def add_global_args(parser, version): # GLOBAL ARGUMENTS parser.add_argument( '-h', '--help', action='store_true', help=argparse.SUPPRESS) parser.add_argument( '--version', action='version', version=version, help=_("Shows the client version and exits.")) parser.add_argument( '-d', '--debug', action='store_true', default=bool(utils.env('SENLINCLIENT_DEBUG')), help=_('Defaults to env[SENLINCLIENT_DEBUG].')) parser.add_argument( '-v', '--verbose', action="store_true", default=False, help=_("Print more verbose output.")) parser.add_argument( '--api-timeout', help=_('Number of seconds to wait for an API response, ' 'defaults to system socket timeout')) parser.add_argument( '--senlin-api-version', default=utils.env('SENLIN_API_VERSION', default='1'), help=_('Version number for Senlin API to use, Default to "1".'))
def add_global_args(parser, version): # GLOBAL ARGUMENTS parser.add_argument('-h', '--help', action='store_true', help=argparse.SUPPRESS) parser.add_argument('--version', action='version', version=version, help=_("Shows the client version and exits.")) parser.add_argument('-d', '--debug', action='store_true', default=bool(utils.env('SENLINCLIENT_DEBUG')), help=_('Defaults to env[SENLINCLIENT_DEBUG].')) parser.add_argument('-v', '--verbose', action="store_true", default=False, help=_("Print more verbose output.")) parser.add_argument('--api-timeout', help=_( 'Number of seconds to wait for an API response, ' 'defaults to system socket timeout')) parser.add_argument( '--senlin-api-version', default=utils.env('SENLIN_API_VERSION', default='1'), help=_('Version number for Senlin API to use, Default to "1".'))
def add_profiler_args(self, parser): if osprofiler_profiler: parser.add_argument( '--os-profile', metavar='HMAC_KEY', default=utils.env('OS_PROFILE'), help=_('HMAC key to use for encrypting context data for ' 'performance profiling of operation. This key should ' 'be the value of HMAC key configured in ' 'senlin configuration (/etc/senlin/senlin.conf). ' 'Without the key, profiling will not be triggered ' 'even if osprofiler is enabled on server side.'))
def add_global_identity_args(parser): parser.add_argument( '--os-auth-plugin', dest='auth_plugin', metavar='AUTH_PLUGIN', default=utils.env('OS_AUTH_PLUGIN', default=None), help=_('Authentication plugin, default to env[OS_AUTH_PLUGIN]')) parser.add_argument( '--os-auth-url', dest='auth_url', metavar='AUTH_URL', default=utils.env('OS_AUTH_URL'), help=_('Defaults to env[OS_AUTH_URL]')) parser.add_argument( '--os-project-id', dest='project_id', metavar='PROJECT_ID', default=utils.env('OS_PROJECT_ID'), help=_('Defaults to env[OS_PROJECT_ID].')) parser.add_argument( '--os-project-name', dest='project_name', metavar='PROJECT_NAME', default=utils.env('OS_PROJECT_NAME'), help=_('Defaults to env[OS_PROJECT_NAME].')) parser.add_argument( '--os-tenant-id', dest='tenant_id', metavar='TENANT_ID', default=utils.env('OS_TENANT_ID'), help=_('Defaults to env[OS_TENANT_ID].')) parser.add_argument( '--os-tenant-name', dest='tenant_name', metavar='TENANT_NAME', default=utils.env('OS_TENANT_NAME'), help=_('Defaults to env[OS_TENANT_NAME].')) parser.add_argument( '--os-domain-id', dest='domain_id', metavar='DOMAIN_ID', default=utils.env('OS_DOMAIN_ID'), help=_('Domain ID for scope of authorization, defaults to ' 'env[OS_DOMAIN_ID].')) parser.add_argument( '--os-domain-name', dest='domain_name', metavar='DOMAIN_NAME', default=utils.env('OS_DOMAIN_NAME'), help=_('Domain name for scope of authorization, defaults to ' 'env[OS_DOMAIN_NAME].')) parser.add_argument( '--os-project-domain-id', dest='project_domain_id', metavar='PROJECT_DOMAIN_ID', default=utils.env('OS_PROJECT_DOMAIN_ID'), help=_('Project domain ID for scope of authorization, defaults to ' 'env[OS_PROJECT_DOMAIN_ID].')) parser.add_argument( '--os-project-domain-name', dest='project_domain_name', metavar='PROJECT_DOMAIN_NAME', default=utils.env('OS_PROJECT_DOMAIN_NAME'), help=_('Project domain name for scope of authorization, defaults to ' 'env[OS_PROJECT_DOMAIN_NAME].')) parser.add_argument( '--os-user-domain-id', dest='user_domain_id', metavar='USER_DOMAIN_ID', default=utils.env('OS_USER_DOMAIN_ID'), help=_('User domain ID for scope of authorization, defaults to ' 'env[OS_USER_DOMAIN_ID].')) parser.add_argument( '--os-user-domain-name', dest='user_domain_name', metavar='USER_DOMAIN_NAME', default=utils.env('OS_USER_DOMAIN_NAME'), help=_('User domain name for scope of authorization, defaults to ' 'env[OS_USER_DOMAIN_NAME].')) parser.add_argument( '--os-username', dest='username', metavar='USERNAME', default=utils.env('OS_USERNAME'), help=_('Defaults to env[OS_USERNAME].')) parser.add_argument( '--os-user-id', dest='user_id', metavar='USER_ID', default=utils.env('OS_USER_ID'), help=_('Defaults to env[OS_USER_ID].')) parser.add_argument( '--os-password', dest='password', metavar='PASSWORD', default=utils.env('OS_PASSWORD'), help=_('Defaults to env[OS_PASSWORD]')) parser.add_argument( '--os-trust-id', dest='trust_id', metavar='TRUST_ID', default=utils.env('OS_TRUST_ID'), help=_('Defaults to env[OS_TRUST_ID]')) verify_group = parser.add_mutually_exclusive_group() verify_group.add_argument( '--os-cacert', dest='verify', metavar='CA_BUNDLE_FILE', default=utils.env('OS_CACERT', default=True), help=_('Path of CA TLS certificate(s) used to verify the remote ' 'server\'s certificate. Without this option senlin looks ' 'for the default system CA certificates.')) verify_group.add_argument( '--verify', action='store_true', help=_('Verify server certificate (default)')) verify_group.add_argument( '--insecure', dest='verify', action='store_false', help=_('Explicitly allow senlinclient to perform "insecure SSL" ' '(HTTPS) requests. The server\'s certificate will not be ' 'verified against any certificate authorities. This ' 'option should be used with caution.')) parser.add_argument( '--os-token', dest='token', metavar='TOKEN', default=utils.env('OS_TOKEN', default=None), help=_('A string token to bootstrap the Keystone database, defaults ' 'to env[OS_TOKEN]')) parser.add_argument( '--os-access-info', dest='access_info', metavar='ACCESS_INFO', default=utils.env('OS_ACCESS_INFO'), help=_('Access info, defaults to env[OS_ACCESS_INFO]')) parser.add_argument( '--os-api-name', dest='user_preferences', metavar='<service>=<name>', action=sdk.ProfileAction, default=sdk.ProfileAction.env('OS_API_NAME'), help=_('Desired API names, defaults to env[OS_API_NAME]')) parser.add_argument( '--os-api-region', dest='user_preferences', metavar='<service>=<region>', action=sdk.ProfileAction, default=sdk.ProfileAction.env('OS_API_REGION', 'OS_REGION_NAME'), help=_('Desired API region, defaults to env[OS_API_REGION]')) parser.add_argument( '--os-api-version', dest='user_preferences', metavar='<service>=<version>', action=sdk.ProfileAction, default=sdk.ProfileAction.env('OS_API_VERSION'), help=_('Desired API versions, defaults to env[OS_API_VERSION]')) parser.add_argument( '--os-api-interface', dest='user_preferences', metavar='<service>=<interface>', action=sdk.ProfileAction, default=sdk.ProfileAction.env('OS_INTERFACE'), help=_('Desired API interface, defaults to env[OS_INTERFACE]'))
def add_global_identity_args(parser): parser.add_argument( '--os-auth-plugin', dest='auth_plugin', metavar='AUTH_PLUGIN', default=utils.env('OS_AUTH_PLUGIN', default=None), help=_('Authentication plugin, default to env[OS_AUTH_PLUGIN]')) parser.add_argument('--os-auth-url', dest='auth_url', metavar='AUTH_URL', default=utils.env('OS_AUTH_URL'), help=_('Defaults to env[OS_AUTH_URL]')) parser.add_argument('--os-project-id', dest='project_id', metavar='PROJECT_ID', default=utils.env('OS_PROJECT_ID'), help=_('Defaults to env[OS_PROJECT_ID].')) parser.add_argument('--os-project-name', dest='project_name', metavar='PROJECT_NAME', default=utils.env('OS_PROJECT_NAME'), help=_('Defaults to env[OS_PROJECT_NAME].')) parser.add_argument('--os-tenant-id', dest='tenant_id', metavar='TENANT_ID', default=utils.env('OS_TENANT_ID'), help=_('Defaults to env[OS_TENANT_ID].')) parser.add_argument('--os-tenant-name', dest='tenant_name', metavar='TENANT_NAME', default=utils.env('OS_TENANT_NAME'), help=_('Defaults to env[OS_TENANT_NAME].')) parser.add_argument( '--os-domain-id', dest='domain_id', metavar='DOMAIN_ID', default=utils.env('OS_DOMAIN_ID'), help=_('Domain ID for scope of authorization, defaults to ' 'env[OS_DOMAIN_ID].')) parser.add_argument( '--os-domain-name', dest='domain_name', metavar='DOMAIN_NAME', default=utils.env('OS_DOMAIN_NAME'), help=_('Domain name for scope of authorization, defaults to ' 'env[OS_DOMAIN_NAME].')) parser.add_argument( '--os-project-domain-id', dest='project_domain_id', metavar='PROJECT_DOMAIN_ID', default=utils.env('OS_PROJECT_DOMAIN_ID'), help=_('Project domain ID for scope of authorization, defaults to ' 'env[OS_PROJECT_DOMAIN_ID].')) parser.add_argument( '--os-project-domain-name', dest='project_domain_name', metavar='PROJECT_DOMAIN_NAME', default=utils.env('OS_PROJECT_DOMAIN_NAME'), help=_('Project domain name for scope of authorization, defaults to ' 'env[OS_PROJECT_DOMAIN_NAME].')) parser.add_argument( '--os-user-domain-id', dest='user_domain_id', metavar='USER_DOMAIN_ID', default=utils.env('OS_USER_DOMAIN_ID'), help=_('User domain ID for scope of authorization, defaults to ' 'env[OS_USER_DOMAIN_ID].')) parser.add_argument( '--os-user-domain-name', dest='user_domain_name', metavar='USER_DOMAIN_NAME', default=utils.env('OS_USER_DOMAIN_NAME'), help=_('User domain name for scope of authorization, defaults to ' 'env[OS_USER_DOMAIN_NAME].')) parser.add_argument('--os-username', dest='username', metavar='USERNAME', default=utils.env('OS_USERNAME'), help=_('Defaults to env[OS_USERNAME].')) parser.add_argument('--os-user-id', dest='user_id', metavar='USER_ID', default=utils.env('OS_USER_ID'), help=_('Defaults to env[OS_USER_ID].')) parser.add_argument('--os-password', dest='password', metavar='PASSWORD', default=utils.env('OS_PASSWORD'), help=_('Defaults to env[OS_PASSWORD]')) parser.add_argument('--os-trust-id', dest='trust_id', metavar='TRUST_ID', default=utils.env('OS_TRUST_ID'), help=_('Defaults to env[OS_TRUST_ID]')) verify_group = parser.add_mutually_exclusive_group() verify_group.add_argument( '--os-cacert', dest='verify', metavar='CA_BUNDLE_FILE', default=utils.env('OS_CACERT', default=True), help=_('Path of CA TLS certificate(s) used to verify the remote ' 'server\'s certificate. Without this option senlin looks ' 'for the default system CA certificates.')) verify_group.add_argument('--verify', action='store_true', help=_('Verify server certificate (default)')) verify_group.add_argument( '--insecure', dest='verify', action='store_false', help=_('Explicitly allow senlinclient to perform "insecure SSL" ' '(HTTPS) requests. The server\'s certificate will not be ' 'verified against any certificate authorities. This ' 'option should be used with caution.')) parser.add_argument( '--os-token', dest='token', metavar='TOKEN', default=utils.env('OS_TOKEN', default=None), help=_('A string token to bootstrap the Keystone database, defaults ' 'to env[OS_TOKEN]')) parser.add_argument('--os-access-info', dest='access_info', metavar='ACCESS_INFO', default=utils.env('OS_ACCESS_INFO'), help=_('Access info, defaults to env[OS_ACCESS_INFO]')) parser.add_argument( '--os-api-name', dest='user_preferences', metavar='<service>=<name>', action=sdk.ProfileAction, default=sdk.ProfileAction.env('OS_API_NAME'), help=_('Desired API names, defaults to env[OS_API_NAME]')) parser.add_argument( '--os-api-region', dest='user_preferences', metavar='<service>=<region>', action=sdk.ProfileAction, default=sdk.ProfileAction.env('OS_API_REGION', 'OS_REGION_NAME'), help=_('Desired API region, defaults to env[OS_API_REGION]')) parser.add_argument( '--os-api-version', dest='user_preferences', metavar='<service>=<version>', action=sdk.ProfileAction, default=sdk.ProfileAction.env('OS_API_VERSION'), help=_('Desired API versions, defaults to env[OS_API_VERSION]')) parser.add_argument( '--os-api-interface', dest='user_preferences', metavar='<service>=<interface>', action=sdk.ProfileAction, default=sdk.ProfileAction.env('OS_INTERFACE'), help=_('Desired API interface, defaults to env[OS_INTERFACE]'))