEndpoint): - def setUp(self): super(TestEndpointShow, self).setUp() @@ -223,8 +241,16 @@ class TestEndpointShow(TestEndpoint): self.fake_endpoint.service_id, ) - collist = ('adminurl', 'id', 'internalurl', 'publicurl', - 'region', 'service_id', 'service_name', 'service_type') + collist = ( + 'adminurl', + 'id', + 'internalurl', + 'publicurl', + 'region', + 'service_id', + 'service_name', + 'service_type', + ) self.assertEqual(collist, columns) datalist = ( self.fake_endpoint.adminurl, diff --git a/openstackclient/tests/unit/identity/v2_0/test_project.py b/openstackclient/tests/unit/identity/v2_0/test_project.py index 496214aae..68ec9f02e 100644 --- a/openstackclient/tests/unit/identity/v2_0/test_project.py +++ b/openstackclient/tests/unit/identity/v2_0/test_project.py @@ -25,7 +25,6 @@ from openstackclient.tests.unit.identity.v2_0 import fakes as identity_fakes class TestProject(identity_fakes.TestIdentityv2): - fake_project = identity_fakes.FakeProject.create_one_project() fake_projects = identity_fakes.FakeProject.create_projects() @@ -42,10 +41,18 @@ class TestProject(identity_fakes.TestIdentityv2): fake_project.name, ) datalists = ( - (fake_projects[0].description, True, - fake_projects[0].id, fake_projects[0].name,), - (fake_projects[1].description, True, - fake_projects[1].id, fake_projects[1].name,), + ( + fake_projects[0].description, + True, + fake_projects[0].id, + fake_projects[0].name, + ), + ( + fake_projects[1].description, + True, + fake_projects[1].id, + fake_projects[1].name, + ), ) def setUp(self): @@ -57,7 +64,6 @@ class TestProject(identity_fakes.TestIdentityv2): class TestProjectCreate(TestProject): - def setUp(self): super(TestProjectCreate, self).setUp() @@ -88,15 +94,15 @@ class TestProjectCreate(TestProject): 'enabled': True, } self.projects_mock.create.assert_called_with( - self.fake_project.name, - **kwargs + self.fake_project.name, **kwargs ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_project_create_description(self): arglist = [ - '--description', 'new desc', + '--description', + 'new desc', self.fake_project.name, ] verifylist = [ @@ -116,8 +122,7 @@ class TestProjectCreate(TestProject): 'enabled': True, } self.projects_mock.create.assert_called_with( - self.fake_project.name, - **kwargs + self.fake_project.name, **kwargs ) self.assertEqual(self.columns, columns) @@ -146,8 +151,7 @@ class TestProjectCreate(TestProject): 'enabled': True, } self.projects_mock.create.assert_called_with( - self.fake_project.name, - **kwargs + self.fake_project.name, **kwargs ) self.assertEqual(self.columns, columns) @@ -176,8 +180,7 @@ class TestProjectCreate(TestProject): 'enabled': False, } self.projects_mock.create.assert_called_with( - self.fake_project.name, - **kwargs + self.fake_project.name, **kwargs ) self.assertEqual(self.columns, columns) @@ -185,8 +188,10 @@ class TestProjectCreate(TestProject): def test_project_create_property(self): arglist = [ - '--property', 'fee=fi', - '--property', 'fo=fum', + '--property', + 'fee=fi', + '--property', + 'fo=fum', self.fake_project.name, ] verifylist = [ @@ -208,8 +213,7 @@ class TestProjectCreate(TestProject): 'fo': 'fum', } self.projects_mock.create.assert_called_with( - self.fake_project.name, - **kwargs + self.fake_project.name, **kwargs ) self.assertEqual(self.columns, columns) @@ -248,8 +252,7 @@ class TestProjectCreate(TestProject): 'enabled': True, } self.projects_mock.create.assert_called_with( - self.fake_project.name, - **kwargs + self.fake_project.name, **kwargs ) self.assertEqual(self.columns, columns) @@ -277,8 +280,7 @@ class TestProjectCreate(TestProject): 'enabled': True, } self.projects_mock.create.assert_called_with( - self.fake_project.name, - **kwargs + self.fake_project.name, **kwargs ) self.assertEqual(self.columns, columns) @@ -286,7 +288,6 @@ class TestProjectCreate(TestProject): class TestProjectDelete(TestProject): - def setUp(self): super(TestProjectDelete, self).setUp() @@ -315,8 +316,7 @@ class TestProjectDelete(TestProject): @mock.patch.object(utils, 'find_resource') def test_delete_multi_projects_with_exception(self, find_mock): - find_mock.side_effect = [self.fake_project, - exceptions.CommandError] + find_mock.side_effect = [self.fake_project, exceptions.CommandError] arglist = [ self.fake_project.id, 'unexist_project', @@ -330,8 +330,7 @@ class TestProjectDelete(TestProject): self.cmd.take_action(parsed_args) self.fail('CommandError should be raised.') except exceptions.CommandError as e: - self.assertEqual('1 of 2 projects failed to delete.', - str(e)) + self.assertEqual('1 of 2 projects failed to delete.', str(e)) find_mock.assert_any_call(self.projects_mock, self.fake_project.id) find_mock.assert_any_call(self.projects_mock, 'unexist_project') @@ -341,7 +340,6 @@ class TestProjectDelete(TestProject): class TestProjectList(TestProject): - def setUp(self): super(TestProjectList, self).setUp() @@ -363,10 +361,12 @@ class TestProjectList(TestProject): collist = ('ID', 'Name') self.assertEqual(collist, columns) - datalist = (( - self.fake_project.id, - self.fake_project.name, - ), ) + datalist = ( + ( + self.fake_project.id, + self.fake_project.name, + ), + ) self.assertEqual(datalist, tuple(data)) def test_project_list_long(self): @@ -386,18 +386,23 @@ class TestProjectList(TestProject): collist = ('ID', 'Name', 'Description', 'Enabled') self.assertEqual(collist, columns) - datalist = (( - self.fake_project.id, - self.fake_project.name, - self.fake_project.description, - True, - ), ) + datalist = ( + ( + self.fake_project.id, + self.fake_project.name, + self.fake_project.description, + True, + ), + ) self.assertEqual(datalist, tuple(data)) def test_project_list_sort(self): self.projects_mock.list.return_value = self.fake_projects - arglist = ['--sort', 'name:asc', ] + arglist = [ + '--sort', + 'name:asc', + ] verifylist = [] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -425,7 +430,6 @@ class TestProjectList(TestProject): class TestProjectSet(TestProject): - def setUp(self): super(TestProjectSet, self).setUp() @@ -468,11 +472,13 @@ class TestProjectSet(TestProject): parsed_args = self.check_parser(self.cmd, arglist, verifylist) self.assertRaises( - exceptions.CommandError, self.cmd.take_action, parsed_args) + exceptions.CommandError, self.cmd.take_action, parsed_args + ) def test_project_set_name(self): arglist = [ - '--name', self.fake_project.name, + '--name', + self.fake_project.name, self.fake_project.name, ] verifylist = [ @@ -492,14 +498,14 @@ class TestProjectSet(TestProject): 'tenant_name': self.fake_project.name, } self.projects_mock.update.assert_called_with( - self.fake_project.id, - **kwargs + self.fake_project.id, **kwargs ) self.assertIsNone(result) def test_project_set_description(self): arglist = [ - '--description', self.fake_project.description, + '--description', + self.fake_project.description, self.fake_project.name, ] verifylist = [ @@ -519,8 +525,7 @@ class TestProjectSet(TestProject): 'tenant_name': self.fake_project.name, } self.projects_mock.update.assert_called_with( - self.fake_project.id, - **kwargs + self.fake_project.id, **kwargs ) self.assertIsNone(result) @@ -545,8 +550,7 @@ class TestProjectSet(TestProject): 'tenant_name': self.fake_project.name, } self.projects_mock.update.assert_called_with( - self.fake_project.id, - **kwargs + self.fake_project.id, **kwargs ) self.assertIsNone(result) @@ -571,15 +575,16 @@ class TestProjectSet(TestProject): 'tenant_name': self.fake_project.name, } self.projects_mock.update.assert_called_with( - self.fake_project.id, - **kwargs + self.fake_project.id, **kwargs ) self.assertIsNone(result) def test_project_set_property(self): arglist = [ - '--property', 'fee=fi', - '--property', 'fo=fum', + '--property', + 'fee=fi', + '--property', + 'fo=fum', self.fake_project.name, ] verifylist = [ @@ -599,14 +604,12 @@ class TestProjectSet(TestProject): 'fo': 'fum', } self.projects_mock.update.assert_called_with( - self.fake_project.id, - **kwargs + self.fake_project.id, **kwargs ) self.assertIsNone(result) class TestProjectShow(TestProject): - fake_proj_show = identity_fakes.FakeProject.create_one_project() def setUp(self): @@ -647,7 +650,6 @@ class TestProjectShow(TestProject): class TestProjectUnset(TestProject): - attr = {'fee': 'fi', 'fo': 'fum'} fake_proj = identity_fakes.FakeProject.create_one_project(attr) @@ -674,8 +676,10 @@ class TestProjectUnset(TestProject): def test_project_unset_key(self): arglist = [ - '--property', 'fee', - '--property', 'fo', + '--property', + 'fee', + '--property', + 'fo', self.fake_proj.name, ] verifylist = [ @@ -695,7 +699,6 @@ class TestProjectUnset(TestProject): } self.projects_mock.update.assert_called_with( - self.fake_proj.id, - **kwargs + self.fake_proj.id, **kwargs ) self.assertIsNone(result) diff --git a/openstackclient/tests/unit/identity/v2_0/test_role.py b/openstackclient/tests/unit/identity/v2_0/test_role.py index 423884d9f..738982dbe 100644 --- a/openstackclient/tests/unit/identity/v2_0/test_role.py +++ b/openstackclient/tests/unit/identity/v2_0/test_role.py @@ -24,7 +24,6 @@ from openstackclient.tests.unit.identity.v2_0 import fakes as identity_fakes class TestRole(identity_fakes.TestIdentityv2): - attr = {} attr['endpoints'] = [ { @@ -64,7 +63,6 @@ class TestRole(identity_fakes.TestIdentityv2): class TestRoleAdd(TestRole): - def setUp(self): super(TestRoleAdd, self).setUp() @@ -80,8 +78,10 @@ class TestRoleAdd(TestRole): def test_role_add(self): arglist = [ - '--project', self.fake_project.name, - '--user', self.fake_user.name, + '--project', + self.fake_project.name, + '--user', + self.fake_user.name, self.fake_role.name, ] verifylist = [ @@ -113,12 +113,8 @@ class TestRoleAdd(TestRole): class TestRoleCreate(TestRole): - fake_role_c = identity_fakes.FakeRole.create_one_role() - columns = ( - 'id', - 'name' - ) + columns = ('id', 'name') datalist = ( fake_role_c.id, fake_role_c.name, @@ -215,7 +211,6 @@ class TestRoleCreate(TestRole): class TestRoleDelete(TestRole): - def setUp(self): super(TestRoleDelete, self).setUp() @@ -243,8 +238,7 @@ class TestRoleDelete(TestRole): @mock.patch.object(utils, 'find_resource') def test_delete_multi_roles_with_exception(self, find_mock): - find_mock.side_effect = [self.fake_role, - exceptions.CommandError] + find_mock.side_effect = [self.fake_role, exceptions.CommandError] arglist = [ self.fake_role.id, 'unexist_role', @@ -258,8 +252,7 @@ class TestRoleDelete(TestRole): self.cmd.take_action(parsed_args) self.fail('CommandError should be raised.') except exceptions.CommandError as e: - self.assertEqual('1 of 2 roles failed to delete.', - str(e)) + self.assertEqual('1 of 2 roles failed to delete.', str(e)) find_mock.assert_any_call(self.roles_mock, self.fake_role.id) find_mock.assert_any_call(self.roles_mock, 'unexist_role') @@ -269,7 +262,6 @@ class TestRoleDelete(TestRole): class TestRoleList(TestRole): - def setUp(self): super(TestRoleList, self).setUp() @@ -292,15 +284,16 @@ class TestRoleList(TestRole): collist = ('ID', 'Name') self.assertEqual(collist, columns) - datalist = (( - self.fake_role.id, - self.fake_role.name, - ), ) + datalist = ( + ( + self.fake_role.id, + self.fake_role.name, + ), + ) self.assertEqual(datalist, tuple(data)) class TestRoleRemove(TestRole): - def setUp(self): super(TestRoleRemove, self).setUp() @@ -316,8 +309,10 @@ class TestRoleRemove(TestRole): def test_role_remove(self): arglist = [ - '--project', self.fake_project.name, - '--user', self.fake_user.name, + '--project', + self.fake_project.name, + '--user', + self.fake_user.name, self.fake_role.name, ] verifylist = [ @@ -339,7 +334,6 @@ class TestRoleRemove(TestRole): class TestRoleShow(TestRole): - def setUp(self): super(TestRoleShow, self).setUp() diff --git a/openstackclient/tests/unit/identity/v2_0/test_role_assignment.py b/openstackclient/tests/unit/identity/v2_0/test_role_assignment.py index 3e1231aa3..248f689e4 100644 --- a/openstackclient/tests/unit/identity/v2_0/test_role_assignment.py +++ b/openstackclient/tests/unit/identity/v2_0/test_role_assignment.py @@ -22,13 +22,11 @@ from openstackclient.tests.unit.identity.v2_0 import fakes as identity_fakes class TestRoleAssignment(identity_fakes.TestIdentityv2): - def setUp(self): super(TestRoleAssignment, self).setUp() class TestRoleAssignmentList(TestRoleAssignment): - columns = ( 'Role', 'User', @@ -74,7 +72,6 @@ class TestRoleAssignmentList(TestRoleAssignment): self.cmd = role_assignment.ListRoleAssignment(self.app, None) def test_role_assignment_list_no_filters(self): - arglist = [] verifylist = [] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -87,9 +84,9 @@ class TestRoleAssignmentList(TestRoleAssignment): ) def test_role_assignment_list_only_project_filter(self): - arglist = [ - '--project', identity_fakes.project_name, + '--project', + identity_fakes.project_name, ] verifylist = [ ('project', identity_fakes.project_name), @@ -104,9 +101,9 @@ class TestRoleAssignmentList(TestRoleAssignment): ) def test_role_assignment_list_only_user_filter(self): - arglist = [ - '--user', identity_fakes.user_name, + '--user', + identity_fakes.user_name, ] verifylist = [ ('user', identity_fakes.user_name), @@ -121,25 +118,24 @@ class TestRoleAssignmentList(TestRoleAssignment): ) def test_role_assignment_list_project_and_user(self): - self.roles_mock.roles_for_user.return_value = [ fakes.FakeResource( None, - copy.deepcopy( - identity_fakes.ROLE), + copy.deepcopy(identity_fakes.ROLE), loaded=True, ), fakes.FakeResource( None, - copy.deepcopy( - identity_fakes.ROLE_2), + copy.deepcopy(identity_fakes.ROLE_2), loaded=True, ), ] arglist = [ - '--project', identity_fakes.project_name, - '--user', identity_fakes.user_name, + '--project', + identity_fakes.project_name, + '--user', + identity_fakes.user_name, ] verifylist = [ ('user', identity_fakes.user_name), @@ -158,18 +154,21 @@ class TestRoleAssignmentList(TestRoleAssignment): ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.role_id, - identity_fakes.user_id, - identity_fakes.project_id, - ), (identity_fakes.ROLE_2['id'], - identity_fakes.user_id, - identity_fakes.project_id, - ),) + datalist = ( + ( + identity_fakes.role_id, + identity_fakes.user_id, + identity_fakes.project_id, + ), + ( + identity_fakes.ROLE_2['id'], + identity_fakes.user_id, + identity_fakes.project_id, + ), + ) self.assertEqual(datalist, tuple(data)) def test_role_assignment_list_def_creds(self): - auth_ref = self.app.client_manager.auth_ref = mock.Mock() auth_ref.project_id.return_value = identity_fakes.project_id auth_ref.user_id.return_value = identity_fakes.user_id @@ -177,14 +176,12 @@ class TestRoleAssignmentList(TestRoleAssignment): self.roles_mock.roles_for_user.return_value = [ fakes.FakeResource( None, - copy.deepcopy( - identity_fakes.ROLE), + copy.deepcopy(identity_fakes.ROLE), loaded=True, ), fakes.FakeResource( None, - copy.deepcopy( - identity_fakes.ROLE_2), + copy.deepcopy(identity_fakes.ROLE_2), loaded=True, ), ] @@ -210,37 +207,40 @@ class TestRoleAssignmentList(TestRoleAssignment): ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.role_id, - identity_fakes.user_id, - identity_fakes.project_id, - ), (identity_fakes.ROLE_2['id'], - identity_fakes.user_id, - identity_fakes.project_id, - ),) + datalist = ( + ( + identity_fakes.role_id, + identity_fakes.user_id, + identity_fakes.project_id, + ), + ( + identity_fakes.ROLE_2['id'], + identity_fakes.user_id, + identity_fakes.project_id, + ), + ) self.assertEqual(datalist, tuple(data)) def test_role_assignment_list_by_name_project_and_user(self): - self.roles_mock.roles_for_user.return_value = [ fakes.FakeResource( None, - copy.deepcopy( - identity_fakes.ROLE), + copy.deepcopy(identity_fakes.ROLE), loaded=True, ), fakes.FakeResource( None, - copy.deepcopy( - identity_fakes.ROLE_2), + copy.deepcopy(identity_fakes.ROLE_2), loaded=True, ), ] arglist = [ - '--project', identity_fakes.project_name, - '--user', identity_fakes.user_name, - '--names' + '--project', + identity_fakes.project_name, + '--user', + identity_fakes.user_name, + '--names', ] verifylist = [ ('user', identity_fakes.user_name), @@ -260,12 +260,16 @@ class TestRoleAssignmentList(TestRoleAssignment): ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.role_name, - identity_fakes.user_name, - identity_fakes.project_name, - ), (identity_fakes.ROLE_2['name'], - identity_fakes.user_name, - identity_fakes.project_name, - ),) + datalist = ( + ( + identity_fakes.role_name, + identity_fakes.user_name, + identity_fakes.project_name, + ), + ( + identity_fakes.ROLE_2['name'], + identity_fakes.user_name, + identity_fakes.project_name, + ), + ) self.assertEqual(datalist, tuple(data)) diff --git a/openstackclient/tests/unit/identity/v2_0/test_service.py b/openstackclient/tests/unit/identity/v2_0/test_service.py index 6c4374eff..844f395be 100644 --- a/openstackclient/tests/unit/identity/v2_0/test_service.py +++ b/openstackclient/tests/unit/identity/v2_0/test_service.py @@ -32,7 +32,6 @@ class TestService(identity_fakes.TestIdentityv2): class TestServiceCreate(TestService): - fake_service_c = identity_fakes.FakeService.create_one_service() columns = ( 'description', @@ -83,7 +82,8 @@ class TestServiceCreate(TestService): def test_service_create_with_name_option(self): arglist = [ - '--name', self.fake_service_c.name, + '--name', + self.fake_service_c.name, self.fake_service_c.type, ] verifylist = [ @@ -110,8 +110,10 @@ class TestServiceCreate(TestService): def test_service_create_description(self): arglist = [ - '--name', self.fake_service_c.name, - '--description', self.fake_service_c.description, + '--name', + self.fake_service_c.name, + '--description', + self.fake_service_c.description, self.fake_service_c.type, ] verifylist = [ @@ -138,7 +140,6 @@ class TestServiceCreate(TestService): class TestServiceDelete(TestService): - def setUp(self): super(TestServiceDelete, self).setUp() @@ -167,7 +168,6 @@ class TestServiceDelete(TestService): class TestServiceList(TestService): - def setUp(self): super(TestServiceList, self).setUp() @@ -190,11 +190,13 @@ class TestServiceList(TestService): collist = ('ID', 'Name', 'Type') self.assertEqual(collist, columns) - datalist = (( - self.fake_service.id, - self.fake_service.name, - self.fake_service.type, - ), ) + datalist = ( + ( + self.fake_service.id, + self.fake_service.name, + self.fake_service.type, + ), + ) self.assertEqual(datalist, tuple(data)) def test_service_list_long(self): @@ -215,17 +217,18 @@ class TestServiceList(TestService): collist = ('ID', 'Name', 'Type', 'Description') self.assertEqual(collist, columns) - datalist = (( - self.fake_service.id, - self.fake_service.name, - self.fake_service.type, - self.fake_service.description, - ), ) + datalist = ( + ( + self.fake_service.id, + self.fake_service.name, + self.fake_service.type, + self.fake_service.description, + ), + ) self.assertEqual(datalist, tuple(data)) class TestServiceShow(TestService): - fake_service_s = identity_fakes.FakeService.create_one_service() def setUp(self): @@ -282,4 +285,6 @@ class TestServiceShow(TestService): except exceptions.CommandError as e: self.assertEqual( "Multiple service matches found for 'nounique_service'," - " use an ID to be more specific.", str(e)) + " use an ID to be more specific.", + str(e), + ) diff --git a/openstackclient/tests/unit/identity/v2_0/test_token.py b/openstackclient/tests/unit/identity/v2_0/test_token.py index c079ce679..33cb0d9c3 100644 --- a/openstackclient/tests/unit/identity/v2_0/test_token.py +++ b/openstackclient/tests/unit/identity/v2_0/test_token.py @@ -20,7 +20,6 @@ from openstackclient.tests.unit.identity.v2_0 import fakes as identity_fakes class TestToken(identity_fakes.TestIdentityv2): - fake_user = identity_fakes.FakeUser.create_one_user() fake_project = identity_fakes.FakeProject.create_one_project() @@ -33,7 +32,6 @@ class TestToken(identity_fakes.TestIdentityv2): class TestTokenIssue(TestToken): - def setUp(self): super(TestTokenIssue, self).setUp() @@ -94,7 +92,6 @@ class TestTokenIssue(TestToken): class TestTokenRevoke(TestToken): - TOKEN = 'fob' def setUp(self): diff --git a/openstackclient/tests/unit/identity/v2_0/test_user.py b/openstackclient/tests/unit/identity/v2_0/test_user.py index c3f5f1d7a..a8baf61a0 100644 --- a/openstackclient/tests/unit/identity/v2_0/test_user.py +++ b/openstackclient/tests/unit/identity/v2_0/test_user.py @@ -24,7 +24,6 @@ from openstackclient.tests.unit.identity.v2_0 import fakes as identity_fakes class TestUser(identity_fakes.TestIdentityv2): - fake_project = identity_fakes.FakeProject.create_one_project() attr = { 'tenantId': fake_project.id, @@ -44,7 +43,6 @@ class TestUser(identity_fakes.TestIdentityv2): class TestUserCreate(TestUser): - fake_project_c = identity_fakes.FakeProject.create_one_project() attr = { 'tenantId': fake_project_c.id, @@ -99,10 +97,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name, password, email, tenant_id=, enabled=) self.users_mock.create.assert_called_with( - self.fake_user_c.name, - None, - None, - **kwargs + self.fake_user_c.name, None, None, **kwargs ) self.assertEqual(self.columns, columns) @@ -110,13 +105,14 @@ class TestUserCreate(TestUser): def test_user_create_password(self): arglist = [ - '--password', 'secret', + '--password', + 'secret', self.fake_user_c.name, ] verifylist = [ ('name', self.fake_user_c.name), ('password_prompt', False), - ('password', 'secret') + ('password', 'secret'), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -132,10 +128,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name, password, email, tenant_id=, enabled=) self.users_mock.create.assert_called_with( - self.fake_user_c.name, - 'secret', - None, - **kwargs + self.fake_user_c.name, 'secret', None, **kwargs ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -147,7 +140,7 @@ class TestUserCreate(TestUser): ] verifylist = [ ('name', self.fake_user_c.name), - ('password_prompt', True) + ('password_prompt', True), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -166,10 +159,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name, password, email, tenant_id=, enabled=) self.users_mock.create.assert_called_with( - self.fake_user_c.name, - 'abc123', - None, - **kwargs + self.fake_user_c.name, 'abc123', None, **kwargs ) self.assertEqual(self.columns, columns) @@ -177,7 +167,8 @@ class TestUserCreate(TestUser): def test_user_create_email(self): arglist = [ - '--email', 'barney@example.com', + '--email', + 'barney@example.com', self.fake_user_c.name, ] verifylist = [ @@ -198,10 +189,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name, password, email, tenant_id=, enabled=) self.users_mock.create.assert_called_with( - self.fake_user_c.name, - None, - 'barney@example.com', - **kwargs + self.fake_user_c.name, None, 'barney@example.com', **kwargs ) self.assertEqual(self.columns, columns) @@ -219,7 +207,8 @@ class TestUserCreate(TestUser): self.users_mock.create.return_value = user_2 arglist = [ - '--project', self.fake_project_c.name, + '--project', + self.fake_project_c.name, user_2.name, ] verifylist = [ @@ -240,10 +229,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name, password, email, tenant_id=, enabled=) self.users_mock.create.assert_called_with( - user_2.name, - None, - None, - **kwargs + user_2.name, None, None, **kwargs ) self.assertEqual(self.columns, columns) @@ -280,10 +266,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name, password, email, tenant_id=, enabled=) self.users_mock.create.assert_called_with( - self.fake_user_c.name, - None, - None, - **kwargs + self.fake_user_c.name, None, None, **kwargs ) self.assertEqual(self.columns, columns) @@ -313,10 +296,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name, password, email, tenant_id=, enabled=) self.users_mock.create.assert_called_with( - self.fake_user_c.name, - None, - None, - **kwargs + self.fake_user_c.name, None, None, **kwargs ) self.assertEqual(self.columns, columns) @@ -375,17 +355,13 @@ class TestUserCreate(TestUser): } # UserManager.create(name, password, email, tenant_id=, enabled=) self.users_mock.create.assert_called_with( - self.fake_user_c.name, - None, - None, - **kwargs + self.fake_user_c.name, None, None, **kwargs ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) class TestUserDelete(TestUser): - def setUp(self): super(TestUserDelete, self).setUp() @@ -414,8 +390,7 @@ class TestUserDelete(TestUser): @mock.patch.object(utils, 'find_resource') def test_delete_multi_users_with_exception(self, find_mock): - find_mock.side_effect = [self.fake_user, - exceptions.CommandError] + find_mock.side_effect = [self.fake_user, exceptions.CommandError] arglist = [ self.fake_user.id, 'unexist_user', @@ -429,8 +404,7 @@ class TestUserDelete(TestUser): self.cmd.take_action(parsed_args) self.fail('CommandError should be raised.') except exceptions.CommandError as e: - self.assertEqual('1 of 2 users failed to delete.', - str(e)) + self.assertEqual('1 of 2 users failed to delete.', str(e)) find_mock.assert_any_call(self.users_mock, self.fake_user.id) find_mock.assert_any_call(self.users_mock, 'unexist_user') @@ -440,7 +414,6 @@ class TestUserDelete(TestUser): class TestUserList(TestUser): - fake_project_l = identity_fakes.FakeProject.create_one_project() attr = { 'tenantId': fake_project_l.id, @@ -486,7 +459,8 @@ class TestUserList(TestUser): def test_user_list_project(self): arglist = [ - '--project', self.fake_project_l.id, + '--project', + self.fake_project_l.id, ] verifylist = [ ('project', self.fake_project_l.id), @@ -522,20 +496,22 @@ class TestUserList(TestUser): collist = ('ID', 'Name', 'Project', 'Email', 'Enabled') self.assertEqual(collist, columns) - datalist = (( - self.fake_user_l.id, - self.fake_user_l.name, - user.ProjectColumn( - self.fake_project_l.id, - {self.fake_project_l.id: self.fake_project_l}), - self.fake_user_l.email, - True, - ), ) + datalist = ( + ( + self.fake_user_l.id, + self.fake_user_l.name, + user.ProjectColumn( + self.fake_project_l.id, + {self.fake_project_l.id: self.fake_project_l}, + ), + self.fake_user_l.email, + True, + ), + ) self.assertCountEqual(datalist, tuple(data)) class TestUserSet(TestUser): - def setUp(self): super(TestUserSet, self).setUp() @@ -583,11 +559,13 @@ class TestUserSet(TestUser): parsed_args = self.check_parser(self.cmd, arglist, verifylist) self.assertRaises( - exceptions.CommandError, self.cmd.take_action, parsed_args) + exceptions.CommandError, self.cmd.take_action, parsed_args + ) def test_user_set_name(self): arglist = [ - '--name', 'qwerty', + '--name', + 'qwerty', self.fake_user.name, ] verifylist = [ @@ -609,15 +587,13 @@ class TestUserSet(TestUser): 'name': 'qwerty', } # UserManager.update(user, **kwargs) - self.users_mock.update.assert_called_with( - self.fake_user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.fake_user.id, **kwargs) self.assertIsNone(result) def test_user_set_password(self): arglist = [ - '--password', 'secret', + '--password', + 'secret', self.fake_user.name, ] verifylist = [ @@ -672,7 +648,8 @@ class TestUserSet(TestUser): def test_user_set_email(self): arglist = [ - '--email', 'barney@example.com', + '--email', + 'barney@example.com', self.fake_user.name, ] verifylist = [ @@ -694,15 +671,13 @@ class TestUserSet(TestUser): 'enabled': True, } # UserManager.update(user, **kwargs) - self.users_mock.update.assert_called_with( - self.fake_user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.fake_user.id, **kwargs) self.assertIsNone(result) def test_user_set_project(self): arglist = [ - '--project', self.fake_project.id, + '--project', + self.fake_project.id, self.fake_user.name, ] verifylist = [ @@ -748,10 +723,7 @@ class TestUserSet(TestUser): 'enabled': True, } # UserManager.update(user, **kwargs) - self.users_mock.update.assert_called_with( - self.fake_user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.fake_user.id, **kwargs) self.assertIsNone(result) def test_user_set_disable(self): @@ -777,15 +749,11 @@ class TestUserSet(TestUser): 'enabled': False, } # UserManager.update(user, **kwargs) - self.users_mock.update.assert_called_with( - self.fake_user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.fake_user.id, **kwargs) self.assertIsNone(result) class TestUserShow(TestUser): - def setUp(self): super(TestUserShow, self).setUp() diff --git a/openstackclient/tests/unit/identity/v3/fakes.py b/openstackclient/tests/unit/identity/v3/fakes.py index 58d5d14d0..0626df874 100644 --- a/openstackclient/tests/unit/identity/v3/fakes.py +++ b/openstackclient/tests/unit/identity/v3/fakes.py @@ -58,55 +58,24 @@ EMPLOYEE_GROUP_ID = "0cd5e9" DEVELOPER_GROUP_ID = "xyz" MAPPING_RULES = [ { - "local": [ - { - "group": { - "id": EMPLOYEE_GROUP_ID - } - } - ], + "local": [{"group": {"id": EMPLOYEE_GROUP_ID}}], "remote": [ - { - "type": "orgPersonType", - "not_any_of": [ - "Contractor", - "Guest" - ] - } - ] + {"type": "orgPersonType", "not_any_of": ["Contractor", "Guest"]} + ], } ] MAPPING_RULES_2 = [ { - "local": [ - { - "group": { - "id": DEVELOPER_GROUP_ID - } - } - ], - "remote": [ - { - "type": "orgPersonType", - "any_one_of": [ - "Contractor" - ] - } - ] + "local": [{"group": {"id": DEVELOPER_GROUP_ID}}], + "remote": [{"type": "orgPersonType", "any_one_of": ["Contractor"]}], } ] -MAPPING_RESPONSE = { - "id": mapping_id, - "rules": MAPPING_RULES -} +MAPPING_RESPONSE = {"id": mapping_id, "rules": MAPPING_RULES} -MAPPING_RESPONSE_2 = { - "id": mapping_id, - "rules": MAPPING_RULES_2 -} +MAPPING_RESPONSE_2 = {"id": mapping_id, "rules": MAPPING_RULES_2} mfa_opt1 = 'password,totp' mfa_opt2 = 'password' @@ -270,7 +239,7 @@ USER = { trust_id = 't-456' trust_expires = None trust_impersonation = False -trust_roles = {"id": role_id, "name": role_name}, +trust_roles = ({"id": role_id, "name": role_name},) TRUST = { 'expires_at': trust_expires, @@ -327,32 +296,31 @@ mapping_id_updated = 'prod_mapping' sp_id = 'BETA' sp_description = 'Service Provider to burst into' service_provider_url = 'https://beta.example.com/Shibboleth.sso/POST/SAML' -sp_auth_url = ('https://beta.example.com/v3/OS-FEDERATION/identity_providers/' - 'idp/protocol/saml2/auth') +sp_auth_url = ( + 'https://beta.example.com/v3/OS-FEDERATION/identity_providers/' + 'idp/protocol/saml2/auth' +) SERVICE_PROVIDER = { 'id': sp_id, 'enabled': True, 'description': sp_description, 'sp_url': service_provider_url, - 'auth_url': sp_auth_url + 'auth_url': sp_auth_url, } -PROTOCOL_ID_MAPPING = { - 'id': protocol_id, - 'mapping': mapping_id -} +PROTOCOL_ID_MAPPING = {'id': protocol_id, 'mapping': mapping_id} PROTOCOL_OUTPUT = { 'id': protocol_id, 'mapping_id': mapping_id, - 'identity_provider': idp_id + 'identity_provider': idp_id, } PROTOCOL_OUTPUT_UPDATED = { 'id': protocol_id, 'mapping_id': mapping_id_updated, - 'identity_provider': idp_id + 'identity_provider': idp_id, } # Assignments @@ -366,22 +334,24 @@ ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID = { ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID_INCLUDE_NAMES = { 'scope': { 'project': { - 'domain': {'id': domain_id, - 'name': domain_name}, + 'domain': {'id': domain_id, 'name': domain_name}, 'id': project_id, - 'name': project_name}}, + 'name': project_name, + } + }, 'user': { - 'domain': {'id': domain_id, - 'name': domain_name}, + 'domain': {'id': domain_id, 'name': domain_name}, 'id': user_id, - 'name': user_name}, - 'role': {'id': role_id, - 'name': role_name}, + 'name': user_name, + }, + 'role': {'id': role_id, 'name': role_name}, } ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID_INHERITED = { - 'scope': {'project': {'id': project_id}, - 'OS-INHERIT:inherited_to': 'projects'}, + 'scope': { + 'project': {'id': project_id}, + 'OS-INHERIT:inherited_to': 'projects', + }, 'user': {'id': user_id}, 'role': {'id': role_id}, } @@ -405,21 +375,20 @@ ASSIGNMENT_WITH_DOMAIN_ROLE = { } ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID_INCLUDE_NAMES = { - 'scope': { - 'domain': {'id': domain_id, - 'name': domain_name}}, + 'scope': {'domain': {'id': domain_id, 'name': domain_name}}, 'user': { - 'domain': {'id': domain_id, - 'name': domain_name}, + 'domain': {'id': domain_id, 'name': domain_name}, 'id': user_id, - 'name': user_name}, - 'role': {'id': role_id, - 'name': role_name}, + 'name': user_name, + }, + 'role': {'id': role_id, 'name': role_name}, } ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID_INHERITED = { - 'scope': {'domain': {'id': domain_id}, - 'OS-INHERIT:inherited_to': 'projects'}, + 'scope': { + 'domain': {'id': domain_id}, + 'OS-INHERIT:inherited_to': 'projects', + }, 'user': {'id': user_id}, 'role': {'id': role_id}, } @@ -437,7 +406,7 @@ consumer_secret = 'test consumer secret' OAUTH_CONSUMER = { 'id': consumer_id, 'secret': consumer_secret, - 'description': consumer_description + 'description': consumer_description, } access_token_id = 'test access token id' @@ -448,7 +417,7 @@ OAUTH_ACCESS_TOKEN = { 'id': access_token_id, 'expires': access_token_expires, 'key': access_token_id, - 'secret': access_token_secret + 'secret': access_token_secret, } request_token_id = 'test request token id' @@ -459,17 +428,15 @@ OAUTH_REQUEST_TOKEN = { 'id': request_token_id, 'expires': request_token_expires, 'key': request_token_id, - 'secret': request_token_secret + 'secret': request_token_secret, } oauth_verifier_pin = '6d74XaDS' -OAUTH_VERIFIER = { - 'oauth_verifier': oauth_verifier_pin -} +OAUTH_VERIFIER = {'oauth_verifier': oauth_verifier_pin} app_cred_id = 'app-cred-id' app_cred_name = 'testing_app_cred' -app_cred_role = {"id": role_id, "name": role_name, "domain": None}, +app_cred_role = ({"id": role_id, "name": role_name, "domain": None},) app_cred_description = 'app credential for testing' app_cred_expires = datetime.datetime(2022, 1, 1, 0, 0) app_cred_expires_str = app_cred_expires.strftime('%Y-%m-%dT%H:%M:%S%z') @@ -491,7 +458,7 @@ APP_CRED_BASIC = { 'expires_at': None, 'unrestricted': False, 'secret': app_cred_secret, - 'access_rules': None + 'access_rules': None, } APP_CRED_OPTIONS = { 'id': app_cred_id, @@ -519,7 +486,7 @@ APP_CRED_ACCESS_RULES = { 'expires_at': None, 'unrestricted': False, 'secret': app_cred_secret, - 'access_rules': app_cred_access_rules + 'access_rules': app_cred_access_rules, } registered_limit_id = 'registered-limit-id' @@ -532,7 +499,7 @@ REGISTERED_LIMIT = { 'resource_name': registered_limit_resource_name, 'service_id': service_id, 'description': None, - 'region_id': None + 'region_id': None, } REGISTERED_LIMIT_OPTIONS = { 'id': registered_limit_id, @@ -540,7 +507,7 @@ REGISTERED_LIMIT_OPTIONS = { 'resource_name': registered_limit_resource_name, 'service_id': service_id, 'description': registered_limit_description, - 'region_id': region_id + 'region_id': region_id, } limit_id = 'limit-id' @@ -554,7 +521,7 @@ LIMIT = { 'resource_name': limit_resource_name, 'service_id': service_id, 'description': None, - 'region_id': None + 'region_id': None, } LIMIT_OPTIONS = { 'id': limit_id, @@ -563,7 +530,7 @@ LIMIT_OPTIONS = { 'resource_name': limit_resource_name, 'service_id': service_id, 'description': limit_description, - 'region_id': region_id + 'region_id': region_id, } @@ -598,7 +565,6 @@ def fake_auth_ref(fake_token, fake_service=None): class FakeAuth(object): - def __init__(self, auth_method_class=None): self._auth_method_class = auth_method_class @@ -607,13 +573,11 @@ class FakeAuth(object): class FakeSession(object): - def __init__(self, **kwargs): self.auth = FakeAuth() class FakeIdentityv3Client(object): - def __init__(self, **kwargs): self.domains = mock.Mock() self.domains.resource_class = fakes.FakeResource(None, {}) @@ -638,8 +602,9 @@ class FakeIdentityv3Client(object): self.services = mock.Mock() self.services.resource_class = fakes.FakeResource(None, {}) self.session = mock.Mock() - self.session.auth.auth_ref.service_catalog.resource_class = \ + self.session.auth.auth_ref.service_catalog.resource_class = ( fakes.FakeResource(None, {}) + ) self.tokens = mock.Mock() self.tokens.resource_class = fakes.FakeResource(None, {}) self.trusts = mock.Mock() @@ -654,8 +619,9 @@ class FakeIdentityv3Client(object): self.auth.client = mock.Mock() self.auth.client.resource_class = fakes.FakeResource(None, {}) self.application_credentials = mock.Mock() - self.application_credentials.resource_class = fakes.FakeResource(None, - {}) + self.application_credentials.resource_class = fakes.FakeResource( + None, {} + ) self.access_rules = mock.Mock() self.access_rules.resource_class = fakes.FakeResource(None, {}) self.inference_rules = mock.Mock() @@ -667,7 +633,6 @@ class FakeIdentityv3Client(object): class FakeFederationManager(object): - def __init__(self, **kwargs): self.identity_providers = mock.Mock() self.identity_providers.resource_class = fakes.FakeResource(None, {}) @@ -684,14 +649,12 @@ class FakeFederationManager(object): class FakeFederatedClient(FakeIdentityv3Client): - def __init__(self, **kwargs): super(FakeFederatedClient, self).__init__(**kwargs) self.federation = FakeFederationManager() class FakeOAuth1Client(FakeIdentityv3Client): - def __init__(self, **kwargs): super(FakeOAuth1Client, self).__init__(**kwargs) @@ -704,7 +667,6 @@ class FakeOAuth1Client(FakeIdentityv3Client): class TestIdentityv3(utils.TestCommand): - def setUp(self): super(TestIdentityv3, self).setUp() @@ -715,24 +677,20 @@ class TestIdentityv3(utils.TestCommand): class TestFederatedIdentity(utils.TestCommand): - def setUp(self): super(TestFederatedIdentity, self).setUp() self.app.client_manager.identity = FakeFederatedClient( - endpoint=fakes.AUTH_URL, - token=fakes.AUTH_TOKEN + endpoint=fakes.AUTH_URL, token=fakes.AUTH_TOKEN ) class TestOAuth1(utils.TestCommand): - def setUp(self): super(TestOAuth1, self).setUp() self.app.client_manager.identity = FakeOAuth1Client( - endpoint=fakes.AUTH_URL, - token=fakes.AUTH_TOKEN + endpoint=fakes.AUTH_URL, token=fakes.AUTH_TOKEN ) @@ -765,8 +723,9 @@ class FakeProject(object): } project_info.update(attrs) - project = fakes.FakeResource(info=copy.deepcopy(project_info), - loaded=True) + project = fakes.FakeResource( + info=copy.deepcopy(project_info), loaded=True + ) return project @staticmethod @@ -813,8 +772,9 @@ class FakeDomain(object): } domain_info.update(attrs) - domain = fakes.FakeResource(info=copy.deepcopy(domain_info), - loaded=True) + domain = fakes.FakeResource( + info=copy.deepcopy(domain_info), loaded=True + ) return domain @@ -845,7 +805,8 @@ class FakeCredential(object): credential_info.update(attrs) credential = fakes.FakeResource( - info=copy.deepcopy(credential_info), loaded=True) + info=copy.deepcopy(credential_info), loaded=True + ) return credential @staticmethod @@ -914,8 +875,7 @@ class FakeUser(object): } user_info.update(attrs) - user = fakes.FakeResource(info=copy.deepcopy(user_info), - loaded=True) + user = fakes.FakeResource(info=copy.deepcopy(user_info), loaded=True) return user @staticmethod @@ -982,8 +942,7 @@ class FakeGroup(object): } group_info.update(attrs) - group = fakes.FakeResource(info=copy.deepcopy(group_info), - loaded=True) + group = fakes.FakeResource(info=copy.deepcopy(group_info), loaded=True) return group @staticmethod @@ -1052,8 +1011,9 @@ class FakeEndpoint(object): } endpoint_info.update(attrs) - endpoint = fakes.FakeResource(info=copy.deepcopy(endpoint_info), - loaded=True) + endpoint = fakes.FakeResource( + info=copy.deepcopy(endpoint_info), loaded=True + ) return endpoint @staticmethod @@ -1076,8 +1036,7 @@ class FakeEndpoint(object): # Overwrite default attributes if there are some attributes set endpoint_filter_info.update(attrs) - endpoint_filter = fakes.FakeModel( - copy.deepcopy(endpoint_filter_info)) + endpoint_filter = fakes.FakeModel(copy.deepcopy(endpoint_filter_info)) return endpoint_filter @@ -1110,8 +1069,9 @@ class FakeEndpointGroup(object): } endpointgroup_info.update(attrs) - endpoint = fakes.FakeResource(info=copy.deepcopy(endpointgroup_info), - loaded=True) + endpoint = fakes.FakeResource( + info=copy.deepcopy(endpointgroup_info), loaded=True + ) return endpoint @staticmethod @@ -1135,7 +1095,8 @@ class FakeEndpointGroup(object): endpointgroup_filter_info.update(attrs) endpointgroup_filter = fakes.FakeModel( - copy.deepcopy(endpointgroup_filter_info)) + copy.deepcopy(endpointgroup_filter_info) + ) return endpointgroup_filter @@ -1166,8 +1127,9 @@ class FakeService(object): } service_info.update(attrs) - service = fakes.FakeResource(info=copy.deepcopy(service_info), - loaded=True) + service = fakes.FakeResource( + info=copy.deepcopy(service_info), loaded=True + ) return service @@ -1195,13 +1157,15 @@ class FakeRoleAssignment(object): role_assignment_info.update(attrs) role_assignment = fakes.FakeResource( - info=copy.deepcopy(role_assignment_info), loaded=True) + info=copy.deepcopy(role_assignment_info), loaded=True + ) return role_assignment class FakeImpliedRoleResponse(object): """Fake one or more role assignment.""" + def __init__(self, prior_role, implied_roles): self.prior_role = prior_role self.implies = [role for role in implied_roles] @@ -1215,8 +1179,6 @@ class FakeImpliedRoleResponse(object): """ # set default attributes. - implied_roles = [ - FakeImpliedRoleResponse(ROLES[0], [ROLES[1]]) - ] + implied_roles = [FakeImpliedRoleResponse(ROLES[0], [ROLES[1]])] return implied_roles diff --git a/openstackclient/tests/unit/identity/v3/test_access_rule.py b/openstackclient/tests/unit/identity/v3/test_access_rule.py index 904fe323d..3727dcfec 100644 --- a/openstackclient/tests/unit/identity/v3/test_access_rule.py +++ b/openstackclient/tests/unit/identity/v3/test_access_rule.py @@ -25,7 +25,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestAccessRule(identity_fakes.TestIdentityv3): - def setUp(self): super(TestAccessRule, self).setUp() @@ -37,7 +36,6 @@ class TestAccessRule(identity_fakes.TestIdentityv3): class TestAccessRuleDelete(TestAccessRule): - def setUp(self): super(TestAccessRuleDelete, self).setUp() @@ -50,16 +48,13 @@ class TestAccessRuleDelete(TestAccessRule): self.access_rules_mock.delete.return_value = None # Get the command object to test - self.cmd = access_rule.DeleteAccessRule( - self.app, None) + self.cmd = access_rule.DeleteAccessRule(self.app, None) def test_access_rule_delete(self): arglist = [ identity_fakes.access_rule_id, ] - verifylist = [ - ('access_rule', [identity_fakes.access_rule_id]) - ] + verifylist = [('access_rule', [identity_fakes.access_rule_id])] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) @@ -71,8 +66,10 @@ class TestAccessRuleDelete(TestAccessRule): @mock.patch.object(utils, 'find_resource') def test_delete_multi_access_rules_with_exception(self, find_mock): - find_mock.side_effect = [self.access_rules_mock.get.return_value, - exceptions.CommandError] + find_mock.side_effect = [ + self.access_rules_mock.get.return_value, + exceptions.CommandError, + ] arglist = [ identity_fakes.access_rule_id, 'nonexistent_access_rule', @@ -86,21 +83,24 @@ class TestAccessRuleDelete(TestAccessRule): self.cmd.take_action(parsed_args) self.fail('CommandError should be raised.') except exceptions.CommandError as e: - self.assertEqual('1 of 2 access rules failed to' - ' delete.', str(e)) + self.assertEqual( + '1 of 2 access rules failed to' ' delete.', str(e) + ) - find_mock.assert_any_call(self.access_rules_mock, - identity_fakes.access_rule_id) - find_mock.assert_any_call(self.access_rules_mock, - 'nonexistent_access_rule') + find_mock.assert_any_call( + self.access_rules_mock, identity_fakes.access_rule_id + ) + find_mock.assert_any_call( + self.access_rules_mock, 'nonexistent_access_rule' + ) self.assertEqual(2, find_mock.call_count) self.access_rules_mock.delete.assert_called_once_with( - identity_fakes.access_rule_id) + identity_fakes.access_rule_id + ) class TestAccessRuleList(TestAccessRule): - def setUp(self): super(TestAccessRuleList, self).setUp() @@ -126,17 +126,18 @@ class TestAccessRuleList(TestAccessRule): collist = ('ID', 'Service', 'Method', 'Path') self.assertEqual(collist, columns) - datalist = (( - identity_fakes.access_rule_id, - identity_fakes.access_rule_service, - identity_fakes.access_rule_method, - identity_fakes.access_rule_path, - ), ) + datalist = ( + ( + identity_fakes.access_rule_id, + identity_fakes.access_rule_service, + identity_fakes.access_rule_method, + identity_fakes.access_rule_path, + ), + ) self.assertEqual(datalist, tuple(data)) class TestAccessRuleShow(TestAccessRule): - def setUp(self): super(TestAccessRuleShow, self).setUp() @@ -161,7 +162,8 @@ class TestAccessRuleShow(TestAccessRule): columns, data = self.cmd.take_action(parsed_args) self.access_rules_mock.get.assert_called_with( - identity_fakes.access_rule_id) + identity_fakes.access_rule_id + ) collist = ('id', 'method', 'path', 'service') self.assertEqual(collist, columns) diff --git a/openstackclient/tests/unit/identity/v3/test_application_credential.py b/openstackclient/tests/unit/identity/v3/test_application_credential.py index 24bafc9f5..68ed750d8 100644 --- a/openstackclient/tests/unit/identity/v3/test_application_credential.py +++ b/openstackclient/tests/unit/identity/v3/test_application_credential.py @@ -26,7 +26,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestApplicationCredential(identity_fakes.TestIdentityv3): - def setUp(self): super(TestApplicationCredential, self).setUp() @@ -38,7 +37,6 @@ class TestApplicationCredential(identity_fakes.TestIdentityv3): class TestApplicationCredentialCreate(TestApplicationCredential): - def setUp(self): super(TestApplicationCredentialCreate, self).setUp() @@ -50,7 +48,8 @@ class TestApplicationCredentialCreate(TestApplicationCredential): # Get the command object to test self.cmd = application_credential.CreateApplicationCredential( - self.app, None) + self.app, None + ) def test_application_credential_create_basic(self): self.app_creds_mock.create.return_value = fakes.FakeResource( @@ -60,12 +59,8 @@ class TestApplicationCredentialCreate(TestApplicationCredential): ) name = identity_fakes.app_cred_name - arglist = [ - name - ] - verifylist = [ - ('name', identity_fakes.app_cred_name) - ] + arglist = [name] + verifylist = [('name', identity_fakes.app_cred_name)] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class ShowOne in cliff, abstract method take_action() @@ -82,13 +77,19 @@ class TestApplicationCredentialCreate(TestApplicationCredential): 'unrestricted': False, 'access_rules': None, } - self.app_creds_mock.create.assert_called_with( - name, - **kwargs - ) + self.app_creds_mock.create.assert_called_with(name, **kwargs) - collist = ('access_rules', 'description', 'expires_at', 'id', 'name', - 'project_id', 'roles', 'secret', 'unrestricted') + collist = ( + 'access_rules', + 'description', + 'expires_at', + 'id', + 'name', + 'project_id', + 'roles', + 'secret', + 'unrestricted', + ) self.assertEqual(collist, columns) datalist = ( None, @@ -113,17 +114,21 @@ class TestApplicationCredentialCreate(TestApplicationCredential): arglist = [ name, - '--secret', 'moresecuresecret', - '--role', identity_fakes.role_id, - '--expiration', identity_fakes.app_cred_expires_str, - '--description', 'credential for testing' + '--secret', + 'moresecuresecret', + '--role', + identity_fakes.role_id, + '--expiration', + identity_fakes.app_cred_expires_str, + '--description', + 'credential for testing', ] verifylist = [ ('name', identity_fakes.app_cred_name), ('secret', 'moresecuresecret'), ('role', [identity_fakes.role_id]), ('expiration', identity_fakes.app_cred_expires_str), - ('description', 'credential for testing') + ('description', 'credential for testing'), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -141,13 +146,19 @@ class TestApplicationCredentialCreate(TestApplicationCredential): 'unrestricted': False, 'access_rules': None, } - self.app_creds_mock.create.assert_called_with( - name, - **kwargs - ) + self.app_creds_mock.create.assert_called_with(name, **kwargs) - collist = ('access_rules', 'description', 'expires_at', 'id', 'name', - 'project_id', 'roles', 'secret', 'unrestricted') + collist = ( + 'access_rules', + 'description', + 'expires_at', + 'id', + 'name', + 'project_id', + 'roles', + 'secret', + 'unrestricted', + ) self.assertEqual(collist, columns) datalist = ( None, @@ -172,7 +183,8 @@ class TestApplicationCredentialCreate(TestApplicationCredential): arglist = [ name, - '--access-rules', identity_fakes.app_cred_access_rules, + '--access-rules', + identity_fakes.app_cred_access_rules, ] verifylist = [ ('name', identity_fakes.app_cred_name), @@ -189,15 +201,21 @@ class TestApplicationCredentialCreate(TestApplicationCredential): 'expires_at': None, 'description': None, 'unrestricted': False, - 'access_rules': json.loads(identity_fakes.app_cred_access_rules) + 'access_rules': json.loads(identity_fakes.app_cred_access_rules), } - self.app_creds_mock.create.assert_called_with( - name, - **kwargs - ) + self.app_creds_mock.create.assert_called_with(name, **kwargs) - collist = ('access_rules', 'description', 'expires_at', 'id', 'name', - 'project_id', 'roles', 'secret', 'unrestricted') + collist = ( + 'access_rules', + 'description', + 'expires_at', + 'id', + 'name', + 'project_id', + 'roles', + 'secret', + 'unrestricted', + ) self.assertEqual(collist, columns) datalist = ( identity_fakes.app_cred_access_rules, @@ -215,7 +233,8 @@ class TestApplicationCredentialCreate(TestApplicationCredential): @mock.patch('openstackclient.identity.v3.application_credential.json.load') @mock.patch('openstackclient.identity.v3.application_credential.open') def test_application_credential_create_with_access_rules_file( - self, _, mock_json_load): + self, _, mock_json_load + ): mock_json_load.return_value = identity_fakes.app_cred_access_rules name = identity_fakes.app_cred_name @@ -227,7 +246,8 @@ class TestApplicationCredentialCreate(TestApplicationCredential): arglist = [ name, - '--access-rules', identity_fakes.app_cred_access_rules_path, + '--access-rules', + identity_fakes.app_cred_access_rules_path, ] verifylist = [ ('name', identity_fakes.app_cred_name), @@ -244,15 +264,21 @@ class TestApplicationCredentialCreate(TestApplicationCredential): 'expires_at': None, 'description': None, 'unrestricted': False, - 'access_rules': identity_fakes.app_cred_access_rules + 'access_rules': identity_fakes.app_cred_access_rules, } - self.app_creds_mock.create.assert_called_with( - name, - **kwargs - ) + self.app_creds_mock.create.assert_called_with(name, **kwargs) - collist = ('access_rules', 'description', 'expires_at', 'id', 'name', - 'project_id', 'roles', 'secret', 'unrestricted') + collist = ( + 'access_rules', + 'description', + 'expires_at', + 'id', + 'name', + 'project_id', + 'roles', + 'secret', + 'unrestricted', + ) self.assertEqual(collist, columns) datalist = ( identity_fakes.app_cred_access_rules, @@ -269,7 +295,6 @@ class TestApplicationCredentialCreate(TestApplicationCredential): class TestApplicationCredentialDelete(TestApplicationCredential): - def setUp(self): super(TestApplicationCredentialDelete, self).setUp() @@ -283,15 +308,14 @@ class TestApplicationCredentialDelete(TestApplicationCredential): # Get the command object to test self.cmd = application_credential.DeleteApplicationCredential( - self.app, None) + self.app, None + ) def test_application_credential_delete(self): arglist = [ identity_fakes.app_cred_id, ] - verifylist = [ - ('application_credential', [identity_fakes.app_cred_id]) - ] + verifylist = [('application_credential', [identity_fakes.app_cred_id])] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) @@ -303,8 +327,10 @@ class TestApplicationCredentialDelete(TestApplicationCredential): @mock.patch.object(utils, 'find_resource') def test_delete_multi_app_creds_with_exception(self, find_mock): - find_mock.side_effect = [self.app_creds_mock.get.return_value, - exceptions.CommandError] + find_mock.side_effect = [ + self.app_creds_mock.get.return_value, + exceptions.CommandError, + ] arglist = [ identity_fakes.app_cred_id, 'nonexistent_app_cred', @@ -318,21 +344,22 @@ class TestApplicationCredentialDelete(TestApplicationCredential): self.cmd.take_action(parsed_args) self.fail('CommandError should be raised.') except exceptions.CommandError as e: - self.assertEqual('1 of 2 application credentials failed to' - ' delete.', str(e)) + self.assertEqual( + '1 of 2 application credentials failed to' ' delete.', str(e) + ) - find_mock.assert_any_call(self.app_creds_mock, - identity_fakes.app_cred_id) - find_mock.assert_any_call(self.app_creds_mock, - 'nonexistent_app_cred') + find_mock.assert_any_call( + self.app_creds_mock, identity_fakes.app_cred_id + ) + find_mock.assert_any_call(self.app_creds_mock, 'nonexistent_app_cred') self.assertEqual(2, find_mock.call_count) self.app_creds_mock.delete.assert_called_once_with( - identity_fakes.app_cred_id) + identity_fakes.app_cred_id + ) class TestApplicationCredentialList(TestApplicationCredential): - def setUp(self): super(TestApplicationCredentialList, self).setUp() @@ -345,8 +372,9 @@ class TestApplicationCredentialList(TestApplicationCredential): ] # Get the command object to test - self.cmd = application_credential.ListApplicationCredential(self.app, - None) + self.cmd = application_credential.ListApplicationCredential( + self.app, None + ) def test_application_credential_list(self): arglist = [] @@ -362,18 +390,19 @@ class TestApplicationCredentialList(TestApplicationCredential): collist = ('ID', 'Name', 'Project ID', 'Description', 'Expires At') self.assertEqual(collist, columns) - datalist = (( - identity_fakes.app_cred_id, - identity_fakes.app_cred_name, - identity_fakes.project_id, - None, - None - ), ) + datalist = ( + ( + identity_fakes.app_cred_id, + identity_fakes.app_cred_name, + identity_fakes.project_id, + None, + None, + ), + ) self.assertEqual(datalist, tuple(data)) class TestApplicationCredentialShow(TestApplicationCredential): - def setUp(self): super(TestApplicationCredentialShow, self).setUp() @@ -384,8 +413,9 @@ class TestApplicationCredentialShow(TestApplicationCredential): ) # Get the command object to test - self.cmd = application_credential.ShowApplicationCredential(self.app, - None) + self.cmd = application_credential.ShowApplicationCredential( + self.app, None + ) def test_application_credential_show(self): arglist = [ @@ -403,8 +433,17 @@ class TestApplicationCredentialShow(TestApplicationCredential): self.app_creds_mock.get.assert_called_with(identity_fakes.app_cred_id) - collist = ('access_rules', 'description', 'expires_at', 'id', 'name', - 'project_id', 'roles', 'secret', 'unrestricted') + collist = ( + 'access_rules', + 'description', + 'expires_at', + 'id', + 'name', + 'project_id', + 'roles', + 'secret', + 'unrestricted', + ) self.assertEqual(collist, columns) datalist = ( None, diff --git a/openstackclient/tests/unit/identity/v3/test_catalog.py b/openstackclient/tests/unit/identity/v3/test_catalog.py index 802a9017e..a157859e7 100644 --- a/openstackclient/tests/unit/identity/v3/test_catalog.py +++ b/openstackclient/tests/unit/identity/v3/test_catalog.py @@ -19,7 +19,6 @@ from openstackclient.tests.unit import utils class TestCatalog(utils.TestCommand): - fake_service = { 'id': 'qwertyuiop', 'type': 'compute', @@ -62,7 +61,6 @@ class TestCatalog(utils.TestCommand): class TestCatalogList(TestCatalog): - def setUp(self): super(TestCatalogList, self).setUp() @@ -88,17 +86,19 @@ class TestCatalogList(TestCatalog): collist = ('Name', 'Type', 'Endpoints') self.assertEqual(collist, columns) - datalist = (( - 'supernova', - 'compute', - catalog.EndpointsColumn( - auth_ref.service_catalog.catalog[0]['endpoints']), - ), ) + datalist = ( + ( + 'supernova', + 'compute', + catalog.EndpointsColumn( + auth_ref.service_catalog.catalog[0]['endpoints'] + ), + ), + ) self.assertCountEqual(datalist, tuple(data)) class TestCatalogShow(TestCatalog): - def setUp(self): super(TestCatalogShow, self).setUp() @@ -130,7 +130,8 @@ class TestCatalogShow(TestCatalog): self.assertEqual(collist, columns) datalist = ( catalog.EndpointsColumn( - auth_ref.service_catalog.catalog[0]['endpoints']), + auth_ref.service_catalog.catalog[0]['endpoints'] + ), 'qwertyuiop', 'supernova', 'compute', @@ -146,4 +147,5 @@ class TestFormatColumns(TestCatalog): 'onlyone\n admin: https://admin.example.com\n' '\n internal: https://internal.example.com\n' '\n none: https://none.example.com\n', - col.human_readable()) + col.human_readable(), + ) diff --git a/openstackclient/tests/unit/identity/v3/test_consumer.py b/openstackclient/tests/unit/identity/v3/test_consumer.py index 403250ef5..fd13ef4ab 100644 --- a/openstackclient/tests/unit/identity/v3/test_consumer.py +++ b/openstackclient/tests/unit/identity/v3/test_consumer.py @@ -18,7 +18,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestOAuth1(identity_fakes.TestOAuth1): - def setUp(self): super(TestOAuth1, self).setUp() identity_client = self.app.client_manager.identity @@ -27,7 +26,6 @@ class TestOAuth1(identity_fakes.TestOAuth1): class TestConsumerCreate(TestOAuth1): - def setUp(self): super(TestConsumerCreate, self).setUp() @@ -41,7 +39,8 @@ class TestConsumerCreate(TestOAuth1): def test_create_consumer(self): arglist = [ - '--description', identity_fakes.consumer_description, + '--description', + identity_fakes.consumer_description, ] verifylist = [ ('description', identity_fakes.consumer_description), @@ -64,7 +63,6 @@ class TestConsumerCreate(TestOAuth1): class TestConsumerDelete(TestOAuth1): - def setUp(self): super(TestConsumerDelete, self).setUp() @@ -96,7 +94,6 @@ class TestConsumerDelete(TestOAuth1): class TestConsumerList(TestOAuth1): - def setUp(self): super(TestConsumerList, self).setUp() @@ -129,15 +126,16 @@ class TestConsumerList(TestOAuth1): collist = ('ID', 'Description') self.assertEqual(collist, columns) - datalist = (( - identity_fakes.consumer_id, - identity_fakes.consumer_description, - ), ) + datalist = ( + ( + identity_fakes.consumer_id, + identity_fakes.consumer_description, + ), + ) self.assertEqual(datalist, tuple(data)) class TestConsumerSet(TestOAuth1): - def setUp(self): super(TestConsumerSet, self).setUp() @@ -161,7 +159,8 @@ class TestConsumerSet(TestOAuth1): new_description = "consumer new description" arglist = [ - '--description', new_description, + '--description', + new_description, identity_fakes.consumer_id, ] verifylist = [ @@ -174,14 +173,12 @@ class TestConsumerSet(TestOAuth1): kwargs = {'description': new_description} self.consumers_mock.update.assert_called_with( - identity_fakes.consumer_id, - **kwargs + identity_fakes.consumer_id, **kwargs ) self.assertIsNone(result) class TestConsumerShow(TestOAuth1): - def setUp(self): super(TestConsumerShow, self).setUp() diff --git a/openstackclient/tests/unit/identity/v3/test_credential.py b/openstackclient/tests/unit/identity/v3/test_credential.py index 40596d587..e6c2be678 100644 --- a/openstackclient/tests/unit/identity/v3/test_credential.py +++ b/openstackclient/tests/unit/identity/v3/test_credential.py @@ -21,7 +21,6 @@ from openstackclient.tests.unit import utils class TestCredential(identity_fakes.TestIdentityv3): - def setUp(self): super(TestCredential, self).setUp() @@ -39,7 +38,6 @@ class TestCredential(identity_fakes.TestIdentityv3): class TestCredentialCreate(TestCredential): - user = identity_fakes.FakeUser.create_one_user() project = identity_fakes.FakeProject.create_one_project() columns = ( @@ -54,7 +52,8 @@ class TestCredentialCreate(TestCredential): super(TestCredentialCreate, self).setUp() self.credential = identity_fakes.FakeCredential.create_one_credential( - attrs={'user_id': self.user.id, 'project_id': self.project.id}) + attrs={'user_id': self.user.id, 'project_id': self.project.id} + ) self.credentials_mock.create.return_value = self.credential self.users_mock.get.return_value = self.user self.projects_mock.get.return_value = self.project @@ -87,9 +86,7 @@ class TestCredentialCreate(TestCredential): 'blob': self.credential.blob, 'project': None, } - self.credentials_mock.create.assert_called_once_with( - **kwargs - ) + self.credentials_mock.create.assert_called_once_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.data, data) @@ -98,8 +95,10 @@ class TestCredentialCreate(TestCredential): arglist = [ self.credential.user_id, self.credential.blob, - '--type', self.credential.type, - '--project', self.credential.project_id, + '--type', + self.credential.type, + '--project', + self.credential.project_id, ] verifylist = [ ('user', self.credential.user_id), @@ -117,16 +116,13 @@ class TestCredentialCreate(TestCredential): 'blob': self.credential.blob, 'project': self.credential.project_id, } - self.credentials_mock.create.assert_called_once_with( - **kwargs - ) + self.credentials_mock.create.assert_called_once_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.data, data) class TestCredentialDelete(TestCredential): - credentials = identity_fakes.FakeCredential.create_credentials(count=2) def setUp(self): @@ -181,8 +177,8 @@ class TestCredentialDelete(TestCredential): parsed_args = self.check_parser(self.cmd, arglist, verifylist) delete_mock_result = [None, exceptions.CommandError] - self.credentials_mock.delete = ( - mock.Mock(side_effect=delete_mock_result) + self.credentials_mock.delete = mock.Mock( + side_effect=delete_mock_result ) try: @@ -196,17 +192,18 @@ class TestCredentialDelete(TestCredential): class TestCredentialList(TestCredential): - credential = identity_fakes.FakeCredential.create_one_credential() columns = ('ID', 'Type', 'User ID', 'Data', 'Project ID') - data = (( - credential.id, - credential.type, - credential.user_id, - credential.blob, - credential.project_id, - ), ) + data = ( + ( + credential.id, + credential.type, + credential.user_id, + credential.blob, + credential.project_id, + ), + ) def setUp(self): super(TestCredentialList, self).setUp() @@ -232,8 +229,10 @@ class TestCredentialList(TestCredential): def test_credential_list_with_options(self): arglist = [ - '--user', self.credential.user_id, - '--type', self.credential.type, + '--user', + self.credential.user_id, + '--type', + self.credential.type, ] verifylist = [ ('user', self.credential.user_id), @@ -248,16 +247,13 @@ class TestCredentialList(TestCredential): 'type': self.credential.type, } self.users_mock.get.assert_called_with(self.credential.user_id) - self.credentials_mock.list.assert_called_with( - **kwargs - ) + self.credentials_mock.list.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.data, tuple(data)) class TestCredentialSet(TestCredential): - credential = identity_fakes.FakeCredential.create_one_credential() def setUp(self): @@ -269,44 +265,57 @@ class TestCredentialSet(TestCredential): self.credential.id, ] - self.assertRaises(utils.ParserException, - self.check_parser, self.cmd, arglist, []) + self.assertRaises( + utils.ParserException, self.check_parser, self.cmd, arglist, [] + ) def test_credential_set_missing_user(self): arglist = [ - '--type', 'ec2', - '--data', self.credential.blob, + '--type', + 'ec2', + '--data', + self.credential.blob, self.credential.id, ] - self.assertRaises(utils.ParserException, - self.check_parser, self.cmd, arglist, []) + self.assertRaises( + utils.ParserException, self.check_parser, self.cmd, arglist, [] + ) def test_credential_set_missing_type(self): arglist = [ - '--user', self.credential.user_id, - '--data', self.credential.blob, + '--user', + self.credential.user_id, + '--data', + self.credential.blob, self.credential.id, ] - self.assertRaises(utils.ParserException, - self.check_parser, self.cmd, arglist, []) + self.assertRaises( + utils.ParserException, self.check_parser, self.cmd, arglist, [] + ) def test_credential_set_missing_data(self): arglist = [ - '--user', self.credential.user_id, - '--type', 'ec2', + '--user', + self.credential.user_id, + '--type', + 'ec2', self.credential.id, ] - self.assertRaises(utils.ParserException, - self.check_parser, self.cmd, arglist, []) + self.assertRaises( + utils.ParserException, self.check_parser, self.cmd, arglist, [] + ) def test_credential_set_valid(self): arglist = [ - '--user', self.credential.user_id, - '--type', 'ec2', - '--data', self.credential.blob, + '--user', + self.credential.user_id, + '--type', + 'ec2', + '--data', + self.credential.blob, self.credential.id, ] parsed_args = self.check_parser(self.cmd, arglist, []) @@ -317,10 +326,14 @@ class TestCredentialSet(TestCredential): def test_credential_set_valid_with_project(self): arglist = [ - '--user', self.credential.user_id, - '--type', 'ec2', - '--data', self.credential.blob, - '--project', self.credential.project_id, + '--user', + self.credential.user_id, + '--type', + 'ec2', + '--data', + self.credential.blob, + '--project', + self.credential.project_id, self.credential.id, ] parsed_args = self.check_parser(self.cmd, arglist, []) @@ -331,7 +344,6 @@ class TestCredentialSet(TestCredential): class TestCredentialShow(TestCredential): - columns = ( 'blob', 'id', diff --git a/openstackclient/tests/unit/identity/v3/test_domain.py b/openstackclient/tests/unit/identity/v3/test_domain.py index c39f1bd3d..08fbbaac9 100644 --- a/openstackclient/tests/unit/identity/v3/test_domain.py +++ b/openstackclient/tests/unit/identity/v3/test_domain.py @@ -15,7 +15,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestDomain(identity_fakes.TestIdentityv3): - def setUp(self): super(TestDomain, self).setUp() @@ -25,14 +24,7 @@ class TestDomain(identity_fakes.TestIdentityv3): class TestDomainCreate(TestDomain): - - columns = ( - 'description', - 'enabled', - 'id', - 'name', - 'tags' - ) + columns = ('description', 'enabled', 'id', 'name', 'tags') def setUp(self): super(TestDomainCreate, self).setUp() @@ -44,7 +36,7 @@ class TestDomainCreate(TestDomain): True, self.domain.id, self.domain.name, - self.domain.tags + self.domain.tags, ) # Get the command object to test @@ -71,16 +63,15 @@ class TestDomainCreate(TestDomain): 'options': {}, 'enabled': True, } - self.domains_mock.create.assert_called_with( - **kwargs - ) + self.domains_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_domain_create_description(self): arglist = [ - '--description', 'new desc', + '--description', + 'new desc', self.domain.name, ] verifylist = [ @@ -101,9 +92,7 @@ class TestDomainCreate(TestDomain): 'options': {}, 'enabled': True, } - self.domains_mock.create.assert_called_with( - **kwargs - ) + self.domains_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -131,9 +120,7 @@ class TestDomainCreate(TestDomain): 'options': {}, 'enabled': True, } - self.domains_mock.create.assert_called_with( - **kwargs - ) + self.domains_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -161,9 +148,7 @@ class TestDomainCreate(TestDomain): 'options': {}, 'enabled': False, } - self.domains_mock.create.assert_called_with( - **kwargs - ) + self.domains_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -191,9 +176,7 @@ class TestDomainCreate(TestDomain): 'options': {'immutable': True}, 'enabled': True, } - self.domains_mock.create.assert_called_with( - **kwargs - ) + self.domains_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -221,16 +204,13 @@ class TestDomainCreate(TestDomain): 'options': {'immutable': False}, 'enabled': True, } - self.domains_mock.create.assert_called_with( - **kwargs - ) + self.domains_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) class TestDomainDelete(TestDomain): - domain = identity_fakes.FakeDomain.create_one_domain() def setUp(self): @@ -261,7 +241,6 @@ class TestDomainDelete(TestDomain): class TestDomainList(TestDomain): - domain = identity_fakes.FakeDomain.create_one_domain() def setUp(self): @@ -285,20 +264,19 @@ class TestDomainList(TestDomain): collist = ('ID', 'Name', 'Enabled', 'Description') self.assertEqual(collist, columns) - datalist = (( - self.domain.id, - self.domain.name, - True, - self.domain.description, - ), ) + datalist = ( + ( + self.domain.id, + self.domain.name, + True, + self.domain.description, + ), + ) self.assertEqual(datalist, tuple(data)) def test_domain_list_with_option_name(self): - arglist = ['--name', - self.domain.name] - verifylist = [ - ('name', self.domain.name) - ] + arglist = ['--name', self.domain.name] + verifylist = [('name', self.domain.name)] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class Lister in cliff, abstract method take_action() @@ -306,26 +284,24 @@ class TestDomainList(TestDomain): # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) - kwargs = { - 'name': self.domain.name - } + kwargs = {'name': self.domain.name} self.domains_mock.list.assert_called_with(**kwargs) collist = ('ID', 'Name', 'Enabled', 'Description') self.assertEqual(collist, columns) - datalist = (( - self.domain.id, - self.domain.name, - True, - self.domain.description, - ), ) + datalist = ( + ( + self.domain.id, + self.domain.name, + True, + self.domain.description, + ), + ) self.assertEqual(datalist, tuple(data)) def test_domain_list_with_option_enabled(self): arglist = ['--enabled'] - verifylist = [ - ('enabled', True) - ] + verifylist = [('enabled', True)] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class Lister in cliff, abstract method take_action() @@ -333,24 +309,23 @@ class TestDomainList(TestDomain): # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) - kwargs = { - 'enabled': True - } + kwargs = {'enabled': True} self.domains_mock.list.assert_called_with(**kwargs) collist = ('ID', 'Name', 'Enabled', 'Description') self.assertEqual(collist, columns) - datalist = (( - self.domain.id, - self.domain.name, - True, - self.domain.description, - ), ) + datalist = ( + ( + self.domain.id, + self.domain.name, + True, + self.domain.description, + ), + ) self.assertEqual(datalist, tuple(data)) class TestDomainSet(TestDomain): - domain = identity_fakes.FakeDomain.create_one_domain() def setUp(self): @@ -375,15 +350,13 @@ class TestDomainSet(TestDomain): result = self.cmd.take_action(parsed_args) kwargs = {} - self.domains_mock.update.assert_called_with( - self.domain.id, - **kwargs - ) + self.domains_mock.update.assert_called_with(self.domain.id, **kwargs) self.assertIsNone(result) def test_domain_set_name(self): arglist = [ - '--name', 'qwerty', + '--name', + 'qwerty', self.domain.id, ] verifylist = [ @@ -398,15 +371,13 @@ class TestDomainSet(TestDomain): kwargs = { 'name': 'qwerty', } - self.domains_mock.update.assert_called_with( - self.domain.id, - **kwargs - ) + self.domains_mock.update.assert_called_with(self.domain.id, **kwargs) self.assertIsNone(result) def test_domain_set_description(self): arglist = [ - '--description', 'new desc', + '--description', + 'new desc', self.domain.id, ] verifylist = [ @@ -421,10 +392,7 @@ class TestDomainSet(TestDomain): kwargs = { 'description': 'new desc', } - self.domains_mock.update.assert_called_with( - self.domain.id, - **kwargs - ) + self.domains_mock.update.assert_called_with(self.domain.id, **kwargs) self.assertIsNone(result) def test_domain_set_enable(self): @@ -444,10 +412,7 @@ class TestDomainSet(TestDomain): kwargs = { 'enabled': True, } - self.domains_mock.update.assert_called_with( - self.domain.id, - **kwargs - ) + self.domains_mock.update.assert_called_with(self.domain.id, **kwargs) self.assertIsNone(result) def test_domain_set_disable(self): @@ -467,10 +432,7 @@ class TestDomainSet(TestDomain): kwargs = { 'enabled': False, } - self.domains_mock.update.assert_called_with( - self.domain.id, - **kwargs - ) + self.domains_mock.update.assert_called_with(self.domain.id, **kwargs) self.assertIsNone(result) def test_domain_set_immutable_option(self): @@ -490,10 +452,7 @@ class TestDomainSet(TestDomain): kwargs = { 'options': {'immutable': True}, } - self.domains_mock.update.assert_called_with( - self.domain.id, - **kwargs - ) + self.domains_mock.update.assert_called_with(self.domain.id, **kwargs) self.assertIsNone(result) def test_domain_set_no_immutable_option(self): @@ -513,15 +472,11 @@ class TestDomainSet(TestDomain): kwargs = { 'options': {'immutable': False}, } - self.domains_mock.update.assert_called_with( - self.domain.id, - **kwargs - ) + self.domains_mock.update.assert_called_with(self.domain.id, **kwargs) self.assertIsNone(result) class TestDomainShow(TestDomain): - def setUp(self): super(TestDomainShow, self).setUp() @@ -538,16 +493,9 @@ class TestDomainShow(TestDomain): ('domain', self.domain.id), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - self.app.client_manager.identity.tokens.get_token_data.return_value = \ - {'token': - {'project': - {'domain': - {'id': 'd1', - 'name': 'd1' - } - } - } - } + self.app.client_manager.identity.tokens.get_token_data.return_value = { + 'token': {'project': {'domain': {'id': 'd1', 'name': 'd1'}}} + } # In base command class ShowOne in cliff, abstract method take_action() # returns a two-part tuple with a tuple of column names and a tuple of @@ -564,6 +512,6 @@ class TestDomainShow(TestDomain): True, self.domain.id, self.domain.name, - self.domain.tags + self.domain.tags, ) self.assertEqual(datalist, data) diff --git a/openstackclient/tests/unit/identity/v3/test_endpoint.py b/openstackclient/tests/unit/identity/v3/test_endpoint.py index 62dcf58d5..39159432f 100644 --- a/openstackclient/tests/unit/identity/v3/test_endpoint.py +++ b/openstackclient/tests/unit/identity/v3/test_endpoint.py @@ -15,16 +15,13 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestEndpoint(identity_fakes.TestIdentityv3): - def setUp(self): super(TestEndpoint, self).setUp() # Get a shortcut to the EndpointManager Mock self.endpoints_mock = self.app.client_manager.identity.endpoints self.endpoints_mock.reset_mock() - self.ep_filter_mock = ( - self.app.client_manager.identity.endpoint_filter - ) + self.ep_filter_mock = self.app.client_manager.identity.endpoint_filter self.ep_filter_mock.reset_mock() # Get a shortcut to the ServiceManager Mock @@ -41,7 +38,6 @@ class TestEndpoint(identity_fakes.TestIdentityv3): class TestEndpointCreate(TestEndpoint): - service = identity_fakes.FakeService.create_one_service() columns = ( @@ -59,7 +55,8 @@ class TestEndpointCreate(TestEndpoint): super(TestEndpointCreate, self).setUp() self.endpoint = identity_fakes.FakeEndpoint.create_one_endpoint( - attrs={'service_id': self.service.id}) + attrs={'service_id': self.service.id} + ) self.endpoints_mock.create.return_value = self.endpoint # This is the return value for common.find_resource(service) @@ -96,9 +93,7 @@ class TestEndpointCreate(TestEndpoint): 'region': None, } - self.endpoints_mock.create.assert_called_with( - **kwargs - ) + self.endpoints_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) datalist = ( @@ -118,7 +113,8 @@ class TestEndpointCreate(TestEndpoint): self.service.id, self.endpoint.interface, self.endpoint.url, - '--region', self.endpoint.region, + '--region', + self.endpoint.region, ] verifylist = [ ('enabled', True), @@ -143,9 +139,7 @@ class TestEndpointCreate(TestEndpoint): 'region': self.endpoint.region, } - self.endpoints_mock.create.assert_called_with( - **kwargs - ) + self.endpoints_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) datalist = ( @@ -165,7 +159,7 @@ class TestEndpointCreate(TestEndpoint): self.service.id, self.endpoint.interface, self.endpoint.url, - '--enable' + '--enable', ] verifylist = [ ('enabled', True), @@ -189,9 +183,7 @@ class TestEndpointCreate(TestEndpoint): 'region': None, } - self.endpoints_mock.create.assert_called_with( - **kwargs - ) + self.endpoints_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) datalist = ( @@ -235,9 +227,7 @@ class TestEndpointCreate(TestEndpoint): 'region': None, } - self.endpoints_mock.create.assert_called_with( - **kwargs - ) + self.endpoints_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) datalist = ( @@ -254,7 +244,6 @@ class TestEndpointCreate(TestEndpoint): class TestEndpointDelete(TestEndpoint): - endpoint = identity_fakes.FakeEndpoint.create_one_endpoint() def setUp(self): @@ -285,10 +274,10 @@ class TestEndpointDelete(TestEndpoint): class TestEndpointList(TestEndpoint): - service = identity_fakes.FakeService.create_one_service() endpoint = identity_fakes.FakeEndpoint.create_one_endpoint( - attrs={'service_id': service.id}) + attrs={'service_id': service.id} + ) columns = ( 'ID', @@ -339,7 +328,8 @@ class TestEndpointList(TestEndpoint): def test_endpoint_list_service(self): arglist = [ - '--service', self.service.id, + '--service', + self.service.id, ] verifylist = [ ('service', self.service.id), @@ -373,7 +363,8 @@ class TestEndpointList(TestEndpoint): def test_endpoint_list_interface(self): arglist = [ - '--interface', self.endpoint.interface, + '--interface', + self.endpoint.interface, ] verifylist = [ ('interface', self.endpoint.interface), @@ -407,7 +398,8 @@ class TestEndpointList(TestEndpoint): def test_endpoint_list_region(self): arglist = [ - '--region', self.endpoint.region, + '--region', + self.endpoint.region, ] verifylist = [ ('region', self.endpoint.region), @@ -448,10 +440,7 @@ class TestEndpointList(TestEndpoint): ] self.projects_mock.get.return_value = project - arglist = [ - '--project', project.name, - '--project-domain', domain.name - ] + arglist = ['--project', project.name, '--project-domain', domain.name] verifylist = [ ('project', project.name), ('project_domain', domain.name), @@ -482,10 +471,10 @@ class TestEndpointList(TestEndpoint): class TestEndpointSet(TestEndpoint): - service = identity_fakes.FakeService.create_one_service() endpoint = identity_fakes.FakeEndpoint.create_one_endpoint( - attrs={'service_id': service.id}) + attrs={'service_id': service.id} + ) def setUp(self): super(TestEndpointSet, self).setUp() @@ -520,16 +509,12 @@ class TestEndpointSet(TestEndpoint): 'url': None, } self.endpoints_mock.update.assert_called_with( - self.endpoint.id, - **kwargs + self.endpoint.id, **kwargs ) self.assertIsNone(result) def test_endpoint_set_interface(self): - arglist = [ - '--interface', 'public', - self.endpoint.id - ] + arglist = ['--interface', 'public', self.endpoint.id] verifylist = [ ('interface', 'public'), ('endpoint', self.endpoint.id), @@ -547,16 +532,12 @@ class TestEndpointSet(TestEndpoint): 'service': None, } self.endpoints_mock.update.assert_called_with( - self.endpoint.id, - **kwargs + self.endpoint.id, **kwargs ) self.assertIsNone(result) def test_endpoint_set_url(self): - arglist = [ - '--url', 'http://localhost:5000', - self.endpoint.id - ] + arglist = ['--url', 'http://localhost:5000', self.endpoint.id] verifylist = [ ('url', 'http://localhost:5000'), ('endpoint', self.endpoint.id), @@ -574,16 +555,12 @@ class TestEndpointSet(TestEndpoint): 'service': None, } self.endpoints_mock.update.assert_called_with( - self.endpoint.id, - **kwargs + self.endpoint.id, **kwargs ) self.assertIsNone(result) def test_endpoint_set_service(self): - arglist = [ - '--service', self.service.id, - self.endpoint.id - ] + arglist = ['--service', self.service.id, self.endpoint.id] verifylist = [ ('service', self.service.id), ('endpoint', self.endpoint.id), @@ -601,16 +578,12 @@ class TestEndpointSet(TestEndpoint): 'service': self.service.id, } self.endpoints_mock.update.assert_called_with( - self.endpoint.id, - **kwargs + self.endpoint.id, **kwargs ) self.assertIsNone(result) def test_endpoint_set_region(self): - arglist = [ - '--region', 'e-rzzz', - self.endpoint.id - ] + arglist = ['--region', 'e-rzzz', self.endpoint.id] verifylist = [ ('region', 'e-rzzz'), ('endpoint', self.endpoint.id), @@ -628,16 +601,12 @@ class TestEndpointSet(TestEndpoint): 'service': None, } self.endpoints_mock.update.assert_called_with( - self.endpoint.id, - **kwargs + self.endpoint.id, **kwargs ) self.assertIsNone(result) def test_endpoint_set_enable(self): - arglist = [ - '--enable', - self.endpoint.id - ] + arglist = ['--enable', self.endpoint.id] verifylist = [ ('enabled', True), ('endpoint', self.endpoint.id), @@ -655,16 +624,12 @@ class TestEndpointSet(TestEndpoint): 'service': None, } self.endpoints_mock.update.assert_called_with( - self.endpoint.id, - **kwargs + self.endpoint.id, **kwargs ) self.assertIsNone(result) def test_endpoint_set_disable(self): - arglist = [ - '--disable', - self.endpoint.id - ] + arglist = ['--disable', self.endpoint.id] verifylist = [ ('disabled', True), ('endpoint', self.endpoint.id), @@ -682,17 +647,16 @@ class TestEndpointSet(TestEndpoint): 'service': None, } self.endpoints_mock.update.assert_called_with( - self.endpoint.id, - **kwargs + self.endpoint.id, **kwargs ) self.assertIsNone(result) class TestEndpointShow(TestEndpoint): - service = identity_fakes.FakeService.create_one_service() endpoint = identity_fakes.FakeEndpoint.create_one_endpoint( - attrs={'service_id': service.id}) + attrs={'service_id': service.id} + ) def setUp(self): super(TestEndpointShow, self).setUp() @@ -747,15 +711,16 @@ class TestEndpointShow(TestEndpoint): class TestEndpointCreateServiceWithoutName(TestEndpointCreate): - service = identity_fakes.FakeService.create_one_service( - attrs={'service_name': ''}) + attrs={'service_name': ''} + ) def setUp(self): super(TestEndpointCreate, self).setUp() self.endpoint = identity_fakes.FakeEndpoint.create_one_endpoint( - attrs={'service_id': self.service.id}) + attrs={'service_id': self.service.id} + ) self.endpoints_mock.create.return_value = self.endpoint @@ -767,11 +732,12 @@ class TestEndpointCreateServiceWithoutName(TestEndpointCreate): class TestEndpointListServiceWithoutName(TestEndpointList): - service = identity_fakes.FakeService.create_one_service( - attrs={'service_name': ''}) + attrs={'service_name': ''} + ) endpoint = identity_fakes.FakeEndpoint.create_one_endpoint( - attrs={'service_id': service.id}) + attrs={'service_id': service.id} + ) def setUp(self): super(TestEndpointList, self).setUp() @@ -787,11 +753,12 @@ class TestEndpointListServiceWithoutName(TestEndpointList): class TestEndpointShowServiceWithoutName(TestEndpointShow): - service = identity_fakes.FakeService.create_one_service( - attrs={'service_name': ''}) + attrs={'service_name': ''} + ) endpoint = identity_fakes.FakeEndpoint.create_one_endpoint( - attrs={'service_id': service.id}) + attrs={'service_id': service.id} + ) def setUp(self): super(TestEndpointShow, self).setUp() @@ -806,16 +773,15 @@ class TestEndpointShowServiceWithoutName(TestEndpointShow): class TestAddProjectToEndpoint(TestEndpoint): - project = identity_fakes.FakeProject.create_one_project() domain = identity_fakes.FakeDomain.create_one_domain() service = identity_fakes.FakeService.create_one_service() endpoint = identity_fakes.FakeEndpoint.create_one_endpoint( - attrs={'service_id': service.id}) + attrs={'service_id': service.id} + ) new_ep_filter = identity_fakes.FakeEndpoint.create_one_endpoint_filter( - attrs={'endpoint': endpoint.id, - 'project': project.id} + attrs={'endpoint': endpoint.id, 'project': project.id} ) def setUp(self): @@ -844,8 +810,7 @@ class TestAddProjectToEndpoint(TestEndpoint): result = self.cmd.take_action(parsed_args) self.ep_filter_mock.add_endpoint_to_project.assert_called_with( - project=self.project.id, - endpoint=self.endpoint.id + project=self.project.id, endpoint=self.endpoint.id ) self.assertIsNone(result) @@ -853,7 +818,8 @@ class TestAddProjectToEndpoint(TestEndpoint): arglist = [ self.endpoint.id, self.project.id, - '--project-domain', self.domain.id, + '--project-domain', + self.domain.id, ] verifylist = [ ('endpoint', self.endpoint.id), @@ -864,19 +830,18 @@ class TestAddProjectToEndpoint(TestEndpoint): result = self.cmd.take_action(parsed_args) self.ep_filter_mock.add_endpoint_to_project.assert_called_with( - project=self.project.id, - endpoint=self.endpoint.id + project=self.project.id, endpoint=self.endpoint.id ) self.assertIsNone(result) class TestRemoveProjectEndpoint(TestEndpoint): - project = identity_fakes.FakeProject.create_one_project() domain = identity_fakes.FakeDomain.create_one_domain() service = identity_fakes.FakeService.create_one_service() endpoint = identity_fakes.FakeEndpoint.create_one_endpoint( - attrs={'service_id': service.id}) + attrs={'service_id': service.id} + ) def setUp(self): super(TestRemoveProjectEndpoint, self).setUp() @@ -914,7 +879,8 @@ class TestRemoveProjectEndpoint(TestEndpoint): arglist = [ self.endpoint.id, self.project.id, - '--project-domain', self.domain.id, + '--project-domain', + self.domain.id, ] verifylist = [ ('endpoint', self.endpoint.id), diff --git a/openstackclient/tests/unit/identity/v3/test_endpoint_group.py b/openstackclient/tests/unit/identity/v3/test_endpoint_group.py index c081fa1f1..66d06dd9c 100644 --- a/openstackclient/tests/unit/identity/v3/test_endpoint_group.py +++ b/openstackclient/tests/unit/identity/v3/test_endpoint_group.py @@ -18,7 +18,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestEndpointGroup(identity_fakes.TestIdentityv3): - def setUp(self): super(TestEndpointGroup, self).setUp() @@ -27,9 +26,7 @@ class TestEndpointGroup(identity_fakes.TestIdentityv3): self.app.client_manager.identity.endpoint_groups ) self.endpoint_groups_mock.reset_mock() - self.epf_mock = ( - self.app.client_manager.identity.endpoint_filter - ) + self.epf_mock = self.app.client_manager.identity.endpoint_filter self.epf_mock.reset_mock() # Get a shortcut to the ServiceManager Mock @@ -46,7 +43,6 @@ class TestEndpointGroup(identity_fakes.TestIdentityv3): class TestEndpointGroupCreate(TestEndpointGroup): - columns = ( 'description', 'filters', @@ -59,7 +55,9 @@ class TestEndpointGroupCreate(TestEndpointGroup): self.endpoint_group = ( identity_fakes.FakeEndpointGroup.create_one_endpointgroup( - attrs={'filters': identity_fakes.endpoint_group_filters})) + attrs={'filters': identity_fakes.endpoint_group_filters} + ) + ) self.endpoint_groups_mock.create.return_value = self.endpoint_group @@ -68,7 +66,8 @@ class TestEndpointGroupCreate(TestEndpointGroup): def test_endpointgroup_create_no_options(self): arglist = [ - '--description', self.endpoint_group.description, + '--description', + self.endpoint_group.description, self.endpoint_group.name, identity_fakes.endpoint_group_file_path, ] @@ -81,8 +80,11 @@ class TestEndpointGroupCreate(TestEndpointGroup): mocker = mock.Mock() mocker.return_value = identity_fakes.endpoint_group_filters - with mock.patch("openstackclient.identity.v3.endpoint_group." - "CreateEndpointGroup._read_filters", mocker): + with mock.patch( + "openstackclient.identity.v3.endpoint_group." + "CreateEndpointGroup._read_filters", + mocker, + ): columns, data = self.cmd.take_action(parsed_args) # Set expected values @@ -92,9 +94,7 @@ class TestEndpointGroupCreate(TestEndpointGroup): 'description': self.endpoint_group.description, } - self.endpoint_groups_mock.create.assert_called_with( - **kwargs - ) + self.endpoint_groups_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) datalist = ( @@ -107,9 +107,9 @@ class TestEndpointGroupCreate(TestEndpointGroup): class TestEndpointGroupDelete(TestEndpointGroup): - endpoint_group = ( - identity_fakes.FakeEndpointGroup.create_one_endpointgroup()) + identity_fakes.FakeEndpointGroup.create_one_endpointgroup() + ) def setUp(self): super(TestEndpointGroupDelete, self).setUp() @@ -139,9 +139,9 @@ class TestEndpointGroupDelete(TestEndpointGroup): class TestEndpointGroupList(TestEndpointGroup): - endpoint_group = ( - identity_fakes.FakeEndpointGroup.create_one_endpointgroup()) + identity_fakes.FakeEndpointGroup.create_one_endpointgroup() + ) project = identity_fakes.FakeProject.create_one_project() domain = identity_fakes.FakeDomain.create_one_domain() @@ -157,9 +157,11 @@ class TestEndpointGroupList(TestEndpointGroup): self.endpoint_groups_mock.list.return_value = [self.endpoint_group] self.endpoint_groups_mock.get.return_value = self.endpoint_group self.epf_mock.list_projects_for_endpoint_group.return_value = [ - self.project] + self.project + ] self.epf_mock.list_endpoint_groups_for_project.return_value = [ - self.endpoint_group] + self.endpoint_group + ] # Get the command object to test self.cmd = endpoint_group.ListEndpointGroup(self.app, None) @@ -187,7 +189,8 @@ class TestEndpointGroupList(TestEndpointGroup): def test_endpoint_group_list_projects_by_endpoint_group(self): arglist = [ - '--endpointgroup', self.endpoint_group.id, + '--endpointgroup', + self.endpoint_group.id, ] verifylist = [ ('endpointgroup', self.endpoint_group.id), @@ -219,8 +222,10 @@ class TestEndpointGroupList(TestEndpointGroup): self.projects_mock.get.return_value = self.project arglist = [ - '--project', self.project.name, - '--domain', self.domain.name + '--project', + self.project.name, + '--domain', + self.domain.name, ] verifylist = [ ('project', self.project.name), @@ -248,9 +253,9 @@ class TestEndpointGroupList(TestEndpointGroup): class TestEndpointGroupSet(TestEndpointGroup): - endpoint_group = ( - identity_fakes.FakeEndpointGroup.create_one_endpointgroup()) + identity_fakes.FakeEndpointGroup.create_one_endpointgroup() + ) def setUp(self): super(TestEndpointGroupSet, self).setUp() @@ -274,22 +279,14 @@ class TestEndpointGroupSet(TestEndpointGroup): result = self.cmd.take_action(parsed_args) - kwargs = { - 'name': None, - 'filters': None, - 'description': '' - } + kwargs = {'name': None, 'filters': None, 'description': ''} self.endpoint_groups_mock.update.assert_called_with( - self.endpoint_group.id, - **kwargs + self.endpoint_group.id, **kwargs ) self.assertIsNone(result) def test_endpoint_group_set_name(self): - arglist = [ - '--name', 'qwerty', - self.endpoint_group.id - ] + arglist = ['--name', 'qwerty', self.endpoint_group.id] verifylist = [ ('name', 'qwerty'), ('endpointgroup', self.endpoint_group.id), @@ -299,20 +296,16 @@ class TestEndpointGroupSet(TestEndpointGroup): result = self.cmd.take_action(parsed_args) # Set expected values - kwargs = { - 'name': 'qwerty', - 'filters': None, - 'description': '' - } + kwargs = {'name': 'qwerty', 'filters': None, 'description': ''} self.endpoint_groups_mock.update.assert_called_with( - self.endpoint_group.id, - **kwargs + self.endpoint_group.id, **kwargs ) self.assertIsNone(result) def test_endpoint_group_set_filters(self): arglist = [ - '--filters', identity_fakes.endpoint_group_file_path, + '--filters', + identity_fakes.endpoint_group_file_path, self.endpoint_group.id, ] verifylist = [ @@ -324,8 +317,11 @@ class TestEndpointGroupSet(TestEndpointGroup): mocker = mock.Mock() mocker.return_value = identity_fakes.endpoint_group_filters_2 - with mock.patch("openstackclient.identity.v3.endpoint_group." - "SetEndpointGroup._read_filters", mocker): + with mock.patch( + "openstackclient.identity.v3.endpoint_group." + "SetEndpointGroup._read_filters", + mocker, + ): result = self.cmd.take_action(parsed_args) # Set expected values @@ -336,17 +332,13 @@ class TestEndpointGroupSet(TestEndpointGroup): } self.endpoint_groups_mock.update.assert_called_with( - self.endpoint_group.id, - **kwargs + self.endpoint_group.id, **kwargs ) self.assertIsNone(result) def test_endpoint_group_set_description(self): - arglist = [ - '--description', 'qwerty', - self.endpoint_group.id - ] + arglist = ['--description', 'qwerty', self.endpoint_group.id] verifylist = [ ('description', 'qwerty'), ('endpointgroup', self.endpoint_group.id), @@ -362,23 +354,23 @@ class TestEndpointGroupSet(TestEndpointGroup): 'description': 'qwerty', } self.endpoint_groups_mock.update.assert_called_with( - self.endpoint_group.id, - **kwargs + self.endpoint_group.id, **kwargs ) self.assertIsNone(result) class TestAddProjectToEndpointGroup(TestEndpointGroup): - project = identity_fakes.FakeProject.create_one_project() domain = identity_fakes.FakeDomain.create_one_domain() endpoint_group = ( - identity_fakes.FakeEndpointGroup.create_one_endpointgroup()) + identity_fakes.FakeEndpointGroup.create_one_endpointgroup() + ) new_ep_filter = ( identity_fakes.FakeEndpointGroup.create_one_endpointgroup_filter( - attrs={'endpointgroup': endpoint_group.id, - 'project': project.id})) + attrs={'endpointgroup': endpoint_group.id, 'project': project.id} + ) + ) def setUp(self): super(TestAddProjectToEndpointGroup, self).setUp() @@ -416,7 +408,8 @@ class TestAddProjectToEndpointGroup(TestEndpointGroup): arglist = [ self.endpoint_group.id, self.project.id, - '--project-domain', self.domain.id, + '--project-domain', + self.domain.id, ] verifylist = [ ('endpointgroup', self.endpoint_group.id), @@ -434,11 +427,11 @@ class TestAddProjectToEndpointGroup(TestEndpointGroup): class TestRemoveProjectEndpointGroup(TestEndpointGroup): - project = identity_fakes.FakeProject.create_one_project() domain = identity_fakes.FakeDomain.create_one_domain() endpoint_group = ( - identity_fakes.FakeEndpointGroup.create_one_endpointgroup()) + identity_fakes.FakeEndpointGroup.create_one_endpointgroup() + ) def setUp(self): super(TestRemoveProjectEndpointGroup, self).setUp() @@ -452,7 +445,8 @@ class TestRemoveProjectEndpointGroup(TestEndpointGroup): # Get the command object to test self.cmd = endpoint_group.RemoveProjectFromEndpointGroup( - self.app, None) + self.app, None + ) def test_remove_project_endpoint_no_options(self): arglist = [ @@ -477,7 +471,8 @@ class TestRemoveProjectEndpointGroup(TestEndpointGroup): arglist = [ self.endpoint_group.id, self.project.id, - '--project-domain', self.domain.id, + '--project-domain', + self.domain.id, ] verifylist = [ ('endpointgroup', self.endpoint_group.id), diff --git a/openstackclient/tests/unit/identity/v3/test_group.py b/openstackclient/tests/unit/identity/v3/test_group.py index 04ba0dbe0..3c95931cf 100644 --- a/openstackclient/tests/unit/identity/v3/test_group.py +++ b/openstackclient/tests/unit/identity/v3/test_group.py @@ -23,7 +23,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestGroup(identity_fakes.TestIdentityv3): - def setUp(self): super(TestGroup, self).setUp() @@ -41,7 +40,6 @@ class TestGroup(identity_fakes.TestIdentityv3): class TestGroupAddUser(TestGroup): - _group = identity_fakes.FakeGroup.create_one_group() users = identity_fakes.FakeUser.create_users(count=2) @@ -49,8 +47,7 @@ class TestGroupAddUser(TestGroup): super(TestGroupAddUser, self).setUp() self.groups_mock.get.return_value = self._group - self.users_mock.get = ( - identity_fakes.FakeUser.get_users(self.users)) + self.users_mock.get = identity_fakes.FakeUser.get_users(self.users) self.users_mock.add_to_group.return_value = None self.cmd = group.AddUserToGroup(self.app, None) @@ -68,7 +65,8 @@ class TestGroupAddUser(TestGroup): result = self.cmd.take_action(parsed_args) self.users_mock.add_to_group.assert_called_once_with( - self.users[0].id, self._group.id) + self.users[0].id, self._group.id + ) self.assertIsNone(result) def test_group_add_multi_users(self): @@ -84,15 +82,19 @@ class TestGroupAddUser(TestGroup): parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) - calls = [call(self.users[0].id, self._group.id), - call(self.users[1].id, self._group.id)] + calls = [ + call(self.users[0].id, self._group.id), + call(self.users[1].id, self._group.id), + ] self.users_mock.add_to_group.assert_has_calls(calls) self.assertIsNone(result) @mock.patch.object(group.LOG, 'error') def test_group_add_user_with_error(self, mock_error): self.users_mock.add_to_group.side_effect = [ - exceptions.CommandError(), None] + exceptions.CommandError(), + None, + ] arglist = [ self._group.name, self.users[0].name, @@ -117,7 +119,6 @@ class TestGroupAddUser(TestGroup): class TestGroupCheckUser(TestGroup): - group = identity_fakes.FakeGroup.create_one_group() user = identity_fakes.FakeUser.create_one_user() @@ -143,12 +144,14 @@ class TestGroupCheckUser(TestGroup): result = self.cmd.take_action(parsed_args) self.users_mock.check_in_group.assert_called_once_with( - self.user.id, self.group.id) + self.user.id, self.group.id + ) self.assertIsNone(result) def test_group_check_user_server_error(self): def server_error(*args): raise ks_exc.http.InternalServerError + self.users_mock.check_in_group.side_effect = server_error arglist = [ self.group.name, @@ -160,12 +163,12 @@ class TestGroupCheckUser(TestGroup): ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - self.assertRaises(ks_exc.http.InternalServerError, - self.cmd.take_action, parsed_args) + self.assertRaises( + ks_exc.http.InternalServerError, self.cmd.take_action, parsed_args + ) class TestGroupCreate(TestGroup): - domain = identity_fakes.FakeDomain.create_one_domain() columns = ( @@ -178,7 +181,8 @@ class TestGroupCreate(TestGroup): def setUp(self): super(TestGroupCreate, self).setUp() self.group = identity_fakes.FakeGroup.create_one_group( - attrs={'domain_id': self.domain.id}) + attrs={'domain_id': self.domain.id} + ) self.data = ( self.group.description, self.group.domain_id, @@ -212,8 +216,10 @@ class TestGroupCreate(TestGroup): def test_group_create_with_options(self): arglist = [ - '--domain', self.domain.name, - '--description', self.group.description, + '--domain', + self.domain.name, + '--description', + self.group.description, self.group.name, ] verifylist = [ @@ -251,16 +257,15 @@ class TestGroupCreate(TestGroup): class TestGroupDelete(TestGroup): - domain = identity_fakes.FakeDomain.create_one_domain() groups = identity_fakes.FakeGroup.create_groups( - attrs={'domain_id': domain.id}, count=2) + attrs={'domain_id': domain.id}, count=2 + ) def setUp(self): super(TestGroupDelete, self).setUp() - self.groups_mock.get = ( - identity_fakes.FakeGroup.get_groups(self.groups)) + self.groups_mock.get = identity_fakes.FakeGroup.get_groups(self.groups) self.groups_mock.delete.return_value = None self.domains_mock.get.return_value = self.domain @@ -301,11 +306,11 @@ class TestGroupDelete(TestGroup): def test_group_delete_with_domain(self): get_mock_result = [exceptions.CommandError, self.groups[0]] - self.groups_mock.get = ( - mock.Mock(side_effect=get_mock_result)) + self.groups_mock.get = mock.Mock(side_effect=get_mock_result) arglist = [ - '--domain', self.domain.id, + '--domain', + self.domain.id, self.groups[0].id, ] verifylist = [ @@ -316,14 +321,14 @@ class TestGroupDelete(TestGroup): result = self.cmd.take_action(parsed_args) self.groups_mock.get.assert_any_call( - self.groups[0].id, domain_id=self.domain.id) + self.groups[0].id, domain_id=self.domain.id + ) self.groups_mock.delete.assert_called_once_with(self.groups[0].id) self.assertIsNone(result) @mock.patch.object(utils, 'find_resource') def test_delete_multi_groups_with_exception(self, find_mock): - find_mock.side_effect = [self.groups[0], - exceptions.CommandError] + find_mock.side_effect = [self.groups[0], exceptions.CommandError] arglist = [ self.groups[0].id, 'unexist_group', @@ -337,8 +342,7 @@ class TestGroupDelete(TestGroup): self.cmd.take_action(parsed_args) self.fail('CommandError should be raised.') except exceptions.CommandError as e: - self.assertEqual('1 of 2 groups failed to delete.', - str(e)) + self.assertEqual('1 of 2 groups failed to delete.', str(e)) find_mock.assert_any_call(self.groups_mock, self.groups[0].id) find_mock.assert_any_call(self.groups_mock, 'unexist_group') @@ -348,7 +352,6 @@ class TestGroupDelete(TestGroup): class TestGroupList(TestGroup): - domain = identity_fakes.FakeDomain.create_one_domain() group = identity_fakes.FakeGroup.create_one_group() user = identity_fakes.FakeUser.create_one_user() @@ -393,16 +396,15 @@ class TestGroupList(TestGroup): 'user': None, } - self.groups_mock.list.assert_called_with( - **kwargs - ) + self.groups_mock.list.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) def test_group_list_domain(self): arglist = [ - '--domain', self.domain.id, + '--domain', + self.domain.id, ] verifylist = [ ('domain', self.domain.id), @@ -420,16 +422,15 @@ class TestGroupList(TestGroup): 'user': None, } - self.groups_mock.list.assert_called_with( - **kwargs - ) + self.groups_mock.list.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) def test_group_list_user(self): arglist = [ - '--user', self.user.name, + '--user', + self.user.name, ] verifylist = [ ('user', self.user.name), @@ -447,9 +448,7 @@ class TestGroupList(TestGroup): 'user': self.user.id, } - self.groups_mock.list.assert_called_with( - **kwargs - ) + self.groups_mock.list.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) @@ -474,26 +473,25 @@ class TestGroupList(TestGroup): 'user': None, } - self.groups_mock.list.assert_called_with( - **kwargs - ) + self.groups_mock.list.assert_called_with(**kwargs) columns = self.columns + ( 'Domain ID', 'Description', ) - datalist = (( - self.group.id, - self.group.name, - self.group.domain_id, - self.group.description, - ), ) + datalist = ( + ( + self.group.id, + self.group.name, + self.group.domain_id, + self.group.description, + ), + ) self.assertEqual(columns, columns) self.assertEqual(datalist, tuple(data)) class TestGroupRemoveUser(TestGroup): - _group = identity_fakes.FakeGroup.create_one_group() users = identity_fakes.FakeUser.create_users(count=2) @@ -501,8 +499,7 @@ class TestGroupRemoveUser(TestGroup): super(TestGroupRemoveUser, self).setUp() self.groups_mock.get.return_value = self._group - self.users_mock.get = ( - identity_fakes.FakeUser.get_users(self.users)) + self.users_mock.get = identity_fakes.FakeUser.get_users(self.users) self.users_mock.remove_from_group.return_value = None self.cmd = group.RemoveUserFromGroup(self.app, None) @@ -520,7 +517,8 @@ class TestGroupRemoveUser(TestGroup): result = self.cmd.take_action(parsed_args) self.users_mock.remove_from_group.assert_called_once_with( - self.users[0].id, self._group.id) + self.users[0].id, self._group.id + ) self.assertIsNone(result) def test_group_remove_multi_users(self): @@ -536,15 +534,19 @@ class TestGroupRemoveUser(TestGroup): parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) - calls = [call(self.users[0].id, self._group.id), - call(self.users[1].id, self._group.id)] + calls = [ + call(self.users[0].id, self._group.id), + call(self.users[1].id, self._group.id), + ] self.users_mock.remove_from_group.assert_has_calls(calls) self.assertIsNone(result) @mock.patch.object(group.LOG, 'error') def test_group_remove_user_with_error(self, mock_error): self.users_mock.remove_from_group.side_effect = [ - exceptions.CommandError(), None] + exceptions.CommandError(), + None, + ] arglist = [ self._group.id, self.users[0].id, @@ -569,10 +571,10 @@ class TestGroupRemoveUser(TestGroup): class TestGroupSet(TestGroup): - domain = identity_fakes.FakeDomain.create_one_domain() group = identity_fakes.FakeGroup.create_one_group( - attrs={'domain_id': domain.id}) + attrs={'domain_id': domain.id} + ) def setUp(self): super(TestGroupSet, self).setUp() @@ -598,8 +600,10 @@ class TestGroupSet(TestGroup): def test_group_set_name_and_description(self): arglist = [ - '--name', 'new_name', - '--description', 'new_description', + '--name', + 'new_name', + '--description', + 'new_description', self.group.id, ] verifylist = [ @@ -615,16 +619,17 @@ class TestGroupSet(TestGroup): 'description': 'new_description', } self.groups_mock.update.assert_called_once_with( - self.group.id, **kwargs) + self.group.id, **kwargs + ) self.assertIsNone(result) def test_group_set_with_domain(self): get_mock_result = [exceptions.CommandError, self.group] - self.groups_mock.get = ( - mock.Mock(side_effect=get_mock_result)) + self.groups_mock.get = mock.Mock(side_effect=get_mock_result) arglist = [ - '--domain', self.domain.id, + '--domain', + self.domain.id, self.group.id, ] verifylist = [ @@ -635,13 +640,13 @@ class TestGroupSet(TestGroup): result = self.cmd.take_action(parsed_args) self.groups_mock.get.assert_any_call( - self.group.id, domain_id=self.domain.id) + self.group.id, domain_id=self.domain.id + ) self.groups_mock.update.assert_called_once_with(self.group.id) self.assertIsNone(result) class TestGroupShow(TestGroup): - domain = identity_fakes.FakeDomain.create_one_domain() columns = ( @@ -654,7 +659,8 @@ class TestGroupShow(TestGroup): def setUp(self): super(TestGroupShow, self).setUp() self.group = identity_fakes.FakeGroup.create_one_group( - attrs={'domain_id': self.domain.id}) + attrs={'domain_id': self.domain.id} + ) self.data = ( self.group.description, self.group.domain_id, @@ -683,11 +689,11 @@ class TestGroupShow(TestGroup): def test_group_show_with_domain(self): get_mock_result = [exceptions.CommandError, self.group] - self.groups_mock.get = ( - mock.Mock(side_effect=get_mock_result)) + self.groups_mock.get = mock.Mock(side_effect=get_mock_result) arglist = [ - '--domain', self.domain.id, + '--domain', + self.domain.id, self.group.id, ] verifylist = [ @@ -698,6 +704,7 @@ class TestGroupShow(TestGroup): columns, data = self.cmd.take_action(parsed_args) self.groups_mock.get.assert_any_call( - self.group.id, domain_id=self.domain.id) + self.group.id, domain_id=self.domain.id + ) self.assertEqual(self.columns, columns) self.assertEqual(self.data, data) diff --git a/openstackclient/tests/unit/identity/v3/test_identity_provider.py b/openstackclient/tests/unit/identity/v3/test_identity_provider.py index 480bae596..f45f53a3d 100644 --- a/openstackclient/tests/unit/identity/v3/test_identity_provider.py +++ b/openstackclient/tests/unit/identity/v3/test_identity_provider.py @@ -24,7 +24,6 @@ from openstackclient.tests.unit import utils as test_utils class TestIdentityProvider(identity_fakes.TestFederatedIdentity): - def setUp(self): super(TestIdentityProvider, self).setUp() @@ -44,7 +43,6 @@ class TestIdentityProvider(identity_fakes.TestFederatedIdentity): class TestIdentityProviderCreate(TestIdentityProvider): - columns = ( 'description', 'domain_id', @@ -87,8 +85,7 @@ class TestIdentityProviderCreate(TestIdentityProvider): } self.identity_providers_mock.create.assert_called_with( - id=identity_fakes.idp_id, - **kwargs + id=identity_fakes.idp_id, **kwargs ) self.assertEqual(self.columns, columns) @@ -96,7 +93,8 @@ class TestIdentityProviderCreate(TestIdentityProvider): def test_create_identity_provider_description(self): arglist = [ - '--description', identity_fakes.idp_description, + '--description', + identity_fakes.idp_description, identity_fakes.idp_id, ] verifylist = [ @@ -115,8 +113,7 @@ class TestIdentityProviderCreate(TestIdentityProvider): } self.identity_providers_mock.create.assert_called_with( - id=identity_fakes.idp_id, - **kwargs + id=identity_fakes.idp_id, **kwargs ) self.assertEqual(self.columns, columns) @@ -125,7 +122,8 @@ class TestIdentityProviderCreate(TestIdentityProvider): def test_create_identity_provider_remote_id(self): arglist = [ identity_fakes.idp_id, - '--remote-id', identity_fakes.idp_remote_ids[0] + '--remote-id', + identity_fakes.idp_remote_ids[0], ] verifylist = [ ('identity_provider_id', identity_fakes.idp_id), @@ -143,8 +141,7 @@ class TestIdentityProviderCreate(TestIdentityProvider): } self.identity_providers_mock.create.assert_called_with( - id=identity_fakes.idp_id, - **kwargs + id=identity_fakes.idp_id, **kwargs ) self.assertEqual(self.columns, columns) @@ -152,9 +149,11 @@ class TestIdentityProviderCreate(TestIdentityProvider): def test_create_identity_provider_remote_ids_multiple(self): arglist = [ - '--remote-id', identity_fakes.idp_remote_ids[0], - '--remote-id', identity_fakes.idp_remote_ids[1], - identity_fakes.idp_id + '--remote-id', + identity_fakes.idp_remote_ids[0], + '--remote-id', + identity_fakes.idp_remote_ids[1], + identity_fakes.idp_id, ] verifylist = [ ('identity_provider_id', identity_fakes.idp_id), @@ -172,8 +171,7 @@ class TestIdentityProviderCreate(TestIdentityProvider): } self.identity_providers_mock.create.assert_called_with( - id=identity_fakes.idp_id, - **kwargs + id=identity_fakes.idp_id, **kwargs ) self.assertEqual(self.columns, columns) @@ -181,7 +179,8 @@ class TestIdentityProviderCreate(TestIdentityProvider): def test_create_identity_provider_remote_ids_file(self): arglist = [ - '--remote-id-file', '/tmp/file_name', + '--remote-id-file', + '/tmp/file_name', identity_fakes.idp_id, ] verifylist = [ @@ -192,8 +191,11 @@ class TestIdentityProviderCreate(TestIdentityProvider): mocker = mock.Mock() mocker.return_value = "\n".join(identity_fakes.idp_remote_ids) - with mock.patch("openstackclient.identity.v3.identity_provider." - "utils.read_blob_file_contents", mocker): + with mock.patch( + "openstackclient.identity.v3.identity_provider." + "utils.read_blob_file_contents", + mocker, + ): columns, data = self.cmd.take_action(parsed_args) # Set expected values @@ -205,15 +207,13 @@ class TestIdentityProviderCreate(TestIdentityProvider): } self.identity_providers_mock.create.assert_called_with( - id=identity_fakes.idp_id, - **kwargs + id=identity_fakes.idp_id, **kwargs ) self.assertEqual(self.columns, columns) self.assertCountEqual(self.datalist, data) def test_create_identity_provider_disabled(self): - # Prepare FakeResource object IDENTITY_PROVIDER = copy.deepcopy(identity_fakes.IDENTITY_PROVIDER) IDENTITY_PROVIDER['enabled'] = False @@ -241,8 +241,7 @@ class TestIdentityProviderCreate(TestIdentityProvider): } self.identity_providers_mock.create.assert_called_with( - id=identity_fakes.idp_id, - **kwargs + id=identity_fakes.idp_id, **kwargs ) self.assertEqual(self.columns, columns) @@ -251,13 +250,14 @@ class TestIdentityProviderCreate(TestIdentityProvider): identity_fakes.domain_id, False, identity_fakes.idp_id, - identity_fakes.formatted_idp_remote_ids + identity_fakes.formatted_idp_remote_ids, ) self.assertCountEqual(datalist, data) def test_create_identity_provider_domain_name(self): arglist = [ - '--domain', identity_fakes.domain_name, + '--domain', + identity_fakes.domain_name, identity_fakes.idp_id, ] verifylist = [ @@ -276,8 +276,7 @@ class TestIdentityProviderCreate(TestIdentityProvider): } self.identity_providers_mock.create.assert_called_with( - id=identity_fakes.idp_id, - **kwargs + id=identity_fakes.idp_id, **kwargs ) self.assertEqual(self.columns, columns) @@ -285,7 +284,8 @@ class TestIdentityProviderCreate(TestIdentityProvider): def test_create_identity_provider_domain_id(self): arglist = [ - '--domain', identity_fakes.domain_id, + '--domain', + identity_fakes.domain_id, identity_fakes.idp_id, ] verifylist = [ @@ -304,8 +304,7 @@ class TestIdentityProviderCreate(TestIdentityProvider): } self.identity_providers_mock.create.assert_called_with( - id=identity_fakes.idp_id, - **kwargs + id=identity_fakes.idp_id, **kwargs ) self.assertEqual(self.columns, columns) @@ -313,7 +312,8 @@ class TestIdentityProviderCreate(TestIdentityProvider): def test_create_identity_provider_authttl_positive(self): arglist = [ - '--authorization-ttl', '60', + '--authorization-ttl', + '60', identity_fakes.idp_id, ] verifylist = [ @@ -333,8 +333,7 @@ class TestIdentityProviderCreate(TestIdentityProvider): } self.identity_providers_mock.create.assert_called_with( - id=identity_fakes.idp_id, - **kwargs + id=identity_fakes.idp_id, **kwargs ) self.assertEqual(self.columns, columns) @@ -342,7 +341,8 @@ class TestIdentityProviderCreate(TestIdentityProvider): def test_create_identity_provider_authttl_zero(self): arglist = [ - '--authorization-ttl', '0', + '--authorization-ttl', + '0', identity_fakes.idp_id, ] verifylist = [ @@ -362,8 +362,7 @@ class TestIdentityProviderCreate(TestIdentityProvider): } self.identity_providers_mock.create.assert_called_with( - id=identity_fakes.idp_id, - **kwargs + id=identity_fakes.idp_id, **kwargs ) self.assertEqual(self.columns, columns) @@ -371,7 +370,8 @@ class TestIdentityProviderCreate(TestIdentityProvider): def test_create_identity_provider_authttl_negative(self): arglist = [ - '--authorization-ttl', '-60', + '--authorization-ttl', + '-60', identity_fakes.idp_id, ] verifylist = [ @@ -379,21 +379,27 @@ class TestIdentityProviderCreate(TestIdentityProvider): ('authorization_ttl', -60), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - self.assertRaises(exceptions.CommandError, self.cmd.take_action, - parsed_args) + self.assertRaises( + exceptions.CommandError, self.cmd.take_action, parsed_args + ) def test_create_identity_provider_authttl_not_int(self): arglist = [ - '--authorization-ttl', 'spam', + '--authorization-ttl', + 'spam', identity_fakes.idp_id, ] verifylist = [] - self.assertRaises(test_utils.ParserException, self.check_parser, - self.cmd, arglist, verifylist) + self.assertRaises( + test_utils.ParserException, + self.check_parser, + self.cmd, + arglist, + verifylist, + ) class TestIdentityProviderDelete(TestIdentityProvider): - def setUp(self): super(TestIdentityProviderDelete, self).setUp() @@ -425,7 +431,6 @@ class TestIdentityProviderDelete(TestIdentityProvider): class TestIdentityProviderList(TestIdentityProvider): - def setUp(self): super(TestIdentityProviderList, self).setUp() @@ -459,20 +464,19 @@ class TestIdentityProviderList(TestIdentityProvider): collist = ('ID', 'Enabled', 'Domain ID', 'Description') self.assertEqual(collist, columns) - datalist = (( - identity_fakes.idp_id, - True, - identity_fakes.domain_id, - identity_fakes.idp_description, - ), ) + datalist = ( + ( + identity_fakes.idp_id, + True, + identity_fakes.domain_id, + identity_fakes.idp_description, + ), + ) self.assertCountEqual(datalist, tuple(data)) def test_identity_provider_list_ID_option(self): - arglist = ['--id', - identity_fakes.idp_id] - verifylist = [ - ('id', identity_fakes.idp_id) - ] + arglist = ['--id', identity_fakes.idp_id] + verifylist = [('id', identity_fakes.idp_id)] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class Lister in cliff, abstract method take_action() @@ -480,26 +484,24 @@ class TestIdentityProviderList(TestIdentityProvider): # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) - kwargs = { - 'id': identity_fakes.idp_id - } + kwargs = {'id': identity_fakes.idp_id} self.identity_providers_mock.list.assert_called_with(**kwargs) collist = ('ID', 'Enabled', 'Domain ID', 'Description') self.assertEqual(collist, columns) - datalist = (( - identity_fakes.idp_id, - True, - identity_fakes.domain_id, - identity_fakes.idp_description, - ), ) + datalist = ( + ( + identity_fakes.idp_id, + True, + identity_fakes.domain_id, + identity_fakes.idp_description, + ), + ) self.assertCountEqual(datalist, tuple(data)) def test_identity_provider_list_enabled_option(self): arglist = ['--enabled'] - verifylist = [ - ('enabled', True) - ] + verifylist = [('enabled', True)] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class Lister in cliff, abstract method take_action() @@ -507,24 +509,23 @@ class TestIdentityProviderList(TestIdentityProvider): # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) - kwargs = { - 'enabled': True - } + kwargs = {'enabled': True} self.identity_providers_mock.list.assert_called_with(**kwargs) collist = ('ID', 'Enabled', 'Domain ID', 'Description') self.assertEqual(collist, columns) - datalist = (( - identity_fakes.idp_id, - True, - identity_fakes.domain_id, - identity_fakes.idp_description, - ), ) + datalist = ( + ( + identity_fakes.idp_id, + True, + identity_fakes.domain_id, + identity_fakes.idp_description, + ), + ) self.assertCountEqual(datalist, tuple(data)) class TestIdentityProviderSet(TestIdentityProvider): - columns = ( 'description', 'enabled', @@ -543,31 +544,24 @@ class TestIdentityProviderSet(TestIdentityProvider): self.cmd = identity_provider.SetIdentityProvider(self.app, None) def test_identity_provider_set_description(self): - """Set Identity Provider's description. """ + """Set Identity Provider's description.""" def prepare(self): """Prepare fake return objects before the test is executed""" updated_idp = copy.deepcopy(identity_fakes.IDENTITY_PROVIDER) updated_idp['enabled'] = False - resources = fakes.FakeResource( - None, - updated_idp, - loaded=True - ) + resources = fakes.FakeResource(None, updated_idp, loaded=True) self.identity_providers_mock.update.return_value = resources prepare(self) new_description = 'new desc' - arglist = [ - '--description', new_description, - identity_fakes.idp_id - ] + arglist = ['--description', new_description, identity_fakes.idp_id] verifylist = [ ('identity_provider', identity_fakes.idp_id), ('description', new_description), ('enable', False), ('disable', False), - ('remote_id', None) + ('remote_id', None), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) self.cmd.take_action(parsed_args) @@ -586,25 +580,24 @@ class TestIdentityProviderSet(TestIdentityProvider): """Prepare fake return objects before the test is executed""" updated_idp = copy.deepcopy(identity_fakes.IDENTITY_PROVIDER) updated_idp['enabled'] = False - resources = fakes.FakeResource( - None, - updated_idp, - loaded=True - ) + resources = fakes.FakeResource(None, updated_idp, loaded=True) self.identity_providers_mock.update.return_value = resources prepare(self) arglist = [ - '--disable', identity_fakes.idp_id, - '--remote-id', identity_fakes.idp_remote_ids[0], - '--remote-id', identity_fakes.idp_remote_ids[1] + '--disable', + identity_fakes.idp_id, + '--remote-id', + identity_fakes.idp_remote_ids[0], + '--remote-id', + identity_fakes.idp_remote_ids[1], ] verifylist = [ ('identity_provider', identity_fakes.idp_id), ('description', None), ('enable', False), ('disable', True), - ('remote_id', identity_fakes.idp_remote_ids) + ('remote_id', identity_fakes.idp_remote_ids), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -612,7 +605,7 @@ class TestIdentityProviderSet(TestIdentityProvider): self.identity_providers_mock.update.assert_called_with( identity_fakes.idp_id, enabled=False, - remote_ids=identity_fakes.idp_remote_ids + remote_ids=identity_fakes.idp_remote_ids, ) def test_identity_provider_enable(self): @@ -626,29 +619,34 @@ class TestIdentityProviderSet(TestIdentityProvider): resources = fakes.FakeResource( None, copy.deepcopy(identity_fakes.IDENTITY_PROVIDER), - loaded=True + loaded=True, ) self.identity_providers_mock.update.return_value = resources prepare(self) arglist = [ - '--enable', identity_fakes.idp_id, - '--remote-id', identity_fakes.idp_remote_ids[0], - '--remote-id', identity_fakes.idp_remote_ids[1] + '--enable', + identity_fakes.idp_id, + '--remote-id', + identity_fakes.idp_remote_ids[0], + '--remote-id', + identity_fakes.idp_remote_ids[1], ] verifylist = [ ('identity_provider', identity_fakes.idp_id), ('description', None), ('enable', True), ('disable', False), - ('remote_id', identity_fakes.idp_remote_ids) + ('remote_id', identity_fakes.idp_remote_ids), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) self.cmd.take_action(parsed_args) self.identity_providers_mock.update.assert_called_with( - identity_fakes.idp_id, enabled=True, - remote_ids=identity_fakes.idp_remote_ids) + identity_fakes.idp_id, + enabled=True, + remote_ids=identity_fakes.idp_remote_ids, + ) def test_identity_provider_replace_remote_ids(self): """Enable Identity Provider. @@ -662,31 +660,31 @@ class TestIdentityProviderSet(TestIdentityProvider): updated_idp = copy.deepcopy(identity_fakes.IDENTITY_PROVIDER) updated_idp['remote_ids'] = [self.new_remote_id] - resources = fakes.FakeResource( - None, - updated_idp, - loaded=True - ) + resources = fakes.FakeResource(None, updated_idp, loaded=True) self.identity_providers_mock.update.return_value = resources prepare(self) arglist = [ - '--enable', identity_fakes.idp_id, - '--remote-id', self.new_remote_id + '--enable', + identity_fakes.idp_id, + '--remote-id', + self.new_remote_id, ] verifylist = [ ('identity_provider', identity_fakes.idp_id), ('description', None), ('enable', True), ('disable', False), - ('remote_id', [self.new_remote_id]) + ('remote_id', [self.new_remote_id]), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) self.cmd.take_action(parsed_args) self.identity_providers_mock.update.assert_called_with( - identity_fakes.idp_id, enabled=True, - remote_ids=[self.new_remote_id]) + identity_fakes.idp_id, + enabled=True, + remote_ids=[self.new_remote_id], + ) def test_identity_provider_replace_remote_ids_file(self): """Enable Identity Provider. @@ -700,17 +698,15 @@ class TestIdentityProviderSet(TestIdentityProvider): updated_idp = copy.deepcopy(identity_fakes.IDENTITY_PROVIDER) updated_idp['remote_ids'] = [self.new_remote_id] - resources = fakes.FakeResource( - None, - updated_idp, - loaded=True - ) + resources = fakes.FakeResource(None, updated_idp, loaded=True) self.identity_providers_mock.update.return_value = resources prepare(self) arglist = [ - '--enable', identity_fakes.idp_id, - '--remote-id-file', self.new_remote_id, + '--enable', + identity_fakes.idp_id, + '--remote-id-file', + self.new_remote_id, ] verifylist = [ ('identity_provider', identity_fakes.idp_id), @@ -723,12 +719,17 @@ class TestIdentityProviderSet(TestIdentityProvider): mocker = mock.Mock() mocker.return_value = self.new_remote_id - with mock.patch("openstackclient.identity.v3.identity_provider." - "utils.read_blob_file_contents", mocker): + with mock.patch( + "openstackclient.identity.v3.identity_provider." + "utils.read_blob_file_contents", + mocker, + ): self.cmd.take_action(parsed_args) self.identity_providers_mock.update.assert_called_with( - identity_fakes.idp_id, enabled=True, - remote_ids=[self.new_remote_id]) + identity_fakes.idp_id, + enabled=True, + remote_ids=[self.new_remote_id], + ) def test_identity_provider_no_options(self): def prepare(self): @@ -736,7 +737,7 @@ class TestIdentityProviderSet(TestIdentityProvider): resources = fakes.FakeResource( None, copy.deepcopy(identity_fakes.IDENTITY_PROVIDER), - loaded=True + loaded=True, ) self.identity_providers_mock.get.return_value = resources @@ -755,7 +756,7 @@ class TestIdentityProviderSet(TestIdentityProvider): ('identity_provider', identity_fakes.idp_id), ('enable', False), ('disable', False), - ('remote_id', None) + ('remote_id', None), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -766,18 +767,11 @@ class TestIdentityProviderSet(TestIdentityProvider): """Prepare fake return objects before the test is executed""" updated_idp = copy.deepcopy(identity_fakes.IDENTITY_PROVIDER) updated_idp['authorization_ttl'] = 60 - resources = fakes.FakeResource( - None, - updated_idp, - loaded=True - ) + resources = fakes.FakeResource(None, updated_idp, loaded=True) self.identity_providers_mock.update.return_value = resources prepare(self) - arglist = [ - '--authorization-ttl', '60', - identity_fakes.idp_id - ] + arglist = ['--authorization-ttl', '60', identity_fakes.idp_id] verifylist = [ ('identity_provider', identity_fakes.idp_id), ('enable', False), @@ -797,18 +791,11 @@ class TestIdentityProviderSet(TestIdentityProvider): """Prepare fake return objects before the test is executed""" updated_idp = copy.deepcopy(identity_fakes.IDENTITY_PROVIDER) updated_idp['authorization_ttl'] = 0 - resources = fakes.FakeResource( - None, - updated_idp, - loaded=True - ) + resources = fakes.FakeResource(None, updated_idp, loaded=True) self.identity_providers_mock.update.return_value = resources prepare(self) - arglist = [ - '--authorization-ttl', '0', - identity_fakes.idp_id - ] + arglist = ['--authorization-ttl', '0', identity_fakes.idp_id] verifylist = [ ('identity_provider', identity_fakes.idp_id), ('enable', False), @@ -824,10 +811,7 @@ class TestIdentityProviderSet(TestIdentityProvider): ) def test_identity_provider_set_authttl_negative(self): - arglist = [ - '--authorization-ttl', '-1', - identity_fakes.idp_id - ] + arglist = ['--authorization-ttl', '-1', identity_fakes.idp_id] verifylist = [ ('identity_provider', identity_fakes.idp_id), ('enable', False), @@ -836,21 +820,23 @@ class TestIdentityProviderSet(TestIdentityProvider): ('authorization_ttl', -1), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - self.assertRaises(exceptions.CommandError, self.cmd.take_action, - parsed_args) + self.assertRaises( + exceptions.CommandError, self.cmd.take_action, parsed_args + ) def test_identity_provider_set_authttl_not_int(self): - arglist = [ - '--authorization-ttl', 'spam', - identity_fakes.idp_id - ] + arglist = ['--authorization-ttl', 'spam', identity_fakes.idp_id] verifylist = [] - self.assertRaises(test_utils.ParserException, self.check_parser, - self.cmd, arglist, verifylist) + self.assertRaises( + test_utils.ParserException, + self.check_parser, + self.cmd, + arglist, + verifylist, + ) class TestIdentityProviderShow(TestIdentityProvider): - def setUp(self): super(TestIdentityProviderShow, self).setUp() @@ -860,8 +846,10 @@ class TestIdentityProviderShow(TestIdentityProvider): loaded=True, ) - self.identity_providers_mock.get.side_effect = [Exception("Not found"), - ret] + self.identity_providers_mock.get.side_effect = [ + Exception("Not found"), + ret, + ] self.identity_providers_mock.get.return_value = ret # Get the command object to test @@ -879,8 +867,7 @@ class TestIdentityProviderShow(TestIdentityProvider): columns, data = self.cmd.take_action(parsed_args) self.identity_providers_mock.get.assert_called_with( - identity_fakes.idp_id, - id='test_idp' + identity_fakes.idp_id, id='test_idp' ) collist = ('description', 'domain_id', 'enabled', 'id', 'remote_ids') @@ -890,6 +877,6 @@ class TestIdentityProviderShow(TestIdentityProvider): identity_fakes.domain_id, True, identity_fakes.idp_id, - identity_fakes.formatted_idp_remote_ids + identity_fakes.formatted_idp_remote_ids, ) self.assertCountEqual(datalist, data) diff --git a/openstackclient/tests/unit/identity/v3/test_implied_role.py b/openstackclient/tests/unit/identity/v3/test_implied_role.py index 749681293..ea9c75965 100644 --- a/openstackclient/tests/unit/identity/v3/test_implied_role.py +++ b/openstackclient/tests/unit/identity/v3/test_implied_role.py @@ -21,7 +21,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestRole(identity_fakes.TestIdentityv3): - def setUp(self): super(TestRole, self).setUp() @@ -56,7 +55,6 @@ class TestRole(identity_fakes.TestIdentityv3): class TestImpliedRoleCreate(TestRole): - def setUp(self): super(TestImpliedRoleCreate, self).setUp() @@ -75,8 +73,10 @@ class TestImpliedRoleCreate(TestRole): fake_resource = fakes.FakeResource( None, - {'prior_role': copy.deepcopy(identity_fakes.ROLES[0]), - 'implied': copy.deepcopy(identity_fakes.ROLES[1]), }, + { + 'prior_role': copy.deepcopy(identity_fakes.ROLES[0]), + 'implied': copy.deepcopy(identity_fakes.ROLES[1]), + }, loaded=True, ) self.inference_rules_mock.create.return_value = fake_resource @@ -84,10 +84,10 @@ class TestImpliedRoleCreate(TestRole): self.cmd = implied_role.CreateImpliedRole(self.app, None) def test_implied_role_create(self): - arglist = [ identity_fakes.ROLES[0]['id'], - '--implied-role', identity_fakes.ROLES[1]['id'], + '--implied-role', + identity_fakes.ROLES[1]['id'], ] verifylist = [ ('role', identity_fakes.ROLES[0]['id']), @@ -102,21 +102,19 @@ class TestImpliedRoleCreate(TestRole): # InferenceRuleManager.create(prior, implied) self.inference_rules_mock.create.assert_called_with( - identity_fakes.ROLES[0]['id'], - identity_fakes.ROLES[1]['id'] + identity_fakes.ROLES[0]['id'], identity_fakes.ROLES[1]['id'] ) collist = ('implied', 'prior_role') self.assertEqual(collist, columns) datalist = ( identity_fakes.ROLES[1]['id'], - identity_fakes.ROLES[0]['id'] + identity_fakes.ROLES[0]['id'], ) self.assertEqual(datalist, data) class TestImpliedRoleDelete(TestRole): - def setUp(self): super(TestImpliedRoleDelete, self).setUp() @@ -135,8 +133,10 @@ class TestImpliedRoleDelete(TestRole): fake_resource = fakes.FakeResource( None, - {'prior-role': copy.deepcopy(identity_fakes.ROLES[0]), - 'implied': copy.deepcopy(identity_fakes.ROLES[1]), }, + { + 'prior-role': copy.deepcopy(identity_fakes.ROLES[0]), + 'implied': copy.deepcopy(identity_fakes.ROLES[1]), + }, loaded=True, ) self.inference_rules_mock.delete.return_value = fake_resource @@ -146,7 +146,8 @@ class TestImpliedRoleDelete(TestRole): def test_implied_role_delete(self): arglist = [ identity_fakes.ROLES[0]['id'], - '--implied-role', identity_fakes.ROLES[1]['id'], + '--implied-role', + identity_fakes.ROLES[1]['id'], ] verifylist = [ ('role', identity_fakes.ROLES[0]['id']), @@ -156,18 +157,17 @@ class TestImpliedRoleDelete(TestRole): self.cmd.take_action(parsed_args) self.inference_rules_mock.delete.assert_called_with( - identity_fakes.ROLES[0]['id'], - identity_fakes.ROLES[1]['id'] + identity_fakes.ROLES[0]['id'], identity_fakes.ROLES[1]['id'] ) class TestImpliedRoleList(TestRole): - def setUp(self): super(TestImpliedRoleList, self).setUp() self.inference_rules_mock.list_inference_roles.return_value = ( - identity_fakes.FakeImpliedRoleResponse.create_list()) + identity_fakes.FakeImpliedRoleResponse.create_list() + ) self.cmd = implied_role.ListImpliedRole(self.app, None) @@ -178,12 +178,20 @@ class TestImpliedRoleList(TestRole): columns, data = self.cmd.take_action(parsed_args) self.inference_rules_mock.list_inference_roles.assert_called_with() - collist = ['Prior Role ID', 'Prior Role Name', - 'Implied Role ID', 'Implied Role Name'] + collist = [ + 'Prior Role ID', + 'Prior Role Name', + 'Implied Role ID', + 'Implied Role Name', + ] self.assertEqual(collist, columns) datalist = [ - (identity_fakes.ROLES[0]['id'], identity_fakes.ROLES[0]['name'], - identity_fakes.ROLES[1]['id'], identity_fakes.ROLES[1]['name']) + ( + identity_fakes.ROLES[0]['id'], + identity_fakes.ROLES[0]['name'], + identity_fakes.ROLES[1]['id'], + identity_fakes.ROLES[1]['name'], + ) ] x = [d for d in data] self.assertEqual(datalist, x) diff --git a/openstackclient/tests/unit/identity/v3/test_limit.py b/openstackclient/tests/unit/identity/v3/test_limit.py index e5cd87b8b..d5895afeb 100644 --- a/openstackclient/tests/unit/identity/v3/test_limit.py +++ b/openstackclient/tests/unit/identity/v3/test_limit.py @@ -21,7 +21,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestLimit(identity_fakes.TestIdentityv3): - def setUp(self): super(TestLimit, self).setUp() @@ -40,28 +39,21 @@ class TestLimit(identity_fakes.TestIdentityv3): class TestLimitCreate(TestLimit): - def setUp(self): super(TestLimitCreate, self).setUp() self.service = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.SERVICE), - loaded=True + None, copy.deepcopy(identity_fakes.SERVICE), loaded=True ) self.services_mock.get.return_value = self.service self.project = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.PROJECT), - loaded=True + None, copy.deepcopy(identity_fakes.PROJECT), loaded=True ) self.projects_mock.get.return_value = self.project self.region = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.REGION), - loaded=True + None, copy.deepcopy(identity_fakes.REGION), loaded=True ) self.regions_mock.get.return_value = self.region @@ -69,23 +61,24 @@ class TestLimitCreate(TestLimit): def test_limit_create_without_options(self): self.limit_mock.create.return_value = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.LIMIT), - loaded=True + None, copy.deepcopy(identity_fakes.LIMIT), loaded=True ) resource_limit = 15 arglist = [ - '--project', identity_fakes.project_id, - '--service', identity_fakes.service_id, - '--resource-limit', str(resource_limit), - identity_fakes.limit_resource_name + '--project', + identity_fakes.project_id, + '--service', + identity_fakes.service_id, + '--resource-limit', + str(resource_limit), + identity_fakes.limit_resource_name, ] verifylist = [ ('project', identity_fakes.project_id), ('service', identity_fakes.service_id), ('resource_name', identity_fakes.limit_resource_name), - ('resource_limit', resource_limit) + ('resource_limit', resource_limit), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -100,8 +93,15 @@ class TestLimitCreate(TestLimit): **kwargs ) - collist = ('description', 'id', 'project_id', 'region_id', - 'resource_limit', 'resource_name', 'service_id') + collist = ( + 'description', + 'id', + 'project_id', + 'region_id', + 'resource_limit', + 'resource_name', + 'service_id', + ) self.assertEqual(collist, columns) datalist = ( None, @@ -110,25 +110,28 @@ class TestLimitCreate(TestLimit): None, resource_limit, identity_fakes.limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) def test_limit_create_with_options(self): self.limit_mock.create.return_value = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.LIMIT_OPTIONS), - loaded=True + None, copy.deepcopy(identity_fakes.LIMIT_OPTIONS), loaded=True ) resource_limit = 15 arglist = [ - '--project', identity_fakes.project_id, - '--service', identity_fakes.service_id, - '--resource-limit', str(resource_limit), - '--region', identity_fakes.region_id, - '--description', identity_fakes.limit_description, - identity_fakes.limit_resource_name + '--project', + identity_fakes.project_id, + '--service', + identity_fakes.service_id, + '--resource-limit', + str(resource_limit), + '--region', + identity_fakes.region_id, + '--description', + identity_fakes.limit_description, + identity_fakes.limit_resource_name, ] verifylist = [ ('project', identity_fakes.project_id), @@ -136,7 +139,7 @@ class TestLimitCreate(TestLimit): ('resource_name', identity_fakes.limit_resource_name), ('resource_limit', resource_limit), ('region', identity_fakes.region_id), - ('description', identity_fakes.limit_description) + ('description', identity_fakes.limit_description), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -144,7 +147,7 @@ class TestLimitCreate(TestLimit): kwargs = { 'description': identity_fakes.limit_description, - 'region': self.region + 'region': self.region, } self.limit_mock.create.assert_called_with( self.project, @@ -154,8 +157,15 @@ class TestLimitCreate(TestLimit): **kwargs ) - collist = ('description', 'id', 'project_id', 'region_id', - 'resource_limit', 'resource_name', 'service_id') + collist = ( + 'description', + 'id', + 'project_id', + 'region_id', + 'resource_limit', + 'resource_name', + 'service_id', + ) self.assertEqual(collist, columns) datalist = ( identity_fakes.limit_description, @@ -164,13 +174,12 @@ class TestLimitCreate(TestLimit): identity_fakes.region_id, resource_limit, identity_fakes.limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) class TestLimitDelete(TestLimit): - def setUp(self): super(TestLimitDelete, self).setUp() self.cmd = limit.DeleteLimit(self.app, None) @@ -179,16 +188,12 @@ class TestLimitDelete(TestLimit): self.limit_mock.delete.return_value = None arglist = [identity_fakes.limit_id] - verifylist = [ - ('limit_id', [identity_fakes.limit_id]) - ] + verifylist = [('limit_id', [identity_fakes.limit_id])] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) - self.limit_mock.delete.assert_called_with( - identity_fakes.limit_id - ) + self.limit_mock.delete.assert_called_with(identity_fakes.limit_id) self.assertIsNone(result) def test_limit_delete_with_exception(self): @@ -196,29 +201,22 @@ class TestLimitDelete(TestLimit): self.limit_mock.delete.side_effect = return_value arglist = ['fake-limit-id'] - verifylist = [ - ('limit_id', ['fake-limit-id']) - ] + verifylist = [('limit_id', ['fake-limit-id'])] parsed_args = self.check_parser(self.cmd, arglist, verifylist) try: self.cmd.take_action(parsed_args) self.fail('CommandError should be raised.') except exceptions.CommandError as e: - self.assertEqual( - '1 of 1 limits failed to delete.', str(e) - ) + self.assertEqual('1 of 1 limits failed to delete.', str(e)) class TestLimitShow(TestLimit): - def setUp(self): super(TestLimitShow, self).setUp() self.limit_mock.get.return_value = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.LIMIT), - loaded=True + None, copy.deepcopy(identity_fakes.LIMIT), loaded=True ) self.cmd = limit.ShowLimit(self.app, None) @@ -233,8 +231,13 @@ class TestLimitShow(TestLimit): self.limit_mock.get.assert_called_with(identity_fakes.limit_id) collist = ( - 'description', 'id', 'project_id', 'region_id', 'resource_limit', - 'resource_name', 'service_id' + 'description', + 'id', + 'project_id', + 'region_id', + 'resource_limit', + 'resource_name', + 'service_id', ) self.assertEqual(collist, columns) datalist = ( @@ -244,13 +247,12 @@ class TestLimitShow(TestLimit): None, identity_fakes.limit_resource_limit, identity_fakes.limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) class TestLimitSet(TestLimit): - def setUp(self): super(TestLimitSet, self).setUp() self.cmd = limit.SetLimit(self.app, None) @@ -263,12 +265,13 @@ class TestLimitSet(TestLimit): ) arglist = [ - '--description', identity_fakes.limit_description, - identity_fakes.limit_id + '--description', + identity_fakes.limit_description, + identity_fakes.limit_id, ] verifylist = [ ('description', identity_fakes.limit_description), - ('limit_id', identity_fakes.limit_id) + ('limit_id', identity_fakes.limit_id), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -277,12 +280,17 @@ class TestLimitSet(TestLimit): self.limit_mock.update.assert_called_with( identity_fakes.limit_id, description=identity_fakes.limit_description, - resource_limit=None + resource_limit=None, ) collist = ( - 'description', 'id', 'project_id', 'region_id', 'resource_limit', - 'resource_name', 'service_id' + 'description', + 'id', + 'project_id', + 'region_id', + 'resource_limit', + 'resource_name', + 'service_id', ) self.assertEqual(collist, columns) datalist = ( @@ -292,7 +300,7 @@ class TestLimitSet(TestLimit): None, identity_fakes.limit_resource_limit, identity_fakes.limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) @@ -305,12 +313,13 @@ class TestLimitSet(TestLimit): ) arglist = [ - '--resource-limit', str(resource_limit), - identity_fakes.limit_id + '--resource-limit', + str(resource_limit), + identity_fakes.limit_id, ] verifylist = [ ('resource_limit', resource_limit), - ('limit_id', identity_fakes.limit_id) + ('limit_id', identity_fakes.limit_id), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -319,12 +328,17 @@ class TestLimitSet(TestLimit): self.limit_mock.update.assert_called_with( identity_fakes.limit_id, description=None, - resource_limit=resource_limit + resource_limit=resource_limit, ) collist = ( - 'description', 'id', 'project_id', 'region_id', 'resource_limit', - 'resource_name', 'service_id' + 'description', + 'id', + 'project_id', + 'region_id', + 'resource_limit', + 'resource_name', + 'service_id', ) self.assertEqual(collist, columns) datalist = ( @@ -334,21 +348,18 @@ class TestLimitSet(TestLimit): None, resource_limit, identity_fakes.limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) class TestLimitList(TestLimit): - def setUp(self): super(TestLimitList, self).setUp() self.limit_mock.list.return_value = [ fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.LIMIT), - loaded=True + None, copy.deepcopy(identity_fakes.LIMIT), loaded=True ) ] @@ -362,22 +373,28 @@ class TestLimitList(TestLimit): columns, data = self.cmd.take_action(parsed_args) self.limit_mock.list.assert_called_with( - service=None, resource_name=None, region=None, - project=None + service=None, resource_name=None, region=None, project=None ) collist = ( - 'ID', 'Project ID', 'Service ID', 'Resource Name', - 'Resource Limit', 'Description', 'Region ID' + 'ID', + 'Project ID', + 'Service ID', + 'Resource Name', + 'Resource Limit', + 'Description', + 'Region ID', ) self.assertEqual(collist, columns) - datalist = (( - identity_fakes.limit_id, - identity_fakes.project_id, - identity_fakes.service_id, - identity_fakes.limit_resource_name, - identity_fakes.limit_resource_limit, - None, - None - ), ) + datalist = ( + ( + identity_fakes.limit_id, + identity_fakes.project_id, + identity_fakes.service_id, + identity_fakes.limit_resource_name, + identity_fakes.limit_resource_limit, + None, + None, + ), + ) self.assertEqual(datalist, tuple(data)) diff --git a/openstackclient/tests/unit/identity/v3/test_mappings.py b/openstackclient/tests/unit/identity/v3/test_mappings.py index 184bd2a26..e594a96ba 100644 --- a/openstackclient/tests/unit/identity/v3/test_mappings.py +++ b/openstackclient/tests/unit/identity/v3/test_mappings.py @@ -23,7 +23,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestMapping(identity_fakes.TestFederatedIdentity): - def setUp(self): super(TestMapping, self).setUp() @@ -33,82 +32,73 @@ class TestMapping(identity_fakes.TestFederatedIdentity): class TestMappingCreate(TestMapping): - def setUp(self): super(TestMappingCreate, self).setUp() self.mapping_mock.create.return_value = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.MAPPING_RESPONSE), - loaded=True + None, copy.deepcopy(identity_fakes.MAPPING_RESPONSE), loaded=True ) self.cmd = mapping.CreateMapping(self.app, None) def test_create_mapping(self): arglist = [ - '--rules', identity_fakes.mapping_rules_file_path, - identity_fakes.mapping_id + '--rules', + identity_fakes.mapping_rules_file_path, + identity_fakes.mapping_id, ] verifylist = [ ('mapping', identity_fakes.mapping_id), - ('rules', identity_fakes.mapping_rules_file_path) + ('rules', identity_fakes.mapping_rules_file_path), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) mocker = mock.Mock() mocker.return_value = identity_fakes.MAPPING_RULES - with mock.patch("openstackclient.identity.v3.mapping." - "CreateMapping._read_rules", mocker): + with mock.patch( + "openstackclient.identity.v3.mapping." "CreateMapping._read_rules", + mocker, + ): columns, data = self.cmd.take_action(parsed_args) self.mapping_mock.create.assert_called_with( mapping_id=identity_fakes.mapping_id, - rules=identity_fakes.MAPPING_RULES) + rules=identity_fakes.MAPPING_RULES, + ) collist = ('id', 'rules') self.assertEqual(collist, columns) - datalist = (identity_fakes.mapping_id, - identity_fakes.MAPPING_RULES) + datalist = (identity_fakes.mapping_id, identity_fakes.MAPPING_RULES) self.assertEqual(datalist, data) class TestMappingDelete(TestMapping): - def setUp(self): super(TestMappingDelete, self).setUp() self.mapping_mock.get.return_value = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.MAPPING_RESPONSE), - loaded=True) + None, copy.deepcopy(identity_fakes.MAPPING_RESPONSE), loaded=True + ) self.mapping_mock.delete.return_value = None self.cmd = mapping.DeleteMapping(self.app, None) def test_delete_mapping(self): - arglist = [ - identity_fakes.mapping_id - ] - verifylist = [ - ('mapping', [identity_fakes.mapping_id]) - ] + arglist = [identity_fakes.mapping_id] + verifylist = [('mapping', [identity_fakes.mapping_id])] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) - self.mapping_mock.delete.assert_called_with( - identity_fakes.mapping_id) + self.mapping_mock.delete.assert_called_with(identity_fakes.mapping_id) self.assertIsNone(result) class TestMappingList(TestMapping): - def setUp(self): super(TestMappingList, self).setUp() self.mapping_mock.get.return_value = fakes.FakeResource( - None, - {'id': identity_fakes.mapping_id}, - loaded=True) + None, {'id': identity_fakes.mapping_id}, loaded=True + ) # Pretend list command returns list of two mappings. # NOTE(marek-denis): We are returning FakeResources with mapping id # only as ShowMapping class is implemented in a way where rules will @@ -146,20 +136,15 @@ class TestMappingList(TestMapping): class TestMappingSet(TestMapping): - def setUp(self): super(TestMappingSet, self).setUp() self.mapping_mock.get.return_value = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.MAPPING_RESPONSE), - loaded=True + None, copy.deepcopy(identity_fakes.MAPPING_RESPONSE), loaded=True ) self.mapping_mock.update.return_value = fakes.FakeResource( - None, - identity_fakes.MAPPING_RESPONSE_2, - loaded=True + None, identity_fakes.MAPPING_RESPONSE_2, loaded=True ) # Get the command object to test @@ -167,74 +152,69 @@ class TestMappingSet(TestMapping): def test_set_new_rules(self): arglist = [ - '--rules', identity_fakes.mapping_rules_file_path, - identity_fakes.mapping_id + '--rules', + identity_fakes.mapping_rules_file_path, + identity_fakes.mapping_id, ] verifylist = [ ('mapping', identity_fakes.mapping_id), - ('rules', identity_fakes.mapping_rules_file_path) + ('rules', identity_fakes.mapping_rules_file_path), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) mocker = mock.Mock() mocker.return_value = identity_fakes.MAPPING_RULES_2 - with mock.patch("openstackclient.identity.v3.mapping." - "SetMapping._read_rules", mocker): + with mock.patch( + "openstackclient.identity.v3.mapping." "SetMapping._read_rules", + mocker, + ): result = self.cmd.take_action(parsed_args) self.mapping_mock.update.assert_called_with( mapping=identity_fakes.mapping_id, - rules=identity_fakes.MAPPING_RULES_2) + rules=identity_fakes.MAPPING_RULES_2, + ) self.assertIsNone(result) def test_set_rules_wrong_file_path(self): arglist = [ - '--rules', identity_fakes.mapping_rules_file_path, - identity_fakes.mapping_id + '--rules', + identity_fakes.mapping_rules_file_path, + identity_fakes.mapping_id, ] verifylist = [ ('mapping', identity_fakes.mapping_id), - ('rules', identity_fakes.mapping_rules_file_path) + ('rules', identity_fakes.mapping_rules_file_path), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) self.assertRaises( - exceptions.CommandError, - self.cmd.take_action, - parsed_args) + exceptions.CommandError, self.cmd.take_action, parsed_args + ) class TestMappingShow(TestMapping): - def setUp(self): super(TestMappingShow, self).setUp() self.mapping_mock.get.return_value = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.MAPPING_RESPONSE), - loaded=True + None, copy.deepcopy(identity_fakes.MAPPING_RESPONSE), loaded=True ) self.cmd = mapping.ShowMapping(self.app, None) def test_mapping_show(self): - arglist = [ - identity_fakes.mapping_id - ] - verifylist = [ - ('mapping', identity_fakes.mapping_id) - ] + arglist = [identity_fakes.mapping_id] + verifylist = [('mapping', identity_fakes.mapping_id)] parsed_args = self.check_parser(self.cmd, arglist, verifylist) columns, data = self.cmd.take_action(parsed_args) - self.mapping_mock.get.assert_called_with( - identity_fakes.mapping_id) + self.mapping_mock.get.assert_called_with(identity_fakes.mapping_id) collist = ('id', 'rules') self.assertEqual(collist, columns) - datalist = (identity_fakes.mapping_id, - identity_fakes.MAPPING_RULES) + datalist = (identity_fakes.mapping_id, identity_fakes.MAPPING_RULES) self.assertEqual(datalist, data) diff --git a/openstackclient/tests/unit/identity/v3/test_oauth.py b/openstackclient/tests/unit/identity/v3/test_oauth.py index 3aabd9b8a..0a4a61556 100644 --- a/openstackclient/tests/unit/identity/v3/test_oauth.py +++ b/openstackclient/tests/unit/identity/v3/test_oauth.py @@ -18,7 +18,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestOAuth1(identity_fakes.TestOAuth1): - def setUp(self): super(TestOAuth1, self).setUp() identity_client = self.app.client_manager.identity @@ -33,7 +32,6 @@ class TestOAuth1(identity_fakes.TestOAuth1): class TestAccessTokenCreate(TestOAuth1): - def setUp(self): super(TestAccessTokenCreate, self).setUp() @@ -47,11 +45,16 @@ class TestAccessTokenCreate(TestOAuth1): def test_create_access_tokens(self): arglist = [ - '--consumer-key', identity_fakes.consumer_id, - '--consumer-secret', identity_fakes.consumer_secret, - '--request-key', identity_fakes.request_token_id, - '--request-secret', identity_fakes.request_token_secret, - '--verifier', identity_fakes.oauth_verifier_pin, + '--consumer-key', + identity_fakes.consumer_id, + '--consumer-secret', + identity_fakes.consumer_secret, + '--request-key', + identity_fakes.request_token_id, + '--request-secret', + identity_fakes.request_token_secret, + '--verifier', + identity_fakes.oauth_verifier_pin, ] verifylist = [ ('consumer_key', identity_fakes.consumer_id), @@ -83,7 +86,6 @@ class TestAccessTokenCreate(TestOAuth1): class TestRequestTokenAuthorize(TestOAuth1): - def setUp(self): super(TestRequestTokenAuthorize, self).setUp() @@ -100,8 +102,10 @@ class TestRequestTokenAuthorize(TestOAuth1): def test_authorize_request_tokens(self): arglist = [ - '--request-key', identity_fakes.request_token_id, - '--role', identity_fakes.role_name, + '--request-key', + identity_fakes.request_token_id, + '--role', + identity_fakes.role_name, ] verifylist = [ ('request_key', identity_fakes.request_token_id), @@ -117,14 +121,11 @@ class TestRequestTokenAuthorize(TestOAuth1): collist = ('oauth_verifier',) self.assertEqual(collist, columns) - datalist = ( - identity_fakes.oauth_verifier_pin, - ) + datalist = (identity_fakes.oauth_verifier_pin,) self.assertEqual(datalist, data) class TestRequestTokenCreate(TestOAuth1): - def setUp(self): super(TestRequestTokenCreate, self).setUp() @@ -144,9 +145,12 @@ class TestRequestTokenCreate(TestOAuth1): def test_create_request_tokens(self): arglist = [ - '--consumer-key', identity_fakes.consumer_id, - '--consumer-secret', identity_fakes.consumer_secret, - '--project', identity_fakes.project_id, + '--consumer-key', + identity_fakes.consumer_id, + '--consumer-secret', + identity_fakes.consumer_secret, + '--project', + identity_fakes.project_id, ] verifylist = [ ('consumer_key', identity_fakes.consumer_id), diff --git a/openstackclient/tests/unit/identity/v3/test_project.py b/openstackclient/tests/unit/identity/v3/test_project.py index dfd0805b2..d5d3bb1f9 100644 --- a/openstackclient/tests/unit/identity/v3/test_project.py +++ b/openstackclient/tests/unit/identity/v3/test_project.py @@ -25,7 +25,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestProject(identity_fakes.TestIdentityv3): - def setUp(self): super(TestProject, self).setUp() @@ -39,7 +38,6 @@ class TestProject(identity_fakes.TestIdentityv3): class TestProjectCreate(TestProject): - domain = identity_fakes.FakeDomain.create_one_domain() columns = ( @@ -50,14 +48,15 @@ class TestProjectCreate(TestProject): 'is_domain', 'name', 'parent_id', - 'tags' + 'tags', ) def setUp(self): super(TestProjectCreate, self).setUp() self.project = identity_fakes.FakeProject.create_one_project( - attrs={'domain_id': self.domain.id}) + attrs={'domain_id': self.domain.id} + ) self.domains_mock.get.return_value = self.domain self.projects_mock.create.return_value = self.project self.datalist = ( @@ -68,7 +67,7 @@ class TestProjectCreate(TestProject): False, self.project.name, self.project.parent_id, - self.project.tags + self.project.tags, ) # Get the command object to test self.cmd = project.CreateProject(self.app, None) @@ -82,7 +81,7 @@ class TestProjectCreate(TestProject): ('enable', False), ('disable', False), ('name', self.project.name), - ('tags', []) + ('tags', []), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -103,9 +102,7 @@ class TestProjectCreate(TestProject): } # ProjectManager.create(name=, domain=, description=, # enabled=, **kwargs) - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) collist = ( 'description', @@ -115,7 +112,7 @@ class TestProjectCreate(TestProject): 'is_domain', 'name', 'parent_id', - 'tags' + 'tags', ) self.assertEqual(collist, columns) datalist = ( @@ -126,13 +123,14 @@ class TestProjectCreate(TestProject): False, self.project.name, self.project.parent_id, - self.project.tags + self.project.tags, ) self.assertEqual(datalist, data) def test_project_create_description(self): arglist = [ - '--description', 'new desc', + '--description', + 'new desc', self.project.name, ] verifylist = [ @@ -141,7 +139,7 @@ class TestProjectCreate(TestProject): ('disable', False), ('name', self.project.name), ('parent', None), - ('tags', []) + ('tags', []), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -162,16 +160,15 @@ class TestProjectCreate(TestProject): } # ProjectManager.create(name=, domain=, description=, # enabled=, **kwargs) - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_project_create_domain(self): arglist = [ - '--domain', self.project.domain_id, + '--domain', + self.project.domain_id, self.project.name, ] verifylist = [ @@ -180,7 +177,7 @@ class TestProjectCreate(TestProject): ('disable', False), ('name', self.project.name), ('parent', None), - ('tags', []) + ('tags', []), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -201,16 +198,15 @@ class TestProjectCreate(TestProject): } # ProjectManager.create(name=, domain=, description=, # enabled=, **kwargs) - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_project_create_domain_no_perms(self): arglist = [ - '--domain', self.project.domain_id, + '--domain', + self.project.domain_id, self.project.name, ] verifylist = [ @@ -219,7 +215,7 @@ class TestProjectCreate(TestProject): ('disable', False), ('name', self.project.name), ('parent', None), - ('tags', []) + ('tags', []), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) mocker = mock.Mock() @@ -238,9 +234,7 @@ class TestProjectCreate(TestProject): 'tags': [], 'options': {}, } - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -254,7 +248,7 @@ class TestProjectCreate(TestProject): ('disable', False), ('name', self.project.name), ('parent', None), - ('tags', []) + ('tags', []), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -275,9 +269,7 @@ class TestProjectCreate(TestProject): } # ProjectManager.create(name=, domain=, description=, # enabled=, **kwargs) - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -312,17 +304,17 @@ class TestProjectCreate(TestProject): } # ProjectManager.create(name=, domain=, # description=, enabled=, **kwargs) - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_project_create_property(self): arglist = [ - '--property', 'fee=fi', - '--property', 'fo=fum', + '--property', + 'fee=fi', + '--property', + 'fo=fum', self.project.name, ] verifylist = [ @@ -350,16 +342,15 @@ class TestProjectCreate(TestProject): } # ProjectManager.create(name=, domain=, description=, # enabled=, **kwargs) - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_project_create_is_domain_false_property(self): arglist = [ - '--property', 'is_domain=false', + '--property', + 'is_domain=false', self.project.name, ] verifylist = [ @@ -390,16 +381,15 @@ class TestProjectCreate(TestProject): 'tags': [], 'options': {}, } - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_project_create_is_domain_true_property(self): arglist = [ - '--property', 'is_domain=true', + '--property', + 'is_domain=true', self.project.name, ] verifylist = [ @@ -430,16 +420,15 @@ class TestProjectCreate(TestProject): 'tags': [], 'options': {}, } - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_project_create_is_domain_none_property(self): arglist = [ - '--property', 'is_domain=none', + '--property', + 'is_domain=none', self.project.name, ] verifylist = [ @@ -470,9 +459,7 @@ class TestProjectCreate(TestProject): 'tags': [], 'options': {}, } - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -480,13 +467,16 @@ class TestProjectCreate(TestProject): def test_project_create_parent(self): self.parent = identity_fakes.FakeProject.create_one_project() self.project = identity_fakes.FakeProject.create_one_project( - attrs={'domain_id': self.domain.id, 'parent_id': self.parent.id}) + attrs={'domain_id': self.domain.id, 'parent_id': self.parent.id} + ) self.projects_mock.get.return_value = self.parent self.projects_mock.create.return_value = self.project arglist = [ - '--domain', self.project.domain_id, - '--parent', self.parent.name, + '--domain', + self.project.domain_id, + '--parent', + self.parent.name, self.project.name, ] verifylist = [ @@ -495,7 +485,7 @@ class TestProjectCreate(TestProject): ('enable', False), ('disable', False), ('name', self.project.name), - ('tags', []) + ('tags', []), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -511,9 +501,7 @@ class TestProjectCreate(TestProject): 'options': {}, } - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) collist = ( 'description', @@ -523,7 +511,7 @@ class TestProjectCreate(TestProject): 'is_domain', 'name', 'parent_id', - 'tags' + 'tags', ) self.assertEqual(columns, collist) datalist = ( @@ -534,20 +522,24 @@ class TestProjectCreate(TestProject): self.project.is_domain, self.project.name, self.parent.id, - self.project.tags + self.project.tags, ) self.assertEqual(data, datalist) def test_project_create_invalid_parent(self): self.projects_mock.resource_class.__name__ = 'Project' self.projects_mock.get.side_effect = exceptions.NotFound( - 'Invalid parent') + 'Invalid parent' + ) self.projects_mock.find.side_effect = exceptions.NotFound( - 'Invalid parent') + 'Invalid parent' + ) arglist = [ - '--domain', self.project.domain_id, - '--parent', 'invalid', + '--domain', + self.project.domain_id, + '--parent', + 'invalid', self.project.name, ] verifylist = [ @@ -567,8 +559,10 @@ class TestProjectCreate(TestProject): def test_project_create_with_tags(self): arglist = [ - '--domain', self.project.domain_id, - '--tag', 'foo', + '--domain', + self.project.domain_id, + '--tag', + 'foo', self.project.name, ] verifylist = [ @@ -577,7 +571,7 @@ class TestProjectCreate(TestProject): ('disable', False), ('name', self.project.name), ('parent', None), - ('tags', ['foo']) + ('tags', ['foo']), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -596,9 +590,7 @@ class TestProjectCreate(TestProject): 'tags': ['foo'], 'options': {}, } - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -615,7 +607,7 @@ class TestProjectCreate(TestProject): ('disable', False), ('name', self.project.name), ('parent', None), - ('tags', []) + ('tags', []), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -636,9 +628,7 @@ class TestProjectCreate(TestProject): } # ProjectManager.create(name=, domain=, description=, # enabled=, **kwargs) - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -655,7 +645,7 @@ class TestProjectCreate(TestProject): ('disable', False), ('name', self.project.name), ('parent', None), - ('tags', []) + ('tags', []), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -676,16 +666,13 @@ class TestProjectCreate(TestProject): } # ProjectManager.create(name=, domain=, description=, # enabled=, **kwargs) - self.projects_mock.create.assert_called_with( - **kwargs - ) + self.projects_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) class TestProjectDelete(TestProject): - project = identity_fakes.FakeProject.create_one_project() def setUp(self): @@ -716,8 +703,7 @@ class TestProjectDelete(TestProject): @mock.patch.object(utils, 'find_resource') def test_delete_multi_projects_with_exception(self, find_mock): - find_mock.side_effect = [self.project, - exceptions.CommandError] + find_mock.side_effect = [self.project, exceptions.CommandError] arglist = [ self.project.id, 'unexist_project', @@ -731,8 +717,7 @@ class TestProjectDelete(TestProject): self.cmd.take_action(parsed_args) self.fail('CommandError should be raised.') except exceptions.CommandError as e: - self.assertEqual('1 of 2 projects failed to delete.', - str(e)) + self.assertEqual('1 of 2 projects failed to delete.', str(e)) find_mock.assert_any_call(self.projects_mock, self.project.id) find_mock.assert_any_call(self.projects_mock, 'unexist_project') @@ -742,10 +727,10 @@ class TestProjectDelete(TestProject): class TestProjectList(TestProject): - domain = identity_fakes.FakeDomain.create_one_domain() project = identity_fakes.FakeProject.create_one_project( - attrs={'domain_id': domain.id}) + attrs={'domain_id': domain.id} + ) projects = identity_fakes.FakeProject.create_projects() columns = ( @@ -759,10 +744,18 @@ class TestProjectList(TestProject): ), ) datalists = ( - (projects[0].description, True, - projects[0].id, projects[0].name,), - (projects[1].description, True, - projects[1].id, projects[1].name,), + ( + projects[0].description, + True, + projects[0].id, + projects[0].name, + ), + ( + projects[1].description, + True, + projects[1].id, + projects[1].name, + ), ) def setUp(self): @@ -804,18 +797,21 @@ class TestProjectList(TestProject): collist = ('ID', 'Name', 'Domain ID', 'Description', 'Enabled') self.assertEqual(collist, columns) - datalist = (( - self.project.id, - self.project.name, - self.project.domain_id, - self.project.description, - True, - ), ) + datalist = ( + ( + self.project.id, + self.project.name, + self.project.domain_id, + self.project.description, + True, + ), + ) self.assertEqual(datalist, tuple(data)) def test_project_list_domain(self): arglist = [ - '--domain', self.project.domain_id, + '--domain', + self.project.domain_id, ] verifylist = [ ('domain', self.project.domain_id), @@ -830,14 +826,16 @@ class TestProjectList(TestProject): # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) self.projects_mock.list.assert_called_with( - domain=self.project.domain_id) + domain=self.project.domain_id + ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) def test_project_list_domain_no_perms(self): arglist = [ - '--domain', self.project.domain_id, + '--domain', + self.project.domain_id, ] verifylist = [ ('domain', self.project.domain_id), @@ -850,17 +848,20 @@ class TestProjectList(TestProject): columns, data = self.cmd.take_action(parsed_args) self.projects_mock.list.assert_called_with( - domain=self.project.domain_id) + domain=self.project.domain_id + ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) def test_project_list_parent(self): self.parent = identity_fakes.FakeProject.create_one_project() self.project = identity_fakes.FakeProject.create_one_project( - attrs={'domain_id': self.domain.id, 'parent_id': self.parent.id}) + attrs={'domain_id': self.domain.id, 'parent_id': self.parent.id} + ) arglist = [ - '--parent', self.parent.id, + '--parent', + self.parent.id, ] verifylist = [ ('parent', self.parent.id), @@ -879,7 +880,10 @@ class TestProjectList(TestProject): def test_project_list_sort(self): self.projects_mock.list.return_value = self.projects - arglist = ['--sort', 'name:asc', ] + arglist = [ + '--sort', + 'name:asc', + ] verifylist = [] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -926,22 +930,25 @@ class TestProjectList(TestProject): # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) self.projects_mock.list.assert_called_with( - user=self.app.client_manager.auth_ref.user_id) + user=self.app.client_manager.auth_ref.user_id + ) collist = ('ID', 'Name') self.assertEqual(collist, columns) - datalist = (( - self.project.id, - self.project.name, - ), ) + datalist = ( + ( + self.project.id, + self.project.name, + ), + ) self.assertEqual(datalist, tuple(data)) class TestProjectSet(TestProject): - domain = identity_fakes.FakeDomain.create_one_domain() project = identity_fakes.FakeProject.create_one_project( - attrs={'domain_id': domain.id}) + attrs={'domain_id': domain.id} + ) def setUp(self): super(TestProjectSet, self).setUp() @@ -971,8 +978,10 @@ class TestProjectSet(TestProject): def test_project_set_name(self): arglist = [ - '--name', 'qwerty', - '--domain', self.project.domain_id, + '--name', + 'qwerty', + '--domain', + self.project.domain_id, self.project.name, ] verifylist = [ @@ -992,16 +1001,15 @@ class TestProjectSet(TestProject): } # ProjectManager.update(project, name=, domain=, description=, # enabled=, **kwargs) - self.projects_mock.update.assert_called_with( - self.project.id, - **kwargs - ) + self.projects_mock.update.assert_called_with(self.project.id, **kwargs) self.assertIsNone(result) def test_project_set_description(self): arglist = [ - '--domain', self.project.domain_id, - '--description', 'new desc', + '--domain', + self.project.domain_id, + '--description', + 'new desc', self.project.name, ] verifylist = [ @@ -1019,15 +1027,13 @@ class TestProjectSet(TestProject): kwargs = { 'description': 'new desc', } - self.projects_mock.update.assert_called_with( - self.project.id, - **kwargs - ) + self.projects_mock.update.assert_called_with(self.project.id, **kwargs) self.assertIsNone(result) def test_project_set_enable(self): arglist = [ - '--domain', self.project.domain_id, + '--domain', + self.project.domain_id, '--enable', self.project.name, ] @@ -1045,15 +1051,13 @@ class TestProjectSet(TestProject): kwargs = { 'enabled': True, } - self.projects_mock.update.assert_called_with( - self.project.id, - **kwargs - ) + self.projects_mock.update.assert_called_with(self.project.id, **kwargs) self.assertIsNone(result) def test_project_set_disable(self): arglist = [ - '--domain', self.project.domain_id, + '--domain', + self.project.domain_id, '--disable', self.project.name, ] @@ -1071,17 +1075,17 @@ class TestProjectSet(TestProject): kwargs = { 'enabled': False, } - self.projects_mock.update.assert_called_with( - self.project.id, - **kwargs - ) + self.projects_mock.update.assert_called_with(self.project.id, **kwargs) self.assertIsNone(result) def test_project_set_property(self): arglist = [ - '--domain', self.project.domain_id, - '--property', 'fee=fi', - '--property', 'fo=fum', + '--domain', + self.project.domain_id, + '--property', + 'fee=fi', + '--property', + 'fo=fum', self.project.name, ] verifylist = [ @@ -1098,17 +1102,17 @@ class TestProjectSet(TestProject): 'fee': 'fi', 'fo': 'fum', } - self.projects_mock.update.assert_called_with( - self.project.id, - **kwargs - ) + self.projects_mock.update.assert_called_with(self.project.id, **kwargs) self.assertIsNone(result) def test_project_set_tags(self): arglist = [ - '--name', 'qwerty', - '--domain', self.project.domain_id, - '--tag', 'foo', + '--name', + 'qwerty', + '--domain', + self.project.domain_id, + '--tag', + 'foo', self.project.name, ] verifylist = [ @@ -1117,28 +1121,23 @@ class TestProjectSet(TestProject): ('enable', False), ('disable', False), ('project', self.project.name), - ('tags', ['foo']) + ('tags', ['foo']), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) # Set expected values - kwargs = { - 'name': 'qwerty', - 'tags': ['foo'] - } + kwargs = {'name': 'qwerty', 'tags': ['foo']} # ProjectManager.update(project, name=, domain=, description=, # enabled=, **kwargs) - self.projects_mock.update.assert_called_with( - self.project.id, - **kwargs - ) + self.projects_mock.update.assert_called_with(self.project.id, **kwargs) self.assertIsNone(result) def test_project_set_with_immutable_option(self): arglist = [ - '--domain', self.project.domain_id, + '--domain', + self.project.domain_id, '--immutable', self.project.name, ] @@ -1157,15 +1156,13 @@ class TestProjectSet(TestProject): kwargs = { 'options': {'immutable': True}, } - self.projects_mock.update.assert_called_with( - self.project.id, - **kwargs - ) + self.projects_mock.update.assert_called_with(self.project.id, **kwargs) self.assertIsNone(result) def test_project_set_with_no_immutable_option(self): arglist = [ - '--domain', self.project.domain_id, + '--domain', + self.project.domain_id, '--no-immutable', self.project.name, ] @@ -1184,28 +1181,24 @@ class TestProjectSet(TestProject): kwargs = { 'options': {'immutable': False}, } - self.projects_mock.update.assert_called_with( - self.project.id, - **kwargs - ) + self.projects_mock.update.assert_called_with(self.project.id, **kwargs) self.assertIsNone(result) class TestProjectShow(TestProject): - domain = identity_fakes.FakeDomain.create_one_domain() def setUp(self): super(TestProjectShow, self).setUp() self.project = identity_fakes.FakeProject.create_one_project( - attrs={'domain_id': self.domain.id}) + attrs={'domain_id': self.domain.id} + ) # Get the command object to test self.cmd = project.ShowProject(self.app, None) def test_project_show(self): - self.projects_mock.get.return_value = self.project arglist = [ @@ -1216,15 +1209,15 @@ class TestProjectShow(TestProject): ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - self.app.client_manager.identity.tokens.get_token_data.return_value = \ - {'token': - {'project': - {'domain': {}, - 'name': parsed_args.project, - 'id': parsed_args.project - } - } - } + self.app.client_manager.identity.tokens.get_token_data.return_value = { + 'token': { + 'project': { + 'domain': {}, + 'name': parsed_args.project, + 'id': parsed_args.project, + } + } + } # In base command class ShowOne in cliff, abstract method take_action() # returns a two-part tuple with a tuple of column names and a tuple of @@ -1241,7 +1234,7 @@ class TestProjectShow(TestProject): 'is_domain', 'name', 'parent_id', - 'tags' + 'tags', ) self.assertEqual(collist, columns) datalist = ( @@ -1252,7 +1245,7 @@ class TestProjectShow(TestProject): False, self.project.name, self.project.parent_id, - self.project.tags + self.project.tags, ) self.assertEqual(datalist, data) @@ -1260,7 +1253,7 @@ class TestProjectShow(TestProject): self.project = identity_fakes.FakeProject.create_one_project( attrs={ 'parent_id': self.project.parent_id, - 'parents': [{'project': {'id': self.project.parent_id}}] + 'parents': [{'project': {'id': self.project.parent_id}}], } ) self.projects_mock.get.return_value = self.project @@ -1275,23 +1268,28 @@ class TestProjectShow(TestProject): ('children', False), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - self.app.client_manager.identity.tokens.get_token_data.return_value = \ - {'token': - {'project': - {'domain': {}, - 'name': parsed_args.project, - 'id': parsed_args.project - } - } - } + self.app.client_manager.identity.tokens.get_token_data.return_value = { + 'token': { + 'project': { + 'domain': {}, + 'name': parsed_args.project, + 'id': parsed_args.project, + } + } + } columns, data = self.cmd.take_action(parsed_args) - self.projects_mock.get.assert_has_calls([call(self.project.id), - call(self.project.id, - parents_as_ids=True, - subtree_as_ids=False, - )]) + self.projects_mock.get.assert_has_calls( + [ + call(self.project.id), + call( + self.project.id, + parents_as_ids=True, + subtree_as_ids=False, + ), + ] + ) collist = ( 'description', @@ -1302,7 +1300,7 @@ class TestProjectShow(TestProject): 'name', 'parent_id', 'parents', - 'tags' + 'tags', ) self.assertEqual(columns, collist) datalist = ( @@ -1314,7 +1312,7 @@ class TestProjectShow(TestProject): self.project.name, self.project.parent_id, [{'project': {'id': self.project.parent_id}}], - self.project.tags + self.project.tags, ) self.assertEqual(data, datalist) @@ -1322,7 +1320,7 @@ class TestProjectShow(TestProject): self.project = identity_fakes.FakeProject.create_one_project( attrs={ 'parent_id': self.project.parent_id, - 'subtree': [{'project': {'id': 'children-id'}}] + 'subtree': [{'project': {'id': 'children-id'}}], } ) self.projects_mock.get.return_value = self.project @@ -1337,22 +1335,27 @@ class TestProjectShow(TestProject): ('children', True), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - self.app.client_manager.identity.tokens.get_token_data.return_value = \ - {'token': - {'project': - {'domain': {}, - 'name': parsed_args.project, - 'id': parsed_args.project - } - } - } + self.app.client_manager.identity.tokens.get_token_data.return_value = { + 'token': { + 'project': { + 'domain': {}, + 'name': parsed_args.project, + 'id': parsed_args.project, + } + } + } columns, data = self.cmd.take_action(parsed_args) - self.projects_mock.get.assert_has_calls([call(self.project.id), - call(self.project.id, - parents_as_ids=False, - subtree_as_ids=True, - )]) + self.projects_mock.get.assert_has_calls( + [ + call(self.project.id), + call( + self.project.id, + parents_as_ids=False, + subtree_as_ids=True, + ), + ] + ) collist = ( 'description', @@ -1363,7 +1366,7 @@ class TestProjectShow(TestProject): 'name', 'parent_id', 'subtree', - 'tags' + 'tags', ) self.assertEqual(columns, collist) datalist = ( @@ -1375,7 +1378,7 @@ class TestProjectShow(TestProject): self.project.name, self.project.parent_id, [{'project': {'id': 'children-id'}}], - self.project.tags + self.project.tags, ) self.assertEqual(data, datalist) @@ -1384,7 +1387,7 @@ class TestProjectShow(TestProject): attrs={ 'parent_id': self.project.parent_id, 'parents': [{'project': {'id': self.project.parent_id}}], - 'subtree': [{'project': {'id': 'children-id'}}] + 'subtree': [{'project': {'id': 'children-id'}}], } ) self.projects_mock.get.return_value = self.project @@ -1400,22 +1403,27 @@ class TestProjectShow(TestProject): ('children', True), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - self.app.client_manager.identity.tokens.get_token_data.return_value = \ - {'token': - {'project': - {'domain': {}, - 'name': parsed_args.project, - 'id': parsed_args.project - } - } - } + self.app.client_manager.identity.tokens.get_token_data.return_value = { + 'token': { + 'project': { + 'domain': {}, + 'name': parsed_args.project, + 'id': parsed_args.project, + } + } + } columns, data = self.cmd.take_action(parsed_args) - self.projects_mock.get.assert_has_calls([call(self.project.id), - call(self.project.id, - parents_as_ids=True, - subtree_as_ids=True, - )]) + self.projects_mock.get.assert_has_calls( + [ + call(self.project.id), + call( + self.project.id, + parents_as_ids=True, + subtree_as_ids=True, + ), + ] + ) collist = ( 'description', @@ -1427,7 +1435,7 @@ class TestProjectShow(TestProject): 'parent_id', 'parents', 'subtree', - 'tags' + 'tags', ) self.assertEqual(columns, collist) datalist = ( @@ -1440,27 +1448,29 @@ class TestProjectShow(TestProject): self.project.parent_id, [{'project': {'id': self.project.parent_id}}], [{'project': {'id': 'children-id'}}], - self.project.tags + self.project.tags, ) self.assertEqual(data, datalist) def test_project_show_with_domain(self): project = identity_fakes.FakeProject.create_one_project( - {"name": self.project.name}) + {"name": self.project.name} + ) - self.app.client_manager.identity.tokens.get_token_data.return_value = \ - {'token': - {'project': - {'domain': {"id": self.project.domain_id}, - 'name': self.project.name, - 'id': self.project.id - } - } - } + self.app.client_manager.identity.tokens.get_token_data.return_value = { + 'token': { + 'project': { + 'domain': {"id": self.project.domain_id}, + 'name': self.project.name, + 'id': self.project.id, + } + } + } identity_client = self.app.client_manager.identity arglist = [ - "--domain", self.domain.id, + "--domain", + self.domain.id, project.name, ] verifylist = [ @@ -1469,13 +1479,14 @@ class TestProjectShow(TestProject): ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - project_str = common._get_token_resource(identity_client, 'project', - parsed_args.project, - parsed_args.domain) + project_str = common._get_token_resource( + identity_client, 'project', parsed_args.project, parsed_args.domain + ) self.assertEqual(self.project.id, project_str) arglist = [ - "--domain", project.domain_id, + "--domain", + project.domain_id, project.name, ] verifylist = [ @@ -1484,7 +1495,7 @@ class TestProjectShow(TestProject): ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - project_str = common._get_token_resource(identity_client, 'project', - parsed_args.project, - parsed_args.domain) + project_str = common._get_token_resource( + identity_client, 'project', parsed_args.project, parsed_args.domain + ) self.assertEqual(project.name, project_str) diff --git a/openstackclient/tests/unit/identity/v3/test_protocol.py b/openstackclient/tests/unit/identity/v3/test_protocol.py index 30b4aa4a1..bb27910c3 100644 --- a/openstackclient/tests/unit/identity/v3/test_protocol.py +++ b/openstackclient/tests/unit/identity/v3/test_protocol.py @@ -20,7 +20,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestProtocol(identity_fakes.TestFederatedIdentity): - def setUp(self): super(TestProtocol, self).setUp() @@ -30,7 +29,6 @@ class TestProtocol(identity_fakes.TestFederatedIdentity): class TestProtocolCreate(TestProtocol): - def setUp(self): super(TestProtocolCreate, self).setUp() @@ -42,33 +40,37 @@ class TestProtocolCreate(TestProtocol): def test_create_protocol(self): argslist = [ identity_fakes.protocol_id, - '--identity-provider', identity_fakes.idp_id, - '--mapping', identity_fakes.mapping_id + '--identity-provider', + identity_fakes.idp_id, + '--mapping', + identity_fakes.mapping_id, ] verifylist = [ ('federation_protocol', identity_fakes.protocol_id), ('identity_provider', identity_fakes.idp_id), - ('mapping', identity_fakes.mapping_id) + ('mapping', identity_fakes.mapping_id), ] parsed_args = self.check_parser(self.cmd, argslist, verifylist) columns, data = self.cmd.take_action(parsed_args) self.protocols_mock.create.assert_called_with( protocol_id=identity_fakes.protocol_id, identity_provider=identity_fakes.idp_id, - mapping=identity_fakes.mapping_id) + mapping=identity_fakes.mapping_id, + ) collist = ('id', 'identity_provider', 'mapping') self.assertEqual(collist, columns) - datalist = (identity_fakes.protocol_id, - identity_fakes.idp_id, - identity_fakes.mapping_id) + datalist = ( + identity_fakes.protocol_id, + identity_fakes.idp_id, + identity_fakes.mapping_id, + ) self.assertEqual(datalist, data) class TestProtocolDelete(TestProtocol): - def setUp(self): super(TestProtocolDelete, self).setUp() @@ -84,8 +86,9 @@ class TestProtocolDelete(TestProtocol): def test_delete_identity_provider(self): arglist = [ - '--identity-provider', identity_fakes.idp_id, - identity_fakes.protocol_id + '--identity-provider', + identity_fakes.idp_id, + identity_fakes.protocol_id, ] verifylist = [ ('federation_protocol', [identity_fakes.protocol_id]), @@ -96,20 +99,24 @@ class TestProtocolDelete(TestProtocol): result = self.cmd.take_action(parsed_args) self.protocols_mock.delete.assert_called_with( - identity_fakes.idp_id, identity_fakes.protocol_id) + identity_fakes.idp_id, identity_fakes.protocol_id + ) self.assertIsNone(result) class TestProtocolList(TestProtocol): - def setUp(self): super(TestProtocolList, self).setUp() self.protocols_mock.get.return_value = fakes.FakeResource( - None, identity_fakes.PROTOCOL_ID_MAPPING, loaded=True) + None, identity_fakes.PROTOCOL_ID_MAPPING, loaded=True + ) - self.protocols_mock.list.return_value = [fakes.FakeResource( - None, identity_fakes.PROTOCOL_ID_MAPPING, loaded=True)] + self.protocols_mock.list.return_value = [ + fakes.FakeResource( + None, identity_fakes.PROTOCOL_ID_MAPPING, loaded=True + ) + ] self.cmd = federation_protocol.ListProtocols(self.app, None) @@ -124,65 +131,83 @@ class TestProtocolList(TestProtocol): class TestProtocolSet(TestProtocol): - def setUp(self): super(TestProtocolSet, self).setUp() self.protocols_mock.get.return_value = fakes.FakeResource( - None, identity_fakes.PROTOCOL_OUTPUT, loaded=True) + None, identity_fakes.PROTOCOL_OUTPUT, loaded=True + ) self.protocols_mock.update.return_value = fakes.FakeResource( - None, identity_fakes.PROTOCOL_OUTPUT_UPDATED, loaded=True) + None, identity_fakes.PROTOCOL_OUTPUT_UPDATED, loaded=True + ) self.cmd = federation_protocol.SetProtocol(self.app, None) def test_set_new_mapping(self): arglist = [ identity_fakes.protocol_id, - '--identity-provider', identity_fakes.idp_id, - '--mapping', identity_fakes.mapping_id + '--identity-provider', + identity_fakes.idp_id, + '--mapping', + identity_fakes.mapping_id, + ] + verifylist = [ + ('identity_provider', identity_fakes.idp_id), + ('federation_protocol', identity_fakes.protocol_id), + ('mapping', identity_fakes.mapping_id), ] - verifylist = [('identity_provider', identity_fakes.idp_id), - ('federation_protocol', identity_fakes.protocol_id), - ('mapping', identity_fakes.mapping_id)] parsed_args = self.check_parser(self.cmd, arglist, verifylist) columns, data = self.cmd.take_action(parsed_args) self.protocols_mock.update.assert_called_with( - identity_fakes.idp_id, identity_fakes.protocol_id, - identity_fakes.mapping_id) + identity_fakes.idp_id, + identity_fakes.protocol_id, + identity_fakes.mapping_id, + ) collist = ('id', 'identity_provider', 'mapping') self.assertEqual(collist, columns) - datalist = (identity_fakes.protocol_id, identity_fakes.idp_id, - identity_fakes.mapping_id_updated) + datalist = ( + identity_fakes.protocol_id, + identity_fakes.idp_id, + identity_fakes.mapping_id_updated, + ) self.assertEqual(datalist, data) class TestProtocolShow(TestProtocol): - def setUp(self): super(TestProtocolShow, self).setUp() self.protocols_mock.get.return_value = fakes.FakeResource( - None, identity_fakes.PROTOCOL_OUTPUT, loaded=False) + None, identity_fakes.PROTOCOL_OUTPUT, loaded=False + ) self.cmd = federation_protocol.ShowProtocol(self.app, None) def test_show_protocol(self): - arglist = [identity_fakes.protocol_id, '--identity-provider', - identity_fakes.idp_id] - verifylist = [('federation_protocol', identity_fakes.protocol_id), - ('identity_provider', identity_fakes.idp_id)] + arglist = [ + identity_fakes.protocol_id, + '--identity-provider', + identity_fakes.idp_id, + ] + verifylist = [ + ('federation_protocol', identity_fakes.protocol_id), + ('identity_provider', identity_fakes.idp_id), + ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) columns, data = self.cmd.take_action(parsed_args) - self.protocols_mock.get.assert_called_with(identity_fakes.idp_id, - identity_fakes.protocol_id) + self.protocols_mock.get.assert_called_with( + identity_fakes.idp_id, identity_fakes.protocol_id + ) collist = ('id', 'identity_provider', 'mapping') self.assertEqual(collist, columns) - datalist = (identity_fakes.protocol_id, - identity_fakes.idp_id, - identity_fakes.mapping_id) + datalist = ( + identity_fakes.protocol_id, + identity_fakes.idp_id, + identity_fakes.mapping_id, + ) self.assertEqual(datalist, data) diff --git a/openstackclient/tests/unit/identity/v3/test_region.py b/openstackclient/tests/unit/identity/v3/test_region.py index e83a4e9f0..9e83b7a86 100644 --- a/openstackclient/tests/unit/identity/v3/test_region.py +++ b/openstackclient/tests/unit/identity/v3/test_region.py @@ -19,7 +19,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestRegion(identity_fakes.TestIdentityv3): - def setUp(self): super(TestRegion, self).setUp() @@ -29,7 +28,6 @@ class TestRegion(identity_fakes.TestIdentityv3): class TestRegionCreate(TestRegion): - columns = ( 'description', 'parent_region', @@ -56,11 +54,12 @@ class TestRegionCreate(TestRegion): def test_region_create_description(self): arglist = [ identity_fakes.region_id, - '--description', identity_fakes.region_description, + '--description', + identity_fakes.region_description, ] verifylist = [ ('region', identity_fakes.region_id), - ('description', identity_fakes.region_description) + ('description', identity_fakes.region_description), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -75,9 +74,7 @@ class TestRegionCreate(TestRegion): 'id': identity_fakes.region_id, 'parent_region': None, } - self.regions_mock.create.assert_called_with( - **kwargs - ) + self.regions_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -102,9 +99,7 @@ class TestRegionCreate(TestRegion): 'id': identity_fakes.region_id, 'parent_region': None, } - self.regions_mock.create.assert_called_with( - **kwargs - ) + self.regions_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -112,7 +107,8 @@ class TestRegionCreate(TestRegion): def test_region_create_parent_region_id(self): arglist = [ identity_fakes.region_id, - '--parent-region', identity_fakes.region_parent_region_id, + '--parent-region', + identity_fakes.region_parent_region_id, ] verifylist = [ ('region', identity_fakes.region_id), @@ -131,15 +127,12 @@ class TestRegionCreate(TestRegion): 'id': identity_fakes.region_id, 'parent_region': identity_fakes.region_parent_region_id, } - self.regions_mock.create.assert_called_with( - **kwargs - ) + self.regions_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) class TestRegionDelete(TestRegion): - def setUp(self): super(TestRegionDelete, self).setUp() @@ -166,7 +159,6 @@ class TestRegionDelete(TestRegion): class TestRegionList(TestRegion): - columns = ( 'Region', 'Parent Region', @@ -210,7 +202,8 @@ class TestRegionList(TestRegion): def test_region_list_parent_region_id(self): arglist = [ - '--parent-region', identity_fakes.region_parent_region_id, + '--parent-region', + identity_fakes.region_parent_region_id, ] verifylist = [ ('parent_region', identity_fakes.region_parent_region_id), @@ -222,14 +215,14 @@ class TestRegionList(TestRegion): # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) self.regions_mock.list.assert_called_with( - parent_region_id=identity_fakes.region_parent_region_id) + parent_region_id=identity_fakes.region_parent_region_id + ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) class TestRegionSet(TestRegion): - def setUp(self): super(TestRegionSet, self).setUp() @@ -255,14 +248,14 @@ class TestRegionSet(TestRegion): kwargs = {} self.regions_mock.update.assert_called_with( - identity_fakes.region_id, - **kwargs + identity_fakes.region_id, **kwargs ) self.assertIsNone(result) def test_region_set_description(self): arglist = [ - '--description', 'qwerty', + '--description', + 'qwerty', identity_fakes.region_id, ] verifylist = [ @@ -278,14 +271,14 @@ class TestRegionSet(TestRegion): 'description': 'qwerty', } self.regions_mock.update.assert_called_with( - identity_fakes.region_id, - **kwargs + identity_fakes.region_id, **kwargs ) self.assertIsNone(result) def test_region_set_parent_region_id(self): arglist = [ - '--parent-region', 'new_parent', + '--parent-region', + 'new_parent', identity_fakes.region_id, ] verifylist = [ @@ -301,14 +294,12 @@ class TestRegionSet(TestRegion): 'parent_region': 'new_parent', } self.regions_mock.update.assert_called_with( - identity_fakes.region_id, - **kwargs + identity_fakes.region_id, **kwargs ) self.assertIsNone(result) class TestRegionShow(TestRegion): - def setUp(self): super(TestRegionShow, self).setUp() diff --git a/openstackclient/tests/unit/identity/v3/test_registered_limit.py b/openstackclient/tests/unit/identity/v3/test_registered_limit.py index 262ca4f98..1ba6737e7 100644 --- a/openstackclient/tests/unit/identity/v3/test_registered_limit.py +++ b/openstackclient/tests/unit/identity/v3/test_registered_limit.py @@ -21,7 +21,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestRegisteredLimit(identity_fakes.TestIdentityv3): - def setUp(self): super(TestRegisteredLimit, self).setUp() @@ -36,21 +35,16 @@ class TestRegisteredLimit(identity_fakes.TestIdentityv3): class TestRegisteredLimitCreate(TestRegisteredLimit): - def setUp(self): super(TestRegisteredLimitCreate, self).setUp() self.service = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.SERVICE), - loaded=True + None, copy.deepcopy(identity_fakes.SERVICE), loaded=True ) self.services_mock.get.return_value = self.service self.region = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.REGION), - loaded=True + None, copy.deepcopy(identity_fakes.REGION), loaded=True ) self.regions_mock.get.return_value = self.region @@ -58,23 +52,23 @@ class TestRegisteredLimitCreate(TestRegisteredLimit): def test_registered_limit_create_without_options(self): self.registered_limit_mock.create.return_value = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.REGISTERED_LIMIT), - loaded=True + None, copy.deepcopy(identity_fakes.REGISTERED_LIMIT), loaded=True ) resource_name = identity_fakes.registered_limit_resource_name default_limit = identity_fakes.registered_limit_default_limit arglist = [ - '--service', identity_fakes.service_id, - '--default-limit', '10', + '--service', + identity_fakes.service_id, + '--default-limit', + '10', resource_name, ] verifylist = [ ('service', identity_fakes.service_id), ('default_limit', default_limit), - ('resource_name', resource_name) + ('resource_name', resource_name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -85,8 +79,14 @@ class TestRegisteredLimitCreate(TestRegisteredLimit): self.service, resource_name, default_limit, **kwargs ) - collist = ('default_limit', 'description', 'id', 'region_id', - 'resource_name', 'service_id') + collist = ( + 'default_limit', + 'description', + 'id', + 'region_id', + 'resource_name', + 'service_id', + ) self.assertEqual(collist, columns) datalist = ( @@ -95,7 +95,7 @@ class TestRegisteredLimitCreate(TestRegisteredLimit): identity_fakes.registered_limit_id, None, identity_fakes.registered_limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) @@ -103,18 +103,22 @@ class TestRegisteredLimitCreate(TestRegisteredLimit): self.registered_limit_mock.create.return_value = fakes.FakeResource( None, copy.deepcopy(identity_fakes.REGISTERED_LIMIT_OPTIONS), - loaded=True + loaded=True, ) resource_name = identity_fakes.registered_limit_resource_name default_limit = identity_fakes.registered_limit_default_limit description = identity_fakes.registered_limit_description arglist = [ - '--region', identity_fakes.region_id, - '--description', description, - '--service', identity_fakes.service_id, - '--default-limit', '10', - resource_name + '--region', + identity_fakes.region_id, + '--description', + description, + '--service', + identity_fakes.service_id, + '--default-limit', + '10', + resource_name, ] verifylist = [ @@ -122,7 +126,7 @@ class TestRegisteredLimitCreate(TestRegisteredLimit): ('description', description), ('service', identity_fakes.service_id), ('default_limit', default_limit), - ('resource_name', resource_name) + ('resource_name', resource_name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -133,8 +137,14 @@ class TestRegisteredLimitCreate(TestRegisteredLimit): self.service, resource_name, default_limit, **kwargs ) - collist = ('default_limit', 'description', 'id', 'region_id', - 'resource_name', 'service_id') + collist = ( + 'default_limit', + 'description', + 'id', + 'region_id', + 'resource_name', + 'service_id', + ) self.assertEqual(collist, columns) datalist = ( @@ -143,13 +153,12 @@ class TestRegisteredLimitCreate(TestRegisteredLimit): identity_fakes.registered_limit_id, identity_fakes.region_id, identity_fakes.registered_limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) class TestRegisteredLimitDelete(TestRegisteredLimit): - def setUp(self): super(TestRegisteredLimitDelete, self).setUp() @@ -176,9 +185,7 @@ class TestRegisteredLimitDelete(TestRegisteredLimit): self.registered_limit_mock.delete.side_effect = return_value arglist = ['fake-registered-limit-id'] - verifylist = [ - ('registered_limit_id', ['fake-registered-limit-id']) - ] + verifylist = [('registered_limit_id', ['fake-registered-limit-id'])] parsed_args = self.check_parser(self.cmd, arglist, verifylist) try: @@ -191,14 +198,11 @@ class TestRegisteredLimitDelete(TestRegisteredLimit): class TestRegisteredLimitShow(TestRegisteredLimit): - def setUp(self): super(TestRegisteredLimitShow, self).setUp() self.registered_limit_mock.get.return_value = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.REGISTERED_LIMIT), - loaded=True + None, copy.deepcopy(identity_fakes.REGISTERED_LIMIT), loaded=True ) self.cmd = registered_limit.ShowRegisteredLimit(self.app, None) @@ -217,8 +221,12 @@ class TestRegisteredLimitShow(TestRegisteredLimit): ) collist = ( - 'default_limit', 'description', 'id', 'region_id', 'resource_name', - 'service_id' + 'default_limit', + 'description', + 'id', + 'region_id', + 'resource_name', + 'service_id', ) self.assertEqual(collist, columns) datalist = ( @@ -227,33 +235,33 @@ class TestRegisteredLimitShow(TestRegisteredLimit): identity_fakes.registered_limit_id, None, identity_fakes.registered_limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) class TestRegisteredLimitSet(TestRegisteredLimit): - def setUp(self): super(TestRegisteredLimitSet, self).setUp() self.cmd = registered_limit.SetRegisteredLimit(self.app, None) def test_registered_limit_set_description(self): registered_limit = copy.deepcopy(identity_fakes.REGISTERED_LIMIT) - registered_limit['description'] = ( - identity_fakes.registered_limit_description - ) + registered_limit[ + 'description' + ] = identity_fakes.registered_limit_description self.registered_limit_mock.update.return_value = fakes.FakeResource( None, registered_limit, loaded=True ) arglist = [ - '--description', identity_fakes.registered_limit_description, - identity_fakes.registered_limit_id + '--description', + identity_fakes.registered_limit_description, + identity_fakes.registered_limit_id, ] verifylist = [ ('description', identity_fakes.registered_limit_description), - ('registered_limit_id', identity_fakes.registered_limit_id) + ('registered_limit_id', identity_fakes.registered_limit_id), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -265,12 +273,16 @@ class TestRegisteredLimitSet(TestRegisteredLimit): resource_name=None, default_limit=None, description=identity_fakes.registered_limit_description, - region=None + region=None, ) collist = ( - 'default_limit', 'description', 'id', 'region_id', 'resource_name', - 'service_id' + 'default_limit', + 'description', + 'id', + 'region_id', + 'resource_name', + 'service_id', ) self.assertEqual(collist, columns) datalist = ( @@ -279,7 +291,7 @@ class TestRegisteredLimitSet(TestRegisteredLimit): identity_fakes.registered_limit_id, None, identity_fakes.registered_limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) @@ -292,12 +304,13 @@ class TestRegisteredLimitSet(TestRegisteredLimit): ) arglist = [ - '--default-limit', str(default_limit), - identity_fakes.registered_limit_id + '--default-limit', + str(default_limit), + identity_fakes.registered_limit_id, ] verifylist = [ ('default_limit', default_limit), - ('registered_limit_id', identity_fakes.registered_limit_id) + ('registered_limit_id', identity_fakes.registered_limit_id), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -309,12 +322,16 @@ class TestRegisteredLimitSet(TestRegisteredLimit): resource_name=None, default_limit=default_limit, description=None, - region=None + region=None, ) collist = ( - 'default_limit', 'description', 'id', 'region_id', 'resource_name', - 'service_id' + 'default_limit', + 'description', + 'id', + 'region_id', + 'resource_name', + 'service_id', ) self.assertEqual(collist, columns) datalist = ( @@ -323,7 +340,7 @@ class TestRegisteredLimitSet(TestRegisteredLimit): identity_fakes.registered_limit_id, None, identity_fakes.registered_limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) @@ -336,12 +353,13 @@ class TestRegisteredLimitSet(TestRegisteredLimit): ) arglist = [ - '--resource-name', resource_name, - identity_fakes.registered_limit_id + '--resource-name', + resource_name, + identity_fakes.registered_limit_id, ] verifylist = [ ('resource_name', resource_name), - ('registered_limit_id', identity_fakes.registered_limit_id) + ('registered_limit_id', identity_fakes.registered_limit_id), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -353,12 +371,16 @@ class TestRegisteredLimitSet(TestRegisteredLimit): resource_name=resource_name, default_limit=None, description=None, - region=None + region=None, ) collist = ( - 'default_limit', 'description', 'id', 'region_id', 'resource_name', - 'service_id' + 'default_limit', + 'description', + 'id', + 'region_id', + 'resource_name', + 'service_id', ) self.assertEqual(collist, columns) datalist = ( @@ -367,7 +389,7 @@ class TestRegisteredLimitSet(TestRegisteredLimit): identity_fakes.registered_limit_id, None, resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) @@ -380,13 +402,10 @@ class TestRegisteredLimitSet(TestRegisteredLimit): ) self.services_mock.get.return_value = service - arglist = [ - '--service', service.id, - identity_fakes.registered_limit_id - ] + arglist = ['--service', service.id, identity_fakes.registered_limit_id] verifylist = [ ('service', service.id), - ('registered_limit_id', identity_fakes.registered_limit_id) + ('registered_limit_id', identity_fakes.registered_limit_id), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -398,12 +417,16 @@ class TestRegisteredLimitSet(TestRegisteredLimit): resource_name=None, default_limit=None, description=None, - region=None + region=None, ) collist = ( - 'default_limit', 'description', 'id', 'region_id', 'resource_name', - 'service_id' + 'default_limit', + 'description', + 'id', + 'region_id', + 'resource_name', + 'service_id', ) self.assertEqual(collist, columns) datalist = ( @@ -412,7 +435,7 @@ class TestRegisteredLimitSet(TestRegisteredLimit): identity_fakes.registered_limit_id, None, identity_fakes.registered_limit_resource_name, - service.id + service.id, ) self.assertEqual(datalist, data) @@ -420,24 +443,17 @@ class TestRegisteredLimitSet(TestRegisteredLimit): registered_limit = copy.deepcopy(identity_fakes.REGISTERED_LIMIT) region = identity_fakes.REGION region['id'] = 'RegionTwo' - region = fakes.FakeResource( - None, - copy.deepcopy(region), - loaded=True - ) + region = fakes.FakeResource(None, copy.deepcopy(region), loaded=True) registered_limit['region_id'] = region.id self.registered_limit_mock.update.return_value = fakes.FakeResource( None, registered_limit, loaded=True ) self.regions_mock.get.return_value = region - arglist = [ - '--region', region.id, - identity_fakes.registered_limit_id - ] + arglist = ['--region', region.id, identity_fakes.registered_limit_id] verifylist = [ ('region', region.id), - ('registered_limit_id', identity_fakes.registered_limit_id) + ('registered_limit_id', identity_fakes.registered_limit_id), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) @@ -449,12 +465,16 @@ class TestRegisteredLimitSet(TestRegisteredLimit): resource_name=None, default_limit=None, description=None, - region=region + region=region, ) collist = ( - 'default_limit', 'description', 'id', 'region_id', 'resource_name', - 'service_id' + 'default_limit', + 'description', + 'id', + 'region_id', + 'resource_name', + 'service_id', ) self.assertEqual(collist, columns) datalist = ( @@ -463,20 +483,17 @@ class TestRegisteredLimitSet(TestRegisteredLimit): identity_fakes.registered_limit_id, region.id, identity_fakes.registered_limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) class TestRegisteredLimitList(TestRegisteredLimit): - def setUp(self): super(TestRegisteredLimitList, self).setUp() self.registered_limit_mock.get.return_value = fakes.FakeResource( - None, - copy.deepcopy(identity_fakes.REGISTERED_LIMIT), - loaded=True + None, copy.deepcopy(identity_fakes.REGISTERED_LIMIT), loaded=True ) self.cmd = registered_limit.ShowRegisteredLimit(self.app, None) @@ -495,8 +512,12 @@ class TestRegisteredLimitList(TestRegisteredLimit): ) collist = ( - 'default_limit', 'description', 'id', 'region_id', 'resource_name', - 'service_id' + 'default_limit', + 'description', + 'id', + 'region_id', + 'resource_name', + 'service_id', ) self.assertEqual(collist, columns) datalist = ( @@ -505,6 +526,6 @@ class TestRegisteredLimitList(TestRegisteredLimit): identity_fakes.registered_limit_id, None, identity_fakes.registered_limit_resource_name, - identity_fakes.service_id + identity_fakes.service_id, ) self.assertEqual(datalist, data) diff --git a/openstackclient/tests/unit/identity/v3/test_role.py b/openstackclient/tests/unit/identity/v3/test_role.py index 774b2c2b5..12fd1611b 100644 --- a/openstackclient/tests/unit/identity/v3/test_role.py +++ b/openstackclient/tests/unit/identity/v3/test_role.py @@ -26,7 +26,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestRole(identity_fakes.TestIdentityv3): - def setUp(self): super(TestRole, self).setUp() @@ -55,13 +54,11 @@ class TestRole(identity_fakes.TestIdentityv3): class TestRoleInherited(TestRole): - def _is_inheritance_testcase(self): return True class TestRoleAdd(TestRole): - def setUp(self): super(TestRoleAdd, self).setUp() @@ -105,8 +102,10 @@ class TestRoleAdd(TestRole): def test_role_add_user_system(self): arglist = [ - '--user', identity_fakes.user_name, - '--system', 'all', + '--user', + identity_fakes.user_name, + '--system', + 'all', identity_fakes.role_name, ] if self._is_inheritance_testcase(): @@ -132,15 +131,16 @@ class TestRoleAdd(TestRole): } # RoleManager.grant(role, user=, group=, domain=, project=) self.roles_mock.grant.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) def test_role_add_user_domain(self): arglist = [ - '--user', identity_fakes.user_name, - '--domain', identity_fakes.domain_name, + '--user', + identity_fakes.user_name, + '--domain', + identity_fakes.domain_name, identity_fakes.role_name, ] if self._is_inheritance_testcase(): @@ -165,15 +165,16 @@ class TestRoleAdd(TestRole): } # RoleManager.grant(role, user=, group=, domain=, project=) self.roles_mock.grant.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) def test_role_add_user_project(self): arglist = [ - '--user', identity_fakes.user_name, - '--project', identity_fakes.project_name, + '--user', + identity_fakes.user_name, + '--project', + identity_fakes.project_name, identity_fakes.role_name, ] if self._is_inheritance_testcase(): @@ -198,15 +199,16 @@ class TestRoleAdd(TestRole): } # RoleManager.grant(role, user=, group=, domain=, project=) self.roles_mock.grant.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) def test_role_add_group_system(self): arglist = [ - '--group', identity_fakes.group_name, - '--system', 'all', + '--group', + identity_fakes.group_name, + '--system', + 'all', identity_fakes.role_name, ] if self._is_inheritance_testcase(): @@ -232,15 +234,16 @@ class TestRoleAdd(TestRole): } # RoleManager.grant(role, user=, group=, domain=, project=) self.roles_mock.grant.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) def test_role_add_group_domain(self): arglist = [ - '--group', identity_fakes.group_name, - '--domain', identity_fakes.domain_name, + '--group', + identity_fakes.group_name, + '--domain', + identity_fakes.domain_name, identity_fakes.role_name, ] if self._is_inheritance_testcase(): @@ -265,15 +268,16 @@ class TestRoleAdd(TestRole): } # RoleManager.grant(role, user=, group=, domain=, project=) self.roles_mock.grant.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) def test_role_add_group_project(self): arglist = [ - '--group', identity_fakes.group_name, - '--project', identity_fakes.project_name, + '--group', + identity_fakes.group_name, + '--project', + identity_fakes.project_name, identity_fakes.role_name, ] if self._is_inheritance_testcase(): @@ -298,8 +302,7 @@ class TestRoleAdd(TestRole): } # RoleManager.grant(role, user=, group=, domain=, project=) self.roles_mock.grant.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) @@ -310,9 +313,12 @@ class TestRoleAdd(TestRole): loaded=True, ) arglist = [ - '--user', identity_fakes.user_name, - '--project', identity_fakes.project_name, - '--role-domain', identity_fakes.domain_name, + '--user', + identity_fakes.user_name, + '--project', + identity_fakes.project_name, + '--role-domain', + identity_fakes.domain_name, identity_fakes.ROLE_2['name'], ] if self._is_inheritance_testcase(): @@ -337,8 +343,7 @@ class TestRoleAdd(TestRole): } # RoleManager.grant(role, user=, group=, domain=, project=) self.roles_mock.grant.assert_called_with( - identity_fakes.ROLE_2['id'], - **kwargs + identity_fakes.ROLE_2['id'], **kwargs ) self.assertIsNone(result) @@ -355,8 +360,9 @@ class TestRoleAdd(TestRole): ('inherited', False), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - self.assertRaises(exceptions.CommandError, - self.cmd.take_action, parsed_args) + self.assertRaises( + exceptions.CommandError, self.cmd.take_action, parsed_args + ) class TestRoleAddInherited(TestRoleAdd, TestRoleInherited): @@ -364,7 +370,6 @@ class TestRoleAddInherited(TestRoleAdd, TestRoleInherited): class TestRoleCreate(TestRole): - def setUp(self): super(TestRoleCreate, self).setUp() @@ -406,9 +411,7 @@ class TestRoleCreate(TestRole): } # RoleManager.create(name=, domain=) - self.roles_mock.create.assert_called_with( - **kwargs - ) + self.roles_mock.create.assert_called_with(**kwargs) collist = ('domain', 'id', 'name') self.assertEqual(collist, columns) @@ -420,7 +423,6 @@ class TestRoleCreate(TestRole): self.assertEqual(datalist, data) def test_role_create_with_domain(self): - self.roles_mock.create.return_value = fakes.FakeResource( None, copy.deepcopy(identity_fakes.ROLE_2), @@ -428,7 +430,8 @@ class TestRoleCreate(TestRole): ) arglist = [ - '--domain', identity_fakes.domain_name, + '--domain', + identity_fakes.domain_name, identity_fakes.ROLE_2['name'], ] verifylist = [ @@ -451,9 +454,7 @@ class TestRoleCreate(TestRole): } # RoleManager.create(name=, domain=) - self.roles_mock.create.assert_called_with( - **kwargs - ) + self.roles_mock.create.assert_called_with(**kwargs) collist = ('domain', 'id', 'name') self.assertEqual(collist, columns) @@ -465,14 +466,14 @@ class TestRoleCreate(TestRole): self.assertEqual(datalist, data) def test_role_create_with_description(self): - self.roles_mock.create.return_value = fakes.FakeResource( None, copy.deepcopy(identity_fakes.ROLE_2), loaded=True, ) arglist = [ - '--description', identity_fakes.role_description, + '--description', + identity_fakes.role_description, identity_fakes.ROLE_2['name'], ] verifylist = [ @@ -495,9 +496,7 @@ class TestRoleCreate(TestRole): } # RoleManager.create(name=, domain=) - self.roles_mock.create.assert_called_with( - **kwargs - ) + self.roles_mock.create.assert_called_with(**kwargs) collist = ('domain', 'id', 'name') self.assertEqual(collist, columns) @@ -509,7 +508,6 @@ class TestRoleCreate(TestRole): self.assertEqual(datalist, data) def test_role_create_with_immutable_option(self): - self.roles_mock.create.return_value = fakes.FakeResource( None, copy.deepcopy(identity_fakes.ROLE_2), @@ -532,7 +530,6 @@ class TestRoleCreate(TestRole): # Set expected values kwargs = { - 'options': {'immutable': True}, 'description': None, 'name': identity_fakes.ROLE_2['name'], @@ -540,9 +537,7 @@ class TestRoleCreate(TestRole): } # RoleManager.create(name=, domain=) - self.roles_mock.create.assert_called_with( - **kwargs - ) + self.roles_mock.create.assert_called_with(**kwargs) collist = ('domain', 'id', 'name') self.assertEqual(collist, columns) @@ -554,7 +549,6 @@ class TestRoleCreate(TestRole): self.assertEqual(datalist, data) def test_role_create_with_no_immutable_option(self): - self.roles_mock.create.return_value = fakes.FakeResource( None, copy.deepcopy(identity_fakes.ROLE_2), @@ -577,7 +571,6 @@ class TestRoleCreate(TestRole): # Set expected values kwargs = { - 'options': {'immutable': False}, 'description': None, 'name': identity_fakes.ROLE_2['name'], @@ -585,9 +578,7 @@ class TestRoleCreate(TestRole): } # RoleManager.create(name=, domain=) - self.roles_mock.create.assert_called_with( - **kwargs - ) + self.roles_mock.create.assert_called_with(**kwargs) collist = ('domain', 'id', 'name') self.assertEqual(collist, columns) @@ -600,7 +591,6 @@ class TestRoleCreate(TestRole): class TestRoleDelete(TestRole): - def setUp(self): super(TestRoleDelete, self).setUp() @@ -639,7 +629,8 @@ class TestRoleDelete(TestRole): self.roles_mock.delete.return_value = None arglist = [ - '--domain', identity_fakes.domain_name, + '--domain', + identity_fakes.domain_name, identity_fakes.ROLE_2['name'], ] verifylist = [ @@ -657,8 +648,10 @@ class TestRoleDelete(TestRole): @mock.patch.object(utils, 'find_resource') def test_delete_multi_roles_with_exception(self, find_mock): - find_mock.side_effect = [self.roles_mock.get.return_value, - exceptions.CommandError] + find_mock.side_effect = [ + self.roles_mock.get.return_value, + exceptions.CommandError, + ] arglist = [ identity_fakes.role_name, 'unexist_role', @@ -672,22 +665,20 @@ class TestRoleDelete(TestRole): self.cmd.take_action(parsed_args) self.fail('CommandError should be raised.') except exceptions.CommandError as e: - self.assertEqual('1 of 2 roles failed to delete.', - str(e)) + self.assertEqual('1 of 2 roles failed to delete.', str(e)) - find_mock.assert_any_call(self.roles_mock, - identity_fakes.role_name, - domain_id=None) - find_mock.assert_any_call(self.roles_mock, - 'unexist_role', - domain_id=None) + find_mock.assert_any_call( + self.roles_mock, identity_fakes.role_name, domain_id=None + ) + find_mock.assert_any_call( + self.roles_mock, 'unexist_role', domain_id=None + ) self.assertEqual(2, find_mock.call_count) self.roles_mock.delete.assert_called_once_with(identity_fakes.role_id) class TestRoleList(TestRole): - columns = ( 'ID', 'Name', @@ -743,7 +734,8 @@ class TestRoleList(TestRole): ), ] arglist = [ - '--domain', identity_fakes.domain_name, + '--domain', + identity_fakes.domain_name, ] verifylist = [ ('domain', identity_fakes.domain_name), @@ -756,26 +748,23 @@ class TestRoleList(TestRole): columns, data = self.cmd.take_action(parsed_args) # Set expected values - kwargs = { - 'domain_id': identity_fakes.domain_id - } + kwargs = {'domain_id': identity_fakes.domain_id} # RoleManager.list(user=, group=, domain=, project=, **kwargs) - self.roles_mock.list.assert_called_with( - **kwargs - ) + self.roles_mock.list.assert_called_with(**kwargs) collist = ('ID', 'Name', 'Domain') self.assertEqual(collist, columns) - datalist = (( - identity_fakes.ROLE_2['id'], - identity_fakes.ROLE_2['name'], - identity_fakes.domain_name, - ), ) + datalist = ( + ( + identity_fakes.ROLE_2['id'], + identity_fakes.ROLE_2['name'], + identity_fakes.domain_name, + ), + ) self.assertEqual(datalist, tuple(data)) class TestRoleRemove(TestRole): - def setUp(self): super(TestRoleRemove, self).setUp() @@ -815,9 +804,11 @@ class TestRoleRemove(TestRole): def test_role_remove_user_system(self): arglist = [ - '--user', identity_fakes.user_name, - '--system', 'all', - identity_fakes.role_name + '--user', + identity_fakes.user_name, + '--system', + 'all', + identity_fakes.role_name, ] if self._is_inheritance_testcase(): arglist.append('--inherited') @@ -842,8 +833,7 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) @@ -856,9 +846,11 @@ class TestRoleRemove(TestRole): find_mock.side_effect = exceptions.CommandError arglist = [ - '--user', identity_fakes.user_id, - '--system', 'all', - identity_fakes.role_name + '--user', + identity_fakes.user_id, + '--system', + 'all', + identity_fakes.role_name, ] if self._is_inheritance_testcase(): arglist.append('--inherited') @@ -883,15 +875,16 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) def test_role_remove_user_domain(self): arglist = [ - '--user', identity_fakes.user_name, - '--domain', identity_fakes.domain_name, + '--user', + identity_fakes.user_name, + '--domain', + identity_fakes.domain_name, identity_fakes.role_name, ] if self._is_inheritance_testcase(): @@ -916,8 +909,7 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) @@ -929,9 +921,11 @@ class TestRoleRemove(TestRole): find_mock.side_effect = exceptions.CommandError arglist = [ - '--user', identity_fakes.user_id, - '--domain', identity_fakes.domain_name, - identity_fakes.role_name + '--user', + identity_fakes.user_id, + '--domain', + identity_fakes.domain_name, + identity_fakes.role_name, ] if self._is_inheritance_testcase(): arglist.append('--inherited') @@ -956,15 +950,16 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) def test_role_remove_user_project(self): arglist = [ - '--user', identity_fakes.user_name, - '--project', identity_fakes.project_name, + '--user', + identity_fakes.user_name, + '--project', + identity_fakes.project_name, identity_fakes.role_name, ] if self._is_inheritance_testcase(): @@ -989,8 +984,7 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) @@ -1002,9 +996,11 @@ class TestRoleRemove(TestRole): find_mock.side_effect = exceptions.CommandError arglist = [ - '--user', identity_fakes.user_id, - '--project', identity_fakes.project_name, - identity_fakes.role_name + '--user', + identity_fakes.user_id, + '--project', + identity_fakes.project_name, + identity_fakes.role_name, ] if self._is_inheritance_testcase(): arglist.append('--inherited') @@ -1029,15 +1025,16 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) def test_role_remove_group_system(self): arglist = [ - '--group', identity_fakes.group_name, - '--system', 'all', + '--group', + identity_fakes.group_name, + '--system', + 'all', identity_fakes.role_name, ] if self._is_inheritance_testcase(): @@ -1064,8 +1061,7 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) @@ -1077,9 +1073,11 @@ class TestRoleRemove(TestRole): find_mock.side_effect = exceptions.CommandError arglist = [ - '--group', identity_fakes.group_id, - '--system', 'all', - identity_fakes.role_name + '--group', + identity_fakes.group_id, + '--system', + 'all', + identity_fakes.role_name, ] if self._is_inheritance_testcase(): arglist.append('--inherited') @@ -1104,15 +1102,16 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) def test_role_remove_group_domain(self): arglist = [ - '--group', identity_fakes.group_name, - '--domain', identity_fakes.domain_name, + '--group', + identity_fakes.group_name, + '--domain', + identity_fakes.domain_name, identity_fakes.role_name, ] if self._is_inheritance_testcase(): @@ -1138,8 +1137,7 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) @@ -1151,9 +1149,11 @@ class TestRoleRemove(TestRole): find_mock.side_effect = exceptions.CommandError arglist = [ - '--group', identity_fakes.group_id, - '--domain', identity_fakes.domain_name, - identity_fakes.role_name + '--group', + identity_fakes.group_id, + '--domain', + identity_fakes.domain_name, + identity_fakes.role_name, ] if self._is_inheritance_testcase(): arglist.append('--inherited') @@ -1178,15 +1178,16 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) def test_role_remove_group_project(self): arglist = [ - '--group', identity_fakes.group_name, - '--project', identity_fakes.project_name, + '--group', + identity_fakes.group_name, + '--project', + identity_fakes.project_name, identity_fakes.role_name, ] if self._is_inheritance_testcase(): @@ -1211,8 +1212,7 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) @@ -1224,9 +1224,11 @@ class TestRoleRemove(TestRole): find_mock.side_effect = exceptions.CommandError arglist = [ - '--group', identity_fakes.group_id, - '--project', identity_fakes.project_name, - identity_fakes.role_name + '--group', + identity_fakes.group_id, + '--project', + identity_fakes.project_name, + identity_fakes.role_name, ] if self._is_inheritance_testcase(): arglist.append('--inherited') @@ -1251,8 +1253,7 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) @@ -1263,8 +1264,10 @@ class TestRoleRemove(TestRole): loaded=True, ) arglist = [ - '--group', identity_fakes.group_name, - '--domain', identity_fakes.domain_name, + '--group', + identity_fakes.group_name, + '--domain', + identity_fakes.domain_name, identity_fakes.ROLE_2['name'], ] if self._is_inheritance_testcase(): @@ -1289,8 +1292,7 @@ class TestRoleRemove(TestRole): } # RoleManager.revoke(role, user=, group=, domain=, project=) self.roles_mock.revoke.assert_called_with( - identity_fakes.ROLE_2['id'], - **kwargs + identity_fakes.ROLE_2['id'], **kwargs ) self.assertIsNone(result) @@ -1307,12 +1309,12 @@ class TestRoleRemove(TestRole): ('inherited', False), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - self.assertRaises(exceptions.CommandError, - self.cmd.take_action, parsed_args) + self.assertRaises( + exceptions.CommandError, self.cmd.take_action, parsed_args + ) class TestRoleSet(TestRole): - def setUp(self): super(TestRoleSet, self).setUp() @@ -1328,7 +1330,8 @@ class TestRoleSet(TestRole): def test_role_set_no_options(self): arglist = [ - '--name', 'over', + '--name', + 'over', identity_fakes.role_name, ] verifylist = [ @@ -1347,8 +1350,7 @@ class TestRoleSet(TestRole): } # RoleManager.update(role, name=) self.roles_mock.update.assert_called_with( - identity_fakes.role_id, - **kwargs + identity_fakes.role_id, **kwargs ) self.assertIsNone(result) @@ -1359,8 +1361,10 @@ class TestRoleSet(TestRole): loaded=True, ) arglist = [ - '--name', 'over', - '--domain', identity_fakes.domain_name, + '--name', + 'over', + '--domain', + identity_fakes.domain_name, identity_fakes.ROLE_2['name'], ] verifylist = [ @@ -1380,8 +1384,7 @@ class TestRoleSet(TestRole): } # RoleManager.update(role, name=) self.roles_mock.update.assert_called_with( - identity_fakes.ROLE_2['id'], - **kwargs + identity_fakes.ROLE_2['id'], **kwargs ) self.assertIsNone(result) @@ -1392,8 +1395,10 @@ class TestRoleSet(TestRole): loaded=True, ) arglist = [ - '--name', 'over', - '--description', identity_fakes.role_description, + '--name', + 'over', + '--description', + identity_fakes.role_description, identity_fakes.ROLE_2['name'], ] verifylist = [ @@ -1413,8 +1418,7 @@ class TestRoleSet(TestRole): } # RoleManager.update(role, name=) self.roles_mock.update.assert_called_with( - identity_fakes.ROLE_2['id'], - **kwargs + identity_fakes.ROLE_2['id'], **kwargs ) self.assertIsNone(result) @@ -1425,7 +1429,8 @@ class TestRoleSet(TestRole): loaded=True, ) arglist = [ - '--name', 'over', + '--name', + 'over', '--immutable', identity_fakes.ROLE_2['name'], ] @@ -1446,8 +1451,7 @@ class TestRoleSet(TestRole): } # RoleManager.update(role, name=) self.roles_mock.update.assert_called_with( - identity_fakes.ROLE_2['id'], - **kwargs + identity_fakes.ROLE_2['id'], **kwargs ) self.assertIsNone(result) @@ -1458,7 +1462,8 @@ class TestRoleSet(TestRole): loaded=True, ) arglist = [ - '--name', 'over', + '--name', + 'over', '--no-immutable', identity_fakes.ROLE_2['name'], ] @@ -1479,14 +1484,12 @@ class TestRoleSet(TestRole): } # RoleManager.update(role, name=) self.roles_mock.update.assert_called_with( - identity_fakes.ROLE_2['id'], - **kwargs + identity_fakes.ROLE_2['id'], **kwargs ) self.assertIsNone(result) class TestRoleShow(TestRole): - def setUp(self): super(TestRoleShow, self).setUp() @@ -1534,7 +1537,8 @@ class TestRoleShow(TestRole): loaded=True, ) arglist = [ - '--domain', identity_fakes.domain_name, + '--domain', + identity_fakes.domain_name, identity_fakes.ROLE_2['name'], ] verifylist = [ diff --git a/openstackclient/tests/unit/identity/v3/test_role_assignment.py b/openstackclient/tests/unit/identity/v3/test_role_assignment.py index 7d38d360b..04cb68cb2 100644 --- a/openstackclient/tests/unit/identity/v3/test_role_assignment.py +++ b/openstackclient/tests/unit/identity/v3/test_role_assignment.py @@ -20,13 +20,11 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestRoleAssignment(identity_fakes.TestIdentityv3): - def setUp(self): super(TestRoleAssignment, self).setUp() class TestRoleAssignmentList(TestRoleAssignment): - columns = ( 'Role', 'User', @@ -60,26 +58,28 @@ class TestRoleAssignmentList(TestRoleAssignment): self.roles_mock = self.app.client_manager.identity.roles self.roles_mock.reset_mock() - self.role_assignments_mock = self.app.client_manager.identity.\ - role_assignments + self.role_assignments_mock = ( + self.app.client_manager.identity.role_assignments + ) self.role_assignments_mock.reset_mock() # Get the command object to test self.cmd = role_assignment.ListRoleAssignment(self.app, None) def test_role_assignment_list_no_filters(self): - self.role_assignments_mock.list.return_value = [ fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID), + identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID + ), loaded=True, ), fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_GROUP_ID), + identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_GROUP_ID + ), loaded=True, ), ] @@ -102,47 +102,51 @@ class TestRoleAssignmentList(TestRoleAssignment): user=None, project=None, os_inherit_extension_inherited_to=None, - include_names=False) + include_names=False, + ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.role_id, - identity_fakes.user_id, - '', - identity_fakes.project_id, - '', - '', - False - ), (identity_fakes.role_id, - '', - identity_fakes.group_id, - identity_fakes.project_id, - '', - '', - False - ),) + datalist = ( + ( + identity_fakes.role_id, + identity_fakes.user_id, + '', + identity_fakes.project_id, + '', + '', + False, + ), + ( + identity_fakes.role_id, + '', + identity_fakes.group_id, + identity_fakes.project_id, + '', + '', + False, + ), + ) self.assertEqual(datalist, tuple(data)) def test_role_assignment_list_user(self): - self.role_assignments_mock.list.return_value = [ fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID), + identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID + ), loaded=True, ), fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID), + identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID + ), loaded=True, ), ] - arglist = [ - '--user', identity_fakes.user_name - ] + arglist = ['--user', identity_fakes.user_name] verifylist = [ ('user', identity_fakes.user_name), ('group', None), @@ -170,47 +174,51 @@ class TestRoleAssignmentList(TestRoleAssignment): role=None, effective=False, os_inherit_extension_inherited_to=None, - include_names=False) + include_names=False, + ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.role_id, - identity_fakes.user_id, - '', - '', - identity_fakes.domain_id, - '', - False - ), (identity_fakes.role_id, - identity_fakes.user_id, - '', - identity_fakes.project_id, - '', - '', - False - ),) + datalist = ( + ( + identity_fakes.role_id, + identity_fakes.user_id, + '', + '', + identity_fakes.domain_id, + '', + False, + ), + ( + identity_fakes.role_id, + identity_fakes.user_id, + '', + identity_fakes.project_id, + '', + '', + False, + ), + ) self.assertEqual(datalist, tuple(data)) def test_role_assignment_list_group(self): - self.role_assignments_mock.list.return_value = [ fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_GROUP_ID), + identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_GROUP_ID + ), loaded=True, ), fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_GROUP_ID), + identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_GROUP_ID + ), loaded=True, ), ] - arglist = [ - '--group', identity_fakes.group_name - ] + arglist = ['--group', identity_fakes.group_name] verifylist = [ ('user', None), ('group', identity_fakes.group_name), @@ -238,47 +246,51 @@ class TestRoleAssignmentList(TestRoleAssignment): role=None, user=None, os_inherit_extension_inherited_to=None, - include_names=False) + include_names=False, + ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.role_id, - '', - identity_fakes.group_id, - '', - identity_fakes.domain_id, - '', - False - ), (identity_fakes.role_id, - '', - identity_fakes.group_id, - identity_fakes.project_id, - '', - '', - False - ),) + datalist = ( + ( + identity_fakes.role_id, + '', + identity_fakes.group_id, + '', + identity_fakes.domain_id, + '', + False, + ), + ( + identity_fakes.role_id, + '', + identity_fakes.group_id, + identity_fakes.project_id, + '', + '', + False, + ), + ) self.assertEqual(datalist, tuple(data)) def test_role_assignment_list_domain(self): - self.role_assignments_mock.list.return_value = [ fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID), + identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID + ), loaded=True, ), fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_GROUP_ID), + identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_GROUP_ID + ), loaded=True, ), ] - arglist = [ - '--domain', identity_fakes.domain_name - ] + arglist = ['--domain', identity_fakes.domain_name] verifylist = [ ('user', None), ('group', None), @@ -306,47 +318,51 @@ class TestRoleAssignmentList(TestRoleAssignment): role=None, user=None, os_inherit_extension_inherited_to=None, - include_names=False) + include_names=False, + ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.role_id, - identity_fakes.user_id, - '', - '', - identity_fakes.domain_id, - '', - False - ), (identity_fakes.role_id, - '', - identity_fakes.group_id, - '', - identity_fakes.domain_id, - '', - False - ),) + datalist = ( + ( + identity_fakes.role_id, + identity_fakes.user_id, + '', + '', + identity_fakes.domain_id, + '', + False, + ), + ( + identity_fakes.role_id, + '', + identity_fakes.group_id, + '', + identity_fakes.domain_id, + '', + False, + ), + ) self.assertEqual(datalist, tuple(data)) def test_role_assignment_list_project(self): - self.role_assignments_mock.list.return_value = [ fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID), + identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID + ), loaded=True, ), fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_GROUP_ID), + identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_GROUP_ID + ), loaded=True, ), ] - arglist = [ - '--project', identity_fakes.project_name - ] + arglist = ['--project', identity_fakes.project_name] verifylist = [ ('user', None), ('group', None), @@ -374,29 +390,33 @@ class TestRoleAssignmentList(TestRoleAssignment): role=None, user=None, os_inherit_extension_inherited_to=None, - include_names=False) + include_names=False, + ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.role_id, - identity_fakes.user_id, - '', - identity_fakes.project_id, - '', - '', - False - ), (identity_fakes.role_id, - '', - identity_fakes.group_id, - identity_fakes.project_id, - '', - '', - False - ),) + datalist = ( + ( + identity_fakes.role_id, + identity_fakes.user_id, + '', + identity_fakes.project_id, + '', + '', + False, + ), + ( + identity_fakes.role_id, + '', + identity_fakes.group_id, + identity_fakes.project_id, + '', + '', + False, + ), + ) self.assertEqual(datalist, tuple(data)) def test_role_assignment_list_def_creds(self): - auth_ref = self.app.client_manager.auth_ref = mock.Mock() auth_ref.project_id.return_value = identity_fakes.project_id auth_ref.user_id.return_value = identity_fakes.user_id @@ -405,7 +425,8 @@ class TestRoleAssignmentList(TestRoleAssignment): fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID), + identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID + ), loaded=True, ), ] @@ -443,33 +464,37 @@ class TestRoleAssignmentList(TestRoleAssignment): role=None, effective=False, os_inherit_extension_inherited_to=None, - include_names=False) + include_names=False, + ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.role_id, - identity_fakes.user_id, - '', - identity_fakes.project_id, - '', - '', - False - ),) + datalist = ( + ( + identity_fakes.role_id, + identity_fakes.user_id, + '', + identity_fakes.project_id, + '', + '', + False, + ), + ) self.assertEqual(datalist, tuple(data)) def test_role_assignment_list_effective(self): - self.role_assignments_mock.list.return_value = [ fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID), + identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID + ), loaded=True, ), fakes.FakeResource( None, copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID), + identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID + ), loaded=True, ), ] @@ -502,44 +527,42 @@ class TestRoleAssignmentList(TestRoleAssignment): role=None, user=None, os_inherit_extension_inherited_to=None, - include_names=False) + include_names=False, + ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.role_id, - identity_fakes.user_id, - '', - identity_fakes.project_id, - '', - '', - False - ), (identity_fakes.role_id, - identity_fakes.user_id, - '', - '', - identity_fakes.domain_id, - '', - False - ),) + datalist = ( + ( + identity_fakes.role_id, + identity_fakes.user_id, + '', + identity_fakes.project_id, + '', + '', + False, + ), + ( + identity_fakes.role_id, + identity_fakes.user_id, + '', + '', + identity_fakes.domain_id, + '', + False, + ), + ) self.assertEqual(tuple(data), datalist) def test_role_assignment_list_inherited(self): - + fake_assignment_a = copy.deepcopy( + identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID_INHERITED + ) + fake_assignment_b = copy.deepcopy( + identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID_INHERITED + ) self.role_assignments_mock.list.return_value = [ - fakes.FakeResource( - None, - copy.deepcopy( - (identity_fakes. - ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID_INHERITED)), - loaded=True, - ), - fakes.FakeResource( - None, - copy.deepcopy( - (identity_fakes. - ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID_INHERITED)), - loaded=True, - ), + fakes.FakeResource(None, fake_assignment_a, loaded=True), + fakes.FakeResource(None, fake_assignment_b, loaded=True), ] arglist = ['--inherited'] @@ -570,44 +593,42 @@ class TestRoleAssignmentList(TestRoleAssignment): role=None, user=None, os_inherit_extension_inherited_to='projects', - include_names=False) + include_names=False, + ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.role_id, - identity_fakes.user_id, - '', - identity_fakes.project_id, - '', - '', - True - ), (identity_fakes.role_id, - identity_fakes.user_id, - '', - '', - identity_fakes.domain_id, - '', - True - ),) + datalist = ( + ( + identity_fakes.role_id, + identity_fakes.user_id, + '', + identity_fakes.project_id, + '', + '', + True, + ), + ( + identity_fakes.role_id, + identity_fakes.user_id, + '', + '', + identity_fakes.domain_id, + '', + True, + ), + ) self.assertEqual(datalist, tuple(data)) def test_role_assignment_list_include_names(self): - + fake_role_assignment_a = copy.deepcopy( + identity_fakes.ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID_INCLUDE_NAMES + ) + fake_role_assignment_b = copy.deepcopy( + identity_fakes.ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID_INCLUDE_NAMES + ) self.role_assignments_mock.list.return_value = [ - fakes.FakeResource( - None, - copy.deepcopy( - identity_fakes - .ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID_INCLUDE_NAMES), - loaded=True, - ), - fakes.FakeResource( - None, - copy.deepcopy( - identity_fakes - .ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID_INCLUDE_NAMES), - loaded=True, - ), + fakes.FakeResource(None, fake_role_assignment_a, loaded=True), + fakes.FakeResource(None, fake_role_assignment_b, loaded=True), ] arglist = ['--names'] @@ -640,46 +661,62 @@ class TestRoleAssignmentList(TestRoleAssignment): role=None, user=None, os_inherit_extension_inherited_to=None, - include_names=True) + include_names=True, + ) collist = ( - 'Role', 'User', 'Group', 'Project', 'Domain', 'System', 'Inherited' + 'Role', + 'User', + 'Group', + 'Project', + 'Domain', + 'System', + 'Inherited', ) self.assertEqual(columns, collist) - datalist1 = (( - identity_fakes.role_name, - '@'.join([identity_fakes.user_name, identity_fakes.domain_name]), - '', - '@'.join([identity_fakes.project_name, - identity_fakes.domain_name]), - '', - '', - False - ), (identity_fakes.role_name, - '@'.join([identity_fakes.user_name, identity_fakes.domain_name]), - '', - '', - identity_fakes.domain_name, - '', - False - ),) + datalist1 = ( + ( + identity_fakes.role_name, + '@'.join( + [identity_fakes.user_name, identity_fakes.domain_name] + ), + '', + '@'.join( + [identity_fakes.project_name, identity_fakes.domain_name] + ), + '', + '', + False, + ), + ( + identity_fakes.role_name, + '@'.join( + [identity_fakes.user_name, identity_fakes.domain_name] + ), + '', + '', + identity_fakes.domain_name, + '', + False, + ), + ) self.assertEqual(tuple(data), datalist1) def test_role_assignment_list_domain_role(self): - self.role_assignments_mock.list.return_value = [ fakes.FakeResource( None, - copy.deepcopy( - identity_fakes.ASSIGNMENT_WITH_DOMAIN_ROLE), + copy.deepcopy(identity_fakes.ASSIGNMENT_WITH_DOMAIN_ROLE), loaded=True, ), ] arglist = [ - '--role', identity_fakes.ROLE_2['name'], - '--role-domain', identity_fakes.domain_name + '--role', + identity_fakes.ROLE_2['name'], + '--role-domain', + identity_fakes.domain_name, ] verifylist = [ ('user', None), @@ -708,16 +745,19 @@ class TestRoleAssignmentList(TestRoleAssignment): role=self.roles_mock.get(), effective=False, os_inherit_extension_inherited_to=None, - include_names=False) + include_names=False, + ) self.assertEqual(self.columns, columns) - datalist = (( - identity_fakes.ROLE_2['id'], - identity_fakes.user_id, - '', - '', - identity_fakes.domain_id, - '', - False - ),) + datalist = ( + ( + identity_fakes.ROLE_2['id'], + identity_fakes.user_id, + '', + '', + identity_fakes.domain_id, + '', + False, + ), + ) self.assertEqual(datalist, tuple(data)) diff --git a/openstackclient/tests/unit/identity/v3/test_service.py b/openstackclient/tests/unit/identity/v3/test_service.py index 4cba445bf..8143ddd56 100644 --- a/openstackclient/tests/unit/identity/v3/test_service.py +++ b/openstackclient/tests/unit/identity/v3/test_service.py @@ -21,7 +21,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestService(identity_fakes.TestIdentityv3): - def setUp(self): super(TestService, self).setUp() @@ -31,7 +30,6 @@ class TestService(identity_fakes.TestIdentityv3): class TestServiceCreate(TestService): - columns = ( 'description', 'enabled', @@ -58,7 +56,8 @@ class TestServiceCreate(TestService): def test_service_create_name(self): arglist = [ - '--name', self.service.name, + '--name', + self.service.name, self.service.type, ] verifylist = [ @@ -88,7 +87,8 @@ class TestServiceCreate(TestService): def test_service_create_description(self): arglist = [ - '--description', self.service.description, + '--description', + self.service.description, self.service.type, ] verifylist = [ @@ -178,7 +178,6 @@ class TestServiceCreate(TestService): class TestServiceDelete(TestService): - service = identity_fakes.FakeService.create_one_service() def setUp(self): @@ -209,7 +208,6 @@ class TestServiceDelete(TestService): class TestServiceList(TestService): - service = identity_fakes.FakeService.create_one_service() def setUp(self): @@ -234,11 +232,13 @@ class TestServiceList(TestService): collist = ('ID', 'Name', 'Type') self.assertEqual(collist, columns) - datalist = (( - self.service.id, - self.service.name, - self.service.type, - ), ) + datalist = ( + ( + self.service.id, + self.service.name, + self.service.type, + ), + ) self.assertEqual(datalist, tuple(data)) def test_service_list_long(self): @@ -259,18 +259,19 @@ class TestServiceList(TestService): collist = ('ID', 'Name', 'Type', 'Description', 'Enabled') self.assertEqual(collist, columns) - datalist = (( - self.service.id, - self.service.name, - self.service.type, - self.service.description, - True, - ), ) + datalist = ( + ( + self.service.id, + self.service.name, + self.service.type, + self.service.description, + True, + ), + ) self.assertEqual(datalist, tuple(data)) class TestServiceSet(TestService): - service = identity_fakes.FakeService.create_one_service() def setUp(self): @@ -303,7 +304,8 @@ class TestServiceSet(TestService): def test_service_set_type(self): arglist = [ - '--type', self.service.type, + '--type', + self.service.type, self.service.name, ] verifylist = [ @@ -323,15 +325,13 @@ class TestServiceSet(TestService): 'type': self.service.type, } # ServiceManager.update(service, name=, type=, enabled=, **kwargs) - self.services_mock.update.assert_called_with( - self.service.id, - **kwargs - ) + self.services_mock.update.assert_called_with(self.service.id, **kwargs) self.assertIsNone(result) def test_service_set_name(self): arglist = [ - '--name', self.service.name, + '--name', + self.service.name, self.service.name, ] verifylist = [ @@ -351,15 +351,13 @@ class TestServiceSet(TestService): 'name': self.service.name, } # ServiceManager.update(service, name=, type=, enabled=, **kwargs) - self.services_mock.update.assert_called_with( - self.service.id, - **kwargs - ) + self.services_mock.update.assert_called_with(self.service.id, **kwargs) self.assertIsNone(result) def test_service_set_description(self): arglist = [ - '--description', self.service.description, + '--description', + self.service.description, self.service.name, ] verifylist = [ @@ -379,10 +377,7 @@ class TestServiceSet(TestService): 'description': self.service.description, } # ServiceManager.update(service, name=, type=, enabled=, **kwargs) - self.services_mock.update.assert_called_with( - self.service.id, - **kwargs - ) + self.services_mock.update.assert_called_with(self.service.id, **kwargs) self.assertIsNone(result) def test_service_set_enable(self): @@ -407,10 +402,7 @@ class TestServiceSet(TestService): 'enabled': True, } # ServiceManager.update(service, name=, type=, enabled=, **kwargs) - self.services_mock.update.assert_called_with( - self.service.id, - **kwargs - ) + self.services_mock.update.assert_called_with(self.service.id, **kwargs) self.assertIsNone(result) def test_service_set_disable(self): @@ -435,15 +427,11 @@ class TestServiceSet(TestService): 'enabled': False, } # ServiceManager.update(service, name=, type=, enabled=, **kwargs) - self.services_mock.update.assert_called_with( - self.service.id, - **kwargs - ) + self.services_mock.update.assert_called_with(self.service.id, **kwargs) self.assertIsNone(result) class TestServiceShow(TestService): - service = identity_fakes.FakeService.create_one_service() def setUp(self): @@ -470,9 +458,7 @@ class TestServiceShow(TestService): columns, data = self.cmd.take_action(parsed_args) # ServiceManager.get(id) - self.services_mock.find.assert_called_with( - name=self.service.name - ) + self.services_mock.find.assert_called_with(name=self.service.name) collist = ('description', 'enabled', 'id', 'name', 'type') self.assertEqual(collist, columns) @@ -501,4 +487,6 @@ class TestServiceShow(TestService): except exceptions.CommandError as e: self.assertEqual( "Multiple service matches found for 'nounique_service'," - " use an ID to be more specific.", str(e)) + " use an ID to be more specific.", + str(e), + ) diff --git a/openstackclient/tests/unit/identity/v3/test_service_provider.py b/openstackclient/tests/unit/identity/v3/test_service_provider.py index 57473ef95..59117da93 100644 --- a/openstackclient/tests/unit/identity/v3/test_service_provider.py +++ b/openstackclient/tests/unit/identity/v3/test_service_provider.py @@ -20,7 +20,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as service_fakes class TestServiceProvider(service_fakes.TestFederatedIdentity): - def setUp(self): super(TestServiceProvider, self).setUp() @@ -30,7 +29,6 @@ class TestServiceProvider(service_fakes.TestFederatedIdentity): class TestServiceProviderCreate(TestServiceProvider): - columns = ( 'auth_url', 'description', @@ -43,7 +41,7 @@ class TestServiceProviderCreate(TestServiceProvider): service_fakes.sp_description, True, service_fakes.sp_id, - service_fakes.service_provider_url + service_fakes.service_provider_url, ) def setUp(self): @@ -56,15 +54,16 @@ class TestServiceProviderCreate(TestServiceProvider): def test_create_service_provider_required_options_only(self): arglist = [ - '--auth-url', service_fakes.sp_auth_url, - '--service-provider-url', service_fakes.service_provider_url, + '--auth-url', + service_fakes.sp_auth_url, + '--service-provider-url', + service_fakes.service_provider_url, service_fakes.sp_id, ] verifylist = [ ('auth_url', service_fakes.sp_auth_url), ('service_provider_url', service_fakes.service_provider_url), ('service_provider_id', service_fakes.sp_id), - ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) columns, data = self.cmd.take_action(parsed_args) @@ -74,23 +73,24 @@ class TestServiceProviderCreate(TestServiceProvider): 'enabled': True, 'description': None, 'auth_url': service_fakes.sp_auth_url, - 'sp_url': service_fakes.service_provider_url + 'sp_url': service_fakes.service_provider_url, } self.service_providers_mock.create.assert_called_with( - id=service_fakes.sp_id, - **kwargs + id=service_fakes.sp_id, **kwargs ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_create_service_provider_description(self): - arglist = [ - '--description', service_fakes.sp_description, - '--auth-url', service_fakes.sp_auth_url, - '--service-provider-url', service_fakes.service_provider_url, + '--description', + service_fakes.sp_description, + '--auth-url', + service_fakes.sp_auth_url, + '--service-provider-url', + service_fakes.service_provider_url, service_fakes.sp_id, ] verifylist = [ @@ -112,15 +112,13 @@ class TestServiceProviderCreate(TestServiceProvider): } self.service_providers_mock.create.assert_called_with( - id=service_fakes.sp_id, - **kwargs + id=service_fakes.sp_id, **kwargs ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_create_service_provider_disabled(self): - # Prepare FakeResource object service_provider = copy.deepcopy(service_fakes.SERVICE_PROVIDER) service_provider['enabled'] = False @@ -130,8 +128,10 @@ class TestServiceProviderCreate(TestServiceProvider): self.service_providers_mock.create.return_value = resource arglist = [ - '--auth-url', service_fakes.sp_auth_url, - '--service-provider-url', service_fakes.service_provider_url, + '--auth-url', + service_fakes.sp_auth_url, + '--service-provider-url', + service_fakes.service_provider_url, '--disable', service_fakes.sp_id, ] @@ -151,8 +151,7 @@ class TestServiceProviderCreate(TestServiceProvider): } self.service_providers_mock.create.assert_called_with( - id=service_fakes.sp_id, - **kwargs + id=service_fakes.sp_id, **kwargs ) self.assertEqual(self.columns, columns) datalist = ( @@ -160,13 +159,12 @@ class TestServiceProviderCreate(TestServiceProvider): None, False, service_fakes.sp_id, - service_fakes.service_provider_url + service_fakes.service_provider_url, ) self.assertEqual(datalist, data) class TestServiceProviderDelete(TestServiceProvider): - def setUp(self): super(TestServiceProviderDelete, self).setUp() @@ -198,7 +196,6 @@ class TestServiceProviderDelete(TestServiceProvider): class TestServiceProviderList(TestServiceProvider): - def setUp(self): super(TestServiceProviderList, self).setUp() @@ -232,17 +229,18 @@ class TestServiceProviderList(TestServiceProvider): collist = ('ID', 'Enabled', 'Description', 'Auth URL') self.assertEqual(collist, columns) - datalist = (( - service_fakes.sp_id, - True, - service_fakes.sp_description, - service_fakes.sp_auth_url - ), ) + datalist = ( + ( + service_fakes.sp_id, + True, + service_fakes.sp_description, + service_fakes.sp_auth_url, + ), + ) self.assertEqual(tuple(data), datalist) class TestServiceProviderSet(TestServiceProvider): - columns = ( 'auth_url', 'description', @@ -272,16 +270,13 @@ class TestServiceProviderSet(TestServiceProvider): """Prepare fake return objects before the test is executed""" updated_sp = copy.deepcopy(service_fakes.SERVICE_PROVIDER) updated_sp['enabled'] = False - resources = fakes.FakeResource( - None, - updated_sp, - loaded=True - ) + resources = fakes.FakeResource(None, updated_sp, loaded=True) self.service_providers_mock.update.return_value = resources prepare(self) arglist = [ - '--disable', service_fakes.sp_id, + '--disable', + service_fakes.sp_id, ] verifylist = [ ('service_provider', service_fakes.sp_id), @@ -295,7 +290,7 @@ class TestServiceProviderSet(TestServiceProvider): enabled=False, description=None, auth_url=None, - sp_url=None + sp_url=None, ) def test_service_provider_enable(self): @@ -309,13 +304,14 @@ class TestServiceProviderSet(TestServiceProvider): resources = fakes.FakeResource( None, copy.deepcopy(service_fakes.SERVICE_PROVIDER), - loaded=True + loaded=True, ) self.service_providers_mock.update.return_value = resources prepare(self) arglist = [ - '--enable', service_fakes.sp_id, + '--enable', + service_fakes.sp_id, ] verifylist = [ ('service_provider', service_fakes.sp_id), @@ -326,8 +322,12 @@ class TestServiceProviderSet(TestServiceProvider): self.cmd.take_action(parsed_args) self.service_providers_mock.update.assert_called_with( - service_fakes.sp_id, enabled=True, description=None, - auth_url=None, sp_url=None) + service_fakes.sp_id, + enabled=True, + description=None, + auth_url=None, + sp_url=None, + ) def test_service_provider_no_options(self): def prepare(self): @@ -335,7 +335,7 @@ class TestServiceProviderSet(TestServiceProvider): resources = fakes.FakeResource( None, copy.deepcopy(service_fakes.SERVICE_PROVIDER), - loaded=True + loaded=True, ) self.service_providers_mock.get.return_value = resources @@ -364,7 +364,6 @@ class TestServiceProviderSet(TestServiceProvider): class TestServiceProviderShow(TestServiceProvider): - def setUp(self): super(TestServiceProviderShow, self).setUp() @@ -373,8 +372,10 @@ class TestServiceProviderShow(TestServiceProvider): copy.deepcopy(service_fakes.SERVICE_PROVIDER), loaded=True, ) - self.service_providers_mock.get.side_effect = [Exception("Not found"), - ret] + self.service_providers_mock.get.side_effect = [ + Exception("Not found"), + ret, + ] self.service_providers_mock.get.return_value = ret # Get the command object to test @@ -392,8 +393,7 @@ class TestServiceProviderShow(TestServiceProvider): columns, data = self.cmd.take_action(parsed_args) self.service_providers_mock.get.assert_called_with( - service_fakes.sp_id, - id='BETA' + service_fakes.sp_id, id='BETA' ) collist = ('auth_url', 'description', 'enabled', 'id', 'sp_url') @@ -403,6 +403,6 @@ class TestServiceProviderShow(TestServiceProvider): service_fakes.sp_description, True, service_fakes.sp_id, - service_fakes.service_provider_url + service_fakes.service_provider_url, ) self.assertEqual(data, datalist) diff --git a/openstackclient/tests/unit/identity/v3/test_token.py b/openstackclient/tests/unit/identity/v3/test_token.py index adb491b30..80d5dc195 100644 --- a/openstackclient/tests/unit/identity/v3/test_token.py +++ b/openstackclient/tests/unit/identity/v3/test_token.py @@ -20,7 +20,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestToken(identity_fakes.TestIdentityv3): - def setUp(self): super(TestToken, self).setUp() @@ -30,7 +29,6 @@ class TestToken(identity_fakes.TestIdentityv3): class TestTokenIssue(TestToken): - def setUp(self): super(TestTokenIssue, self).setUp() @@ -117,7 +115,6 @@ class TestTokenIssue(TestToken): class TestTokenRevoke(TestToken): - TOKEN = 'fob' def setUp(self): diff --git a/openstackclient/tests/unit/identity/v3/test_trust.py b/openstackclient/tests/unit/identity/v3/test_trust.py index d530adf5a..67e64cea3 100644 --- a/openstackclient/tests/unit/identity/v3/test_trust.py +++ b/openstackclient/tests/unit/identity/v3/test_trust.py @@ -23,7 +23,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestTrust(identity_fakes.TestIdentityv3): - def setUp(self): super(TestTrust, self).setUp() @@ -38,7 +37,6 @@ class TestTrust(identity_fakes.TestIdentityv3): class TestTrustCreate(TestTrust): - def setUp(self): super(TestTrustCreate, self).setUp() @@ -71,10 +69,12 @@ class TestTrustCreate(TestTrust): def test_trust_create_basic(self): arglist = [ - '--project', identity_fakes.project_id, - '--role', identity_fakes.role_id, + '--project', + identity_fakes.project_id, + '--role', + identity_fakes.role_id, + identity_fakes.user_id, identity_fakes.user_id, - identity_fakes.user_id ] verifylist = [ ('project', identity_fakes.project_id), @@ -100,13 +100,18 @@ class TestTrustCreate(TestTrust): # TrustManager.create(trustee_id, trustor_id, impersonation=, # project=, role_names=, expires_at=) self.trusts_mock.create.assert_called_with( - identity_fakes.user_id, - identity_fakes.user_id, - **kwargs + identity_fakes.user_id, identity_fakes.user_id, **kwargs ) - collist = ('expires_at', 'id', 'impersonation', 'project_id', - 'roles', 'trustee_user_id', 'trustor_user_id') + collist = ( + 'expires_at', + 'id', + 'impersonation', + 'project_id', + 'roles', + 'trustee_user_id', + 'trustor_user_id', + ) self.assertEqual(collist, columns) datalist = ( identity_fakes.trust_expires, @@ -115,13 +120,12 @@ class TestTrustCreate(TestTrust): identity_fakes.project_id, identity_fakes.role_name, identity_fakes.user_id, - identity_fakes.user_id + identity_fakes.user_id, ) self.assertEqual(datalist, data) class TestTrustDelete(TestTrust): - def setUp(self): super(TestTrustDelete, self).setUp() @@ -140,9 +144,7 @@ class TestTrustDelete(TestTrust): arglist = [ identity_fakes.trust_id, ] - verifylist = [ - ('trust', [identity_fakes.trust_id]) - ] + verifylist = [('trust', [identity_fakes.trust_id])] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) @@ -154,8 +156,10 @@ class TestTrustDelete(TestTrust): @mock.patch.object(utils, 'find_resource') def test_delete_multi_trusts_with_exception(self, find_mock): - find_mock.side_effect = [self.trusts_mock.get.return_value, - exceptions.CommandError] + find_mock.side_effect = [ + self.trusts_mock.get.return_value, + exceptions.CommandError, + ] arglist = [ identity_fakes.trust_id, 'unexist_trust', @@ -169,19 +173,18 @@ class TestTrustDelete(TestTrust): self.cmd.take_action(parsed_args) self.fail('CommandError should be raised.') except exceptions.CommandError as e: - self.assertEqual('1 of 2 trusts failed to delete.', - str(e)) + self.assertEqual('1 of 2 trusts failed to delete.', str(e)) find_mock.assert_any_call(self.trusts_mock, identity_fakes.trust_id) find_mock.assert_any_call(self.trusts_mock, 'unexist_trust') self.assertEqual(2, find_mock.call_count) self.trusts_mock.delete.assert_called_once_with( - identity_fakes.trust_id) + identity_fakes.trust_id + ) class TestTrustList(TestTrust): - def setUp(self): super(TestTrustList, self).setUp() @@ -211,17 +214,25 @@ class TestTrustList(TestTrust): trustee_user=None, ) - collist = ('ID', 'Expires At', 'Impersonation', 'Project ID', - 'Trustee User ID', 'Trustor User ID') + collist = ( + 'ID', + 'Expires At', + 'Impersonation', + 'Project ID', + 'Trustee User ID', + 'Trustor User ID', + ) self.assertEqual(collist, columns) - datalist = (( - identity_fakes.trust_id, - identity_fakes.trust_expires, - identity_fakes.trust_impersonation, - identity_fakes.project_id, - identity_fakes.user_id, - identity_fakes.user_id - ), ) + datalist = ( + ( + identity_fakes.trust_id, + identity_fakes.trust_expires, + identity_fakes.trust_impersonation, + identity_fakes.project_id, + identity_fakes.user_id, + identity_fakes.user_id, + ), + ) self.assertEqual(datalist, tuple(data)) def test_trust_list_auth_user(self): @@ -248,17 +259,25 @@ class TestTrustList(TestTrust): trustee_user=self.users_mock.get() ) - collist = ('ID', 'Expires At', 'Impersonation', 'Project ID', - 'Trustee User ID', 'Trustor User ID') + collist = ( + 'ID', + 'Expires At', + 'Impersonation', + 'Project ID', + 'Trustee User ID', + 'Trustor User ID', + ) self.assertEqual(collist, columns) - datalist = (( - identity_fakes.trust_id, - identity_fakes.trust_expires, - identity_fakes.trust_impersonation, - identity_fakes.project_id, - identity_fakes.user_id, - identity_fakes.user_id - ), ) + datalist = ( + ( + identity_fakes.trust_id, + identity_fakes.trust_expires, + identity_fakes.trust_impersonation, + identity_fakes.project_id, + identity_fakes.user_id, + identity_fakes.user_id, + ), + ) self.assertEqual(datalist, tuple(data)) def test_trust_list_trustee(self): @@ -281,17 +300,25 @@ class TestTrustList(TestTrust): trustor_user=None, ) - collist = ('ID', 'Expires At', 'Impersonation', 'Project ID', - 'Trustee User ID', 'Trustor User ID') + collist = ( + 'ID', + 'Expires At', + 'Impersonation', + 'Project ID', + 'Trustee User ID', + 'Trustor User ID', + ) self.assertEqual(collist, columns) - datalist = (( - identity_fakes.trust_id, - identity_fakes.trust_expires, - identity_fakes.trust_impersonation, - identity_fakes.project_id, - identity_fakes.user_id, - identity_fakes.user_id - ), ) + datalist = ( + ( + identity_fakes.trust_id, + identity_fakes.trust_expires, + identity_fakes.trust_impersonation, + identity_fakes.project_id, + identity_fakes.user_id, + identity_fakes.user_id, + ), + ) self.assertEqual(datalist, tuple(data)) def test_trust_list_trustor(self): @@ -314,22 +341,29 @@ class TestTrustList(TestTrust): trustee_user=None, ) - collist = ('ID', 'Expires At', 'Impersonation', 'Project ID', - 'Trustee User ID', 'Trustor User ID') + collist = ( + 'ID', + 'Expires At', + 'Impersonation', + 'Project ID', + 'Trustee User ID', + 'Trustor User ID', + ) self.assertEqual(collist, columns) - datalist = (( - identity_fakes.trust_id, - identity_fakes.trust_expires, - identity_fakes.trust_impersonation, - identity_fakes.project_id, - identity_fakes.user_id, - identity_fakes.user_id - ), ) + datalist = ( + ( + identity_fakes.trust_id, + identity_fakes.trust_expires, + identity_fakes.trust_impersonation, + identity_fakes.project_id, + identity_fakes.user_id, + identity_fakes.user_id, + ), + ) self.assertEqual(datalist, tuple(data)) class TestTrustShow(TestTrust): - def setUp(self): super(TestTrustShow, self).setUp() @@ -358,8 +392,15 @@ class TestTrustShow(TestTrust): self.trusts_mock.get.assert_called_with(identity_fakes.trust_id) - collist = ('expires_at', 'id', 'impersonation', 'project_id', - 'roles', 'trustee_user_id', 'trustor_user_id') + collist = ( + 'expires_at', + 'id', + 'impersonation', + 'project_id', + 'roles', + 'trustee_user_id', + 'trustor_user_id', + ) self.assertEqual(collist, columns) datalist = ( identity_fakes.trust_expires, @@ -368,6 +409,6 @@ class TestTrustShow(TestTrust): identity_fakes.project_id, identity_fakes.role_name, identity_fakes.user_id, - identity_fakes.user_id + identity_fakes.user_id, ) self.assertEqual(datalist, data) diff --git a/openstackclient/tests/unit/identity/v3/test_unscoped_saml.py b/openstackclient/tests/unit/identity/v3/test_unscoped_saml.py index 34655263f..fcc72bd6d 100644 --- a/openstackclient/tests/unit/identity/v3/test_unscoped_saml.py +++ b/openstackclient/tests/unit/identity/v3/test_unscoped_saml.py @@ -18,7 +18,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestUnscopedSAML(identity_fakes.TestFederatedIdentity): - def setUp(self): super(TestUnscopedSAML, self).setUp() @@ -30,7 +29,6 @@ class TestUnscopedSAML(identity_fakes.TestFederatedIdentity): class TestDomainList(TestUnscopedSAML): - def setUp(self): super(TestDomainList, self).setUp() @@ -59,17 +57,18 @@ class TestDomainList(TestUnscopedSAML): collist = ('ID', 'Enabled', 'Name', 'Description') self.assertEqual(collist, columns) - datalist = (( - identity_fakes.domain_id, - True, - identity_fakes.domain_name, - identity_fakes.domain_description, - ), ) + datalist = ( + ( + identity_fakes.domain_id, + True, + identity_fakes.domain_name, + identity_fakes.domain_description, + ), + ) self.assertEqual(datalist, tuple(data)) class TestProjectList(TestUnscopedSAML): - def setUp(self): super(TestProjectList, self).setUp() @@ -98,10 +97,12 @@ class TestProjectList(TestUnscopedSAML): collist = ('ID', 'Domain ID', 'Enabled', 'Name') self.assertEqual(collist, columns) - datalist = (( - identity_fakes.project_id, - identity_fakes.domain_id, - True, - identity_fakes.project_name, - ), ) + datalist = ( + ( + identity_fakes.project_id, + identity_fakes.domain_id, + True, + identity_fakes.project_name, + ), + ) self.assertEqual(datalist, tuple(data)) diff --git a/openstackclient/tests/unit/identity/v3/test_user.py b/openstackclient/tests/unit/identity/v3/test_user.py index c71435bac..15ebd67ed 100644 --- a/openstackclient/tests/unit/identity/v3/test_user.py +++ b/openstackclient/tests/unit/identity/v3/test_user.py @@ -25,7 +25,6 @@ from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes class TestUser(identity_fakes.TestIdentityv3): - def setUp(self): super(TestUser, self).setUp() @@ -46,13 +45,13 @@ class TestUser(identity_fakes.TestIdentityv3): self.users_mock.reset_mock() # Shortcut for RoleAssignmentManager Mock - self.role_assignments_mock = self.app.client_manager.identity.\ - role_assignments + self.role_assignments_mock = ( + self.app.client_manager.identity.role_assignments + ) self.role_assignments_mock.reset_mock() class TestUserCreate(TestUser): - domain = identity_fakes.FakeDomain.create_one_domain() project = identity_fakes.FakeProject.create_one_project() @@ -69,8 +68,10 @@ class TestUserCreate(TestUser): super(TestUserCreate, self).setUp() self.user = identity_fakes.FakeUser.create_one_user( - attrs={'domain_id': self.domain.id, - 'default_project_id': self.project.id} + attrs={ + 'domain_id': self.domain.id, + 'default_project_id': self.project.id, + } ) self.datalist = ( self.project.id, @@ -118,16 +119,15 @@ class TestUserCreate(TestUser): # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_user_create_password(self): arglist = [ - '--password', 'secret', + '--password', + 'secret', self.user.name, ] verifylist = [ @@ -157,9 +157,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -198,16 +196,15 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_user_create_email(self): arglist = [ - '--email', 'barney@example.com', + '--email', + 'barney@example.com', self.user.name, ] verifylist = [ @@ -236,16 +233,15 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_user_create_project(self): arglist = [ - '--project', self.project.name, + '--project', + self.project.name, self.user.name, ] verifylist = [ @@ -274,9 +270,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) datalist = ( @@ -291,8 +285,10 @@ class TestUserCreate(TestUser): def test_user_create_project_domain(self): arglist = [ - '--project', self.project.name, - '--project-domain', self.project.domain_id, + '--project', + self.project.name, + '--project-domain', + self.project.domain_id, self.user.name, ] verifylist = [ @@ -322,9 +318,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) datalist = ( @@ -339,7 +333,8 @@ class TestUserCreate(TestUser): def test_user_create_domain(self): arglist = [ - '--domain', self.domain.name, + '--domain', + self.domain.name, self.user.name, ] verifylist = [ @@ -368,9 +363,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -405,9 +398,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -441,9 +432,7 @@ class TestUserCreate(TestUser): 'password': None, } # users.create(name=, password, email, tenant_id=None, enabled=True) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -478,9 +467,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -516,9 +503,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -554,9 +539,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -592,9 +575,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -630,9 +611,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -668,9 +647,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -706,9 +683,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -744,9 +719,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -782,9 +755,7 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -820,22 +791,24 @@ class TestUserCreate(TestUser): } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) def test_user_create_option_with_multi_factor_auth_rule(self): arglist = [ - '--multi-factor-auth-rule', identity_fakes.mfa_opt1, - '--multi-factor-auth-rule', identity_fakes.mfa_opt2, + '--multi-factor-auth-rule', + identity_fakes.mfa_opt1, + '--multi-factor-auth-rule', + identity_fakes.mfa_opt2, self.user.name, ] verifylist = [ - ('multi_factor_auth_rule', [identity_fakes.mfa_opt1, - identity_fakes.mfa_opt2]), + ( + 'multi_factor_auth_rule', + [identity_fakes.mfa_opt1, identity_fakes.mfa_opt2], + ), ('enable', False), ('disable', False), ('name', self.user.name), @@ -855,15 +828,14 @@ class TestUserCreate(TestUser): 'domain': None, 'email': None, 'enabled': True, - 'options': {'multi_factor_auth_rules': [["password", "totp"], - ["password"]]}, + 'options': { + 'multi_factor_auth_rules': [["password", "totp"], ["password"]] + }, 'password': None, } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) @@ -872,7 +844,8 @@ class TestUserCreate(TestUser): arglist = [ '--ignore-password-expiry', '--disable-multi-factor-auth', - '--multi-factor-auth-rule', identity_fakes.mfa_opt1, + '--multi-factor-auth-rule', + identity_fakes.mfa_opt1, self.user.name, ] verifylist = [ @@ -898,23 +871,22 @@ class TestUserCreate(TestUser): 'domain': None, 'email': None, 'enabled': True, - 'options': {'ignore_password_expiry': True, - 'multi_factor_auth_enabled': False, - 'multi_factor_auth_rules': [["password", "totp"]]}, + 'options': { + 'ignore_password_expiry': True, + 'multi_factor_auth_enabled': False, + 'multi_factor_auth_rules': [["password", "totp"]], + }, 'password': None, } # UserManager.create(name=, domain=, project=, password=, email=, # description=, enabled=, default_project=) - self.users_mock.create.assert_called_with( - **kwargs - ) + self.users_mock.create.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, data) class TestUserDelete(TestUser): - user = identity_fakes.FakeUser.create_one_user() def setUp(self): @@ -945,8 +917,7 @@ class TestUserDelete(TestUser): @mock.patch.object(utils, 'find_resource') def test_delete_multi_users_with_exception(self, find_mock): - find_mock.side_effect = [self.user, - exceptions.CommandError] + find_mock.side_effect = [self.user, exceptions.CommandError] arglist = [ self.user.id, 'unexist_user', @@ -960,8 +931,7 @@ class TestUserDelete(TestUser): self.cmd.take_action(parsed_args) self.fail('CommandError should be raised.') except exceptions.CommandError as e: - self.assertEqual('1 of 2 users failed to delete.', - str(e)) + self.assertEqual('1 of 2 users failed to delete.', str(e)) find_mock.assert_any_call(self.users_mock, self.user.id) find_mock.assert_any_call(self.users_mock, 'unexist_user') @@ -971,22 +941,19 @@ class TestUserDelete(TestUser): class TestUserList(TestUser): - domain = identity_fakes.FakeDomain.create_one_domain() project = identity_fakes.FakeProject.create_one_project() user = identity_fakes.FakeUser.create_one_user( - attrs={'domain_id': domain.id, - 'default_project_id': project.id} + attrs={'domain_id': domain.id, 'default_project_id': project.id} ) group = identity_fakes.FakeGroup.create_one_group() role_assignment = ( identity_fakes.FakeRoleAssignment.create_one_role_assignment( - attrs={'user': {'id': user.id}})) + attrs={'user': {'id': user.id}} + ) + ) - columns = [ - 'ID', - 'Name' - ] + columns = ['ID', 'Name'] datalist = ( ( user.id, @@ -1023,16 +990,15 @@ class TestUserList(TestUser): 'group': None, } - self.users_mock.list.assert_called_with( - **kwargs - ) + self.users_mock.list.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) def test_user_list_domain(self): arglist = [ - '--domain', self.domain.id, + '--domain', + self.domain.id, ] verifylist = [ ('domain', self.domain.id), @@ -1050,16 +1016,15 @@ class TestUserList(TestUser): 'group': None, } - self.users_mock.list.assert_called_with( - **kwargs - ) + self.users_mock.list.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) def test_user_list_group(self): arglist = [ - '--group', self.group.name, + '--group', + self.group.name, ] verifylist = [ ('group', self.group.name), @@ -1077,9 +1042,7 @@ class TestUserList(TestUser): 'group': self.group.id, } - self.users_mock.list.assert_called_with( - **kwargs - ) + self.users_mock.list.assert_called_with(**kwargs) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) @@ -1104,9 +1067,7 @@ class TestUserList(TestUser): 'group': None, } - self.users_mock.list.assert_called_with( - **kwargs - ) + self.users_mock.list.assert_called_with(**kwargs) collist = [ 'ID', @@ -1133,7 +1094,8 @@ class TestUserList(TestUser): def test_user_list_project(self): arglist = [ - '--project', self.project.name, + '--project', + self.project.name, ] verifylist = [ ('project', self.project.name), @@ -1157,15 +1119,13 @@ class TestUserList(TestUser): class TestUserSet(TestUser): - project = identity_fakes.FakeProject.create_one_project() domain = identity_fakes.FakeDomain.create_one_domain() user = identity_fakes.FakeUser.create_one_user( attrs={'default_project_id': project.id} ) user2 = identity_fakes.FakeUser.create_one_user( - attrs={'default_project_id': project.id, - 'domain_id': domain.id} + attrs={'default_project_id': project.id, 'domain_id': domain.id} ) def setUp(self): @@ -1199,7 +1159,8 @@ class TestUserSet(TestUser): def test_user_set_name(self): arglist = [ - '--name', 'qwerty', + '--name', + 'qwerty', self.user.name, ] verifylist = [ @@ -1222,17 +1183,16 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_specify_domain(self): arglist = [ - '--name', 'qwerty', - '--domain', self.domain.id, - self.user2.name + '--name', + 'qwerty', + '--domain', + self.domain.id, + self.user2.name, ] verifylist = [ ('name', 'qwerty'), @@ -1248,20 +1208,15 @@ class TestUserSet(TestUser): result = self.cmd.take_action(parsed_args) - kwargs = { - 'enabled': True, - 'name': 'qwerty' - } + kwargs = {'enabled': True, 'name': 'qwerty'} - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_password(self): arglist = [ - '--password', 'secret', + '--password', + 'secret', self.user.name, ] verifylist = [ @@ -1285,10 +1240,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_password_prompt(self): @@ -1320,15 +1272,13 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_email(self): arglist = [ - '--email', 'barney@example.com', + '--email', + 'barney@example.com', self.user.name, ] verifylist = [ @@ -1351,15 +1301,13 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_project(self): arglist = [ - '--project', self.project.id, + '--project', + self.project.id, self.user.name, ] verifylist = [ @@ -1382,16 +1330,15 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_project_domain(self): arglist = [ - '--project', self.project.id, - '--project-domain', self.project.domain_id, + '--project', + self.project.id, + '--project-domain', + self.project.domain_id, self.user.name, ] verifylist = [ @@ -1415,10 +1362,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_enable(self): @@ -1445,10 +1389,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_disable(self): @@ -1475,10 +1416,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_ignore_lockout_failure_attempts(self): @@ -1506,10 +1444,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_no_ignore_lockout_failure_attempts(self): @@ -1537,10 +1472,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_ignore_password_expiry(self): @@ -1568,10 +1500,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_no_ignore_password_expiry(self): @@ -1599,10 +1528,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_ignore_change_password_upon_first_use(self): @@ -1630,10 +1556,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_no_ignore_change_password_upon_first_use(self): @@ -1661,10 +1584,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_enable_lock_password(self): @@ -1692,10 +1612,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_disable_lock_password(self): @@ -1723,10 +1640,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_enable_multi_factor_auth(self): @@ -1754,10 +1668,7 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_disable_multi_factor_auth(self): @@ -1785,15 +1696,13 @@ class TestUserSet(TestUser): } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_option_multi_factor_auth_rule(self): arglist = [ - '--multi-factor-auth-rule', identity_fakes.mfa_opt1, + '--multi-factor-auth-rule', + identity_fakes.mfa_opt1, self.user.name, ] verifylist = [ @@ -1812,21 +1721,20 @@ class TestUserSet(TestUser): # Set expected values kwargs = { 'enabled': True, - 'options': {'multi_factor_auth_rules': [["password", "totp"]]}} + 'options': {'multi_factor_auth_rules': [["password", "totp"]]}, + } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) def test_user_set_with_multiple_options(self): arglist = [ '--ignore-password-expiry', '--enable-multi-factor-auth', - '--multi-factor-auth-rule', identity_fakes.mfa_opt1, + '--multi-factor-auth-rule', + identity_fakes.mfa_opt1, self.user.name, ] verifylist = [ @@ -1847,21 +1755,20 @@ class TestUserSet(TestUser): # Set expected values kwargs = { 'enabled': True, - 'options': {'ignore_password_expiry': True, - 'multi_factor_auth_enabled': True, - 'multi_factor_auth_rules': [["password", "totp"]]}} + 'options': { + 'ignore_password_expiry': True, + 'multi_factor_auth_enabled': True, + 'multi_factor_auth_rules': [["password", "totp"]], + }, + } # UserManager.update(user, name=, domain=, project=, password=, # email=, description=, enabled=, default_project=) - self.users_mock.update.assert_called_with( - self.user.id, - **kwargs - ) + self.users_mock.update.assert_called_with(self.user.id, **kwargs) self.assertIsNone(result) class TestUserSetPassword(TestUser): - def setUp(self): super(TestUserSetPassword, self).setUp() self.cmd = user.SetPasswordUser(self.app, None) @@ -1877,7 +1784,8 @@ class TestUserSetPassword(TestUser): current_pass = 'old_pass' new_pass = 'new_pass' arglist = [ - '--password', new_pass, + '--password', + new_pass, ] verifylist = [ ('password', new_pass), @@ -1911,8 +1819,10 @@ class TestUserSetPassword(TestUser): current_pass = 'old_pass' new_pass = 'new_pass' arglist = [ - '--password', new_pass, - '--original-password', current_pass, + '--password', + new_pass, + '--original-password', + current_pass, ] verifylist = [ ('password', new_pass), @@ -1929,7 +1839,6 @@ class TestUserSetPassword(TestUser): class TestUserShow(TestUser): - user = identity_fakes.FakeUser.create_one_user() def setUp(self): @@ -1939,17 +1848,18 @@ class TestUserShow(TestUser): # Get the command object to test self.cmd = user.ShowUser(self.app, None) - self.app.client_manager.identity.auth.client.get_user_id.\ - return_value = self.user.id - self.app.client_manager.identity.tokens.get_token_data.return_value = \ - {'token': - {'user': - {'domain': {'id': self.user.domain_id}, - 'id': self.user.id, - 'name': self.user.name, - } - } - } + self.app.client_manager.identity.auth.client.get_user_id.return_value = ( # noqa: E501 + self.user.id + ) + self.app.client_manager.identity.tokens.get_token_data.return_value = { + 'token': { + 'user': { + 'domain': {'id': self.user.domain_id}, + 'id': self.user.id, + 'name': self.user.name, + } + } + } def test_user_show(self): arglist = [ @@ -1967,8 +1877,14 @@ class TestUserShow(TestUser): self.users_mock.get.assert_called_with(self.user.id) - collist = ('default_project_id', 'domain_id', 'email', - 'enabled', 'id', 'name') + collist = ( + 'default_project_id', + 'domain_id', + 'email', + 'enabled', + 'id', + 'name', + ) self.assertEqual(collist, columns) datalist = ( self.user.default_project_id, @@ -1982,11 +1898,13 @@ class TestUserShow(TestUser): def test_user_show_with_domain(self): user = identity_fakes.FakeUser.create_one_user( - {"name": self.user.name}) + {"name": self.user.name} + ) identity_client = self.app.client_manager.identity arglist = [ - "--domain", self.user.domain_id, + "--domain", + self.user.domain_id, user.name, ] verifylist = [ @@ -1995,13 +1913,14 @@ class TestUserShow(TestUser): ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - user_str = common._get_token_resource(identity_client, 'user', - parsed_args.user, - parsed_args.domain) + user_str = common._get_token_resource( + identity_client, 'user', parsed_args.user, parsed_args.domain + ) self.assertEqual(self.user.id, user_str) arglist = [ - "--domain", user.domain_id, + "--domain", + user.domain_id, user.name, ] verifylist = [ @@ -2010,7 +1929,7 @@ class TestUserShow(TestUser): ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) - user_str = common._get_token_resource(identity_client, 'user', - parsed_args.user, - parsed_args.domain) + user_str = common._get_token_resource( + identity_client, 'user', parsed_args.user, parsed_args.domain + ) self.assertEqual(user.name, user_str)