def add_global_args(parser, version):
    # GLOBAL ARGUMENTS
    parser.add_argument(
        '-h', '--help', action='store_true',
        help=argparse.SUPPRESS)

    parser.add_argument(
        '--version', action='version', version=version,
        help=_("Shows the client version and exits."))

    parser.add_argument(
        '-d', '--debug', action='store_true',
        default=bool(utils.env('SENLINCLIENT_DEBUG')),
        help=_('Defaults to env[SENLINCLIENT_DEBUG].'))

    parser.add_argument(
        '-v', '--verbose', action="store_true", default=False,
        help=_("Print more verbose output."))

    parser.add_argument(
        '--api-timeout',
        help=_('Number of seconds to wait for an API response, '
               'defaults to system socket timeout'))

    parser.add_argument(
        '--senlin-api-version',
        default=utils.env('SENLIN_API_VERSION', default='1'),
        help=_('Version number for Senlin API to use, Default to "1".'))
Example #2
0
def add_global_args(parser, version):
    # GLOBAL ARGUMENTS
    parser.add_argument('-h',
                        '--help',
                        action='store_true',
                        help=argparse.SUPPRESS)

    parser.add_argument('--version',
                        action='version',
                        version=version,
                        help=_("Shows the client version and exits."))

    parser.add_argument('-d',
                        '--debug',
                        action='store_true',
                        default=bool(utils.env('SENLINCLIENT_DEBUG')),
                        help=_('Defaults to env[SENLINCLIENT_DEBUG].'))

    parser.add_argument('-v',
                        '--verbose',
                        action="store_true",
                        default=False,
                        help=_("Print more verbose output."))

    parser.add_argument('--api-timeout',
                        help=_(
                            'Number of seconds to wait for an API response, '
                            'defaults to system socket timeout'))

    parser.add_argument(
        '--senlin-api-version',
        default=utils.env('SENLIN_API_VERSION', default='1'),
        help=_('Version number for Senlin API to use, Default to "1".'))
 def add_profiler_args(self, parser):
     if osprofiler_profiler:
         parser.add_argument(
             '--os-profile',
             metavar='HMAC_KEY',
             default=utils.env('OS_PROFILE'),
             help=_('HMAC key to use for encrypting context data for '
                    'performance profiling of operation. This key should '
                    'be the value of HMAC key configured in '
                    'senlin configuration (/etc/senlin/senlin.conf). '
                    'Without the key, profiling will not be triggered '
                    'even if osprofiler is enabled on server side.'))
def add_global_identity_args(parser):
    parser.add_argument(
        '--os-auth-plugin', dest='auth_plugin', metavar='AUTH_PLUGIN',
        default=utils.env('OS_AUTH_PLUGIN', default=None),
        help=_('Authentication plugin, default to env[OS_AUTH_PLUGIN]'))

    parser.add_argument(
        '--os-auth-url', dest='auth_url', metavar='AUTH_URL',
        default=utils.env('OS_AUTH_URL'),
        help=_('Defaults to env[OS_AUTH_URL]'))

    parser.add_argument(
        '--os-project-id', dest='project_id', metavar='PROJECT_ID',
        default=utils.env('OS_PROJECT_ID'),
        help=_('Defaults to env[OS_PROJECT_ID].'))

    parser.add_argument(
        '--os-project-name', dest='project_name', metavar='PROJECT_NAME',
        default=utils.env('OS_PROJECT_NAME'),
        help=_('Defaults to env[OS_PROJECT_NAME].'))

    parser.add_argument(
        '--os-tenant-id', dest='tenant_id', metavar='TENANT_ID',
        default=utils.env('OS_TENANT_ID'),
        help=_('Defaults to env[OS_TENANT_ID].'))

    parser.add_argument(
        '--os-tenant-name', dest='tenant_name', metavar='TENANT_NAME',
        default=utils.env('OS_TENANT_NAME'),
        help=_('Defaults to env[OS_TENANT_NAME].'))

    parser.add_argument(
        '--os-domain-id', dest='domain_id', metavar='DOMAIN_ID',
        default=utils.env('OS_DOMAIN_ID'),
        help=_('Domain ID for scope of authorization, defaults to '
               'env[OS_DOMAIN_ID].'))

    parser.add_argument(
        '--os-domain-name', dest='domain_name', metavar='DOMAIN_NAME',
        default=utils.env('OS_DOMAIN_NAME'),
        help=_('Domain name for scope of authorization, defaults to '
               'env[OS_DOMAIN_NAME].'))

    parser.add_argument(
        '--os-project-domain-id', dest='project_domain_id',
        metavar='PROJECT_DOMAIN_ID',
        default=utils.env('OS_PROJECT_DOMAIN_ID'),
        help=_('Project domain ID for scope of authorization, defaults to '
               'env[OS_PROJECT_DOMAIN_ID].'))

    parser.add_argument(
        '--os-project-domain-name', dest='project_domain_name',
        metavar='PROJECT_DOMAIN_NAME',
        default=utils.env('OS_PROJECT_DOMAIN_NAME'),
        help=_('Project domain name for scope of authorization, defaults to '
               'env[OS_PROJECT_DOMAIN_NAME].'))

    parser.add_argument(
        '--os-user-domain-id', dest='user_domain_id',
        metavar='USER_DOMAIN_ID',
        default=utils.env('OS_USER_DOMAIN_ID'),
        help=_('User domain ID for scope of authorization, defaults to '
               'env[OS_USER_DOMAIN_ID].'))

    parser.add_argument(
        '--os-user-domain-name', dest='user_domain_name',
        metavar='USER_DOMAIN_NAME',
        default=utils.env('OS_USER_DOMAIN_NAME'),
        help=_('User domain name for scope of authorization, defaults to '
               'env[OS_USER_DOMAIN_NAME].'))

    parser.add_argument(
        '--os-username', dest='username', metavar='USERNAME',
        default=utils.env('OS_USERNAME'),
        help=_('Defaults to env[OS_USERNAME].'))

    parser.add_argument(
        '--os-user-id', dest='user_id', metavar='USER_ID',
        default=utils.env('OS_USER_ID'),
        help=_('Defaults to env[OS_USER_ID].'))

    parser.add_argument(
        '--os-password', dest='password', metavar='PASSWORD',
        default=utils.env('OS_PASSWORD'),
        help=_('Defaults to env[OS_PASSWORD]'))

    parser.add_argument(
        '--os-trust-id', dest='trust_id', metavar='TRUST_ID',
        default=utils.env('OS_TRUST_ID'),
        help=_('Defaults to env[OS_TRUST_ID]'))

    verify_group = parser.add_mutually_exclusive_group()

    verify_group.add_argument(
        '--os-cacert', dest='verify', metavar='CA_BUNDLE_FILE',
        default=utils.env('OS_CACERT', default=True),
        help=_('Path of CA TLS certificate(s) used to verify the remote '
               'server\'s certificate. Without this option senlin looks '
               'for the default system CA certificates.'))

    verify_group.add_argument(
        '--verify',
        action='store_true',
        help=_('Verify server certificate (default)'))

    verify_group.add_argument(
        '--insecure', dest='verify', action='store_false',
        help=_('Explicitly allow senlinclient to perform "insecure SSL" '
               '(HTTPS) requests. The server\'s certificate will not be '
               'verified against any certificate authorities. This '
               'option should be used with caution.'))

    parser.add_argument(
        '--os-token', dest='token', metavar='TOKEN',
        default=utils.env('OS_TOKEN', default=None),
        help=_('A string token to bootstrap the Keystone database, defaults '
               'to env[OS_TOKEN]'))

    parser.add_argument(
        '--os-access-info', dest='access_info', metavar='ACCESS_INFO',
        default=utils.env('OS_ACCESS_INFO'),
        help=_('Access info, defaults to env[OS_ACCESS_INFO]'))

    parser.add_argument(
        '--os-api-name', dest='user_preferences',
        metavar='<service>=<name>',
        action=sdk.ProfileAction,
        default=sdk.ProfileAction.env('OS_API_NAME'),
        help=_('Desired API names, defaults to env[OS_API_NAME]'))

    parser.add_argument(
        '--os-api-region', dest='user_preferences',
        metavar='<service>=<region>',
        action=sdk.ProfileAction,
        default=sdk.ProfileAction.env('OS_API_REGION', 'OS_REGION_NAME'),
        help=_('Desired API region, defaults to env[OS_API_REGION]'))

    parser.add_argument(
        '--os-api-version', dest='user_preferences',
        metavar='<service>=<version>',
        action=sdk.ProfileAction,
        default=sdk.ProfileAction.env('OS_API_VERSION'),
        help=_('Desired API versions, defaults to env[OS_API_VERSION]'))

    parser.add_argument(
        '--os-api-interface', dest='user_preferences',
        metavar='<service>=<interface>',
        action=sdk.ProfileAction,
        default=sdk.ProfileAction.env('OS_INTERFACE'),
        help=_('Desired API interface, defaults to env[OS_INTERFACE]'))
Example #5
0
def add_global_identity_args(parser):
    parser.add_argument(
        '--os-auth-plugin',
        dest='auth_plugin',
        metavar='AUTH_PLUGIN',
        default=utils.env('OS_AUTH_PLUGIN', default=None),
        help=_('Authentication plugin, default to env[OS_AUTH_PLUGIN]'))

    parser.add_argument('--os-auth-url',
                        dest='auth_url',
                        metavar='AUTH_URL',
                        default=utils.env('OS_AUTH_URL'),
                        help=_('Defaults to env[OS_AUTH_URL]'))

    parser.add_argument('--os-project-id',
                        dest='project_id',
                        metavar='PROJECT_ID',
                        default=utils.env('OS_PROJECT_ID'),
                        help=_('Defaults to env[OS_PROJECT_ID].'))

    parser.add_argument('--os-project-name',
                        dest='project_name',
                        metavar='PROJECT_NAME',
                        default=utils.env('OS_PROJECT_NAME'),
                        help=_('Defaults to env[OS_PROJECT_NAME].'))

    parser.add_argument('--os-tenant-id',
                        dest='tenant_id',
                        metavar='TENANT_ID',
                        default=utils.env('OS_TENANT_ID'),
                        help=_('Defaults to env[OS_TENANT_ID].'))

    parser.add_argument('--os-tenant-name',
                        dest='tenant_name',
                        metavar='TENANT_NAME',
                        default=utils.env('OS_TENANT_NAME'),
                        help=_('Defaults to env[OS_TENANT_NAME].'))

    parser.add_argument(
        '--os-domain-id',
        dest='domain_id',
        metavar='DOMAIN_ID',
        default=utils.env('OS_DOMAIN_ID'),
        help=_('Domain ID for scope of authorization, defaults to '
               'env[OS_DOMAIN_ID].'))

    parser.add_argument(
        '--os-domain-name',
        dest='domain_name',
        metavar='DOMAIN_NAME',
        default=utils.env('OS_DOMAIN_NAME'),
        help=_('Domain name for scope of authorization, defaults to '
               'env[OS_DOMAIN_NAME].'))

    parser.add_argument(
        '--os-project-domain-id',
        dest='project_domain_id',
        metavar='PROJECT_DOMAIN_ID',
        default=utils.env('OS_PROJECT_DOMAIN_ID'),
        help=_('Project domain ID for scope of authorization, defaults to '
               'env[OS_PROJECT_DOMAIN_ID].'))

    parser.add_argument(
        '--os-project-domain-name',
        dest='project_domain_name',
        metavar='PROJECT_DOMAIN_NAME',
        default=utils.env('OS_PROJECT_DOMAIN_NAME'),
        help=_('Project domain name for scope of authorization, defaults to '
               'env[OS_PROJECT_DOMAIN_NAME].'))

    parser.add_argument(
        '--os-user-domain-id',
        dest='user_domain_id',
        metavar='USER_DOMAIN_ID',
        default=utils.env('OS_USER_DOMAIN_ID'),
        help=_('User domain ID for scope of authorization, defaults to '
               'env[OS_USER_DOMAIN_ID].'))

    parser.add_argument(
        '--os-user-domain-name',
        dest='user_domain_name',
        metavar='USER_DOMAIN_NAME',
        default=utils.env('OS_USER_DOMAIN_NAME'),
        help=_('User domain name for scope of authorization, defaults to '
               'env[OS_USER_DOMAIN_NAME].'))

    parser.add_argument('--os-username',
                        dest='username',
                        metavar='USERNAME',
                        default=utils.env('OS_USERNAME'),
                        help=_('Defaults to env[OS_USERNAME].'))

    parser.add_argument('--os-user-id',
                        dest='user_id',
                        metavar='USER_ID',
                        default=utils.env('OS_USER_ID'),
                        help=_('Defaults to env[OS_USER_ID].'))

    parser.add_argument('--os-password',
                        dest='password',
                        metavar='PASSWORD',
                        default=utils.env('OS_PASSWORD'),
                        help=_('Defaults to env[OS_PASSWORD]'))

    parser.add_argument('--os-trust-id',
                        dest='trust_id',
                        metavar='TRUST_ID',
                        default=utils.env('OS_TRUST_ID'),
                        help=_('Defaults to env[OS_TRUST_ID]'))

    verify_group = parser.add_mutually_exclusive_group()

    verify_group.add_argument(
        '--os-cacert',
        dest='verify',
        metavar='CA_BUNDLE_FILE',
        default=utils.env('OS_CACERT', default=True),
        help=_('Path of CA TLS certificate(s) used to verify the remote '
               'server\'s certificate. Without this option senlin looks '
               'for the default system CA certificates.'))

    verify_group.add_argument('--verify',
                              action='store_true',
                              help=_('Verify server certificate (default)'))

    verify_group.add_argument(
        '--insecure',
        dest='verify',
        action='store_false',
        help=_('Explicitly allow senlinclient to perform "insecure SSL" '
               '(HTTPS) requests. The server\'s certificate will not be '
               'verified against any certificate authorities. This '
               'option should be used with caution.'))

    parser.add_argument(
        '--os-token',
        dest='token',
        metavar='TOKEN',
        default=utils.env('OS_TOKEN', default=None),
        help=_('A string token to bootstrap the Keystone database, defaults '
               'to env[OS_TOKEN]'))

    parser.add_argument('--os-access-info',
                        dest='access_info',
                        metavar='ACCESS_INFO',
                        default=utils.env('OS_ACCESS_INFO'),
                        help=_('Access info, defaults to env[OS_ACCESS_INFO]'))

    parser.add_argument(
        '--os-api-name',
        dest='user_preferences',
        metavar='<service>=<name>',
        action=sdk.ProfileAction,
        default=sdk.ProfileAction.env('OS_API_NAME'),
        help=_('Desired API names, defaults to env[OS_API_NAME]'))

    parser.add_argument(
        '--os-api-region',
        dest='user_preferences',
        metavar='<service>=<region>',
        action=sdk.ProfileAction,
        default=sdk.ProfileAction.env('OS_API_REGION', 'OS_REGION_NAME'),
        help=_('Desired API region, defaults to env[OS_API_REGION]'))

    parser.add_argument(
        '--os-api-version',
        dest='user_preferences',
        metavar='<service>=<version>',
        action=sdk.ProfileAction,
        default=sdk.ProfileAction.env('OS_API_VERSION'),
        help=_('Desired API versions, defaults to env[OS_API_VERSION]'))

    parser.add_argument(
        '--os-api-interface',
        dest='user_preferences',
        metavar='<service>=<interface>',
        action=sdk.ProfileAction,
        default=sdk.ProfileAction.env('OS_INTERFACE'),
        help=_('Desired API interface, defaults to env[OS_INTERFACE]'))